The Importance of a Good IoT Monitoring and Alarm System

IoT Monitoring

BehrTech Blog

The Importance of a Good Monitoring and Alarm System for your IoT Network

Your IoT network may have hundreds or even thousands of end devices (sensors) with each sensor sending messages on a regular basis. It’s important to make sure that sensors are getting to the gateway in a timely manner.  

A robust and scalable wireless technology, proper network planning and testing, and an optimal architecture are critical to a well-functioning network. However, unexpected issues including interference, changes in the environment, hardware and software problems, batteries running out etc., can impact your network. You need a solution that can monitor the network for problems and if a problem occurs, can alert your team in real time.

At a minimum, a good IoT monitoring solution consists of two elements:

  1. Configurable thresholds that warn you of a potential issue.
  2. Real-time alerts sent to your team in the event of one of these thresholds being reached.

Configurable Thresholds

A good IoT monitoring system includes thresholds that you can set to inform your team of activity that might bear investigating. Useful thresholds include the following:

Signal Level – Part of planning and testing is determining the level at which your gateway might stop receiving signals from a sensor. It’s useful to set a threshold that warns you if the signal strength is getting close to this level. For example, if you know that your gateway stops receiving signals around -135 dBm, you could configure a threshold of -125 dBm (10 dBm above this level). If the system detects a signal level below this, then an alarm is triggered, and you can investigate.

Signal Level Drops Below an Acceptable Limit – While it’s important to know if the received signal has dropped below a certain level, it’s also helpful to find out if the signal strength from a sensor has dropped from one message to the next, as this could indicate an issue.

Missed Messages – Perhaps the gateway has stopped receiving messages for a short interval before receiving them again. There could be some unexpected interference or maybe a sensor has malfunctioned. In either case, it’s important to know as quickly as possible to ensure that you are not missing important data. Once you identify that there is a problem, you can locate and troubleshoot the sensor.

Messages Are No Longer Being Sent – Maybe a sensor has stopped transmitting messages altogether or for a sustained period of time. For example, perhaps a sensor is supposed to send data every 10 minutes and it has suffered a battery failure. You could set a threshold of 30 minutes. If the 30 minutes have elapsed with no messages, an alert is triggered, and your team can investigate.

Real Time Alerts

Equally important to the thresholds themselves are the ways in which the alerts are sent to your team. While there are many ways to send messages, email and MQTT represent two good options.

Email is still a key method of communication in the enterprise and timely emails help ensure that you are able to act on it immediately.

MQTT is a standard messaging protocol for IoT offering lightweight communication between the gateway and the consumers of the data and it remains an excellent way to receive data in real time.

Conclusion

In conclusion, a robust and stable wireless sensor network helps your IT and OT teams sleep peacefully.  Even the best networks, however, can suffer problems from time to time. Having a solution that is capable of monitoring your network for issues and provides proactive real-time alerting to your team when problems occur helps to keep minor issues from becoming big problems.

The BehrTech wireless IoT management platform – MYTHINGS Central includes a number of plugins that extend system functionality. In addition to plugins providing connectivity to platforms such as AWS, Cumulocity, and Losant, MYTHINGS Central also includes the BehrTech Network Monitoring and Alarm Service to alert you of potential issues before they become problems.  

Subscribe to Our Monthly Blog Roundup



[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D1%22%7D” unique_id=”7f9c9f03″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%2BPGFydGljbGUgY2xhc3M9InZjZS1wb3N0cy1ncmlkLWl0ZW0taW5uZXJ7e2N1c3RvbV9mZWF0dXJlZF9pbWFnZV9oYXNpbWFnZV9jbGFzc19uZXdzX3Bvc3RfZ3JpZF9pdGVtfX0iPjxkaXYgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uIHZjZS1wb3N0LWRlc2NyaXB0aW9uLS10aXRsZS1jb2xvci1iLTMzLTMzLTMzIHZjZS1wb3N0LWRlc2NyaXB0aW9uLS1leGNlcnB0LWNvbG9yLWItMzMtMzMtMzMgdmNlLXBvc3QtZGVzY3JpcHRpb24tLWF1dGhvci1jb2xvci1mZmNlMDAgdmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtY29sb3ItYi0zMy0zMy0zMyI%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWltYWdlIiBzdHlsZT0iYmFja2dyb3VuZC1pbWFnZTp1cmwoe3tmZWF0dXJlZF9pbWFnZV91cmx9fSkiPjxhIGhyZWY9Int7cG9zdF9wZXJtYWxpbmt9fSI%2BPC9hPjwvZGl2PjxkaXYgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uLS1jb250ZW50Ij48cCBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEiPjxzcGFuPlBvc3RlZCA8L3NwYW4%2BPHNwYW4gY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uLS1tZXRhLWRhdGUiPm9uIDx0aW1lIGRhdGV0aW1lPSJ7e3Bvc3RfZGF0ZV9nbXR9fSI%2Be3twb3N0X2RhdGV9fSA8L3RpbWU%2BPC9zcGFuPjwvcD48aDMgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uLS10aXRsZSI%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij57e3Bvc3RfdGl0bGV9fTwvYT48L2gzPnt7c2ltcGxlX3Bvc3RfZGVzY3JpcHRpb25fZXhjZXJwdH19PC9kaXY%2BPC9kaXY%2BPC9hcnRpY2xlPjwvZGl2Pg%3D%3D[/vcv_posts_grid]

Get Next-Gen Wireless Connectivity for IoT Monitoring

Contact a MYTHINGS™ Platform Expert for more information or to book a demo.

4 Major Consequences of Unreliable Industrial IoT Connectivity

Industrial IoT Connectivity

BehrTech Blog

4 Major Consequences of Unreliable Industrial IoT Connectivity

[addtoany]

Pervasive wireless connectivity is a major driving force behind the IoT revolution and a fundamental building block in its architecture. In Industrial IoT, network reliability is a top priority. Because industrial applications are often mission-critical, failing to get the message through, particularly in times of emergency, can result in costly and even disastrous consequences. Unfortunately, not all wireless connectivity options are created equal, so selecting the right technology for your use case, is paramount to the long-term success of your IoT project and the realization of IoT’s innumerable benefits. Without it, organizations lack the necessary visibility into existing processes, equipment and production that empowers strategic decision-making.

Here are 4 major consequences of unreliable IoT connectivity in industrial environments.

