FreeWave Technologies, NetFoundry, and Keyfactor Announce a Triumvirate for IIoT Connectivity Security Services

Boulder, CO – January 28, 2025 – FreeWave Technologies, a leader in industrial wireless connectivity and Industrial Internet of Things (IIoT) solutions, has integrated the technology of NetFoundry and Keyfactor to deliver unparalleled security and simplicity for IIoT connectivity. This triumvirate leverages Zero Trust principles and architecture from the field’s foremost leaders, setting a new standard for network security in remote and embedded industrial edge operations. FreeWave Technologies has implemented this stringent security methodology into its IIoT network portfolio. “Based on the criticality of secure connectivity in today’s hyper-connected world, we looked for a team that could push us beyond what’s common with VPN and APN security practices today. Leveraging Zero Trust principles and techniques will help our customers move away from once-trusted VPNs to something that is impermeable to threats. FreeWave’s Zero Trust overlay applies the strictest security practices on every user, device, and application in our customers’ networks. Our deny-by-default model ensures no bytes or access requests are allowed, until explicitly authenticated and authorized with strong identity,” said Steve Wulchin, CEO of FreeWave Technologies. FreeWave Technologies: Leading the Charge in IIoT Connectivity FreeWave Technologies’ innovation has consistently been at the forefront of industrial connectivity, providing robust and reliable IIoT solutions tailored to the unique challenges of remote operations for three decades. Our key features include: Enhanced Connectivity: Leveraging global satellite and cellular networks, along with our proprietary radio communications, FreeWave ensures seamless communication in even the most rugged and remote locations. Real-Time Data Visualization: Users benefit from real-time data visualizations, alerts, and alarms, crucial for optimizing operations, understanding usage patterns, and addressing issues promptly via our Platform-as-a-Service data platform solution. NetFoundry: Zero Trust Secure Connectivity Designed into your Products NetFoundry, a pioneer in Zero Trust security, is driving a paradigm shift worldwide that enables product builders like FreeWave to embed secure overlay connectivity directly into their industrial-grade products and applications. Key features and benefits include: Secure By Design Solution Offers: Connected products become unreachable from underlay networks, utilizing their own, embedded, global zero trust connectivity. Simplified and Scalable Operations: Increased adoption of products and services by eliminating inefficient dependencies on customer’s infrastructure, identifiable IP addresses, vulnerable VPNs, and complex firewall configurations. Business Velocity and Acceleration: NetFoundry’s OEM Partners quickly deliver new connected product offers to the world’s most security conscious customers, exceeding EU CRA, NIST 800-171, and IEC 62443 standards without long development cycles. “FreeWave has designed NetFoundry’s industry-leading, embedded Zero Trust connectivity into their powerful IIoT solutions, making adoption super simple and secure for their customers. The integrated solution means FreeWave customers do not need to waste time and money to build their own secure networking infrastructure, nor do they need to disrupt existing firewalls and network routing configurations. We are proud to partner with FreeWave to help them serve IIoT customers with excellence”, said Galeal Zino, CEO of NetFoundry. Keyfactor: Ensuring Trust with Comprehensive Digital Identity Security Keyfactor, the leader in digital identity security, specializes in protecting the integrity and authenticity of data and devices with: Public Key Infrastructure (PKI): Keyfactor provides comprehensive PKI solutions to manage and secure digital identities across IIoT devices, ensuring data integrity and trust. Certificate Lifecycle Automation: Automates the management of digital certificates, reducing the risk of expired certificates and potential security vulnerabilities. IoT Device Security: Ensures that every IIoT device is authenticated and authorized, preventing unauthorized devices from accessing critical networks. “With the rise of IIoT, ensuring the security and integrity of every device and data point is crucial. Our collaboration with FreeWave and NetFoundry brings together the best in connectivity, network security, and digital identity management to safeguard industrial operations,” said Ellen Boehm, SVP, IoT Strategies and Operations at Keyfactor. A Synergistic Solution for Unmatched IIoT Security FreeWave’s implementation of this security technique marks a significant milestone in advancing IIoT security standards for remote IIoT networks. By combining FreeWave’s expertise in industrial connectivity, NetFoundry’s Zero Trust networking, and Keyfactor’s digital identity management, customers can rely on a comprehensive security solution that addresses the most pressing challenges faced by remote industrial operations. Key Benefits of the Triumvirate: Enhanced Security: Authenticate-before-connect and no inbound FW ports means no network requests or bytes of data can be sent, minimizing the potential risks of network attacks, hacks, and device insecurities. Seamless Integration: Clients benefit from a unified IIoT solution that integrates robust connectivity, advanced network security, and digital identity management. Operational Efficiency: Real-time data insights and secure connectivity enable clients to optimize their operations and reduce downtime. Scalability and Flexibility: The combined solutions ensure that clients can scale their operations efficiently, adapting to evolving industry demands. Visit the FreeWave Technologies’ website to learn more about the latest IIoT network developments and how this collaboration is setting new standards in the industry. ### Press Contacts FreeWave TechnologiesSue Mooresmoore@freewave.com303-381-9205 NetFoundryMichael Pearlmichael.pearl@netfoundry.io KeyfactorMarketBridge for Keyfactorkeyfactor@marketbridge.com
