More Related Content Similar to Key Technologies for IoT (20) More from Björn Ekelund (7) Key Technologies for IoT1. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 1
Key
Technologies
for IOT
Björn Ekelund
2. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 2
2015 – AN INFLECTION POINT
Source: Gartner 2015
Moore’s law
Resource
efficient
computing
Security
technology
Wireless
technology
Internet
technology
3. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 3
TOWARDS THE INTERNET OF THINGS
App Enablement
Connectivity
Devices
Applications
Transformation
Generic device solutions
Application Enablement
Cloud
Standards and Open Source
Today
Per-problem solutions
Per-industry solutions
Proprietary IT solutions
4. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 4
ENABLERS
“ENABLERS”
5. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 5
KEY TECHNOLOGIES FOR IOT
Wireless connectivity
Capillary networking
Distributed cloud and edge computing
Security and integrity
6. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 6
Wireless connectivity
7. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 7
Wide range of technologies
Data rate
Range
~1Mbps
Bluetooth Long Range
802.11ah
~1kbps
~1Gbps
~10bps
8. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 8
LTE evolution
LTE MTC
LTE-M
NB-LTE
Battery life >10 years with 2 AA batteries
20dB additional coverage
Very low device complexity/cost
Flexible SIM solutions
Wide support for frequency bands and
spectrum options
Support for massive numbers of devices
M2M multiplexed or on stand-alone
carrier
Device Network
9. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 9
5G Journey in the Industry
Global efforts
for a global
standard in
2020
Challenging 5G
system
requirements
Open
platform for
industry eco-
system to
leverage
Builds on
LTE and
previous
experiences
10. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 10
Capillary networking
11. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 11
Capillary Networks
end-to-end controlled IP connectivity
Cloud
Capillary
Network Function
Capillary
Networks
Mobile Core
Capillary
GWs
Bluetooth LE
IEEE 802.15.4
Auto-Configuration, GBA Security, Dynamic Middleware, Dynamic GW Selection, Data & Storage
IEEE 802.11ah
Data Center
Backend
Features
• Bridging LAN-WAN
• Auto-configuration
• Management
• Security
• Ensured E2E connectivity
• Life-cycle robustness
Usage
• Buildings
• Factories
• Homes
• Vehicles
• Sites
12. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 12
Distributed cloud
13. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 13
CALVIN
Network
Computer
Calvin fluidly adapts to change and apps
executes where needed. It seamlessly
manages network integration, discovery,
authentication, mobility, and availability
Calvin is a breakthrough lightweight
Platform as a Service for Networked
Society applications, lowering the
entry barrier for 3rd party developers
In the Networked Society, the
network IS the computer
14. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 14
Project CALVIN
Robust
High
performance
Low latency
Flexible
Local
15. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 15
use case – Energy
16. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 16
use case – transportation
17. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 17
github.com/EricssonResearch/calvin-base
18. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 18
Security
20. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 20
To do Big Data – you
must be able to trust
the Little Data
21. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 21
safety and Security
IoT
Critical
Infrastructure/
Emergency
Preparedness
Concerns
Fuzzy borders
Dangerous
IoT allows remote attackers to do a lot of damage.
Unstoppable
It will happen regardless what the government does
Ubiquitous
Critical Infrastructure can’t avoid IoT even if they try
Unpredictable
We don’t know what new attack vectors IoT will create
Security Afterthought
In the push to get things to the market, security often
not considered initially
22. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 22
Openness vs. attack surface
User friendliness vs. security
Control vs. trust
Flexibility vs. thoroughness
23. Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 23
summary
Devices
Objects
Web/RESTful
IP/6LoWPAN
DataCloud
Networks Security