Industrial IoT Connectivity

1. Unplanned Downtime

According to the Vanson Bourne Research Study, roughly 82 percent of companies that have experienced unplanned downtime over the past three years, have experienced outages that lasted an average of four hours costing an estimated two million dollars. Eighty percent of companies recognize that IoT can eliminate this unplanned downtime, and zero unplanned downtime is now the number one priority for 72% of organizations.

Wireless IoT sensors can capture and communicate many key health and operational metrics like pressure, vibration, temperature, humidity, and voltage of machines and equipment across an entire industrial complex. When there is a disruption to connectivity and data communication, you lose visibility into current production processes and asset performance. Likewise, the analytical models that proactively predict impending issues and schedule demand-based inspection and reparation are no longer accurate, putting your organization at risk of costly unplanned downtime.

2. Worker Safety

An estimated 13,455,000 workers in manufacturing industries are at risk for fatal and nonfatal injuries. The National Safety Council (NSC) reports that the top three leading causes of work-related injuries in the U.S. are: overexertion; slips, trips and falls; and contact with objects and equipment. Together, these account for more than 84% of all nonfatal accidents on the job. As a result, many organizations have adopted wireless IoT technologies to prevent incidents before they occur. For example, IoT wearables that track personal health parameters or that are equipped with sensing capabilities such as fall detection can alert safety control centers in real-time when an accident occurs or when a worker’s personal health data reaches a certain level. This allows managers to initiate an immediate emergency response or advise workers to take breaks in the case of overexertion. Similarly, sensors that measure critical ambient conditions such as atmospheric gases, radiation, heat and humidity can notify workers immediately when dangerous thresholds are encroaching for quick evacuation. Without reliable connectivity, these real-time data flows come to a grinding halt, putting your workers health and safety in jeopardy.   

3. Product Quality

Another significant issue with unreliable industrial IoT connectivity is quality control. Using wireless IoT sensors to monitor and control production equipment has become paramount to the quality of manufactured goods. Technicians are constantly using this data to recalibrate equipment and optimize production lines to ensure consistent process parameters and eliminate time-wasting inefficiencies. Likewise, monitoring and controlling ambient conditions like temperature and humidity plays a significant role in product quality and safety across the entire supply chain, particularity in the pharmaceutical and food and beverage industries. Disruptions to connectivity and data accessibility can derail your production, increase product waste and ultimately impact your customer relationships.

4. Increased Costs

The flow of timely and accurate IoT data gives actionable insights that drive change, particularly when it comes to cutting costs. From lowering overall maintenance costs with predictive maintenance principles and increasing worker safety and productivity to identifying and resolving bottlenecks in production and reducing energy consumption and fuel consumption, there are numerous ways that IoT can improve your bottom line. Unreliable IoT connectivity not only disrupts these cost cutting initiatives but can also put your overall IoT investment at risk. This makes choosing the right technology critical to avoid an expensive rip and replace migration.

Wrapping Up

The IoT value chain essentially starts with data accessibility and choosing the right industrial IoT connectivity solution will ultimately impact the success of your IoT initiative. There’s a plethora of wireless technologies in the market, but not all of them can keep up with the demanding industrial environments. Long-range, deep penetration and high interference immunity of the radio link are key to reliable data communications over large industrial campuses. Also, you’ll want to have a unified communications solution that can extract data from existing industrial networks and support a new layer of granular, battery-operated sensor networks for complete operational visibility. In this context, low power consumption and massive network scalability are other critical wireless criteria not to overlook.

[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D1%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get Reliable and Scalable Industrial IoT Connectivity with MYTHINGS

The History of IoT and Wireless Connectivity

History of IoT

BehrTech Blog

The History of IoT and Wireless Connectivity

[addtoany]

Heralded as the foundational technology for breakthroughs in artificial intelligence, robotics and other critical technology advances, IoT is ranked as the most important technology initiative by senior executives. When you think about the Internet of Things (IoT), what do you picture? Perhaps a smart thermostat, a connected car, or even one of the innumerable use cases taking over the industrial sector. Having now entered the region of $1 trillion as an industry, the rapid growth of IoT has left many wondering where this revolution came from.

Here is a brief history of IoT and its critical counterpart wireless connectivity.

History of IoT
[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D0%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get Next-Gen LPWAN with MYTHINGS Wireless Connectivity

The Impact of Private 5G and LPWAN – An Interview with WIN Connectivity

Private 5G and LPWAN

BehrTech Blog

The Impact of Private 5G and LPWAN on IoT

An Interview with Tim Dentry, CTO of WIN Connectivity

[addtoany]

1. Tell us about WIN Connectivity. What is your focus and vision? What are your solutions? 

WIN Connectivity is a connectivity systems integrator and managed service provider. Specifically, we provide connectivity solutions oriented around IoT use cases that often utilize wireless media for mission accomplishment. For example, we provide in-building and external networking solutions in healthcare, hospitality, manufacturing and logistics, retail, and commercial real estate (smart buildings solutions). Our solutions encompass wired (fiber-to-the-edge) as well as wireless (neutral host carrier 5G, private 5G/cellular and LPWAN connectivity). We engage as either a Design-Build-Transfer model or using our Connectivity-as-a-Service, which is a Design-Build-Operate model that allows enterprises to consume our solution as a recurring operating cost (OpEx) rather than a CapEx model (or a blend of both, as the customer requires). 

2. How do you see the wireless technology landscape today? What are the biggest challenges?

The wireless landscape today is exciting, especially with the advancements of CBRS/private 5G, as well as proliferation of new and better LPWAN solutions such as mioty.  The US FCC making 6GHz available is also very exciting as it allows enterprises to harness more over-the-air power and bandwidth without having to get licensed.  While some might think that cellular wireless and LPWAN are mutually exclusive, they can actually work together to create a powerful IoT architecture.  Each of these solutions can be leveraged to build an overall IoT connectivity solution that ensures IoT adopters are able to realize the success criteria of their use cases.

Ensuring that the cost of the network does not outweigh the benefits of the network solution is one of the biggest challenges in today’s wireless technology landscape. Additionally, understanding the IoT technology itself in addition to connectivity and security, can be difficult and that’s where WIN Connectivity excels.  We make sense of the technology, security and availability requirements that cross multiple groups within an enterprise, whether it is cybersecurity, infrastructure and data governance. 

