SlideShare ist ein Scribd-Unternehmen logo
1 von 25
Downloaden Sie, um offline zu lesen
Machine To Machine
Internet of Things
Challenges for M2M & IoT
M2M SIMs and embedded SIMs
Machine to Machine, M2M
•Refers to the technologies that enable products or “things” to
communicate with each other – and with other Internet-
enabled devices and systems.
Internet of Things (IoT)
•Refers to any wire- or wirelessly connected physical object,
including transportation vehicles, sensors, mobile phones or
even people. This is where Machine to Machine (M2M)
technology comes into play - M2M enables the connection of
‘things’.
RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION
Year 2003 2015 2020
World population Estimated (Billion) 6.3 7.4 7.7
Estimated # of total connected devices (Million) 500 13.4 38.5
Connected devices per person 0.08 1.48 4.65
Machine to Machine, M2M
Challenges of M2M / IoT
connectivity include:
1. Cost control
• As more devices become connected,
how can businesses monitor, manage
and adapt to connectivity costs?
2. Management of many devices
• How can businesses best keep track of,
maintain and regulate the connectivity
of each device without excessive time
and resources?
3. Security
• How do businesses deal with an
increased amount of data
communicated via public channels like
the internet? How can businesses
protect against hackers gaining access to
private networks and misusing data?
4. Increased complexity
• How should businesses best interpret
and use their data to effectively
monetize the IoT using advanced tools
and APIs
Challenges – M2M / IoT
Identify the decision
maker
•Knowing the decision
maker is crucial to a
quick close
Be a consultant and
advice / Be real
•Convey to the client
that you care about
their business and
not just the deal
Create a sense of
urgency
•Attach a deadline to
the deal for clients to
commit.
Overcome objections
•Sales presentation
must address and
overcome potential
objections can
speed up any deal
Know your
competition
•Knowing the areas
that you are more
competitive than
your competition
can lead to that
quick close.
Watch what you say
•Keep it to the point
and focus on your
areas of expertise.
Critical factors to close a deal
2FF – 4FF are Industrial Grade SIM with thicker PIN plate to
safeguard devices from:
Corrosion Vibrations Temperatures
Other
environmental
factors
Sim Cards – 4 sizes have features optimal for different business
cases
1FF –
First/largest
2FF – mini 3FF – Micro 4FF – Nano
MFF2 –
Embedded
(Smallest)
M2M SIMs
eUICC – Embedded SIM with Device
Logistic
• Device and Sim become one
component and works
globally.
• Installation of SIM during
device production, saves cost
on production and
distribution
Provisioning
• Management of SIM and
switching of MNOs are
seamless.
• Profiles can be changed
anytime without the need for
physical replacement
Connectivity
• Wireless capability is available
at anytime
• Reduces deployment time and
ease of access for end users
Global Connectivity - Universal Integrated Circuit Card (UICC)
Connectivity across multiple
countries - various MNOs & no
roaming charges
It is a feature in SIM, 2FF – 4FF
& MFF2
Minimum SIM memory 512K
Universal Integrated Circuit Card
Internet of Things – Physical +
Computer Systems
IoT Roadmap & Challenges
IoT Projected Device Users & Physical
Vulnerabilities
IoT Target Markets
IoT Device and The Usage
Cyber / Network Security
GSM Network & Protocols
Internet of Things (IoT) - Physical world + computer-based systems Integration
IoT becomes a cyber-physical systems-
When augmented with sensors and
actuators
• Encompasses technologies such as
• Smart grids
• Smart homes
• Intelligent transportation
• Smart cities
IoT is also expected to generate
• Large amounts of data from diverse locations
• Aggregation of the data
• Increase in the need to index, store and
process such data more effectively
•Electronics
•Software
•Sensors
•Actuators
•Network
connectivity
•That enable these
objects to collect
and exchange data
Internetworking
of physical or
smart devices
which are
embedded with
•Direct integration of
the physical world
into computer-based
systems
•IoT improves
•Efficiency
•Accuracy
•Economic benefit
IoT allows
objects to be
sensed and/or
controlled
remotely across
existing network
infrastructure
IoT has evolved due to a convergence
of multiple technologies
•Wireless communication
•Real-time analytics
•Machine learning
•Commodity sensors
•Embedded systems.
Smart device concept started at 1982,
a Coke vending machine became first
internet-connected appliance
•Able to report its inventory