Know Before You Buy: How to Find Secure IoT Devices
As the number of IoT devices skyrockets, we are seeing the amazing powers of connected networks. Businesses are able to transform as they approach operations with smart, informed decisions. In the industrial sectors, IT decision makers have visibility into the OT networks and are now able to execute logic locally at the edge devices and transport critical data globally – enabling intelligent command and control of the network. We are starting to see glimpses of a connected world we never knew possible just a few years ago. As adoption of IoT rapidly expands, the Achilles Heel of these devices continues to be security – at least in the minds of end-users and consumers. A Recent report circulating around IoT news outlets states that 90 percent of consumers lack confidence in the security of IoT devices. Yet more than half of these consumers own one or more IoT devices. The report, based on a survey conducted by Gemalto, revealed other concerning and somewhat astonishing statistics that have been reported in recent articles, including: 60 percent of respondents say their main fear is hackers taking control of their devices. 54 percent are concerned about personal information being accessed. 54 percent of the consumers surveyed said they own an IoT device but only 14 percent said they knew enough about how to protect it. Only 11 percent of manufacturers and service providers total IoT budget is spent on securing devices. Two thirds of organizations use encryption as their main means of security, with 62 percent encrypting data as soon as it hits the device and 59 percent as it leaves it. Only 50 percent of IoT companies have adopted a security-by-design approach. 92 percent of companies reported an increase in sales or product usage after devices have been made more secure, demonstrating a link between security and adoption 61 percent of businesses said regulation needs to be greater to specify who is responsible for security and data at each stage of its journey. 55 percent said safeguards are needed for ensuring non-compliance with security. 86 percent of businesses and 90 percent of consumers believe governments should handle regulation of the sector. Smart Device Selection Despite security concerns, adoption of IoT devices continues to rapidly expand. For industrial IoT (IIoT) networks, future business success is going to depend on connecting those edge networks in order optimize operations, drive production, reduce downtime, and create a safer work environment. When decision makers choose the IoT devices that will be deployed in their networks, it is critical to find products that meet the security and operating standards of the business. This can be determined through a careful evaluation of options. Are you looking to purchase IoT devices for your IIoT network? Consider carefully reviewing and answering these questions before you make your decision: What are your requirements? Must haves versus Nice to haves? Are there any regulatory considerations? What is the M2M communications technology controlling or automating? Is it essential that it operates without failure? What data is being collected and/or transmitted with this technology? Is it time sensitive and/or mission critical? What technology solutions have a proven track record for the applications being served? What external factors might impact the reliable transmission and receipt of critical data from one point to another? How does this M2M communications technology address challenges such as data encryption, network access control and signal interference? Can the vendor describe the security mechanisms? Can you understand them? Will this be secure even if everyone knows the security measures? (The right answer is yes, otherwise keep looking) Do we need this technology solution to be fail-safe, in order to prevent or eliminate catastrophic damage from occurring? What are the threat vectors I’m most concerned about? Is cyber security or physical security a greater concern for this deployment? What vulnerabilities have the Information Security community identified in the type or category of IIoT equipment I use? What is the right tradeoff between features, ease of use and security for my installation? Do I have a testing or evaluation plan in place? What ongoing improvements do I expect? While device security is going to be a lingering concern – especially as the lines between the IT and OT networks blur – companies have the power to prioritize security in their networks and make informed decisions when it comes to selecting their devices. Until there are more government guidelines in place, it is up to the IIoT decision maker to find these options in their quest for connectivity.
