Sensor-2-Server (S2S): Implementing IIoT Communications

*This is part of a series of blogs examining Sensor-2-Server (S2S) communications, development and implementation. Last week, in part one of our series, we worked to define Sensor-2-Server (S2S) for IIoT communications, the access layer, and high-level applications. This week, we’re looking at the actual implementation of S2S communication systems. Implementing S2S Communications When implementing S2S networks, the operator needs to have a solid understanding of the following: What sensor data do I want to collect? What does the architecture look like? Where does the data need to come from and where does it need to go? For example, is it just going to SCADA or is it going to other data sources? These key details will drive the selection of the technology that best fits, in addition to the physical environment where it needs to transmit data. Carefully selecting the right pieces will help in architecting the network. In order to make S2S work, an operator needs to understand the physical environment needs. Everything is unique when it comes to RF in particular, and an operator must fully understand their environment if they want to be successful. The ability to collect the data is the first step in improving intelligence of Sensor-2-Server communication, which starts with technology selection. Four Tenets of Sensor-2-Server To establish the most effective S2S communications network, there are four core tenets that the technology must support: collecting the data, protecting the data, transmitting the data and controlling the data. Collect – The technology must allow the operator to collect data from any sensor – whether the sensors are analog or digital, wireless or wired. In some instances, the technology may need the extended ability to collect data at the access layer in a data logging fashion – allowing the operator to collect it, store it locally and make it available to SCADA systems. Protect- The intelligent communication must be able to protect the network against cyber-attacks. It must fix the boundary between the sensor and backbone network. Without ample security in the environment, many industries can be at risk for severe consequences such as compromised data or denial of service. Transport- The data must be transported to the appropriate location for analysis, no matter where the data is collected from. Operators should look for a system that offers seamless wireless data connectivity from Sensor-2-Server. Control- The Sensor-2-Server technology must add intelligenceto the access layer. Data logging is critical, and operators must have the capability to pull data in and control what happens with the data and where that data is stored. Users can leverage that data at the local level or back at the core network. S2S technology can be effectively deployed in the energy sector, whether it is oil and gas, electric power, solar, wind and or tide- based energy. Additionally, utilities, precision agriculture and irrigation can also benefit from intelligent S2S communication. With an intelligent communication system, operators can leverage new technology to improve the profitability of their businesses in ways previously considered impossible. For example, if an oil and gas company can use predictive analytics to estimate the price per barrel, the company can be more responsive – in real time – on its oil production levels. The data gathered from predictive analytics can help operators determine if production should be increased or decreased in certain areas, thus driving higher profitability. These technologies can also lead to cost reduction. For example, by deploying S2S technology at the oil well, the operator does not have to send as many workers out in the field to manually collect data. By enabling multiple benefits (profitability and cost reduction), S2S offers a value proposition that is getting the attention of many industrial operators. Next Week Next week, we’ll look at the benefits of intelligent Sensor-2-Server communications, as well as some of the important security considerations.

