Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By : Dennis McCain
Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By: Dennis McCain

Overview of this book

Even if you’re an IoT technology manager with a sound understanding of wireless local area network technologies like Wi-Fi and Bluetooth, you may face many unique challenges when implementing a wireless wide area network (WWAN) IoT solution with cellular technologies with respect to choosing the optimal IoT device, cellular connectivity, and architecture. To help you overcome such roadblocks, this digital transformation book guides you in implementing a robust, end-to-end cellular IoT solution using best practices for all aspects of managing the IoT solution. Starting with an introduction to the top IoT markets and solutions in the context of an enterprise’s digital transformation, this book will show you how this leads to cost savings and new business models. You’ll grasp all you need to know about the IoT system components, life cycle, and best practices for implementing an IoT solution. While the book explains all the leading IoT wireless technologies, the focus is on LTE and 5G cellular technologies. With a review of real-world cellular IoT solution case studies and future IoT trends, you'll be ready to work with wireless IoT technologies, devices, and architectures. By the end of this book, you'll be able to identify the best wireless technologies for your IoT use cases and successfully implement cellular IoT solutions addressing key issues in the solution life cycle.
Table of Contents (16 chapters)
1
Part 1: Entering the World of the Internet of Things
5
Part 2: Deep Dive into Cellular IoT Solutions
11
Part 3: Cellular IoT Solution Life Cycle and Future Trends

Securing the Internet of Things

“Special thanks to Senthil Ramakrishnan for envisioning this chapter and providing much of the content”

– Dennis McCain

As the Internet of Things (IoT) continues to grow with an expected 30 billion connected devices by 2025 (source: Business Insider, IoT Analytics, Gartner, Intel, Statista), the security of IoT devices and the data they send and receive has become an increasingly critical challenge. As part of an enterprise IoT solution, these devices need to be identified, authenticated, and allowed secure access to enterprise IoT platforms and applications. The IoT data from these devices needs to be sent over secure connectivity channels to ensure data integrity and privacy across the end-to-end IoT solution. As discussed in Chapter 1, Transforming to an IoT Business, there is a wide variety of enterprise IoT solutions, including use cases such as remote power sensors, connected cars, and new use cases triggering new security...