SlideShare a Scribd company logo
Embedded SIM
New opportunities for
security sensitive IoT
applications
Embedded SIM
New opportunities for
security sensitive IoT
applications
EvolutionEvolution from SIM tofrom SIM to eeSIMSIM
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 2 • 30/09/2016
1988
• Invention of
GSM SIM
1992
• First SIM
supporting OTA
• Wide adoption
for GSM
networks
• First SIM based
payments solution
• SIM Tookit
• De-factor
standard for
mobile security
1998
• Introduction of
USIM for 3G
Networks
• First combined
2G/3G solution
2002
28 years of keeping mobile networks
secure
2014
• First NFC USIM
• Introduction of
LTE USIM
• Embedded SIM
based on GSMA
Specifications
2008
• First embedded
SIM specification
from GSMA (M2M)
• Apple SIM
• Original SIM is
digitized
UnderstandingUnderstanding eeSIMSIM
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 3 • 30/09/2016
▸ An embedded SIM (aka eSIM or eUICC* ) is a UICC
supporting OTA** remote SIM provisioning of digital
SIM-tokens
▸ 2 Industry Standards (GSMA-backed and Apple SIM)
▸ A physical hardware is still
required to
make eSIM fully secure
▸ An eSIM can have several
form factors : from traditional
plug-in to solderable
▸ Remote SIM provisioning is a feature providing a way
to
download Over-The-Air the a digital SIM containing
operator profile
*UICC – Universal Integrated Chip Circuit (ETSI Standards)
IoTIoT Market DevelopmentMarket Development
▸ Industry stays at the
beginning of a new Epoch –
Industry 4.0
▸ Internet of things is where
objects connect to each
other directly
▸ Number of connected
devices and connections will
grow rapidly over next few
years
▸ Most communicating
objects will be simple
LPWA IoT devices with
low or no security at all
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 4 • 30/09/2016
Situation with mobile securitySituation with mobile security
90% of devices store
personal data and
information
60% of devices have
user interface
vulnerabilities
80% of devices have got
weak passwords
70% devices transmit
unprotected data
60% of devices
download software
without proper security
*HPE Research
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 5 • 30/09/2016
Hackers can
target:
WhyWhy IoTIoT systems are affectedsystems are affected
▸ IoT devices are mostly low power
LPWA devices or devices with short
range connectivity and lack computing
performance
▸ There are too many unprotected data
end-points to protect them with a
separate security system
▸ There are too many diversified data
objects transmitted
▸ Communications should be real-time
for many systems
Security is often disabled, dataSecurity is often disabled, data
transmission is not secured, integritytransmission is not secured, integrity
is not ensuredis not ensured
 Control Systems
 Network equipment
 Communication
channels
 Data end-points
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 6 • 30/09/2016
MNO SPACE OEM SPACEMNO SPACE OEM SPACE
eSIMeSIM architecturearchitecture: OEM vs. MNO: OEM vs. MNO
eSIM
Global Platform Java Card VM &Java Card VM & RE 3.0.4RE 3.0.4
Profile 2
ISD-R
NFC
3G File System
Profile 1 Profile 3
UICC FrameworkUICC Framework
Authentication
OEM “user” applicationsOEM “user” applications
SSD-P (1) SSD-P(2) SSD-P(3)
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 7 • 30/09/2016
Form factor evolutionForm factor evolution
WLCSP
MFF1/MF
F2
(DFN6x5)
DFN
4x4.2
Software
TEE
ASIC
1988 2003 2010 2012
Evolution from physical form-factor to
software solution
2015
3FF
4FF
5FF?
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 8 • 30/09/2016
Single SESingle SE forfor consumerconsumer devicesdevices
▸ Combination of NFC Secure Element and
eSIM in a single chip
▸ High level of security is
ensured by a single high security
microcontroller
▸ Significant cost reduction with respect
to double chip solution
▸ BYOD-Model for several applications:
payment and access control
▸ Standard Android Open API to access
SE
NFC SIM cards are successful only on several
markets. Adoption world-wide is still low after
10 years
Ideal solution for consumer
devices and wearables with
payment or authentication
function
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 9 • 30/09/2016
eSIMeSIM: From discrete chip to ASIC: From discrete chip to ASIC
▸ Cost reduction comparing with separate
highly-secure SIM-chip solution
▸ High level of protection can be
ensured by various hardware
components (IP blocks)
▸ Shared on-chip resources with other
components (cost reduction factor)
▸ Different secure cores can be used (ARM
SC300, Synopsys ARC, Cortus APS3)
▸ Close integration with Baseband
subsystem
▸ Support of GSMA Remote SIM
Provisioning for consumer devices
enabling in-device provisioning
Significant cost
reduction for new
devices implementing
Embedded SIM concept!
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 10 •
30/09/2016
SoftwareSoftware implementationsimplementations ofof eSIMeSIM