IIoT Top News: Utilities Powering Tomorrow

We’re fresh off a great week at DistribuTECH 2016 where we saw a gamut of technologies, thought leaders and trends. With utilities and energy still top-of-mind, our focus this week is on the changing face of the industry. This digital age means we have come to expect that the power will always charge, operate and run our numerous IoT devices. That’s why this week’s IIoT top news is dedicated to powering our electrical future.  So, it should come as no surprise that, the electric power industry has made it their mission to protect and secure this precious power at all costs. The power initiative has teamed up with federal agencies, National Institute of Standards and Technology, and the North American Electric Reliability Corporation to continue to build its capabilities. Now as you hold tight to your digital devices, take a breath, relax, and enjoy this week’s top news roundup. Industry Pioneer: The Road to Electric Utility of the Future is Paved With Prosumer Technology (Forbes) Years later, after the initial big push for IoT with utilities, we are still hoping for better, cheaper and smarter utility solutions. Forbes suggests the future of utilities will be paved in prosumer technology. William Pentland writes, “In 2009, the U.S. government made the single largest investment ever in modernizing the U.S. power system. Nearly seven years and more than five billion in federal tax dollars later, the electric grid is technically a lot smarter than it used to be. So why do utility rates seem to be getting more – not less – stupid?”   Utilities to Lead Surge of Electric-Car Charging in Southern California (Green Car Reports) Southern California now has the lead on electric-car charging stations as utility companies in the area task themselves with an aggressive plan to expand the number of station in the region.  A recent report from Navigant Research suggests that, “The commencement of these projects marks a major transition for electric-car charging in California, as it marks the beginning of significant involvement from utilities.”   Michigan Utilities Expected to Surpass Renewables Mandate (North American Wind Power) Each year the state of Michigan sets a level of renewable energy that must be met, only this year the Michigan Utilities is expected to surpass that mandate with a surprising amount of growth. According to the six-annual report from the Michigan Public Service Commission (MPSC), “There has been significant growth of wind generation in Michigan’s renewable energy certificate portfolio, from 7 percent in 2009 to 44 percent in 2014.” NRG Proved How Tough It Is To Change. So Who’s Poised to Become the Utility of the Future? (BreakingEnergy.com) A short time ago NRG set its sights on becoming the Google of the energy world, but as the IoT evolves it is very likely an unknown company will be the next market leader for energy worldwide. GreenTech Media argues that “the utility of the future will also have to be so much more to succeed — leveraging data, new technologies and personalization to transform the way customers consume and deliver power.”   What Are Utilities Thinking Today About the Importance of Engaging with Their Customers? (Intelligent Utility) As world continues to become all things IoT, utilities need to consider how engaged they would like to be with their customers. ONZO survey results at DistribuTECH 2016 show, “Most utilities also plan to increase their investment in improving customer engagements and think that analytics are key to their ability to do so.”  

Sensor-2-Server: Intelligent Communication at the Access Layer

*This is the first in a series of blogs examining Sensor-2-Server communications, development and implementation. Throughout history, industrial revolutions have hinged on the power of automating processes. While automation today offers many benefits, imagine if you could automate thousands – or even millions – of processes simultaneously? This is the next potential wave of innovation, and it’s the organizations that are “geographically dispersed” or “automation heavy” that will benefit the most. While long-range communications and connectivity have become increasingly easier to attain, businesses need to be able to break down their isolated islands of automation in industry to achieve comprehensive and connected automation at scale. For example, there always has been a clear line dividing operations technology (OT) and information technology (IT) networks. The emergence of the Internet of Things (IoT) blurs that line as industrial operations head in the direction of complete connectivity for all devices on a network – including those remotely located in the field. With new dedicated access layer platforms, IoT data can be analyzed, acted upon and transmitted from anywhere in an Industrial IoT (IIoT) network. The increasing shift toward Industrial Internet of Things (IIoT) tends to bring up a lot of questions about the continued value of Supervisory Control and Data Acquisition (SCADA) systems that have traditionally served as the driver for monitoring and control in industrial markets. Although OT and IT are beginning to converge, there is still high demand for SCADA data. However, new technology offers the opportunity for data to be used in ways that were previously not possible, such as predictive analytics. This doesn’t make SCADA obsolete, as many operators are using it and will continue to employ it. Going forward, industries will leverage new technologies designed to help them make better business decisions than with SCADA alone. Sensor-2-Server™  (S2S™) intelligent communications for the access layer can collect and transport the data that supports higher-level analytics. As IoT becomes adopted by industrial markets, there is going to be an increased demand for video, voice, data and sensor data communication from the outermost layer of the network (think sensors on oil pads or water tanks). Industries like oil and gas, electric power, agriculture and utilities are starting to pick up on the benefits of S2S when it comes to profitability and cost savings through more advanced data analytics. Defining Sensor-2-Server S2S is intelligent communication that begins at the sensor level and targets servers for specific reasons. These servers could include anything from a SCADA data server that collects and monitors through the SCADA system or a Big Data engine. S2S could be leveraged in a predictive analytics engine that compares data at rest stored in a database to data in motion in real time from the access layer of the network. The concept of S2S extends beyond transmitting data. It is about creating intelligent transmission from a specific location back to the appropriate server with the appropriate intelligence to drive action for change. What is the Access Layer? The access layer is the edge of the IT network. An IT infrastructure has a core that is home to all the Big Data and data analytics. At this core, the data is “at rest” because it has reached its final destination. Next is the distribution layer of the IT infrastructure which is where the major plants, sites and facilities are located. Further out is the aggregate layer where data at the next level in the network is collected. Extending out even further is the access layer.   The access layer is the layer at the far edge of the IT network. In oil and gas, for example, oil pads would be part of the access layer because they are typically remotely located at the edge of the network. It is highly likely that sensors physically exist in this layer for monitoring and control of these devices. Additional examples of the access layer are tanks, refinery sites and ocean exploration vessels. In water/wastewater, the access layer could be the treatment facility that has the water meters, pumps, smart meters, etc. Essentially, in an industrial site, the S2S access layer is the furthest point at which the operators are collecting sensor data. Industrial organizations today need intelligent secure communication and transmission from the sensor data back to the appropriate server, and there are a number of available options. What’s Next? Next week, we’ll continue our Sensor-2-Server series with a look at implementation and some of the core tenets of communication system development.