•Whether newly loaded drinks were
cold
IoT Enabler - Roadmap
IoT concept became popular in 1999,
through Radio-frequency identification
(RFID)
If all objects and people in daily life were
equipped with identifiers, computers could
manage and inventory them
RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION
Year 2003 2015 2020
World population Estimated (Billion) 6.3 7.4 7.7
Estimated # of total connected devices (Million) 500 13.4 38.5
Connected devices per person 0.08 1.48 4.65
Challenges of IoT connectivity
Cost control
Increased in connected
devices, how can
businesses monitor,
manage and adapt to
connectivity costs
Devices Management
How businesses keep
track, maintain and
regulate the connectivity
of each devices without
excessive time and
resources
Security
How businesses deal
with increased in data
communicated via
internet?
Protection against
hackers gaining access to
private networks and
misusing data
Increased complexity
How should businesses
best interpret and use
their data to effectively
monetize the IoT using
advanced tools and APIs
Internet of Things and physical vulnerabilities
IoT - opportunities for direct
integration of physical world into
computer-based systems
This will also provide opportunities for misuse
Communication / transferring data between
connected devices are developed without
consideration of security challenges
As IoT grows widely, cyber attacks
are likely to become a physical
threat rather than virtual threat
If a front door's lock is connected to the Internet,
and can be locked/unlocked from a phone, then a
criminal could enter the home at the press of a
button from a stolen or hacked phone.
People could stand to lose much more than their
credit card numbers in a world controlled by IoT-
enabled devices.
Medical devices can be attacked for both in-
hospital diagnostic equipment and also in
implanted devices like pacemakers, insulin pumps
Media Environmental monitoring Infrastructure management
Manufacturing Energy management Medical and healthcare
Building and home
automation
Transportation
Metropolitan scale
deployments
Consumer application
IoT Target Verticals
*Heart monitoring implants
*Biochip transponders on farm animals
*Automobiles with built-in sensors
*DNA analysis devices for
environmental/food/pathogen
monitoring
*Field operation devices that assist
firefighters in search and rescue
operations
"Things,"refertovarietyofdevices:
These devices collect useful data with the help of various existing technologies and then autonomously flow the data
between other devices.
Smart home -
control and
automate
appliances
Lighting
Heating
Air
conditioning
Washer /
dryers
Ovens
Refrigerators /
freezers
Things in IoT
•CPU
•Memory
•Power resources
IoT used in nearly every field as because of the ability the network
embedded devices with limited
•Natural ecosystems
•Buildings and factories
IoT allows collection of information ranging from
•Intelligent shopping systems - monitors specific users' purchasing habits by tracking the mobile
phones. These users could then be offered with
•Special offers on their favourite products
•Even location of items that they need
IoT systems also can help in
•Sensing and actuating for applications that deal with heat, electricity and energy management
•Enabling extended home security features and home automation
•Internet of living things - biological sensors to analyse and study DNA or other molecules
Additional examples
Everything connected with the help of Internet
Consumer
application
Car
Entertainment
Residences/smart homes
Wearable technology
Quantified self
Connected health
Smart retail
Enterprise
application
Media & Big Data
Fleet Tracking
Environment Monitor
Energy Management
Medical Healthcare
Manufacturing
Infrastructure Management
Building Automation
IoT devices are created more for consumer use
IoT products
Classified in five
categories
Smart
wearable
Smart
home
Smart city
Smart
environment
Smart
enterprise
IoT Devices
The IoT products and solutions in
each of these markets have different
characteristics
Big data and the IoT work in conjunction – Media & Advertising Industry
Protection to
hardware/software
and the
information on
them from
•Theft or damage
•Disruption of service
•Misdirection of the services they
provide
•Network access
•Date / code injection
•Malpractice by operators - tricked into
deviating from secure procedures
Critical area as to
the increased
reliance on
computer systems
and the Internet
•Wireless networks such as Bluetooth
and Wi-Fi
•Growth of "smart" devices, including
smartphones, televisions
Cyber Security
Types of Vulnerabilities and attacks