3. What value does LPWAN bring to IoT deployments?

LPWAN is a tried and true method for connecting IoT devices over long distances and challenging morphology. LPWAN ensures that massive IoT use cases can be realized because of the resilience of the radio systems and the frequency band.  Moreover, while industry experts discuss the IoT implications of cellular, such as 5G mmWave and CBRS, the reality is that the IoT system manufacturers must factor in the cost for a widely deployed IoT sensor to connect to those networks, or the manufacturers themselves must come up to speed.  With LPWAN, device manufacturers and IoT developers can already take advantage of this. If you think of this in the terms of the Gartner Hype Cycle, LPWAN is poised to accelerate out of the Trough of Disillusionment into the Slope of Enlightenment in less than two years, while 5G’s application for IoT is 5-10 years.  Additionally, unlicensed LPWAN does not require carrier/licensed spectrum (NB-IoT, LTE-M, etc) and thus makes it more efficient and affordable for enterprises who want to invest in IoT. 

4. How can LPWAN and 5G work together in Industry 4.0?

As mentioned, LPWAN and 5G, especially private 5G in the CBRS band,  can actually work together to create a powerful IoT architecture. This is particularly true in challenging environments where great distances often mean that a terrestrial backhaul adds additional cost and complexity in order to get LPWAN generated data from the gateway to an edge compute resource or the cloud.  Private 5G provides cost-effective, reliable over-the-air QoS for massive IoT data.   

5. What Industry 4.0 applications would benefit most from a private 5G and LPWAN connectivity solution?

Industry 4.0 applications that blend the concept of critical IoT and massive IoT to achieve business outcomes.  As an example, a manufacturing facility that is incorporating precise indoor localization and asset tracking, work environment monitoring (workplace safety), predictive maintenance for robotics and automation solutions and autonomous entities that require ultra-low latency to make real time decisions from massive amounts of collected data.  One of my favorite application areas for providing a layered connectivity approach using private 5G and LPWAN is connected farming.  Connected farming relies on sensors deployed over a large geographical area, and often these areas are themselves “not connected.”  Private 5G ensures that real-time or critical IoT apps combine, security and safety in growth farms and pastures, as well as inventory control for the upstream, midstream and distribution stages of farming. All of these use cases require a layered, accretive approach to communications.   

6. What are your predictions for advanced wireless networking in the next 3-5 years?

Private 5G will emerge as a natural alternative to enterprise wireless as the ecosystem becomes more compatible with the technology.  Meaning, as more vendors deploy devices with chipsets that natively support private 5G, you will see more deployments at scale.  Costs for the radio systems will drive downward, similar to what has happened with Wi-Fi, and the complexity to deploy these private 5G systems will also simplify and become truly more software-defined.  Finally, I believe that the industry will start to rationalize roaming seamlessly from public to private 5G networks, but this will require a significant amount of coordination in from the carriers and private network providers. 

Private 5G and LPWAN

Tim Dentry

CTO, WIN Connectivity

Tim is the WIN Connectivity CTO, bringing 20+ years of leadership experience in a variety of technology sectors, including Cloud Architecture and Operations, Cybersecurity, Network Infrastructure and Wireless.  His roles have included engineering, design, quality assurance, application development and infrastructure.  Tim has worked in both established communications companies such as MCI and Nokia (Lucent) and has also been a part of multiple early-stage startups such as Edgewater Networks, taking products from the design phase all the way to implementation and ongoing lifecycle management. Tim provides support for the broader WIN team by focusing on key areas such as technology evolution and selection, product development and design, as well as OSS/BSS and back-office solutions. Tim brings to WIN the experience of leveraging cloud infrastructure to deploy WIN’s technology solutions and is responsible for the lifecycle support of all of WIN’s technology offerings including Connectivity-as-a-Service. Tim is proud to have served in the Marine Corps for fourteen years, and is a graduate of Texas A&M University in College Station, Texas.

 

[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D0%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get Next-Gen LPWAN with MYTHINGS Wireless Connectivity

4 Best Practices in Industrial IoT Architecture

Industrial IoT Architecture

BehrTech Blog

4 Best Practices in Industrial IoT Architecture

[addtoany]

The Industrial IoT architecture is made of numerous elements from sensors, connectivity and gateways to device management and application platforms. Assembling these different moving parts might seem daunting, especially for companies who are just at the outset of their IIoT initiative. On top of that, industrial applications entail unique requirements and challenges that need to be addressed tactfully.

The good news is that emerging tools and developments are helping simplify and streamline the process of establishing a viable IIoT architecture. As the IIoT landscape continues to evolve in 2020, here are four best practices tech leaders should consider when architecting their next industrial IoT architecture.

1. Hardware Rapid Prototyping

In the industrial world, the challenge of IoT hardware design lies in the bewildering array of use case requirements. Take temperature sensors as a simple example. Depending on criteria like accuracy, temperature range, response time and stability, there could be hundreds of available sensors to choose from. Most likely, there won’t be an out-of-the-box wireless sensor out there that fully meets your or your client’s specific needs. And that’s where IoT rapid prototyping comes in.

Hardware prototyping standards like mikroBUS allow you to build a customized IoT device prototype in a matter of a few hours and with efficient resources. From a broad portfolio of ready-to-use, compatible sensor, interface and wireless modules as well as compilers and development boards, you can create the optimal hardware mix-and-match that caters to your industrial use case. With rapid prototyping, companies can ratify the technical and business viability of their IIoT solution in a cost-effective and agile fashion, which lays the cornerstone for a successful roll-out.

2. Retrofit Wireless Connectivity

An average factory operates with legacy industrial systems that are nowhere near being connected. While these systems employ a number of proprietary communication protocols for automation purposes, data is captive within discrete control loops, creating numerous data silos on the factory floor. The lack of interoperability among these protocols further hinders the implementation of a factory-wide monitoring and control network.

Emerging retrofit wireless connectivity is critical to an industrial IoT architecture as it enables manufacturers to connect and acquire data from their legacy assets and systems in a simple and cost-effective manner – without costly production downtime and invasive hardware changes. Through the use of an integration platform, operational data can be fetched from controllers through wired-based serial and other industrial protocols, then forwarded to a remote control center using long-range wireless connectivity.