Solving The Challenges of Remote Wi-Fi in the Industrial Internet of Things

Most of us can relate to the frustration of when the Wi-Fi is down, or running slowly, or if we travel away from an established network and aren’t able to connect to another one nearby.  The lack of Wi-Fi makes it impossible to check our emails, look up something on the internet, connect with others, or get our work done efficiently. In short, it makes us feel a little helpless and a whole lot of cranky because we’ve become way too accustomed to getting the information we want – when we want it – and staying in 24/7 connection with our world. Now, if we’re challenged by our Wi-Fi experiencing a service blip in a metropolitan area, imagine a remote industrial setting like an oil pad, a water treatment plant, or a rural electric tower. All of these reside in what is known as the access layer – or at the very outer edge of an IT network. Not only is there usually no internet connectivity in the access layer, but these devices are  typically operating in rugged terrain where they’re experiencing extreme and volatile weather conditions such as wind, snow, blistering heat, tornadoes, dust storms, etc. Each of these access layer settings is part of a larger industrial Internet of Things (IIoT) network that connects the information gathered from local sensors that transmit or receive operational data. From there, they pass it along through subsequent network touch points all the way to the IT department at headquarters where this data is collected, analyzed, and acted upon for improved decision making. So, at the access layer – sometimes in the middle of nowhere where there can be no Wi-Fi networks for miles – talk about being disconnected from the world! Adding the environmental component to that, as well as the fact that most of these remote sites aren’t adequately monitored and data security is at risk, it makes your occasional Wi-Fi challenges seem a bit tame, yes? Here’s where wireless IIoT communications technology can help transmit this critical sensor data from remote industrial locations with no Wi-Fi connectivity all the way to where they’re supposed to go – and at very high speeds. This week, FreeWave is launching its new WavePro™ WP201 shorthaul and Wi-Fi platform that delivers secure collection, control, and transport of Voice, Video, Data, and Sensor (VVDS™) information from the access layer. Think of it as high-speed, rugged Wi-Fi connectivity that can be positioned in that oil pad, power plant or wherever Wi-Fi is needed. It will not only connect these sensors to the internet, but can also transport voice and video to create an instant in-field network, provide greater visibility into what’s going on at these sites, and better protect remote assets. The Advent of Short Haul and the Access Layer Change is inevitable, and change is taking place in SCADA, M2M and IIoT networks. SCADA networks started as networks that transported periodic process updates and used low bandwidth networks with longer links to meet their mission. Today, remote SCADA and Wi-Fi networks are transporting more data from more sensor data with greater frequency in order to drive operational efficiency into business processes. SCADA and M2M networks are becoming more multi-functional than their predecessors. These networks are transporting more than sensor data from the remote site to the enterprise. These networks linking remote sites to the enterprise network are now transporting: Video for remote process monitoring, enhanced site security and theft deterrence Voice, since cellular coverage is not ubiquitous Data so field personal have access to information needed to work efficiently This combination of data types is what FreeWave terms as VVDS™ (voice, video, data and sensor). VVDS transport is now a requirement for your wireless network. Another change occurring in traditional SCADA networks is that link distances are decreasing. In the past, SCADA networks with wireless links of more than 10 miles were common. Today, wireless links in excess of 10 miles typically use high speed, microwave, point-to-point (PTP) systems because of the increased capacity demands of VVDS. The WP201 links the formerly unconnectable and is designed to not only meet the harshest environmental conditions, but also encrypts the data to keep it secure and protected. It can be used in a wide variety of industries like oil & gas, utilities, mining, disaster recovery, facility automation – anywhere  where field sensor information needs to be transmitted to servers for Sensor-2-Server™ (S2S™) connectivity. The applications are almost limitless. With higher speed, shorter wireless links, FreeWave defines wireless networks in three tiers: Long Haul (or the Distribution Layer) are wireless links from 5 miles, and greater and are typically implemented using high speed, PTP microwave systems. Short Haul (or the Aggregation Layer) are wireless links from 1 to 8 miles that are easily implemented using high speed, 2.4GHz or 5GHz radios with directional antennas to create point-to-multipoint (PMP) networks for data and information aggregation, or PTP links that provide network ingress/egress points. Close Haul (or the Access Layer) are PMP networks with wireless links operating from a few feet to a couple of miles to transport VVDS data. Designing and deploying wireless networks using a layer approach that enables each layer to be optimized for transport and for cost ─ leveraging the right equipment at the right point. The WP201 and its remote Wi-Fi and short haul capabilities is the first in a series of S2S products that FreeWave is offering to be that critical communication bridge in the IIoT world.  So in your own operations, what are some ways you might incorporate the WP201 into your network?