IIoT Top News — Security Remains Top of Mind
Cybersecurity has been top of mind for industry experts and consumers alike. The WannaCry ransomware is putting a legitimate scare into affected companies, although many are apparently preparing to call the hackers’ bluff. Yesterday, another cyberattack was announced as well, and it has the potential to be far more lucrative for the developers. The common denominator between the two? A leaked exploit developed by the NSA that leverages a Windows file-sharing protocol. These attacks are indicative of the long-term game of cat and mouse that the government and private enterprise faces for the foreseeable future of security and counterintelligence. Moving forward, the growing network of connected devices for the Industrial Internet of Things (IIoT) faces similar security threats. This week, we found several stories demonstrating some of the solutions surrounding those potential security issues. The 9 Best Practices for IIoT from a Dell Security Expert At a recent presentation for 2017 Dell EMC World Conference, Rohan Kotian, Dell EMC’s senior product manager for IoT security, spoke about his nine best practices for improved IIoT security. His number one strategy? Simply understanding the concerns. Many IoT devices come out of the box with few security controls in place, and understanding the risk is the most important step in addressing them. In this article from Tech Republic, you can read Mr. Kotian’s other nine best practices, including studying the attack trends, classifying risk, and leveraging fog computing. IIoT Market Expected to Approach One Trillion Dollars by 2025 Grand View Research writes that the industrial Internet of Things will experience explosive growth over the next decade, going from a $109 billion industry in 2016 to an expected $933.62 billion by 2025. The massive market increase will be driven by a number of factors, one of which continued investment by government agencies and corporate leaders. As the report states, “The role of the Internet of Things (IoT) is increasingly becoming more prominent in enabling easy access to devices and machines. Government-sponsored initiatives and innovative efforts made by key companies, such as Huawei, GE, and Cisco, are anticipated to enhance the adoption of IIoT worldwide over the forecast period.” IIoT Presents Unique Security Challenges Security is always a top priority in the Internet of Things, but IIoT applications present unique challenges. In this article from CSO Online, Phil Neray, CyberX’s vice president of industrial cybersecurity, writes that despite the growth of IoT applications in oil, gas, electric, and pharmaceuticals, “The fact is that all of these devices were designed a long time ago.” That means IIoT innovators have the challenge of integrating the newest technology into systems that may be decades old. This sort of retrofitting can make security a real challenge and there are few experts available who have both the knowledge of legacy systems and the latest IIoT solutions. Sprint to Deploy LTW Cat 1 by End Of July The Internet of Things relies heavily on low-power communication protocols to perform, so a recent announcement on FierceWireless.com that Sprint will be releasing LTE Cat 1 by the end of July is music to IoT developer’s ears. LTE Cat 1 is designed to support low-power applications on the Sprint network such as vehicle telematics and industrial IoT applications. “As one of the leading enablers and solution providers of the internet of things, Ericsson believes in its power to transform industries and capture new growth,” said Glenn Laxdal, head of Network Products for Ericsson North America. “Ericsson looks forward to partnering with Sprint to deploy Cat M1 next year and bring the transformative power of IoT to the Sprint Nationwide network.” The announcement also noted that Cat M would be following in mid-2018. TE Cat M1 and LTE Cat NB1 will support other applications requiring ultralow-throughput and power consumption.