3. Software-Defined Radio

As no wireless solution is use-case agnostic, a typical IIoT architecture is likely to incorporate multiple radio protocols and standards. Plus, many industrial facilities today have already implemented wireless networks (e.g. Wi-Fi, WirelessHART…) to a certain extent, and look to deploy new types of connectivity to tap into other high-value use cases. Thus, it’s critical to create an efficient and backward-compatible IIoT architecture that can accommodate the co-existence of different wireless technologies, which is why software-defined radio (SDR) is gaining momentum.

SDR refers to a radio communication method where the majority of signal processing is done using software, as opposed to the traditional hardware-driven approach. IoT gateways leveraging SDR can incorporate and decode different protocols concurrently to reduce infrastructure cost and complexity. What’s more, adjustments or additions of new wireless solutions to the architecture can be achieved with simple software updates. This allows companies to dynamically adapt to future operational and technological changes while continuing to support legacy wireless devices in the field.

4. Portable, Container-Based IIoT Platform Design

Depending on criteria like security, reliability, data ownership and costs, companies need to choose among an on-premises, public or private cloud deployment, or even a hybrid approach. As the industrial IoT use cases and architecture scale, the decision on the deployment model and/or cloud vendor is subject to change as well.

In this context, an IIoT platform, typically a device management platform, that comes with a portable, container-based design renders industrial users with full flexibility in selecting their preferred backend environment. At the same time, it enables a simple migration to another server as needed without compromising the consistency or functionality of the application. The idea of a container-based design is that individual applications are packaged and delivered within discrete, standardized containers called Docker. With this modular architecture, users can decide which specific platform functions/ applications they want to use and where to deploy them. Thanks to its flexibility and portability, the container-based design facilitates an interoperable and future-proof IIoT architecture that keeps up with the industry’s dynamic needs.

[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D0%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get Next-Gen Wireless IoT Connectivity with MYTHINGS

Understanding IoT Security

IoT Security

BehrTech Blog

Understanding IoT Security

An Interview with Dick Wilkinson CTO, Supreme Court of New Mexico

[addtoany]

The dramatic surge of IoT devices has transformed how we interact on a day-to-day basis. From industrial sensors for environmental monitoring and asset tracking to smart home sensors for lighting and leak detection, a plethora of IoT devices connected to networks are helping drive innumerable benefits for users. While the benefits of IoT are undeniable, security remains a primary concern for individuals and businesses. This week on the blog we interview cybersecurity expert, Dick Wilkinson to provide insight on risks, prevention and predictions surrounding IoT security.

What is IoT security and what industries are most vulnerable to security threats?

I define IoT security as the process of making sure smart or connected devices only do what you want them to do, and they always work when you expect them to work. If you can achieve that, then you have secured your IoT devices. Of course, that is much easier said than done, even simple devices can harbor multiple serious threats to your overall network or environment.

Every industry is at risk from IoT threats. The highest risk of a headline grabbing catastrophic failure exists in the critical infrastructure and medical fields. The most vulnerable, meaning likely to be attacked, products are the more accessible devices like home consumer or smart city devices that sit out in the open to collect information or provide surveillance through data and sensors. The risk from smart devices exists on a fluid spectrum and each use case presents unique threats with a different risk profile, even if the device itself is not changed from scenario to scenario.

What are the biggest security challenges in an IoT deployment?

People worry about the high number of devices and assume asset identification and management will be the hardest challenge. I would argue that monitoring and inspecting the traffic from these devices to know when you have an anomaly is a much harder and more valuable to challenge to take on. Identifying anomalous, and possibly threatening, behavior from 200 devices is harder than just keeping track of them and where you put them.

What steps can companies take to better protect their IoT systems and devices?

My suggestion is to make a detailed deployment or use plan and identify all of the capabilities and possible configuration options of your new device(s). Do not take the device out of the box and immediately put it in service on your production environment. Just because the device is simple or serves a simple function does not mean that it is secure by design. Security features may exist and be disabled by default to ensure your new tech works easily the first time. Check every configuration option and disable functions or features you know you don’t need. Every input on the device is a possible attack vector, don’t leave open doors to your network, even if the doors are tiny or invisible.

How can companies better communicate their IoT security efforts to reassure stakeholders?

Right now, most stakeholders will be satisfied to know you are even thinking about security around your IoT devices. IoT security has been neglected and too much trust has been offered to these devices. Being aware that smart devices pose new risks and being able to communicate how you are assessing those risks is probably a great starting point to reassure any kind of stakeholder.

What predictions do you have for IoT security in the next 3-5 years?

IoT use is already exploding in almost every industry. I believe the trust that consumers have offered to these devices is quickly fading away. Both product consumers and government regulators are increasing scrutiny of smart devices and new cybersecurity standards will be published very soon. The market appeal of selling verified secure products and the government drive to regulate security into the production of smart devices will help drive down the risk of using IoT. Product verification for cybersecurity threats, not just functionality or safety, will become a standard requirement to enter the market with a new IoT product. Consumers will not tolerate insecure devices existing on the market 3-5 years from now.

IoT Security

Dick Wilkinson

CTO, Supreme Court of New Mexico

Dick Wilkinson is the Co-founder and CTO of Proof Labs inc. He is also a retired Army Warrant Officer with 20 years of experience in the intelligence and cyber security field. He has led diverse technical missions ranging from satellite operations, combat field digital forensics, enterprise cybersecurity as well as cyber research for the Secretary of Defense.  

[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%26amp%3Boffset%3D0%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Build Scalable and Flexible Networks with the mioty BLE Dual Stack

LPWAN and Bluetooth Low Energy: A Match Made in Networking Heaven

LPWAN and Bluetooth

BehrTech Blog

LPWAN and Bluetooth Low Energy: A Match Made in Networking Heaven

[addtoany]

Given its significant benefits in terms of reliability, minimal latency and security, wired communications has been the backbone of industrial control and automation systems. Nevertheless, as the new wave of IoT applications arises, we quickly see wired solutions reaching their limits.

Trenching cables is inherently cumbersome, capital- and labor-intensive, not to mention the fact that damage to wiring brings the risk of production downtime. Due to the plethora of proprietary wiring protocols, any additions or modifications to the architecture is deemed costly and could even entail a “rip-and-replace” of cables and conduits. The bulky and expensive wired infrastructure thus limits the number of connected endpoints and is highly constrained in terms of range and network capacity.

In direct comparison, wireless networks require far fewer hardware components, and less installation and maintenance costs. As there aren’t any physical cables involved, sensors can be easily attached to mobile assets to tap into a new host of operational data. On top of that, wireless networks make data collection in hard-to-access and hazardous environments possible and can flexibly expand to meet your changing business needs.