IIoT Top News: CES 2016 & the Fate of IoT

All eyes appeared to be on the Consumer Electronics Show (CES) 2016 in Las Vegas since last week, as more than 3,600 companies unveiled the IoT and IIoT innovations we can all expect to see in the coming year. This year’s CES showcased plans to make the car a complete mobile office—with technology in place to allow Skype calls and the use of Microsoft 365 from the car. The other hot theme at CES was drones – not a surprise since these unmanned crafts have pulled us in like a tracker-beam to the mother ship. The autonomous ‘copter drone was one of the most impressive releases with the reality that the businessman of tomorrow doesn’t need a private jet, just a ‘copter drone and a smart phone. Now, as we watched all the products rolled out for their various purposes, it seems we have more connected things to add to an already expansive connected world. How will IoT connectivity technologies weather the storm as demand continues to skyrocket? According to IDC Research, IoT is about to take center stage by globally growing from $656 billion in 2014 to $1.7 trillion by 2020. The buzzwords of 2016 and beyond, IoT and IIoT specifically, simply show we are moving to an “everything is connected” environment. Naturally, once the luster of a shiny new thing wears off, we are tasked with the goal of protecting a critical piece of the IoT world – the data. Businesses need to make sure they are keeping information safe and secure. In this digital innovation age, plenty of industries (and therefore technologies) can’t afford a hack or cybersecurity breach at any time, for fear of customer loss.  Companies need to trust their digital information infrastructure will be not only be safe, but also high-performing – or they could very well risk extinction altogether. This week’s IIoT top news post takes another look at the fate of IIoT, as many new “connected things” hit the market this year. Hope you enjoy this week’s recap, and as always, tell us what we missed! Enterprise IoT Projects Will Be Costly, Lengthy and Vulnerable, Says Gartner (Computer Weekly) As the IIoT continues to inhabit day-to-day life, it’s not a surprise that, fifty percent of businesses will use some form of IoT systems by the year 2020. Gartner states that, “By 2020, addressing the black market and other compromises around IoT security will push overall security budgets up, with IoT costs expected to account for twenty percent of annual security budgets, compared with one percent in 2015.” Does Anyone Really Care About the Internet of Things? (Forbes) In this latest article by Forbes, Todd Hixon claims the term IoT was coined 17 years agoand he is still waiting for the killer ultimate app to come out. Hixon further suggests that when it comes to IoT, “Most of the time people prefer to ignore security and focus on more immediate needs and wants.” CES 2016 Takeaways: IoT Could Be the Death of Your Security Network (Network World) The real takeaway from CES 2016 is the overall lack of security for all these new IoT gadgets entering the market and how they fit into the IIoT ecosystem. Tom Henderson, from Network World believes the fate of IoT after CES is that “The damage, the damnation, the truculent total churl of the event was this: all of the new Internet of Thingies/IoT/KewlGear has no cohesive security strategy.” The Internet of Things: Hyped But Here to Stay (USA Today Tech) As the magnitude of connected things get ready for their clos-up, it would appear all the hype for IoT is here to stay. Edward Baig, with USA Today reports that, “You couldn’t walk around CES this week without hearing about or bumping into products related in some way to IoT, the tech industry’s inelegant way of describing all things connected.” What’s Next for the Internet of Things? (TECHCO) Sensors, software, electronic devices and M2M have taken over our daily lives. So, what’s next for IoT? Monoka Jha, with Tech.CO thinks the industry plan needs, “To use the Internet of Things optimally, we need to connect a device to different industries through varied media. For that to happen, the different industries need to have a common physical medium.”