IIoT News RoundUp – Security, New Products and More
The Industrial IoT (IIoT) continues to drive big news headlines. Recently we’ve seen news on security, connectivity and new products. We’ve compiled a handful of the most compelling IoT headlines from the past couple of weeks (including exciting news from FreeWave). IIoT in the News How I Learned to Stop Worrying and Love the Industrial IoT Posted on @RTInsights | By @joemckendrick “Moving to IIoT — to capture and be able to act on real-time information on production, machine health, facility conditions, supply chain movements, inventory, shipping, and a host of other capabilities — is nothing short of a new industrial revolution. Embracing these capabilities requires hefty investments, training, skills acquisition, re-directing of resources, and even re-thinking the business you are in.” Standardized Connectivity Protocols Lead to Growth of IIoT Apps Posted on @ITKE | By @S_Allen_IIoT “IIoT app development programs will begin to outgrow/outpace consumer IoT app development programs within the next three years. Third-party IIoT application development at the edge (i.e., fog computing) specifically will eliminate need for big data transmission capabilities. The ability to filter specific data needs directly at the source means less of a need to collect all the data for broad analysis.” First Industrial IoT Programmable Radio Enables World of Connected Possibilities Posed on @CEAsiaMag | By Lim Guan Yu “The rise of Fog Computing as a driver of intelligent analytics created a need for industrial companies to transport more data faster from Edge sensors. Rather than transport massive packets of data – Big Data –a programmable platform deployed at the edge of IP networks enables sensor control functionality and allows them to send smaller packets of data as determined by the IIoT app. This results in Smart Data that streamlines decision making, provides predictive analytics for maintenance and support, and allows organizations to automate processes that previously required ongoing, manual attention.” Data Leakage And The IIoT Posted on @SemiEngineering | By @Chip_Insider “In the past, the complexity and size of an operation generally provided safeguards against data theft or leakage. But with commonly used data mining tools, it’s now possible to separate out meaningless shop floor data and hone in on the important events, which roughly adhere the 80/20 rule. Add in multiple companies and begin correlating bottlenecks and other noteworthy industrial events, and that data suddenly becomes much more valuable to a lot of people—makers of equipment, government or industry policies, marketing groups, as well as the highest bidders within a particular industry or those looking to invest in an industry.” FreeWave Technologies Updates New WaveContact Wireless Technology Solutions Posted on Yahoo Finance “WaveContact products interface with a wide variety of sensors deployed in industrial and critical infrastructure markets such as oil and gas, electric power, water and wastewater and environmental monitoring. The product line is built for short-range field applications where simplicity and ease of use in Class 1 Division 1 hazardous locations are critical for success.” Why Collaboration Is the Key to IIoT Posted on @automationworld | By Phil Marshall “Building the Industrial Internet of Things (IIoT) is a complex undertaking. When Hilscher started to create an IIoT strategy, we realized that no single organization would be capable of a total solution. Too much was involved across too many domains. Plus, there is a lot that automation vendors don’t know about IT, while the IT world also knows little about automation—at least for now.” FreeWave Technologies Teams Up with Alliance Corporation Posted on @IoTEvolution | By @KenBriodagh “FreeWave said it is expanding its traditional channel partner distribution network with new relationships with distributors who offer new avenues for sourcing through the channel. As FreeWave expands its product offerings further into the IIoT space, aligning and building relationships with partners, like Alliance, is a critical step in offering a full system of integrated hardware and software solutions.” Security Professionals Expect More Attacks on IIoT in 2017 Posted on @HeardOntheWire | By @notjbg “The fears of a large-scale attack waiting to happen were solidified this week when security firm Tripwire released the results of a study it performed about the rise of industrial IoT deployment in organizations, and to what extent it is expected to cause security problems in 2017. The IIoT includes segments ranging from critical infrastructure such as energy and utilities all the way to government, health care and finance. Not surprisingly, more than 50 percent of the security professionals surveyed said they weren’t prepared for an IIoT attack, and 96 percent expected to see an increase in such attacks this year.”