The central value around IoT is the unprecedented visibility into existing processes, equipment and production environment that empowers strategic decision-making. Think of applications used for asset maintenance, facility management and worker safety. As opposed to high-bandwidth, time-sensitive communications, many IoT sensor networks send small-sized telemetry data periodically or only when abnormalities are identified. Of even greater importance is their ability to connect vast numbers of distributed field assets and devices to bring granular business insights. With this in mind, wireless connectivity is often the better option to bring your physical “things” online.

Given the bewildering range of wireless solutions available in the market today, choosing the right technology is no easy task. Not all wireless technologies are created equal and not all can manage every use case. For this reason, there is a growing demand in multiprotocol support. Devices that combine the complementary strengths of different wireless standards and frequencies in one design, such as LPWAN and Bluetooth, makes it feasible for more complex sensor networks to exist.

LPWAN and Bluetooth Low Energy: A Match Made in Networking Heaven

Bluetooth’s ubiquity and global, multi-vendor interoperability has made it the core short-range technology for industrial and commercial IoT projects. Bluetooth Low-Energy (BLE) enabled devices are often used in conjunction with electronic devices, typically smartphones that serve as a hub for transferring data to the cloud. Nowadays, BLE is widely integrated into fitness and medical wearables (e.g. smartwatches, glucose meters, pulse oximeters, etc.) as well as Smart Home devices (e.g. door locks), where data is conveniently communicated to and visualized on smartphones. The release of the Bluetooth Mesh specification in 2017 aimed to enable a more scalable deployment of BLE devices, particularly in retail contexts. Providing versatile indoor localization features, BLE beacon networks have been used to unlock new service innovations like in-store navigation, personalized promotions, and content delivery.

The challenge with BLE-enabled devices is that they must have a way to reliably transmit data over a distance. The reliance on traditional telecommunications infrastructure like Wi-Fi or cellular has put growth limitations on these sensor networks. Long range communication is often a significant obstacle in industrial settings because Wi-Fi and cellular networks are not always available or reliable where industrial facilitates or equipment are located. This is why a complementary, long-range technology is so important.

Geared for low-bandwidth, low computing end nodes, the newer LPWAN solutions offer highly power-efficient and affordable IoT connectivity in vast, structurally dense environments. No current wireless classes can beat LPWAN when it comes to battery life, device and connectivity costs, and ease of implementation. As the name implies, LPWAN nodes are designed to operate on independent batteries for years, rather than days as with other wireless solutions. They can also transmit over many miles while providing deep penetration capability to connect devices at hard-to-reach indoor and underground locations.

In this context, LPWAN extends the power efficient and high data rate capabilities of BLE devices by serving as a reliable and robust backhaul for long range communication in both complex indoor environments and remote locations. This increases deployment flexibility, reduces the need for costly and complex network infrastructure requirements and makes it more feasible for massive-scale sensor networks to exist.

You Might Also Like : Introducing the new mioty BLE Dual Stack

 

For example, LPWAN and Bluetooth Low Energy together, enable the deployment of IoT networks in a significantly broader geographic area. This flexibility is increasingly important as more IoT sensor networks are deployed in far flung, industrial locations like remote mining, oil and gas and manufacturing facilities.

Together, they also cost-effectively enable critical indoor applications like asset tracking and consumables monitoring that require reliable connectivity for a vast number of end-nodes. The physical barriers and obstructions as well as co-channel interference with other systems often present in indoor environments can create challenges for reliable data communication. However, the long-range, deep indoor penetration and high interference immunity offered by next-gen LPWAN technologies ensures reliable data connection in any large industrial campuses or smart buildings.

Wrapping Up

The success of any IoT deployment is dependent on reliable connectivity, which remains a huge obstacle for numerous industries like mining, manufacturing, oil gas and smart buildings. These industries are faced with complex and often remote environments where traditional wired and wireless connectivity options are not possible as standalone technologies. That’s why combining different technologies that cover each other’s drawbacks while also adding on top their individual advantages is critical for building a reliable and robust IoT network. The combination of LPWAN and Bluetooth Low Energy in one design, increases flexibility and integration and opens up a new world of exciting industrial and commercial applications. 

[addtoany]

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%2BPGFydGljbGUgY2xhc3M9InZjZS1wb3N0cy1ncmlkLWl0ZW0taW5uZXJ7e2N1c3RvbV9mZWF0dXJlZF9pbWFnZV9oYXNpbWFnZV9jbGFzc19uZXdzX3Bvc3RfZ3JpZF9pdGVtfX0iPjxkaXYgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uIHZjZS1wb3N0LWRlc2NyaXB0aW9uLS10aXRsZS1jb2xvci1iLTQ3LTQ3LTQ3IHZjZS1wb3N0LWRlc2NyaXB0aW9uLS1leGNlcnB0LWNvbG9yLWItNDctNDctNDcgdmNlLXBvc3QtZGVzY3JpcHRpb24tLWF1dGhvci1jb2xvci1mZmNlMDAgdmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtY29sb3ItZDdkZmU0Ij48ZGl2IGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0taW1hZ2UiIHN0eWxlPSJiYWNrZ3JvdW5kLWltYWdlOnVybCh7e2ZlYXR1cmVkX2ltYWdlX3VybH19KSI%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Build Scalable and Flexible Networks with the mioty BLE Dual Stack

The Evolution of IoT Device Security and Privacy

IoT Device Security

BehrTech Blog

The Evolution of IoT Device Security and Privacy

[addtoany]

As the world starts to look beyond the COVID-pandemic and a “return to business normal”, whatever that may entail, one thing that is certain is that businesses will continue to accelerate towards digital transformation. At the heart of many organisations push towards large scale digitisation will be a continued acceleration to the deployment of Internet of Things (IoT) devices. With ever-increasing connectivity and volume of devices, we are fast approaching a world that will have between 70-80 billion IoT devices by 2025.

Whilst this growth brings numerous benefits across several business sectors and wider society, it will also inevitably change the way people carry out everyday tasks and potentially transform the world.  Undoubtedly IoT will play an important part in individual lives as well as corporate initiatives going forward and whilst having the latest smart phone controlling a smart home is undoubtedly fashionable, smart lighting can actually reduce overall energy consumption and lower consumer and industrial electric bills and carbon footprints and is therefore much more than a technological gimmick.