▸ Functionally implement full ETSI and
GSMA software stacks
▸ Significant cost reduction per a
single end-point
▸ Use of ARM® TrustZone® CryptoCell
Technology, can run on application
processor
▸ Execution on top of Trusted
Execution Environment
▸ Common criteria qualification EAL2+
▸ Can be hardened by hardware
components, ex. Secure Memory
• No tamper resistance
without additional
hardware
• Several TEE providers
including Open Source
solutions
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 11 •
30/09/2016
5FF:5FF: towardstowards singlesingle SESE forfor IoTIoT devicesdevices
▸ Secure end-point concept for wide-range of
devices including narrow band technologies
▸ Different security levels: from highly secure
to software-based (cost reduction per
device)
▸ Extensible list of supported network access
technologies, ex. LoRa, Sigfox
▸ Focus on industrial interfaces
(SPI, I2C, ISO7816)
▸ Focus on IoT industrial protocols (IPv6,
CoAP, MQTT)
▸ Adoption of ETSI, Global Platform and
GSMA standards
• Flexibility and easy integration
• Additional costs per a secured
device
• Simple maintenance
eSIM Specifications paves the road for
the universal SE for IoT devices
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 12 •
30/09/2016
Challenges:
Is Common Criteria
evaluation applicable?
eSIMeSIM in Automotive: beyond networkin Automotive: beyond network
authenticationauthentication
▸ Migration from wired to wireless
interfaces is a significant security
challenge for the car industry
▸ Different national regulations lead to
requirements to have many eSIMs/SEs
(Tolls, tachograph, fleet management
etc)
 A connected car is very sensitive to external
attacks. There are lot of documented cases
 eSIM has a chance to play much more significant role than just a
network authentication token:
• Secure end-point for remote services
• Root of trust for on-board equipment
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 13 •
30/09/2016
SecuringSecuring IoTIoT withwith eSIMeSIM
▸ Security model based
of the protected data/access endpoint concept
▸ Initial provisioning of IoT devices and lifecycle
support
▸ Security for TLS-communication (End-to-End
Security)
▸ Storage of important credentials
▸ Bootstrapping of M2M devices
▸ Data integrity and security during firmware updates
▸ Trusted execution environment for critical
applications
eSIM will provide a significant value for the
security of connected IoT devices
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 14 •
30/09/2016
▸ M2M Root Key used for mutual authentication
and key agreement between the D/G M2M Node
and the M2M Service Provider
Kmr
Kmc
KMA1
▸ M2M Connection Key, renewed with every
new D/G M2M Node authentication
Supported bootstrap procedures
• GBA (Generic Bootstrapping Architecture). Uses
Access Network credentials in UICC (e.g. USIM,
CSIM or ISIM application)
• EAP/PANA - Uses network access credentials by
means of EAP-AKA
KMA2
Optional bootstrap of M2M Service Layer Credentials in the
field:
• Establishment of shared secret Kmr in Device and Network,
adequately protected
• Alternative - pre-provisioning, e.g. via eUICC
KMA3
M2M BootstrappingM2M Bootstrapping withwith eSIMeSIM
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 15 •
30/09/2016
OverviewOverview ofof differentdifferent IoTIoT SESE
solutionssolutions
more expensive Hardware based solutions
less secure
No hardware bundling
more secure
▸ More hardware in most of the cases means
more security
▸ Different hardware and software options
provide a way to minimize costs
less expensive
Highly secure SE, CC EAL5+
TEE-based
TEE-basedTEE-based
with hardware hardening
Soft eSIM
Hardware Secure, No CC
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 16 •
30/09/2016
CellnetrixCellnetrix eSIMeSIM SolutionSolution
© Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 17 • 30/09/2016
Celsium eSIM
Embedded
Operating
System
Reference
Design and
Samples
Additional
Applications
• Support of multiple
semiconductor platforms
• No hardware mandatory,
solutions for mobile SoC
available
• Support of various operating
environments: Android,
Embedded Linux, Windows,
ThreadX
• Different security levels
• Full compliance with GSMA and
most recent ETSI specifications
• Flexible licensing models
including full source code options
CelSIUM significantly
reduces time to market
for new devices
implementing
Embedded SIM concept!
Key
Advantages
:
CelsiumCelsium Development PlatformDevelopment Platform is our solution tois our solution to
address integration ofaddress integration of eSIMeSIM into connectedinto connected
devicesdevices
Simulation and
development
environment
QuestionsQuestions??
Email: vnagin@cellnetrix.com
Web: www.cellnetrix.com
Cellnetrix GmbH
Holstenkamp 54,
D-22525 Hamburg, Germany
Tel. + 49 40 49022 360
Fax.+ 49 40 49022 358
Thank you for your attention!
We’re pleased to answer your questions!