Hacking: A Cybersecurity Top News Edition

Hacking became a scary reality last week as we all witnessed Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit simultaneously get hit with a massive Denial of Service (DoS) attack. This attack also interrupted hundreds of other sites and internet connected devices from functioning properly. For months, we’ve been hearing about the need to protect and secure our networks and devices. As the world steps further into the digital landscape, it’s clear that new advancements around cybersecurity tactics and strategies need to be addressed. Many are calling for standardization as a means to collectively thwart attacks and identify problem areas. Due to the proliferation of IoT technology and billions of connected devices, our critical infrastructure projects are those that may deserve the most attention in the short term. Read on for this week’s top cybersecurity news highlights that shine a light on the hacking aftermath and the inherent cybersecurity risks we should all be aware of in the IoT space. Exposed to Hacking Cybersecurity Experts are calling for Internet of Things Standards in Wake of Massive Attack By @ethanbaron | Published on @mercnews “In the assault Friday that blocked access to hundreds of websites, including Twitter, Airbnb, Amazon, PayPal, CNN, Spotify and Reddit, thousands of hijacked “internet of things” devices bombarded a New Hampshire company called Dyn with traffic.” The Lessons From the East Coast CyberAttack By @josephinecwolff | Published on @Slate “This is an important lesson of online security and often an incredibly difficult one to impress upon users: Even the accounts and computers and machines that you don’t care about being.” Why Businesses Need to Secure Connected Devices to Win Consumer Trust By @jeffjohnroberts | Published on @FortuneMagazine “The issue now is whether the government should do more to regulate the Internet of things (IoT), or if we can instead trust companies and the market to solve the problem.” This Attack Was Different–Cyber Threat Draws Utility Warnings By @BlakeSobczak | Published on @EENewsUpdates “Department of Homeland Security officials, who say they are investigating the attack on Dyn with the FBI, have warned that some smart-grid devices could be inadvertently swept up into attacks on other websites or key internet infrastructure.” Top Five Biggest Threats to IoT Security By Hannah Williams | Published on @cbronline “Hackers have recently been able to obtain access to a wide variety of connected devices, which has prompted new concerns over the security threats of the Internet of Things.” Cybersecurity: The Biggest Threat to Automated Trucking By @AaronHuffCCJ | Published on @CCJnow “A single point of failure, or security breach, in a supply chain has far-reaching effects for all parties. Transportation companies must therefore think beyond their own IoT network perimeter, he advises, as the march towards automation continues.” As we conclude another round of top news highlights, we hope to have opened your eyes to modern cybersecurity considerations. As technology continues to evolve, we must continue to learn how to better protect our IoT interests upon exposure to hacking.
Securing Assets with Outdoor Wi-Fi
The video surveillance market is anticipated to grow to $42B by 2019. Many industries today are using video monitoring as part of their physical security efforts to protect assets. As the Internet of Things (IoT) is increasingly adopted by more industries, careful consideration must be made when leveraging Sensor-to-Server (S2S) solutions for video-based security applications. From a technology perspective, IoT is beneficial for video security because it enables more data collection to drive intelligent business and security decisions that will better protect assets. However, with more sensors and devices connected to an IT network comes increased exposure for cyberattacks. It was inevitable that IoT would cross over into the physical security space, but the idea of security devices connected into an IoT network is concerning to many security professionals. In 2015, HP reported that up to 70 percent of IoT devices are vulnerable to cyberattacks. Any intelligent communication that is leveraged in an IoT environment must be designed with security in mind and have the ability to protect the network against cyber-attacks. Without ample security in the environment, companies risk severe consequences such as compromised data or denial of service. Outdoor Assets Protected Some outdoor shorthaul, Wi-Fi-based S2S networks are now designed to securely monitor and transmit voice, video, data and sensor (VVDS) information for asset monitoring and control. Additionally, any industry looking for an outdoor network robust enough to provide Wi-Fi connectivity may also benefit from these outdoor Wi-Fi solutions. From emergency communications to municipalities, industrial networks to golf courses or campgrounds, and more, there are numerous use cases where Wi-Fi is beneficial for connectivity and also for high-speed shorthaul communications needed to enable VVDS data. In IoT environments there are sensors on every single asset, constantly pulling data, so they need to make sure that security features are part of the technology’s design. For the operator seeking outdoor Wi-Fi to connect physical security devices and enable video monitoring, it is important to be familiar with the technology they are selecting. The Wi-Fi networks best suited for outdoor environments will have a rugged design with proven reliability in extreme environmental conditions. When the right security measures are in place, these solutions can ensure that data is protected through a variety of means including encryption, authentication, virus and intrusion protection, and by being physically tamperproof. Although robust, outdoor Wi-Fi can provide the connectivity needed for VVDS applications, but it needs to be able to withstand and prevent cyber security attacks. When the right technology is selected and enabled, asset protection can be enhanced through video. How are you protecting your assets?