Technological advancements in the automotive sector will allow connected and increasingly smart vehicles to create a hyper-connected smart city where vehicles can connect to and “speak” to smart city infrastructures to create an entirely new operational ecosystem for the driver and town planner, as they plan how to move from point A to point B.

Indeed, at its fullest extent the ecosystem of connected smart cities will naturally evolve into connected healthcare. As Internet of Medical Things (IoMT) evolves to remove the constraints of hospital and medical capacity through the creation of elasticity in the medical system, connected healthcare devices will provide society a deeper and fuller point of view of their own health, or lack thereof, than ever before.

However, as is the case in many areas of societal progress, there are trade-offs. With all of these benefits comes risk, as the increase in connected devices gives hackers and cyber criminals more entry points, and to the majority of society, the trade-off or risk to privacy is the greatest concern.

Over the past 2-3 years, there have been numerous reports of hacking groups attacking critical infrastructure, including a power grid in a region of western Ukraine, and hospitals in both Europe and the US, not to mention water plants in Israel amongst others. Unfortunately, these attacks are likely to only represent the beginning, as hackers seek to exploit the ever-increasing connectivity between connected business and connected consumers. As a result, the average consumer is becoming ever more concerned about their privacy, and whilst increasing regulation has sought to address this, placing a fundamental expectation of security and privacy by design into IoT device manufacturing and operations is critical.

So, what issues are businesses, society and consumers concerned about in relation to IoT device security and privacy as we move towards a truly connected world?

The first key issue to address is public perception and public confidence. Whilst technological advancement will inevitably continue unabated, this needs to be the first problem addressed. Regulatory statutes such as EU GDPR, SB 327, and SB 734 represent major steps forward, however there remains a long way to go to address consumer concern. In 2015, Icontrol’s “State of the Smart Home Study” found that 44% of all Americans were “very concerned” about the possibility of their information getting stolen from their smart home, and 27% were “somewhat concerned.” With that level of worry, consumers would hesitate to purchase connected devices.  Whilst progress has been made, it is unlikely that these figures will have drastically changed today, and if anything, the key trend is that security and privacy has become a fundamental buying consideration for many consumers and businesses that remains unresolved.

The reason for this continued reticence is that so many IoT devices remain vulnerable to hacking as researchers have been able, with relative ease to hack into devices readily available on the market, with relatively simple tools and limited time and energy.  This is often because these devices have been manufactured with simple consumer connectivity and usability at the forefront of development – enshrining the principle of security by design.

Security by design, an often used, but not so often understood phrase describes a methodology that ensures IoT security, and indeed privacy, is a crucial objective at all stages of product creation and deployment. It addresses the challenge that, in many historic hardware deployments and instances of IoT design, security considerations were often included late in the design and prototyping phase. By prioritizing speed to market or other design considerations, security requirements can end up being added on. This approach has led to serious security breaches in the past, as IoT device security cannot be easily retrofitted.

The response can be summarised into 3 key steps required to establish a successful IoT device security and privacy strategy:

  • Security by design approach at the beginning of IoT projects
  • Trusted devices IDs and credentials embedded during manufacturing
  • Lock IDs and credentials in secure hardware containers

However, this drive for consumer usability has inevitably left devices open to exploitation by hacker’s intent in breaching business ecosystems which are now extended to the devices installed in people’s homes. The question is, who is liable for any resultant security and privacy breaches, the manufacturer, or the consumer?  My guidance to manufacturers is that “caveat emptor” – buyer beware – is unlikely to be acceptable for legal consideration when such an event is tested in the courts through a somewhat inevitable future class action law suit for a global privacy breach as so few companies themselves are confident that they have sufficiently robust defences to secure all IoT devices against hackers.

The challenge for manufacturing organisations has been the large-scale proliferation of, and demand for IoT devices, which is largely being driven by end-user organisations seeking new data analytics advantages. IoT devices enable organisations and consumers to collect and aggregate data and the sheer amount of data that can be generated is staggering.  For example, a relatively small town of 10,000 connected homes is likely to be able to generate more than 150m discrete data points every day, creates more entry points for hackers and often leaves sensitive information vulnerable.

These data volumes are created as consumers seek to leverage the simplicity of IoT, and in the very early days of IoT deployment companies have sought to collect user data willingly offered by consumers to make business decisions.  As an example, insurance companies might gather data about your driving habits through a connected car or personal fitness trackers, enticing consumers to offer these data insights through incentives, rewards or often discounts for the services.  However, at the point of purchase, did the consumer consider why there was such a willingness to offer such incentives?

Thankfully consumer awareness is changing and as individuals become ever more aware of their personal and family security and privacy, the need for manufacturers and big business to provide sufficient protection of consumer privacy will become greater. However regulatory influence remains in relative infancy and it is therefore likely that IoT device security and privacy will remain a concern of individual consumers, businesses, and society for several years to come.

IoT Data Security

Mark Brown

Global Managing Director, Cybersecurity and Information Resilience (CSIR), British Standards Institution (BSI)

Mark Brown joined BSI on 1 February 2021 in the role of Global Managing Director of the Consulting Services, Cybersecurity and Information Resilience business and has more than 25 years of expertise in cybersecurity, data privacy and business resilience. He has previously held global leadership roles across industry and professional services, including tenures as Global CISO at SABMiller plc, and Global CIO/CTO at Spectris plc, as well as leadership roles as a Senior Partner at Wipro Ltd., and was also a Partner at Ernst & Young (EY) LLP.
Mark brings a wealth of knowledge including extensive proficiency on the Internet of Things (IoT) and the expanding cybersecurity marketplace as organizations grapple with digital transformation and addressing new technology that brings new business opportunities and risks.
Mark is internationally recognized as a leading authority on information resilience with a focus on cybersecurity and data privacy, presenting a focus on the way IT can enable business strategies and currently chair’s techUK’s Industry 4.0 Cyber Security committee advising the UK Government on how businesses can be incentivized to safely adopt new technologies at minimal risk.  Mark is also an elected member of techUK’s Connected Home Group and Medical Device Innovation Consortium’s (MDIC) 5G Enabled Medical Devices working group.

www.bsigroup.com

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get the latest IoT insights, trends and news delivered to your inbox

IoT Standards and Protocols Explained

Industry Standards and Protocols

BehrTech Blog

IoT Standards and Protocols Explained

For businesses, the transformative power of IoT is increasingly significant with the promise of improving operational efficiency and visibility, while reducing costs.