More Related Content

What's hot

Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategy
Martin Gutberlet
 
Beginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoTBeginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoT
3G4G
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
Belal Ashraf
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021
paul young cpa, cga
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoT
Ericsson
 
M2 m overview_18112013
M2 m overview_18112013M2 m overview_18112013
M2 m overview_18112013Saida Yengui
 
industrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryindustrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryDan Yarmoluk
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
Ahmed Banafa
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
KAILASH CHAUHAN
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Bristol Is Open
 
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographicsPodsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Ma. Theresa Nina Pineda
 
Deploying IoT: A Telco Perspective
Deploying IoT: A Telco PerspectiveDeploying IoT: A Telco Perspective
Deploying IoT: A Telco Perspective
Bangladesh Network Operators Group
 
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT -  Machina ResearchMatt Hatton - 7 Numbers You Need to Know about IoT -  Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
Business of Software Conference
 
Analysys Mason - the opportunity for LPWA solutions
Analysys Mason  - the opportunity for LPWA solutionsAnalysys Mason  - the opportunity for LPWA solutions
Analysys Mason - the opportunity for LPWA solutions
Tom Rebbeck
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise market
archanamohol
 
Paper: Operators must evolve to succeed in the Internet of Things
Paper: Operators must evolve to succeed in the Internet of ThingsPaper: Operators must evolve to succeed in the Internet of Things
Paper: Operators must evolve to succeed in the Internet of Things
Ericsson
 
5G Based AI + Blockchain + IoT Convergence AT A Glance
5G Based AI + Blockchain + IoT Convergence AT A Glance5G Based AI + Blockchain + IoT Convergence AT A Glance
5G Based AI + Blockchain + IoT Convergence AT A Glance
Alex G. Lee, Ph.D. Esq. CLP
 
Israel's First Internet of Things Conference
Israel's First Internet of Things ConferenceIsrael's First Internet of Things Conference
Israel's First Internet of Things Conference
GeminiVC
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
SenZations Summer School
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
Rivetz
 

What's hot (20)

Io t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategyIo t standardization jan2015 mg strategy
Io t standardization jan2015 mg strategy
 
Beginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoTBeginners: M2M, MTC & IoT
Beginners: M2M, MTC & IoT
 
IoT with 5G-Network
IoT with 5G-NetworkIoT with 5G-Network
IoT with 5G-Network
 
What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021What is next for Telecom (Broadband and Cell) - September 2021
What is next for Telecom (Broadband and Cell) - September 2021
 
Accelerating IoT
Accelerating IoTAccelerating IoT
Accelerating IoT
 
M2 m overview_18112013
M2 m overview_18112013M2 m overview_18112013
M2 m overview_18112013
 
industrial IoT can monitor critical machinery
industrial IoT can monitor critical machineryindustrial IoT can monitor critical machinery
industrial IoT can monitor critical machinery
 
IoT and 5G convergence
IoT and 5G convergenceIoT and 5G convergence
IoT and 5G convergence
 
Iot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivityIot basics & evolution of 3 gpp technolgies for iot connectivity
Iot basics & evolution of 3 gpp technolgies for iot connectivity
 
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
Smart Cities, IoT, SDN, 5G Networks, Cloud Computing… Managing Complexity wit...
 