Earth-Shaking: Resiliency & Smart Infrastructure Lead Seismic Monitoring Efforts

Seismic monitoring tends to pop up in the news only during disaster situations, or, more recently, in conjunction with North Korea’s possible detonation of a hydrogen bomb. Earlier in 2015, The New Yorker ran a piece, “The Really Big One,” looking at the probability of a large earthquake destroying the Pacific Northwest. The earthquake off the coast of Japan in 2011 triggered one of the largest nuclear plant meltdowns of recent history, the impact of which we are still dealing with today. Point being, the typical association with seismic monitoring – earthquakes and explosions – is negative. The day-to-day reality, however, is much more interesting. Every day, vast amounts of seismic data are being collected the world over, and that data is being reflected by cities taking action to create smarter, more resilient infrastructures – especially in areas where seismic activity either happens frequently or would be devastating were an event to occur. Geological hazard monitoring has become a primary focus for many areas of the world, and as the technology has matured, so has the ability to transport data in real time. In turn, with real-time data transport comes the ability to incorporate predictive analytics and more intelligent decision making for city planning and civil engineers. New Zealand is an excellent example of the renewed emphasis on earthquake monitoring and preparedness. Each year, there are more than 250 significant earthquakes throughout New Zealand, so collecting that data allows scientists to detect, analyze and respond to the seismic activity. As the data is processed, the predictive analytics come into play. Data from these monitoring sites can be used to examine ground movement, which can indicate stress points, and to gauge the probability of an earthquake in the future. Today’s technology now allows all of that data to be transferred in real time from the monitoring sites to the back office, greatly increasing the ability to deploy it into actionable intelligence. In 2011, when Christchurch, New Zealand, was hit with a series of devastating earthquakes and aftershocks – including an aftershock that “produced the highest peak ground accelerations on record” –  the recovery effort was basically twofold: how could the city not only rebuild the structures and civic needs, but simultaneously make that infrastructure smarter and more resilient, able to predict and handle future seismic events without the crippling aftereffects. And the truth is, those exact questions are being asked by cities in similar positions on a daily basis. What this all points toward is an evolving ability to synthesize IIoT communications technology, data collection and predictive analytics into a smarter and more resilient infrastructure for areas prone to seismic events. Things that used to fall into the realm of “the future” are now very real and very tangible solutions to nature’s enigmatic temperaments.