However, IoT does not come without risks and challenges. While concerns over security and data privacy continue to rise, the lack of IoT standards remains one of the biggest hurdles. The increasing number of legacy, single-vendor, and proprietary solutions cause problems with disparate systems, data silos and security gaps. As IoT successes become more dependent on seamless interoperability and data-sharing among different systems, we want to avoid the scenario of a fragmented market with numerous solutions that simply don’t work with each other.

What are Standards?

Before we continue our discussion on standards, let’s take a step back and clarify their definition.

According to the European Telecommunications Standards Institute (ETSI), a standard is a “document, established by consensus and approved by a recognized body, that provides, for common and repeated use, rules, guidelines or characteristics for activities or their results, aimed at achievement of the optimum degree of order in a given context.”

Simply put, a standard is a published document that specifies a product’s functionality and verifies its quality. It establishes a transparent, consistent and universal understanding of a technology by eliminating inefficient variety in the marketplace. Standards, therefore, enhance compatibility and interoperability in product development, fuel global adoption, and production, and accelerate time-to-market.

To better illustrate the importance of standards, let’s look at light bulbs as a simple example. Nowadays, you can easily go to any store and buy any brand of light bulb, assuming that it is compatible with your lamp as the bulb base and threads have been standardized. This greatly boosts user demand, allowing manufacturers to ramp up their production and reduce costs leveraging economies of scale.

IoT Standards and Wireless Protocols

In the IoT realm, networking standards are hands down the most important. Standard protocols define rules and formats for setting up and managing IoT networks, along with how data are transmitted across these networks. Networking protocols can be categorized into multiple layers accordingly to the communication stack (i.e. OSI or TCP/IP model). In this article, we focus on the physical and network access protocols for data transfer from edge devices.

Even before IoT becomes a worldwide phenomenon, there have been a number of standardized wireless technologies that are widely acknowledged and adopted on a global scale. The most successful examples include Wi-Fi (based on IEEE 802.11a/b/g/n specifications for wireless local area networks), Zigbee (based on IEEE 802.15.4 specification for low-rate wireless personal networks) and GSM/UMTS/LTE (based on 2G/3G/4G mobile broadband standards developed by 3GPP).

However, these previously existing standards, are not optimized for a majority of large-scale IoT deployments that require interconnection of huge amounts of battery operated sensors (end nodes). Limited range and coverage, low penetration capability, power-hungry transmissions and high costs are factors that hamper their applicability in many use cases. By exactly filling these gaps, the arising group of low power wide area (LPWA) technologies are now taking over the IoT stage.

The problem is, most existing LPWA networks – typically the ones operating in the license-free spectrum – are proprietary solutions that do not implement a recognized industry-standard protocol. By making their technical specifications publicly available on a royalty-basis, many LPWAN providers are attempting to claim their technologies as “open standards.” Nevertheless, this is not really the case.

Strictly speaking, a standard – or let’s say an industry standard – must undergo a stringent evaluation process by an established Standards Development Organization (SDO). This guarantees the quality and credibility of the technology. Key global SDO examples include ETSI, IEEE, IETF, 3GPP, etc. So far, technologies that actually implement rigorous LPWA standards published by SDOs have been Narrowband-IoT/LTE-M/EC-GSM (standardized by 3GPP) and mioty (based on Low Throughput Networks – TS 103 357 specifications by ETSI).

Benefits of IoT Standards

So, why should you choose a standard protocol over a proprietary one? From an IoT user’s perspective, standardized communication solutions offer significant benefits in terms of:

  • Guaranteed Quality and Credibility – IoT standards ensure that products and solutions are fit for their intended purposes. In other words, communication technologies that adhere to rigorous standards deliver high Quality-of-Service, robustness against interferences and industry-grade security to ensure reliable and secure transmission of massive IoT sensor data at the edge.
  • Interoperability and Innovation Flexibility – Standardized communication protocols can be programmed on various commodity, off-the-shelf hardware (i.e. chipsets, gateways) to support multi-vendor solutions and the interconnection of heterogeneous devices. Beside promoting interoperability in the long run, this helps end users avoid commercial risks of vendor lock-in, whereby a single supplier retains total control over functionality design and future product/technology innovation.
  • Global Scalability – Industrial users with worldwide operations want to adopt IoT connectivity that can be implemented across their global facilities. Standardized solutions function universally and help minimize installation complexity, thereby safeguarding long-term investment.

With a vast assortment of IoT connectivity solutions available on the market, choosing the right technology can determine the success of your digital transformation. By opting for an industry-standard IoT solution, you can secure the longevity and ROI of your IoT architecture by making it quality-assured, vendor-independent and scalable worldwide.

Subscribe to Our Monthly Blog Roundup

[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%22%7D” unique_id=”5e147370″ pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%2BPGFydGljbGUgY2xhc3M9InZjZS1wb3N0cy1ncmlkLWl0ZW0taW5uZXJ7e2N1c3RvbV9mZWF0dXJlZF9pbWFnZV9oYXNpbWFnZV9jbGFzc19uZXdzX3Bvc3RfZ3JpZF9pdGVtfX0iPjxkaXYgY2xhc3M9InZjZS1wb3N0LWRlc2NyaXB0aW9uIHZjZS1wb3N0LWRlc2NyaXB0aW9uLS10aXRsZS1jb2xvci1iLTQ3LTQ3LTQ3IHZjZS1wb3N0LWRlc2NyaXB0aW9uLS1leGNlcnB0LWNvbG9yLWItNDctNDctNDcgdmNlLXBvc3QtZGVzY3JpcHRpb24tLWF1dGhvci1jb2xvci1mZmNlMDAgdmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtY29sb3ItZDdkZmU0Ij48ZGl2IGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0taW1hZ2UiIHN0eWxlPSJiYWNrZ3JvdW5kLWltYWdlOnVybCh7e2ZlYXR1cmVkX2ltYWdlX3VybH19KSI%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Get the Only ETSI Standardized LPWAN Technology

IoT for Data Center Infrastructure Management: 5 Critical Applications

IoT for Data Center Infrastructure Management: 5 Critical Applications

BehrTech Blog

IoT for Data Center Infrastructure Management: 5 Critical Applications

Data centers have become an indispensable part of modern computing infrastructures; housing business-critical applications and information. As they evolve from centralized on-premises facilities to edge deployments to public cloud services, it’s important to think long-term about how to maintain their reliability and security.