Backdoors
Denial-of-service attack
Direct-access attacks
Eavesdropping
Spoofing
Tampering
Privilege escalation
Phishing
Clickjacking
Social engineering
Systems at risk
Financial systems
Utilities and industrial equipment
Aviation
Consumer devices
Large corporations
Automobiles
Government
Internet of Things and physical vulnerabilities
Network security
UMTS introduced - Universal Subscriber Identity
Module (USIM)
•For greater security
•Mutually authenticating
network and user
Uses a longer
authentication
key
•Authentication levels
•Authorization capabilities
•No non-repudiation.
GSM offers
limited
New attacks are due to
poor
•Security
implementations
•Architecture
•Development for
smartphone
applications
Wiretapping and
eavesdropping
techniques – allows
third party to listen in to
conversations
GSM was intended to be a
secure wireless system with
the user authentication using
•Pre-shared key and
challenge-response
•Over-the-air encryption
However, GSM is vulnerable to
different types of attack, each
of them aimed at a different
part of the network
GSM only authenticates the
user to the network (and not
vice versa)
Internet Protocol
In addition to offering more
addresses, IPv6 also implements
features not present in IPv4
*Address assignment
*Network renumbering
*Router announcements when
changing network connectivity
providers
It simplifies aspects of:
Every device on the Internet is assigned a unique IP address for
Identification Location definition Traffic routes across the Internet
IPv6 is intended to replace IPv4
Because of address exhaustion
IP address will remain
same every time you
connect, from one place
(home)
•IP address would be
different if the
devices are used in
different location
connected to other
connection.
•IP address doesn't
travel with you
•But at home, it would
always be the same if
it's the static type.
Here are the advantages
of a static IP address:
•Businesses are better
suited for it than
residences.
•It's also better for
dedicated services
such as mail, FTP and
VPN servers.
•It's good for creating
or hosting computer
servers.
•It makes it easier for
geolocation services
to accurately assess
where you are.
•Because of these
advantages, it
shouldn't be a
surprise to learn that
it costs more to get
one.
A static IP address is
assigned by request and
for a fee by a service
providers
•Static. Stand. Stable.
Yes, static IP
addresses don't
change
•Static IP address is
assigned to a device
by an (ISP) to be its
permanent address
on the Internet.
Static IP Address
Dynamic IP Address
You'll read most
everywhere that a
dynamic IP address can
change "at any time.“
•But it is possible that
it won't change for
months
•Not really a big deal
because all an IP
address does is keep
you connected.
There are a few more
reasons you can feel
good about a dynamic IP
address:
•It doesn't cost you
anything extra.
•It's carefree,
automatic and
reliable with little
work on your end.
•Geolocation might
be less accurate, if
that matters to you.
•For your ISP, it's the
most efficient use of
IP addresses.
•Technically, your
computer or device
"leases" (at no extra
charge) an IP address
to get connected.
Possibility that the
upload and download
speeds would be faster
with a static IP address
•Unable to set up a
reliable server with a
changeable IP
address
GSM Technology
GSM (Global System for Mobile Communications, originally Groupe SpécialMobile)
•A standard developed by the European Telecommunications Standards Institute (ETSI)
•To describe the protocols for second-generation (2G) digital cellular networks used by mobile
phones
•First deployed in Finland in July 1991
2G networks developed as a replacement for first generation (1G) analog cellular networks
GSM described a digital, circuit-switched network optimized for full duplex voice telephony
This expanded over time to include data communications
•First by circuit-switched transport
•Then by packet data transport via GPRS (General Packet Radio Services)
•EDGE (Enhanced Data rates for GSM Evolution or EGPRS.
Subsequently, the 3GPP developed
•Third-generation (3G) UMTS standards
•Followed by fourth-generation (4G) LTE Advanced standards
•Which do not form part of the ETSI GSM standard.
GSM
•Frequency - 900Mhz (GSM),
1800Mhz (DCS)
•Interface – GSM
•Protocols – GPRS, Generation –
2.5G
UMTS
•Frequency – 2100Mhz (B1)
•Interface – UMTS
•Protocols - UMTS, Generation –
3G
•Protocols - HSPA+, Generation –
3.5G
LTE
•Frequency – 1800Mhz (B3),
2600Mhz (B7)
•Interface – LTE
•Protocols – LTE, LTE-A,
Generation 4G
Standards and Protocols for Mobile Communication Network
GSM Network