IIoT Top News: 2015 News Round-Up

Let’s take a moment and appreciate the excitement 2015 brought for the IIoT: As we look back at the top articles from the year, we were intrigued to learn that cooperative utilities actually have the largest penetration of smart grid meters per percentage of customers, according to Greentech Media and the U.S. Energy Information Administration. It’s interesting to see the largest publicly-owned utility companies in the U.S. are not the leader in deploying smart meter systems. Another topic that caught our eye this year focused on big data initiatives and how they will improve operational efficiencies by the large-scale storage and transfer of volumes of information safely and securely. Companies don’t always see the value in updating information governance policies because there isn’t always a direct reward and no direct penalty for non-compliance. Tim Jennings, Ovum chief research officer, believes as big data continues to grow within the company infrastructure, it is time to consider the security, availability, and time spent storing data. Speaking of Big Data… It is hard to grasp the magnitude of data transferred throughout the cloud. Today, as big data goes to work, it is transforming industrial facilities, and as Forbes states, “they have grown increasingly complex and yes, every machine, every pipeline, every transmission point collects data ready to be read.” Of course, a 2015 news review would not be complete without at least one mention of unmanned systems. Whether the want/need was for industrial, commercial or government applications, the thing on everyone’s mind was how many cool ways this technology could be deployed in the future. While there were many examples to choose from, DARPA certainly caught a lot of attention from its new autonomous submarine-hunting ocean drone. Yes, you read that right! Finally, as we ease our way into 2016, we would like to share the rest of the top technology and IIoT stories from 2015. This year’s round-up highlights articles about: utilities, manufacturing, oil and gas, wireless, big data, security, drones and industry analyst perspectives. Hope you enjoy this week’s roundup, and as always, tell us what we missed! Energy Six Ways IoT Enables Innovation in the Energy Industry (IT World Canada) The energy industry is learning to use IoT to its advantage. IT World Canada details six ways IoT is enabling innovation and improving overall cost and efficiency for the industry. Yogi Schulz with IT World Canada believes that “Applying these IoT advances to a range of energy industry problems will be a major factor in helping the industry return to profitability in the new, lower commodity price environment through innovation based on better data.” Manufacturing Machine Learning (The Economist) As manufacturing becomes digitized, the industry has to adjust from being a product-focused world to a services market, with smart machines installed on the shop floor. The Economist believes that “For many manufacturers—in Germany and beyond—the principal sticking-point in making this digital leap is often cultural.” Manufacturing’s Digital Future (Industry Week) The digital future of manufacturing will incorporate the data analytics, cloud and many other wireless IoT solutions. Industry Week believes “many companies are leveraging interconnectivity to improve their own factory productivity, the factory-floor blocking and tackling of reducing downtime, cutting costs, reducing cycle time, improving OEE, etc.” Oil and Gas In the Digital Oilfield, “No Wires is a No-Brainer (World Oil) With the digital progression of our world, it seems only fitting we would find IoT in the oilfield. The question we must ask is: “Why, in 2015, has wireless I/O not overtaken hardwired infrastructure as the industry standard throughout the OFS sector?” Big Data Internet of Things Transforming Oil and Gas Operations (RigZone) Analytical movement has increased as the cost of oil continues to drop, therefore forcing the oil industry to gravitate toward more big data and IoT. It has been said, “the amount of data generated by oil and gas operations is starting to explode as real-time information from sensors is being collected at a rate of four milliseconds.” Wireless Tech Darpa’s RadioMap Detects RF Spectrum Congestion (GCN) An interconnected connected wireless world has created congested airways, thus making military communication and intelligence gathering requiring radio frequencies be managed. “RadioMap adds value to existing radios, jammers and other RF electronic equipment used by our military forces in the field,” said John Chapin, DARPA program manager. Big Data The Ethics of Big Data (Tech.Co) Big data has been defined as information that has been either unstructured or multi-structured as way to transform data into value. Once you have given value to the data, it is important to realize who owns the data. Tech.CO says that “when it comes to big data ethics, privacy is not necessarily dead, shared information can still have a reasonable degree of confidentially, but big data can still compromise identity and other information that customers and businesses prefer to be confidential.” Security IoT Security Needs to Stop Being an Afterthought (PCR) In the age of smart homes and smart devices it is time to improve the IoT security across the board. The Internet Society (ISOC) recently released a white paper stating, “the vendors who use IoT should take more responsibility for the security issues that can occur with IoT products.” Drones Robo-Bulldozers Guided By Drones Are Helping Ease Japan’s Labor Shortage (The Verge) Komatsu had to find a way to complete construction projects, as Japan gets closer to the 2020 Olympics. The aging population makes it hard to find anyone able to complete the work. The fix Komatsu has found is to offer a service called Smart Construction where, “a team of robotic vehicles scoops rock and pushes dirt without a human behind the wheel. They are guided in their work by a fleet of drones, which map the area in three dimensions and update the data in real time to track how the massive volumes of soil and cement are moving around the site.” Deforestation: British Firm Developing Tree-Planting Drone to Counter Industrial-Scale Logging (The Independent) A British engineering company is hoping to get international backing for an automated tree planting drone system. The purpose of these drone planting fleet’s, would be not