Major outages, data interruptions, and downtimes are expensive. According to Gartner, data center downtime costs $5,600 per minute on average. This results in average costs between $140,000 and $540,00 per hour depending on the organization. Good asset intelligence combined with preventive and predictive maintenance boosts equipment reliability and system availability.

While the sheer volume, velocity and structure of IoT data is creating challenges in terms of security, storage management, servers and the network, IoT has also created new opportunities to optimize data center infrastructure management (DCIF). IoT sensors and wireless IoT connectivity are being used to ensure optimal performance of critical data center equipment to maximize uptime, increase energy efficiency, lower operating costs and above all else, protect the data it is housing. Here are 5 critical IoT applications for data center infrastructure management.

IoT for Data Center Infrastructure Management

1. Temperature & Humidity Monitoring

Data center facilities operate 24/7, consuming vast amounts of energy and generating huge quantities of heat. Temperature control within the data center is essential in order to avoid equipment overheating, to regulate equipment cooling, and to measure overall efficiency.

Temperature sensors located in IT closets, data center racks, and key “hotspots” around the company’s facilities such as air conditioning intake and discharge vents can monitor heat generation and output for decentralized, granular control of the HVAC system and computer room air conditioning (CRAC) unit.

This is also a critical function for reducing energy costs which represent the largest operational expense in data centers. Data centers have a tendency to overcool their facilities by several degrees just to err on the side of caution. According to Gartner, environmental sensors can save up to four percent in energy costs for every degree of upward change in the baseline temperature. This is because temperature sensors at the rack inlet provide far more accurate, real-time view of data center temperatures compared to CRAC readings alone. This information can be used to make the cooling system more efficient, for example shutdown CRAC units as needed.

In addition to temperature, humidity control is essential to avoid damage to critical equipment. High humidity may result in equipment corrosion while low humidity may result in a build-up of static electricity. Environmental sensors provide real-time insights to ensure optimal humidity levels across the facility.

2. Indoor Air Quality Monitoring

Indoor air quality is another environmental hazard impacting data centers. Maintenance operations, infrastructure upgrades, and equipment changes as well as outdoor air used for ventilation, pressurization and/or cooling can introduce airborne contaminants into the facility. An indoor air quality monitoring solution can proactively alert teams to pollutants and particulates that affect electronic equipment, corrode contacts and reduce capabilities to failure point, which can result in costly data center outages.

3. Leak Detection

Water leaks are one of the biggest threats to a data center. Whether it is a leaking air conditioner, water cooled server rack, condensation, groundwater or local plumbing, water damage can have considerable costly consequences.

Leak detection sensors notify teams at the very first sign of a leak allowing them to take remedial action. For example, rope sensors can be placed in hard-to-reach locations such as around each CRAC system, cooling distribution units, under raised floors, and any other leak source (such as pipes). Spot leak sensors can be used to monitor fluid overflows in drip pans, monitoring in smaller rooms, closets or any low spots.

4. Remote Power Monitoring

While environmental monitoring is critical to ensuring proactive intervention and response to potential catastrophes, so is remote monitoring of batteries and uninterruptible power supply (UPS). Having the ability to detect potential problems early and rapidly respond to defects or degradation maximizes the reliability of UPS battery systems and gives organizations the adaptability needed in today’s dynamic data centers.

5. Security & Access Control

A data centre physical security breach might result in the loss of equipment, but the real danger has to do with data exposure. With companies collecting personally identifiable information in many different forms, consumers are becoming increasingly concerned with how well that data is being protected. Any sort of threat to a company’s data, can have a significant impact on reputation and business and result in a large financial loss.

While the likelihood of stealing an entire server is low, an asset tracking solution helps companies manage and track any asset, big or small, in real-time. It can also send out alerts the moment an asset is moved or tampered with, allowing personnel to respond quickly to any threat.

When it comes to monitoring and restricting access to the data center itself, wireless sensors can be used for presence detection and people counting in restricted areas as well as suspicious movements such as opening and closing of doors or windows. Likewise, IoT-enabled locks, card readers and keypads can further monitor and control personnel entering and exiting for a multi-layered approach to security.

Whether it’s an enterprise, managed services, cloud or colocation data center, ensuring the efficient performance of this critical environment is becoming increasingly important. IoT for data center infrastructure management provides a holistic view of current environment conditions, resource usage and security to maximize uptime, increase energy efficiency, lower operating costs and prevent data loss and exposure.

[addtoany]

Subscribe to our Monthly Blog Roundup



[vcv_posts_grid source=”%7B%22tag%22%3A%22postsGridDataSourcePost%22%2C%22value%22%3A%22post_type%3Dpost%26amp%3Bpost_status%3Dpublish%26amp%3Bposts_per_page%3D5%22%7D” unique_id=”1d056b6e” pagination=”0″ pagination_color=”#ffce00″ pagination_per_page=”10″]PGRpdiBjbGFzcz0idmNlLXBvc3RzLWdyaWQtaXRlbSI%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%2BPGEgaHJlZj0ie3twb3N0X3Blcm1hbGlua319Ij48L2E%2BPC9kaXY%2BPGRpdiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLWNvbnRlbnQiPjxwIGNsYXNzPSJ2Y2UtcG9zdC1kZXNjcmlwdGlvbi0tbWV0YSI%2BPHNwYW4%2BUG9zdGVkIDwvc3Bhbj48c3BhbiBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLW1ldGEtZGF0ZSI%2Bb24gPHRpbWUgZGF0ZXRpbWU9Int7cG9zdF9kYXRlX2dtdH19Ij57e3Bvc3RfZGF0ZX19IDwvdGltZT48L3NwYW4%2BPC9wPjxoMyBjbGFzcz0idmNlLXBvc3QtZGVzY3JpcHRpb24tLXRpdGxlIj48YSBocmVmPSJ7e3Bvc3RfcGVybWFsaW5rfX0iPnt7cG9zdF90aXRsZX19PC9hPjwvaDM%2Be3tzaW1wbGVfcG9zdF9kZXNjcmlwdGlvbl9leGNlcnB0fX08L2Rpdj48L2Rpdj48L2FydGljbGU%2BPC9kaXY%2B[/vcv_posts_grid]

Don’t let your IoT projects fail.

Get flexible, scalable and secure wireless connectivity for IoT