Weitere ähnliche Inhalte

Was ist angesagt?

IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT EvolutionJayakumar PP
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationIRJET Journal
 
Industrial IOT By Rishika Ghosh
Industrial IOT By Rishika GhoshIndustrial IOT By Rishika Ghosh
Industrial IOT By Rishika Ghoshrishika ghosh
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTJohn Breitenbach
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingsijtsrd
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerUSA Firmware, LLC
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsDennis Jacob
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)SimiAttri
 
Internet of things
Internet of thingsInternet of things
Internet of thingsTamojit Das
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devicesmentoresd
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materAPPAU_Ukraine
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Salim Hosen
 
Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters GAURAV. H .TANDON
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsEurotech
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...IRJET Journal
 

Was ist angesagt? (20)

IT to IOT Evolution
IT to IOT EvolutionIT to IOT Evolution
IT to IOT Evolution
 
Internet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless HibernationInternet of Things- Remote Desktop & Wireless Hibernation
Internet of Things- Remote Desktop & Wireless Hibernation
 
Industrial IOT By Rishika Ghosh
Industrial IOT By Rishika GhoshIndustrial IOT By Rishika Ghosh
Industrial IOT By Rishika Ghosh
 
The IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoTThe IIC Connectivity Framework for IIoT
The IIC Connectivity Framework for IIoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
The Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the ManufacturerThe Business Case for Iot and IIoT for the Manufacturer
The Business Case for Iot and IIoT for the Manufacturer
 
Internet of Things - Recent developments and Trends
Internet of Things - Recent developments and TrendsInternet of Things - Recent developments and Trends
Internet of Things - Recent developments and Trends
 
Internet of things(iot)
Internet of things(iot)Internet of things(iot)
Internet of things(iot)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
IoT Innovation Insights from Patents
IoT Innovation Insights from PatentsIoT Innovation Insights from Patents
IoT Innovation Insights from Patents
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded DevicesInternet of Things Connectivity for Embedded Devices
Internet of Things Connectivity for Embedded Devices
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
 
IIoT and JD Edwards
IIoT and JD EdwardsIIoT and JD Edwards
IIoT and JD Edwards
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)Presentation on IOT (Internet Of Things)
Presentation on IOT (Internet Of Things)
 
Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters Collusion and Fraud Detection on Electronic Energy Meters
Collusion and Fraud Detection on Electronic Energy Meters
 
Medical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M SolutionsMedical & Healthcare IoT M2M Solutions
Medical & Healthcare IoT M2M Solutions
 
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
A Smart Switch to Connect and Disconnect Electrical Devices at Home by using ...
 
iot monitoring
iot monitoringiot monitoring
iot monitoring
 

Ähnlich wie M2M_IoT_Presentation

IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptxImpanaR2
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfezzAyman1
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptxssuser2cc0d4
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxSelva914004
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptxzarakhalid20
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptxSoftxai
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptxgagag8
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptnadoje
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
iiot-introduction iiot-introductioniiott
iiot-introduction iiot-introductioniiottiiot-introduction iiot-introductioniiott
iiot-introduction iiot-introductioniiottpushpait
 

Ähnlich wie M2M_IoT_Presentation (20)

IoT-Introduction.pptx
IoT-Introduction.pptxIoT-Introduction.pptx
IoT-Introduction.pptx
 
123456.pptx
123456.pptx123456.pptx
123456.pptx
 
Presentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdfPresentation about IoT in media and communication.pdf
Presentation about IoT in media and communication.pdf
 
CHA_001_IOT.pptx
CHA_001_IOT.pptxCHA_001_IOT.pptx
CHA_001_IOT.pptx
 
2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx2 - Iot-Internet-of-Things.pptx
2 - Iot-Internet-of-Things.pptx
 
Shubham hatzade
Shubham hatzadeShubham hatzade
Shubham hatzade
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
Internet_of_Things.pptx
Internet_of_Things.pptxInternet_of_Things.pptx
Internet_of_Things.pptx
 
Internet of Things And Its Components.pptx
Internet of Things And Its Components.pptxInternet of Things And Its Components.pptx
Internet of Things And Its Components.pptx
 
