Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By : Dennis McCain
Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By: Dennis McCain

Overview of this book

Even if you’re an IoT technology manager with a sound understanding of wireless local area network technologies like Wi-Fi and Bluetooth, you may face many unique challenges when implementing a wireless wide area network (WWAN) IoT solution with cellular technologies with respect to choosing the optimal IoT device, cellular connectivity, and architecture. To help you overcome such roadblocks, this digital transformation book guides you in implementing a robust, end-to-end cellular IoT solution using best practices for all aspects of managing the IoT solution. Starting with an introduction to the top IoT markets and solutions in the context of an enterprise’s digital transformation, this book will show you how this leads to cost savings and new business models. You’ll grasp all you need to know about the IoT system components, life cycle, and best practices for implementing an IoT solution. While the book explains all the leading IoT wireless technologies, the focus is on LTE and 5G cellular technologies. With a review of real-world cellular IoT solution case studies and future IoT trends, you'll be ready to work with wireless IoT technologies, devices, and architectures. By the end of this book, you'll be able to identify the best wireless technologies for your IoT use cases and successfully implement cellular IoT solutions addressing key issues in the solution life cycle.
Table of Contents (16 chapters)
1
Part 1: Entering the World of the Internet of Things
5
Part 2: Deep Dive into Cellular IoT Solutions
11
Part 3: Cellular IoT Solution Life Cycle and Future Trends

An overview of the IoT security ecosystem

In current IoT solutions, there is not a single, end-to-end security solution. Each point in the ecosystem shown in Figure 7.1 provides some security solutions that are not connected to other solutions deployed in other points within the ecosystem. This distributed and uncoupled approach is not capable of providing a secure end-to-end system but instead allows points of compromise. In such an insecure system, the critical aspect is the integrity of the data that is being sent and received. Conventional IT data security products such as firewalls and Intrusion Detection Systems/Intrusion Prevention Systems (IDSs/IPSs) do not typically transfer over to the IoT space. While these products may play a role in IoT security, the use of newer protocols and varied types of IoT devices requires the development of new solutions. The solutions being deployed will need to account for varied device types and connectivity models.

Figure 7.1 – IoT ecosystem
...