Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 1
Key
Technologies
for IOT
Björn Ekelund
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 2
2015 – AN INFLECTION POINT
Source: Gartner 2015
Moore’s law
Resource
efficient
computing
Security
technology
Wireless
technology
Internet
technology
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 3
TOWARDS THE INTERNET OF THINGS
App Enablement
Connectivity
Devices
Applications
Transformation
Generic device solutions
Application Enablement
Cloud
Standards and Open Source
Today
Per-problem solutions
Per-industry solutions
Proprietary IT solutions
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 4
ENABLERS
“ENABLERS”
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 5
KEY TECHNOLOGIES FOR IOT
Wireless connectivity
Capillary networking
Distributed cloud and edge computing
Security and integrity
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 6
Wireless connectivity
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 7
Wide range of technologies
Data rate
Range
~1Mbps
Bluetooth Long Range
802.11ah
~1kbps
~1Gbps
~10bps
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 8
LTE evolution
LTE MTC
LTE-M
NB-LTE
Battery life >10 years with 2 AA batteries
20dB additional coverage
Very low device complexity/cost
Flexible SIM solutions
Wide support for frequency bands and
spectrum options
Support for massive numbers of devices
M2M multiplexed or on stand-alone
carrier
Device Network
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 9
5G Journey in the Industry
Global efforts
for a global
standard in
2020
Challenging 5G
system
requirements
Open
platform for
industry eco-
system to
leverage
Builds on
LTE and
previous
experiences
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 10
Capillary networking
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 11
Capillary Networks
end-to-end controlled IP connectivity
Cloud
Capillary
Network Function
Capillary
Networks
Mobile Core
Capillary
GWs
Bluetooth LE
IEEE 802.15.4
Auto-Configuration, GBA Security, Dynamic Middleware, Dynamic GW Selection, Data & Storage
IEEE 802.11ah
Data Center
Backend
Features
• Bridging LAN-WAN
• Auto-configuration
• Management
• Security
• Ensured E2E connectivity
• Life-cycle robustness
Usage
• Buildings
• Factories
• Homes
• Vehicles
• Sites
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 12
Distributed cloud
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 13
CALVIN
Network
Computer
Calvin fluidly adapts to change and apps
executes where needed. It seamlessly
manages network integration, discovery,
authentication, mobility, and availability
Calvin is a breakthrough lightweight
Platform as a Service for Networked
Society applications, lowering the
entry barrier for 3rd party developers
In the Networked Society, the
network IS the computer
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 14
Project CALVIN
Robust
High
performance
Low latency
Flexible
Local
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 15
use case – Energy
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 16
use case – transportation
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 17
github.com/EricssonResearch/calvin-base
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 18
Security
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 19
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 20
To do Big Data – you
must be able to trust
the Little Data
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 21
safety and Security
IoT
Critical
Infrastructure/
Emergency
Preparedness
Concerns
Fuzzy borders
Dangerous
IoT allows remote attackers to do a lot of damage.
Unstoppable
It will happen regardless what the government does
Ubiquitous
Critical Infrastructure can’t avoid IoT even if they try
Unpredictable
We don’t know what new attack vectors IoT will create
Security Afterthought
In the push to get things to the market, security often
not considered initially
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 22
Openness vs. attack surface
User friendliness vs. security
Control vs. trust
Flexibility vs. thoroughness
Björn Ekelund | Public | © Ericsson AB 2015 | 2015-10-14 | Page 23
summary
Devices
Objects
Web/RESTful
IP/6LoWPAN
DataCloud
Networks Security
Key Technologies for IoT

Key Technologies for IoT

  • 1.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 1 Key Technologies for IOT Björn Ekelund
  • 2.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 2 2015 – AN INFLECTION POINT Source: Gartner 2015 Moore’s law Resource efficient computing Security technology Wireless technology Internet technology
  • 3.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 3 TOWARDS THE INTERNET OF THINGS App Enablement Connectivity Devices Applications Transformation Generic device solutions Application Enablement Cloud Standards and Open Source Today Per-problem solutions Per-industry solutions Proprietary IT solutions
  • 4.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 4 ENABLERS “ENABLERS”
  • 5.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 5 KEY TECHNOLOGIES FOR IOT Wireless connectivity Capillary networking Distributed cloud and edge computing Security and integrity
  • 6.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 6 Wireless connectivity
  • 7.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 7 Wide range of technologies Data rate Range ~1Mbps Bluetooth Long Range 802.11ah ~1kbps ~1Gbps ~10bps
  • 8.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 8 LTE evolution LTE MTC LTE-M NB-LTE Battery life >10 years with 2 AA batteries 20dB additional coverage Very low device complexity/cost Flexible SIM solutions Wide support for frequency bands and spectrum options Support for massive numbers of devices M2M multiplexed or on stand-alone carrier Device Network
  • 9.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 9 5G Journey in the Industry Global efforts for a global standard in 2020 Challenging 5G system requirements Open platform for industry eco- system to leverage Builds on LTE and previous experiences
  • 10.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 10 Capillary networking
  • 11.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 11 Capillary Networks end-to-end controlled IP connectivity Cloud Capillary Network Function Capillary Networks Mobile Core Capillary GWs Bluetooth LE IEEE 802.15.4 Auto-Configuration, GBA Security, Dynamic Middleware, Dynamic GW Selection, Data & Storage IEEE 802.11ah Data Center Backend Features • Bridging LAN-WAN • Auto-configuration • Management • Security • Ensured E2E connectivity • Life-cycle robustness Usage • Buildings • Factories • Homes • Vehicles • Sites
  • 12.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 12 Distributed cloud
  • 13.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 13 CALVIN Network Computer Calvin fluidly adapts to change and apps executes where needed. It seamlessly manages network integration, discovery, authentication, mobility, and availability Calvin is a breakthrough lightweight Platform as a Service for Networked Society applications, lowering the entry barrier for 3rd party developers In the Networked Society, the network IS the computer
  • 14.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 14 Project CALVIN Robust High performance Low latency Flexible Local
  • 15.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 15 use case – Energy
  • 16.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 16 use case – transportation
  • 17.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 17 github.com/EricssonResearch/calvin-base
  • 18.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 18 Security
  • 19.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 19
  • 20.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 20 To do Big Data – you must be able to trust the Little Data
  • 21.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 21 safety and Security IoT Critical Infrastructure/ Emergency Preparedness Concerns Fuzzy borders Dangerous IoT allows remote attackers to do a lot of damage. Unstoppable It will happen regardless what the government does Ubiquitous Critical Infrastructure can’t avoid IoT even if they try Unpredictable We don’t know what new attack vectors IoT will create Security Afterthought In the push to get things to the market, security often not considered initially
  • 22.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 22 Openness vs. attack surface User friendliness vs. security Control vs. trust Flexibility vs. thoroughness
  • 23.
    Björn Ekelund |Public | © Ericsson AB 2015 | 2015-10-14 | Page 23 summary Devices Objects Web/RESTful IP/6LoWPAN DataCloud Networks Security