IIoT Top News: IIoT Predictions and Innovations for 2015-2016

As we inch our way closer to the New Year, we would like to take a moment and appreciate some of the technological advancements of 2015, as well as a few bold IIoT predictions for our connected-world enthusiasts. This medley of top news gives credit to our inventiveness, while highlighting a future forecast for IIoT. No matter your place in the world, drones have captured our attention. Precision Ag has changed the way farmers care for crops and animals. So naturally, more and more farmers would be jumping on the drone plan of action. Recently, the FAA has been putting a major kink in the farmer’s right to use drones in farming. The ruling states that if a farmer uses a drone for farm operations in any way, they must file with the FAA for a commercial exemption to use that technology legally. New permanent rules for drone usage could be in place next year from the FAA. So time will tell how the FAA’s ruling will impact the farmers and other commercial drone users in this country. Now it seems every car manufacturing company has grabbed ahold of the terms automation and autonomous. The next generation of cars needs to be self-driven, so the race is on to see what car company will own the rights first. A group in China raises that bar even higher by creating a self-driven car, they claim is operated solely by your mind. Just think one day in the near future you could climb into your car, click your heels together and merely think, “There’s no place like home,” and off the car would zoom. 2015, has been a good year for smart city development here in the U.S., with more than $160 million dollars in governmental funding allocated for this initiative. Gartner predicts that by 2016, the smart cities planned by the government will end up using 1.6 billion connected things. Twenty-four percent of IoT in 2016 will be in commercial security cameras, webcams and indoor LEDs, according to Gartner’s latest prediction. So, with everything becoming connected, IT departments are trying to stress the importance of securing this growing data collection. Don’t get us wrong IT departments are looking forward to the IoT expansion in 2016, but this level of increase in data could have a drastic impact on the networks, which is why IT managers surveyed suggest a new plan of action to combat the overwhelming IoT to the world we all know and love. This week concludes with three main messaging themes gained from this year’s Internet of Things World Forum (IoTWF). First, we must awaken and realize all the competitive advantage IoT can bring to businesses. Next, we must activate a realistic IoT deployment plan that will fit within our business needs. Last, we must accelerate the connection, with the assistance of service providers and developers. The IoT may change the way we function in this world, but the possibility of more innovation at our finger tips fuels our inventive minds forward. Hope you enjoy this week’s focus on IIoT predictions. As always tell us what we missed! Drone Use in Ag Increasing, But Lack of FAA Rules Slowing Technology (Capital Press) For every, good technological advancement there is a level of disruption expected as it thrusts itself into the market place. Drones are quickly becoming the must-have tool for the farming industry yet Capital Press points out that, “the Federal Aviation Administration’s lack of permanent rules for the technology is slowing its development.” Chinese University Develops a Headset That Lets You Drive a Car With Your Mind (Popular Mechanics) Autonomous cars appear to be the wave of the future. A group in China pushed the envelope even further by producing a car powered solely by your mind. They say the inspiration for this forward thinking technology can“bring more benefits to us, since we can better realize functions relating to brain controlling with the help of the driverless cars’ platform.” Smart Cities to Boost Internet of Things Market in 2016: (Gartner Chronicle Daily) The 2015, push for more smart cities is having an equally important impact on the number of connected things. According the Gartner, “The smart cities planned by the government will use almost 1.6 billion of connected things or Internet of Things (IoT) by 2016, an increase of 39 per cent from 2015.” Data Volumes and Network Stress Top IoT Concerns in 2016 (ITPro Portal) A group of IT managers were recently surveyed about the impact all things connected could have in 2016. The department managers stated that, “all this activity adds up to a huge number of devices with the overall average per individual UK organization expected to run into the thousands over the next 12 months. All these devices will be attached to a variety of networks resulting in increased stress on both existing and new networks.” The Internet of Things World Forum 2015 Highlights Three Themes (AME Info) This year’s Internet of Things World Forum highlighted three main themes throughout. The IoTWF focused on, “awaken, activate and accelerate the IoT solutions for your business.”  