Iot.pptx
Iot.pptxIot.pptx
Iot.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Unit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).pptUnit 6 Final ppt (1).ppt
Unit 6 Final ppt (1).ppt
 
F5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready InfrastructureF5 Networks: The Internet of Things - Ready Infrastructure
F5 Networks: The Internet of Things - Ready Infrastructure
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
iiot-introduction iiot-introductioniiott
iiot-introduction iiot-introductioniiottiiot-introduction iiot-introductioniiott
iiot-introduction iiot-introductioniiott
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of ThingsChristopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
Christopher Biedermann, EmiTel Ltd: Cybersecurity and the Internet of Things
 
PPT Format for CA1.pptx
PPT Format for CA1.pptxPPT Format for CA1.pptx
PPT Format for CA1.pptx
 
Iot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptxIot-Internet-of-Things-ppt.pptx
Iot-Internet-of-Things-ppt.pptx
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 

M2M_IoT_Presentation

  • 1. Machine To Machine Internet of Things Challenges for M2M & IoT M2M SIMs and embedded SIMs
  • 2. Machine to Machine, M2M •Refers to the technologies that enable products or “things” to communicate with each other – and with other Internet- enabled devices and systems. Internet of Things (IoT) •Refers to any wire- or wirelessly connected physical object, including transportation vehicles, sensors, mobile phones or even people. This is where Machine to Machine (M2M) technology comes into play - M2M enables the connection of ‘things’. RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION Year 2003 2015 2020 World population Estimated (Billion) 6.3 7.4 7.7 Estimated # of total connected devices (Million) 500 13.4 38.5 Connected devices per person 0.08 1.48 4.65 Machine to Machine, M2M
  • 3. Challenges of M2M / IoT connectivity include: 1. Cost control • As more devices become connected, how can businesses monitor, manage and adapt to connectivity costs? 2. Management of many devices • How can businesses best keep track of, maintain and regulate the connectivity of each device without excessive time and resources? 3. Security • How do businesses deal with an increased amount of data communicated via public channels like the internet? How can businesses protect against hackers gaining access to private networks and misusing data? 4. Increased complexity • How should businesses best interpret and use their data to effectively monetize the IoT using advanced tools and APIs Challenges – M2M / IoT
  • 4. Identify the decision maker •Knowing the decision maker is crucial to a quick close Be a consultant and advice / Be real •Convey to the client that you care about their business and not just the deal Create a sense of urgency •Attach a deadline to the deal for clients to commit. Overcome objections •Sales presentation must address and overcome potential objections can speed up any deal Know your competition •Knowing the areas that you are more competitive than your competition can lead to that quick close. Watch what you say •Keep it to the point and focus on your areas of expertise. Critical factors to close a deal
  • 5. 2FF – 4FF are Industrial Grade SIM with thicker PIN plate to safeguard devices from: Corrosion Vibrations Temperatures Other environmental factors Sim Cards – 4 sizes have features optimal for different business cases 1FF – First/largest 2FF – mini 3FF – Micro 4FF – Nano MFF2 – Embedded (Smallest) M2M SIMs
  • 6. eUICC – Embedded SIM with Device Logistic • Device and Sim become one component and works globally. • Installation of SIM during device production, saves cost on production and distribution Provisioning • Management of SIM and switching of MNOs are seamless. • Profiles can be changed anytime without the need for physical replacement Connectivity • Wireless capability is available at anytime • Reduces deployment time and ease of access for end users Global Connectivity - Universal Integrated Circuit Card (UICC) Connectivity across multiple countries - various MNOs & no roaming charges It is a feature in SIM, 2FF – 4FF & MFF2 Minimum SIM memory 512K Universal Integrated Circuit Card
  • 7. Internet of Things – Physical + Computer Systems IoT Roadmap & Challenges IoT Projected Device Users & Physical Vulnerabilities IoT Target Markets IoT Device and The Usage Cyber / Network Security GSM Network & Protocols
  • 8. Internet of Things (IoT) - Physical world + computer-based systems Integration IoT becomes a cyber-physical systems- When augmented with sensors and actuators • Encompasses technologies such as • Smart grids • Smart homes • Intelligent transportation • Smart cities IoT is also expected to generate • Large amounts of data from diverse locations • Aggregation of the data • Increase in the need to index, store and process such data more effectively •Electronics •Software •Sensors •Actuators •Network connectivity •That enable these objects to collect and exchange data Internetworking of physical or smart devices which are embedded with •Direct integration of the physical world into computer-based systems •IoT improves •Efficiency •Accuracy •Economic benefit IoT allows objects to be sensed and/or controlled remotely across existing network infrastructure