Who Needs Rugged, Outdoor Wi-Fi Networks?
When we think about Wi-Fi, we tend to lean towards the idea of connections that allow us to access our mobile devices. With a Wi-Fi connection we can stream videos, access our apps, check email, work and basically manage our digital lives. In non-traditional settings, the need for outdoor Wi-Fi connectivity is increasing, but it is accompanied by some unique challenges. Outdoor Wi-Fi Connectivity Industries that operate mostly outdoors are finding a greater need for Wi-Fi connectivity. Campgrounds are providing Wi-Fi as both an amenity and as a tracking and booking tool for managers and campers alike. Golf courses have deployed industrial-scale Wi-Fi networks to monitor irrigation, golfers and other assets throughout a course, and marinas are using Wi-Fi networks for both communication and vessel management needs. There has also been a strong uptick in the use of industrial Wi-Fi networking for security programs and disaster response. Companies can use high-speed Voice, Video, Data and Sensor (VVDS) data transport as building blocks for a security network capable of real-time monitoring. These Wi-Fi solutions are especially ideal for video monitoring, as they provide the bandwidth necessary to transport large amounts of data. Disaster response has also been an ideal application for industrial-scale Wi-Fi. Often times, cell networks can get knocked out during environmental disasters, effectively eliminating a critical component for communication. Today, organizations can deploy these Wi-Fi platforms on vehicles or other response assets that can enable communications in emergency or disaster situations. For any industry with outdoor operations, assets will be exposed to the worst natural elements – extreme heat, freezing temperatures, heavy snow, strong wind, dust storms and more. The challenge is finding a shorthaul, Wi-Fi solution that is rugged and secure enough to withstand the elements, but also advanced enough to enable new types of high-speed, high throughput application solutions. Rugged Wi-Fi Communication Solutions There are solutions designed for robust, secure transport of VVDS information for the edge devices in industrial communication networks. These rugged, shorthaul communication networks are specifically designed for outdoor Wi-Fi connectivity and have proven reliability in extreme environmental conditions. These types of solutions are ideal for oil and gas, utilities, mining, power plants, municipalities, disaster recovery or any other type of industrial applications. They also suit innovative deployments at golf courses, marinas, campgrounds and other settings that require outdoor Wi-Fi connectivity. How would you like to have Wi-Fi connectivity for your own outdoor networks? FreeWave just launched a new contest and the winner will receive their own network of rugged, outdoor Wi-Fi solutions. Enter Today! Contest Closed Enter today for a chance to win FreeWave’s award-winning WavePro WP201shorthaul and Wi-Fi solution. Contest entrants must provide a high-level account of the application of the WavePro, along with a description of the need for the platform. Winners will be announced at the close of the entry period. To enter the contest, please visit http://go.freewave.com/wavepro-network-giveaway. Submissions are due by September 30.