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographicsPodsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
Podsystemm2m a-fresh-approach-to-remote-iot-connectivity-infographics
 
Deploying IoT: A Telco Perspective
Deploying IoT: A Telco PerspectiveDeploying IoT: A Telco Perspective
Deploying IoT: A Telco Perspective
 
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT -  Machina ResearchMatt Hatton - 7 Numbers You Need to Know about IoT -  Machina Research
Matt Hatton - 7 Numbers You Need to Know about IoT - Machina Research
 
Analysys Mason - the opportunity for LPWA solutions
Analysys Mason  - the opportunity for LPWA solutionsAnalysys Mason  - the opportunity for LPWA solutions
Analysys Mason - the opportunity for LPWA solutions
 
5 g enterprise market
5 g enterprise market5 g enterprise market
5 g enterprise market
 
Paper: Operators must evolve to succeed in the Internet of Things
Paper: Operators must evolve to succeed in the Internet of ThingsPaper: Operators must evolve to succeed in the Internet of Things
Paper: Operators must evolve to succeed in the Internet of Things
 
5G Based AI + Blockchain + IoT Convergence AT A Glance
5G Based AI + Blockchain + IoT Convergence AT A Glance5G Based AI + Blockchain + IoT Convergence AT A Glance
5G Based AI + Blockchain + IoT Convergence AT A Glance
 
Israel's First Internet of Things Conference
Israel's First Internet of Things ConferenceIsrael's First Internet of Things Conference
Israel's First Internet of Things Conference
 
IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015IoT and 5G: Opportunities and Challenges, SenZations 2015
IoT and 5G: Opportunities and Challenges, SenZations 2015
 
The T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of TrustThe T.E.E. + eSIM Dual Roots of Trust
The T.E.E. + eSIM Dual Roots of Trust
 

Similar to Embedded SIM New opportunities for security sensitive IoT applications

Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptxIndustry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Anil Bhat
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
ADVA
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
Ryan O'Mara
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
Soracom Global, Inc.
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Bosnia Agile
 
Eseye
Eseye Eseye
Eseye
Terry Bonnar
 
Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
Andres G. Guilarte
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Stuart Bennett
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
armmbed
 
02_5G下物聯網的挑戰與機會.pdf
02_5G下物聯網的挑戰與機會.pdf02_5G下物聯網的挑戰與機會.pdf
02_5G下物聯網的挑戰與機會.pdf
Chien Huang Chang
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
JT IoT
 
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATSierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
Thibault Cantegrel
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Jiunn-Jer Sun
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
podsystem1
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
Cisco Service Provider
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet Group
techUK
 
Creating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsCreating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek Labs
MediaTek Labs
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
Justin Hayward
 
How do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scaleHow do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scale
Duncan Purves
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
Alan Quayle
 

Similar to Embedded SIM New opportunities for security sensitive IoT applications (20)

Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptxIndustry_Day-2019-0010-Enabling_the_IoT_domain.pptx
Industry_Day-2019-0010-Enabling_the_IoT_domain.pptx
 
Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud Introducing ConnectGuard™ Cloud
Introducing ConnectGuard™ Cloud
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Eseye
Eseye Eseye
Eseye
 
Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystemmbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
mbed Connect Asia 2016 Securing IoT with the ARM mbed ecosystem
 
02_5G下物聯網的挑戰與機會.pdf
02_5G下物聯網的挑戰與機會.pdf02_5G下物聯網的挑戰與機會.pdf
02_5G下物聯網的挑戰與機會.pdf
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
Sierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open ATSierra Wireless Developer Day 2013 - 08 - Open AT
Sierra Wireless Developer Day 2013 - 08 - Open AT
 
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018Transformation From Today To Tomorrow - Market and Product Strategy 2018
Transformation From Today To Tomorrow - Market and Product Strategy 2018
 
Podsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_designPodsystem io t_presentation2 0_design
Podsystem io t_presentation2 0_design
 
SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform  SP 5G: Unified Enablement Platform
SP 5G: Unified Enablement Platform
 
Connectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet GroupConnectivity Challenges for CAVs - Athonet Group
Connectivity Challenges for CAVs - Athonet Group
 
Creating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsCreating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek Labs
 
Sgcp14phillips
Sgcp14phillipsSgcp14phillips
Sgcp14phillips
 
How do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scaleHow do you manage Internet of Things (IoT) devices at scale
How do you manage Internet of Things (IoT) devices at scale
 
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
How a Multi-IMSI architecture makes global cellular IoT deployments manageabl...
 