  • 9. IoT has evolved due to a convergence of multiple technologies •Wireless communication •Real-time analytics •Machine learning •Commodity sensors •Embedded systems. Smart device concept started at 1982, a Coke vending machine became first internet-connected appliance •Able to report its inventory •Whether newly loaded drinks were cold IoT Enabler - Roadmap IoT concept became popular in 1999, through Radio-frequency identification (RFID) If all objects and people in daily life were equipped with identifiers, computers could manage and inventory them
  • 10. RAPID GROWTH OF CONNECTED DEVICES COMPARED TO WORLD POPULATION Year 2003 2015 2020 World population Estimated (Billion) 6.3 7.4 7.7 Estimated # of total connected devices (Million) 500 13.4 38.5 Connected devices per person 0.08 1.48 4.65 Challenges of IoT connectivity Cost control Increased in connected devices, how can businesses monitor, manage and adapt to connectivity costs Devices Management How businesses keep track, maintain and regulate the connectivity of each devices without excessive time and resources Security How businesses deal with increased in data communicated via internet? Protection against hackers gaining access to private networks and misusing data Increased complexity How should businesses best interpret and use their data to effectively monetize the IoT using advanced tools and APIs
  • 11. Internet of Things and physical vulnerabilities IoT - opportunities for direct integration of physical world into computer-based systems This will also provide opportunities for misuse Communication / transferring data between connected devices are developed without consideration of security challenges As IoT grows widely, cyber attacks are likely to become a physical threat rather than virtual threat If a front door's lock is connected to the Internet, and can be locked/unlocked from a phone, then a criminal could enter the home at the press of a button from a stolen or hacked phone. People could stand to lose much more than their credit card numbers in a world controlled by IoT- enabled devices. Medical devices can be attacked for both in- hospital diagnostic equipment and also in implanted devices like pacemakers, insulin pumps
  • 12. Media Environmental monitoring Infrastructure management Manufacturing Energy management Medical and healthcare Building and home automation Transportation Metropolitan scale deployments Consumer application IoT Target Verticals
  • 13. *Heart monitoring implants *Biochip transponders on farm animals *Automobiles with built-in sensors *DNA analysis devices for environmental/food/pathogen monitoring *Field operation devices that assist firefighters in search and rescue operations "Things,"refertovarietyofdevices: These devices collect useful data with the help of various existing technologies and then autonomously flow the data between other devices. Smart home - control and automate appliances Lighting Heating Air conditioning Washer / dryers Ovens Refrigerators / freezers Things in IoT
  • 14. •CPU •Memory •Power resources IoT used in nearly every field as because of the ability the network embedded devices with limited •Natural ecosystems •Buildings and factories IoT allows collection of information ranging from •Intelligent shopping systems - monitors specific users' purchasing habits by tracking the mobile phones. These users could then be offered with •Special offers on their favourite products •Even location of items that they need IoT systems also can help in •Sensing and actuating for applications that deal with heat, electricity and energy management •Enabling extended home security features and home automation •Internet of living things - biological sensors to analyse and study DNA or other molecules Additional examples Everything connected with the help of Internet
  • 15. Consumer application Car Entertainment Residences/smart homes Wearable technology Quantified self Connected health Smart retail Enterprise application Media & Big Data Fleet Tracking Environment Monitor Energy Management Medical Healthcare Manufacturing Infrastructure Management Building Automation IoT devices are created more for consumer use IoT products Classified in five categories Smart wearable Smart home Smart city Smart environment Smart enterprise IoT Devices The IoT products and solutions in each of these markets have different characteristics
  • 16. Big data and the IoT work in conjunction – Media & Advertising Industry