Behind the Scenes: Airports Across the Country
Many of us have been in airports around the country a lot lately. Summer vacations are a time when families converge at our local airports, anxious to spend time with loved ones and get to their destinations for fun, relaxation and adventure. However, we tend to take for granted all that goes into running our airports, along with the safety and security required to ensure the smooth operation each airport requires. Plus, we generally only think about what is happening inside the airports, but the truth of the matter is, there is potentially more activity happening outside of the airport at any given time. From aircraft maintenance crews and air traffic controllers to airfreight handlers and runway security personnel, there is a slew of machines and people conducting airport operations outdoors that need to be coordinated and as efficient as possible. According to a 2010 report by the Bureau of Transportation Statistics, a total of 631,939,829 passengers boarded domestic flights in the United States that year. This averages to 1.73 million passengers flying per day. It’s mind-boggling to think how this number has increased since that time as it’s clear that general aviation airports of all sizes are an integral part of our National Aviation System. Many airports have aging facilities, shifting demands to accommodate the changes in the general aviation industry, and diminishing revenue sources. These trends coupled with limited staff and budgets have made it difficult to properly maintain the facilities beyond responding to immediate needs. Automator of Airports The automation of processes and industrial communications can help. Setting up an outdoor industrial wi-fi network is one way field managers at airports can ease the burden of maintaining a safe and efficient infrastructure. For instance, establishing a hardened and ruggedized commercial-grade wi-fi network around the perimeter of an airport not only creates a safe and secure enclosed zone, but, also provides a way for maintenance crews to monitor and ensure the overall outdoor field operations of the airport facility. This can be easily achieved through resilient wireless networks because they allow for easy and relatively inexpensive modification as outdoor airport infrastructures and policies change (which can be frequent). In addition, besides obvious benefits to airport maintenance crews, there are indeed FAA requirementsthat need to be adhered to for compliance – making it even more imperative that airport facility personnel find more effective ways of ensuring proper airport operations and safety procedures are maintained at all times. Some examples of how outdoor wi-fi networks can assist in a smoother, more automated airport infrastructure include: Establishing a communications link with all airport maintenance crew through VoIP, video and data so that all personnel are able to communicate with one another and send immediate notifications if/when needed – saving time, effort and money. Adhering to FAA mandates which require personnel to provide reports on outdoor lighting, runways, vehicles and the overall airport infrastructure three times per day. Great efficiencies can be obtained through automating these various tasks reducing the amount of time and labor needed to maintain, monitor and report these things. Installing communication devices on airport maintenance vehicles connects all of them so that personnel can notify proper authorities of outages through their tablets versus manually having to inform supervisors that action needs to be taken. These are just a few of the ways an industrial outdoor wi-fi network can help airports maintain a safe, secure and well-functioning infrastructure. So what will the future airports look like and how will they operate? If the current IoT landscape has shown us anything its that any manual process or operation that can be automated through the use of machines or smart devices eventually will be (automated). As airport field operations continue to be held to higher standards and increasingly rigid regulations, the faster they can adapt to the pressures of an on-demand economy, the better.
(Industrialized) IoT App Development
Has IoT app development begun to take the globe by storm? A few weeks ago we discussed the growing need for more third-party app creation for the Industrial IoT industry. This week, we dive deeper and focus on those early adopters of industrialized IoT app development and what industries these “bleeding edgers” are serving. We all know by now the number of connected things is projected to grow massivelyover the coming years. Injecting new software applications into the industrial IoT world creates even more monitoring, control and usage of devices and data at the edge. Some would call this influx of software with industrialized hardware a modern marriage. The manufacturing sector, for example, seems to have found a use for implementing next-generation hardware to improve and automate operations, especially along the assembly line. At the same time, cloud-based software solutions are being leveraged to improve data analytics, thus improving actionable intelligence in real-time. What’s more is this new environment is incentivizing industrial manufacturers to cultivate new business models as they are finding that solutions they have developed in-house are as valuable as the hardware they manufacture. By tracking the performance of manufactured products in the field, manufacturers gain faster feedback loops and insights from customers. For example, instead of waiting months or even years for performance feedback, the integration of cloud-based software