More from M2M Alliance e.V.

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
M2M Alliance e.V.
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
M2M Alliance e.V.
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
M2M Alliance e.V.
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
M2M Alliance e.V.
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
M2M Alliance e.V.
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
M2M Alliance e.V.
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
M2M Alliance e.V.
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
M2M Alliance e.V.
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
M2M Alliance e.V.
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
M2M Alliance e.V.
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
M2M Alliance e.V.
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
M2M Alliance e.V.
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
M2M Alliance e.V.
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
M2M Alliance e.V.
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
M2M Alliance e.V.
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
M2M Alliance e.V.
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
M2M Alliance e.V.
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
M2M Alliance e.V.
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
M2M Alliance e.V.
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
M2M Alliance e.V.
 

More from M2M Alliance e.V. (20)

M2M Journal 2017
M2M Journal 2017M2M Journal 2017
M2M Journal 2017
 
Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0Predictive Maintenance - Elevator Service 4.0
Predictive Maintenance - Elevator Service 4.0
 
Low-Power Wide Area - Overview
Low-Power Wide Area - OverviewLow-Power Wide Area - Overview
Low-Power Wide Area - Overview
 
VR Industry Solutions
VR Industry Solutions VR Industry Solutions
VR Industry Solutions
 
IoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M EnvironmentIoT Camera Systems as Sensors in the M2M Environment
IoT Camera Systems as Sensors in the M2M Environment
 
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
Non-Disruptive Evaluation Kit for Industry 4.0 for Small- and Medium-Size Ent...
 
StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System StadtLärm - A Distributed Urban Noise Monitoring System
StadtLärm - A Distributed Urban Noise Monitoring System
 
Completely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory ApplicationsCompletely Wireless Real-Time Sensors for Smart Factory Applications
Completely Wireless Real-Time Sensors for Smart Factory Applications
 
Sustainable Business Advantage
Sustainable Business AdvantageSustainable Business Advantage
Sustainable Business Advantage
 
Secure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA TeaserSecure Computing Core Technology - A non-NDA Teaser
Secure Computing Core Technology - A non-NDA Teaser
 
NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology NB-IoT: Pros and Cons of the new LPWA Radio Technology
NB-IoT: Pros and Cons of the new LPWA Radio Technology
 
Internet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device HackingInternet of Dangerous Things - IoT Device Hacking
Internet of Dangerous Things - IoT Device Hacking
 
Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living Smart Service Power – IoT-Assisted, Age-Appropriate Living
Smart Service Power – IoT-Assisted, Age-Appropriate Living
 
Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation Using Blockchain-Technologies for Factory Automation
Using Blockchain-Technologies for Factory Automation
 
Mobile Edge Computing
Mobile Edge ComputingMobile Edge Computing
Mobile Edge Computing
 
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
Resilient Connectivity for Industrial IoT: How Sensor Platforms Become Realt ...
 
Quantified Self and the Social Internet of Things
Quantified Self and the Social Internet of ThingsQuantified Self and the Social Internet of Things
Quantified Self and the Social Internet of Things
 
You Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future RevenuesYou Need a Digital Platform to Turn Data Into Future Revenues
You Need a Digital Platform to Turn Data Into Future Revenues
 
Cloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from RemoteCloud HMI - Monitoring, Control and Analyzing from Remote
Cloud HMI - Monitoring, Control and Analyzing from Remote
 
Industrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential GrowthIndustrial Internet of Things - On the Verge of Exponential Growth
Industrial Internet of Things - On the Verge of Exponential Growth
 

Recently uploaded

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 

Recently uploaded (20)

Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 

Embedded SIM New opportunities for security sensitive IoT applications

  • 1. Embedded SIM New opportunities for security sensitive IoT applications Embedded SIM New opportunities for security sensitive IoT applications
  • 2. EvolutionEvolution from SIM tofrom SIM to eeSIMSIM © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 2 • 30/09/2016 1988 • Invention of GSM SIM 1992 • First SIM supporting OTA • Wide adoption for GSM networks • First SIM based payments solution • SIM Tookit • De-factor standard for mobile security 1998 • Introduction of USIM for 3G Networks • First combined 2G/3G solution 2002 28 years of keeping mobile networks secure 2014 • First NFC USIM • Introduction of LTE USIM • Embedded SIM based on GSMA Specifications 2008 • First embedded SIM specification from GSMA (M2M) • Apple SIM • Original SIM is digitized
  • 3. UnderstandingUnderstanding eeSIMSIM © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 3 • 30/09/2016 ▸ An embedded SIM (aka eSIM or eUICC* ) is a UICC supporting OTA** remote SIM provisioning of digital SIM-tokens ▸ 2 Industry Standards (GSMA-backed and Apple SIM) ▸ A physical hardware is still required to make eSIM fully secure ▸ An eSIM can have several form factors : from traditional plug-in to solderable ▸ Remote SIM provisioning is a feature providing a way to download Over-The-Air the a digital SIM containing operator profile *UICC – Universal Integrated Chip Circuit (ETSI Standards)
  • 4. IoTIoT Market DevelopmentMarket Development ▸ Industry stays at the beginning of a new Epoch – Industry 4.0 ▸ Internet of things is where objects connect to each other directly ▸ Number of connected devices and connections will grow rapidly over next few years ▸ Most communicating objects will be simple LPWA IoT devices with low or no security at all © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 4 • 30/09/2016
  • 5. Situation with mobile securitySituation with mobile security 90% of devices store personal data and information 60% of devices have user interface vulnerabilities 80% of devices have got weak passwords 70% devices transmit unprotected data 60% of devices download software without proper security *HPE Research © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 5 • 30/09/2016
  • 6. Hackers can target: WhyWhy IoTIoT systems are affectedsystems are affected ▸ IoT devices are mostly low power LPWA devices or devices with short range connectivity and lack computing performance ▸ There are too many unprotected data end-points to protect them with a separate security system ▸ There are too many diversified data objects transmitted ▸ Communications should be real-time for many systems Security is often disabled, dataSecurity is often disabled, data transmission is not secured, integritytransmission is not secured, integrity is not ensuredis not ensured  Control Systems  Network equipment  Communication channels  Data end-points © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 6 • 30/09/2016
  • 7. MNO SPACE OEM SPACEMNO SPACE OEM SPACE eSIMeSIM architecturearchitecture: OEM vs. MNO: OEM vs. MNO eSIM Global Platform Java Card VM &Java Card VM & RE 3.0.4RE 3.0.4 Profile 2 ISD-R NFC 3G File System Profile 1 Profile 3 UICC FrameworkUICC Framework Authentication OEM “user” applicationsOEM “user” applications SSD-P (1) SSD-P(2) SSD-P(3) © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 7 • 30/09/2016
  • 8. Form factor evolutionForm factor evolution WLCSP MFF1/MF F2 (DFN6x5) DFN 4x4.2 Software TEE ASIC 1988 2003 2010 2012 Evolution from physical form-factor to software solution 2015 3FF 4FF 5FF? © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 8 • 30/09/2016
  • 9. Single SESingle SE forfor consumerconsumer devicesdevices ▸ Combination of NFC Secure Element and eSIM in a single chip ▸ High level of security is ensured by a single high security microcontroller ▸ Significant cost reduction with respect to double chip solution ▸ BYOD-Model for several applications: payment and access control ▸ Standard Android Open API to access SE NFC SIM cards are successful only on several markets. Adoption world-wide is still low after 10 years Ideal solution for consumer devices and wearables with payment or authentication function © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 9 • 30/09/2016
  • 10. eSIMeSIM: From discrete chip to ASIC: From discrete chip to ASIC ▸ Cost reduction comparing with separate highly-secure SIM-chip solution ▸ High level of protection can be ensured by various hardware components (IP blocks) ▸ Shared on-chip resources with other components (cost reduction factor) ▸ Different secure cores can be used (ARM SC300, Synopsys ARC, Cortus APS3) ▸ Close integration with Baseband subsystem ▸ Support of GSMA Remote SIM Provisioning for consumer devices enabling in-device provisioning Significant cost reduction for new devices implementing Embedded SIM concept! © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 10 • 30/09/2016