  • 17. Protection to hardware/software and the information on them from •Theft or damage •Disruption of service •Misdirection of the services they provide •Network access •Date / code injection •Malpractice by operators - tricked into deviating from secure procedures Critical area as to the increased reliance on computer systems and the Internet •Wireless networks such as Bluetooth and Wi-Fi •Growth of "smart" devices, including smartphones, televisions Cyber Security
  • 18. Types of Vulnerabilities and attacks Backdoors Denial-of-service attack Direct-access attacks Eavesdropping Spoofing Tampering Privilege escalation Phishing Clickjacking Social engineering Systems at risk Financial systems Utilities and industrial equipment Aviation Consumer devices Large corporations Automobiles Government Internet of Things and physical vulnerabilities
  • 19. Network security UMTS introduced - Universal Subscriber Identity Module (USIM) •For greater security •Mutually authenticating network and user Uses a longer authentication key •Authentication levels •Authorization capabilities •No non-repudiation. GSM offers limited New attacks are due to poor •Security implementations •Architecture •Development for smartphone applications Wiretapping and eavesdropping techniques – allows third party to listen in to conversations GSM was intended to be a secure wireless system with the user authentication using •Pre-shared key and challenge-response •Over-the-air encryption However, GSM is vulnerable to different types of attack, each of them aimed at a different part of the network GSM only authenticates the user to the network (and not vice versa)
  • 20. Internet Protocol In addition to offering more addresses, IPv6 also implements features not present in IPv4 *Address assignment *Network renumbering *Router announcements when changing network connectivity providers It simplifies aspects of: Every device on the Internet is assigned a unique IP address for Identification Location definition Traffic routes across the Internet IPv6 is intended to replace IPv4 Because of address exhaustion
  • 21. IP address will remain same every time you connect, from one place (home) •IP address would be different if the devices are used in different location connected to other connection. •IP address doesn't travel with you •But at home, it would always be the same if it's the static type. Here are the advantages of a static IP address: •Businesses are better suited for it than residences. •It's also better for dedicated services such as mail, FTP and VPN servers. •It's good for creating or hosting computer servers. •It makes it easier for geolocation services to accurately assess where you are. •Because of these advantages, it shouldn't be a surprise to learn that it costs more to get one. A static IP address is assigned by request and for a fee by a service providers •Static. Stand. Stable. Yes, static IP addresses don't change •Static IP address is assigned to a device by an (ISP) to be its permanent address on the Internet. Static IP Address
  • 22. Dynamic IP Address You'll read most everywhere that a dynamic IP address can change "at any time.“ •But it is possible that it won't change for months •Not really a big deal because all an IP address does is keep you connected. There are a few more reasons you can feel good about a dynamic IP address: •It doesn't cost you anything extra. •It's carefree, automatic and reliable with little work on your end. •Geolocation might be less accurate, if that matters to you. •For your ISP, it's the most efficient use of IP addresses. •Technically, your computer or device "leases" (at no extra charge) an IP address to get connected. Possibility that the upload and download speeds would be faster with a static IP address •Unable to set up a reliable server with a changeable IP address
  • 23. GSM Technology GSM (Global System for Mobile Communications, originally Groupe SpécialMobile) •A standard developed by the European Telecommunications Standards Institute (ETSI) •To describe the protocols for second-generation (2G) digital cellular networks used by mobile phones •First deployed in Finland in July 1991 2G networks developed as a replacement for first generation (1G) analog cellular networks GSM described a digital, circuit-switched network optimized for full duplex voice telephony This expanded over time to include data communications •First by circuit-switched transport •Then by packet data transport via GPRS (General Packet Radio Services) •EDGE (Enhanced Data rates for GSM Evolution or EGPRS. Subsequently, the 3GPP developed •Third-generation (3G) UMTS standards •Followed by fourth-generation (4G) LTE Advanced standards •Which do not form part of the ETSI GSM standard.
  • 24. GSM •Frequency - 900Mhz (GSM), 1800Mhz (DCS) •Interface – GSM •Protocols – GPRS, Generation – 2.5G UMTS •Frequency – 2100Mhz (B1) •Interface – UMTS •Protocols - UMTS, Generation – 3G •Protocols - HSPA+, Generation – 3.5G LTE •Frequency – 1800Mhz (B3), 2600Mhz (B7) •Interface – LTE •Protocols – LTE, LTE-A, Generation 4G Standards and Protocols for Mobile Communication Network