Guest Post: IHS Predicts IIoT Cybersecurity Will Increasingly Be Implemented in Hardware

By Sam Lucero, Sr. Principal Analyst, M2M & IoT at IHS Technology IIoT & Cybersecurity As IIoT systems create ever more critical dependencies in plant, energy infrastructure, and transportation environments, developers and deploying organizations will turn to hardware-enabled cybersecurity to stave off proliferating cyberattacks. Although the use of secure processors in smartcard applications, such as bank cards, mobile phone SIM cards, and digital ID documents is common, IIoT developers have barely begun to adopt a hardware-enabled approach. Instead, “root of trust” technologies, such as secure key storage, cryptography, and secure boot, are handled in software on the main application processor of the device. IHS estimates that in 2015 only 9.8% of all secure processors shipped were intended for IoT applications (that is, all of IoT, not just IIoT). The challenge with this software-based approach is that security functions on the application processor share common memory resources with other functions and are therefore exposed and vulnerable to malicious attack. Hardware isolation reduces (but cannot completely eliminate) this exposure and therefore dramatically increases the security of the device. This increased security is fundamentally why bankcards, mobile phones, and now ePassports, have shifted to the use of hardware-based security. Looking Ahead A lingering question regarding the use of secure processors in IIoT applications is whether implementation will be in the form of a second coprocessor chip placed alongside the host application processor, or whether cybersecurity hardware intellectual property will be integrated directly into an application processor. (Integration of cybersecurity circuitry still achieves hardware isolation in contrast to software, although some physical security measures may become impractical.) Chip companies such as Atmel, NXP, and Renesas Electronics have adopted this integrated approach for at least some of their respective portfolios targeting the IoT. It remains to be see whether an integrated approach will be successful. While integration helps to reduce overall device bill-of-materials, it can increase cost and complexity for cybersecurity certification, relative to a “two-chip” solution. About Sam Lucero Sam Lucero is a seasoned industry analyst with over 14 years of experience analyzing telecommunications and networking technology markets. He has spent the last ten years assessing the markets for machine-to-machine (M2M) and Internet of Things (IoT) applications. Sam has established leading M2M market research programs and managed international teams of industry analysts. He has authored numerous reports, forecast databases, and topical articles covering various aspects of the M2M/IoT market opportunity and has been widely quoted in news and trade journals, from the New York Times and the Economist to CNET and Wireless Week. Furthermore, Sam has moderated, presented, and judged at a number of industry events, including CTIA and Connected World. In 2014 Sam was named one of six “Augural Analysts” for M2M by Connected World Magazine.

Become a FreeWave Insider

Designed, manufactured and tested in the USA.

© 2024. FreeWave Technologies, Inc. All rights reserved.

HEADQUARTERS

5395 Pearl Parkway, Boulder, CO 80301

TOLL FREE

LOCAL

Designed, manufactured and tested in the USA.

© 2023 FreeWave Technologies, Inc. All rights reserved.