Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By : Dennis McCain
Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By: Dennis McCain

Overview of this book

Even if you’re an IoT technology manager with a sound understanding of wireless local area network technologies like Wi-Fi and Bluetooth, you may face many unique challenges when implementing a wireless wide area network (WWAN) IoT solution with cellular technologies with respect to choosing the optimal IoT device, cellular connectivity, and architecture. To help you overcome such roadblocks, this digital transformation book guides you in implementing a robust, end-to-end cellular IoT solution using best practices for all aspects of managing the IoT solution. Starting with an introduction to the top IoT markets and solutions in the context of an enterprise’s digital transformation, this book will show you how this leads to cost savings and new business models. You’ll grasp all you need to know about the IoT system components, life cycle, and best practices for implementing an IoT solution. While the book explains all the leading IoT wireless technologies, the focus is on LTE and 5G cellular technologies. With a review of real-world cellular IoT solution case studies and future IoT trends, you'll be ready to work with wireless IoT technologies, devices, and architectures. By the end of this book, you'll be able to identify the best wireless technologies for your IoT use cases and successfully implement cellular IoT solutions addressing key issues in the solution life cycle.
Table of Contents (16 chapters)
1
Part 1: Entering the World of the Internet of Things
5
Part 2: Deep Dive into Cellular IoT Solutions
11
Part 3: Cellular IoT Solution Life Cycle and Future Trends

IoT security challenges

Because of the complexity of developing an end-to-end IoT solution, developers and IoT solution/system integrators typically use readily available IoT components to create their enterprise IoT solutions. Although this is easier, it tends to mean less focus on the integration points for these disparate IoT solution components and closing the security gaps that may exist. As such, security flaws and vulnerabilities go hidden and become part of the overall IoT solution. Once the enterprise IoT solution is deployed, the security risks and vulnerable attack surfaces are exposed.

In the context of an end-to-end enterprise IoT solution, there are several security attack surfaces, including the device and interfaces between the IoT solution architecture components. In Chapter 6, Reviewing Cellular IoT Devices with Use Cases, we reviewed the generic components of an IoT device. From a security attack perspective, the device and module firmware, physical inputs/outputs...