and modern hardware provides manufacturers this information in what is approaching real-time. This allows them to respond quickly with fixes, advice or, when needed, replacement equipment. As we enter into uncharted territory for many in this new interoperable, connected tech world, we have to also consider the cybersecurity measures in place and how it will combat any vulnerabilities as the surge of new, industrialized software applications enter our critical infrastructures. Security must be manufactured into the product from the very beginning – this includes tamper-proof hardware, authentication protocols, data encryption and more. What’s Next? Big companies like AT&T and Microsoft are joining forces for the good of the developer. We all can agree software is taking hold of certain business operations, so it is only natural companies would seek an easy solution for enterprise to bring about this change. The industrial side may appear to move slower when it comes to implementation, but that is only because of the various moving parts – machine-to-machine (M2M) devices, sensors and wireless technologies – that must sync with precision without missing a beat. Software is the enabler of this interoperability. So what is the next step in this industrialized development? Jeff Dorsch with Semi Engineering believes that, “Industrial Internet of Things (IIoT) applications proliferate in critical infrastructure, such as the power grid and water supply, the importance of the underlying software and the availability of an open-source platform for app development is coming to the forefront.” This fully-functioning data driven ecosystem will have to decide if open or closed systems are the best for their needs. Google and Apple, for example, have provided internet enabled ecosystems of devices. The problem is that they are closed ecosystems that limit which devices and which data can speak to each other. If industrial players want to take advantage and accelerate their own digital transformations, market opportunities and revenue, then they must take a closer look at open and secure technologies and start innovating for IIoT today. So as we all start to dip our toes in the industrialized software development pond, be sure to consider how your desired outcome matches the factors of delivering business value – customer responsiveness, security, revenue generation and operational efficiency. All are important in and of themselves, but different business models drive different decision-making. Embracing the IIoT app development opportunity early on might prove to be the smartest investment from a competitive advantage standpoint – being able to answer the “why” question is what will eventually separate the high-performers from the rest.
Difference Between Data Sheet Transmit Power & Data Stream Transmit Power
Image courtesy of Flickr Creative Commons You need to link a two production sites together in your IIoT network in order to move critical voice, video, data and sensor data (VVDS™) between the sites by deploying access points. So, you consider using industrial Wi-Fi Access Points to implement this short-haul, point-to-point (PTP) RF link between the two sites. Short-haul RF links out to 8 miles are very doable using industrial Wi-Fi Access Points with directional antennas. You evaluate potential Wi-Fi Access Points from their data sheet specs. This is given, and you select one. Now, there is one specification that is commonly misunderstood and leads to confusion when evaluating MIMO capable Wi-Fi Access Points and using them in either PTP or point-to-multipoint (PMP) IIoT networks as wireless infrastructure. Confusion and mistakes arise from the difference between the transmit power stated on the product data sheet and the transmit power of a single MIMO data stream of the Access Point. For example, a 3×3 MIMO Access Point data sheet states the transmit power is 27dBm for MCS4/12/20 data encoding in either the 2.4 or 5GHz band. This is typical, and not a surprise, but what is this transmit power really stating. The FCC limits and regulates maximum transmit power from an intentional emitter, e.g. Wi-Fi Access Points. For Wi-Fi devices, the limits apply to the aggregate transmit power of the device. In above product spec example, the transmit power stated is the aggregate transmit power for the 3 MIMO data streams. Still good? Yes. You have a Wi-Fi Access Point and the total transmit power is 27dBm. Now, you design your short-haul PTP link using Wi-Fi Access Points and directional antennas. What transmit power do you use in your RF link budget? 27dBm since it is the transmit power for the Access Point for the data encoding and the band you plan to use. Right? No. While 27dBm is the total aggregate transmit power for the Access Point, it is not the transmit power of an individual data stream. The individual data stream transmit power is roughly 5dB less than the aggregate transmit power found in the data sheet for a 3×3 MIMO product. Difference in Transmit Power versus Aggregate Power 1 Data Stream transmitting at 22dBm — Aggregate Transmit Power is 22dBm 2 Data Streams transmitting at 22dBm — Aggregate Transmit Power is 25dBm 3 Data Streams transmitting at 22dBm — Aggregate Transmit Power is 27dBm So here it is… If you use the transmit power from the data sheet in your RF link calculation without correction, your actual link distance will be approximately half what you expect for the planned fade margin or the link reliability will be less than what you expect for the planned link distance. When designing RF links for the IIoT networks, make certain you are using the correct transmit power in your RF link budget calculations.