  • 11. SoftwareSoftware implementationsimplementations ofof eSIMeSIM ▸ Functionally implement full ETSI and GSMA software stacks ▸ Significant cost reduction per a single end-point ▸ Use of ARM® TrustZone® CryptoCell Technology, can run on application processor ▸ Execution on top of Trusted Execution Environment ▸ Common criteria qualification EAL2+ ▸ Can be hardened by hardware components, ex. Secure Memory • No tamper resistance without additional hardware • Several TEE providers including Open Source solutions © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 11 • 30/09/2016
  • 12. 5FF:5FF: towardstowards singlesingle SESE forfor IoTIoT devicesdevices ▸ Secure end-point concept for wide-range of devices including narrow band technologies ▸ Different security levels: from highly secure to software-based (cost reduction per device) ▸ Extensible list of supported network access technologies, ex. LoRa, Sigfox ▸ Focus on industrial interfaces (SPI, I2C, ISO7816) ▸ Focus on IoT industrial protocols (IPv6, CoAP, MQTT) ▸ Adoption of ETSI, Global Platform and GSMA standards • Flexibility and easy integration • Additional costs per a secured device • Simple maintenance eSIM Specifications paves the road for the universal SE for IoT devices © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 12 • 30/09/2016 Challenges: Is Common Criteria evaluation applicable?
  • 13. eSIMeSIM in Automotive: beyond networkin Automotive: beyond network authenticationauthentication ▸ Migration from wired to wireless interfaces is a significant security challenge for the car industry ▸ Different national regulations lead to requirements to have many eSIMs/SEs (Tolls, tachograph, fleet management etc)  A connected car is very sensitive to external attacks. There are lot of documented cases  eSIM has a chance to play much more significant role than just a network authentication token: • Secure end-point for remote services • Root of trust for on-board equipment © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 13 • 30/09/2016
  • 14. SecuringSecuring IoTIoT withwith eSIMeSIM ▸ Security model based of the protected data/access endpoint concept ▸ Initial provisioning of IoT devices and lifecycle support ▸ Security for TLS-communication (End-to-End Security) ▸ Storage of important credentials ▸ Bootstrapping of M2M devices ▸ Data integrity and security during firmware updates ▸ Trusted execution environment for critical applications eSIM will provide a significant value for the security of connected IoT devices © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 14 • 30/09/2016
  • 15. ▸ M2M Root Key used for mutual authentication and key agreement between the D/G M2M Node and the M2M Service Provider Kmr Kmc KMA1 ▸ M2M Connection Key, renewed with every new D/G M2M Node authentication Supported bootstrap procedures • GBA (Generic Bootstrapping Architecture). Uses Access Network credentials in UICC (e.g. USIM, CSIM or ISIM application) • EAP/PANA - Uses network access credentials by means of EAP-AKA KMA2 Optional bootstrap of M2M Service Layer Credentials in the field: • Establishment of shared secret Kmr in Device and Network, adequately protected • Alternative - pre-provisioning, e.g. via eUICC KMA3 M2M BootstrappingM2M Bootstrapping withwith eSIMeSIM © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 15 • 30/09/2016
  • 16. OverviewOverview ofof differentdifferent IoTIoT SESE solutionssolutions more expensive Hardware based solutions less secure No hardware bundling more secure ▸ More hardware in most of the cases means more security ▸ Different hardware and software options provide a way to minimize costs less expensive Highly secure SE, CC EAL5+ TEE-based TEE-basedTEE-based with hardware hardening Soft eSIM Hardware Secure, No CC © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 16 • 30/09/2016
  • 17. CellnetrixCellnetrix eSIMeSIM SolutionSolution © Cellnetrix 2016 • New opportunities for security sensitive IoT Applications • English • 17 • 30/09/2016 Celsium eSIM Embedded Operating System Reference Design and Samples Additional Applications • Support of multiple semiconductor platforms • No hardware mandatory, solutions for mobile SoC available • Support of various operating environments: Android, Embedded Linux, Windows, ThreadX • Different security levels • Full compliance with GSMA and most recent ETSI specifications • Flexible licensing models including full source code options CelSIUM significantly reduces time to market for new devices implementing Embedded SIM concept! Key Advantages : CelsiumCelsium Development PlatformDevelopment Platform is our solution tois our solution to address integration ofaddress integration of eSIMeSIM into connectedinto connected devicesdevices Simulation and development environment
  • 18. QuestionsQuestions?? Email: vnagin@cellnetrix.com Web: www.cellnetrix.com Cellnetrix GmbH Holstenkamp 54, D-22525 Hamburg, Germany Tel. + 49 40 49022 360 Fax.+ 49 40 49022 358 Thank you for your attention! We’re pleased to answer your questions!