Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By : Dennis McCain
Book Image

Implementing Cellular IoT Solutions for Digital Transformation

By: Dennis McCain

Overview of this book

Even if you’re an IoT technology manager with a sound understanding of wireless local area network technologies like Wi-Fi and Bluetooth, you may face many unique challenges when implementing a wireless wide area network (WWAN) IoT solution with cellular technologies with respect to choosing the optimal IoT device, cellular connectivity, and architecture. To help you overcome such roadblocks, this digital transformation book guides you in implementing a robust, end-to-end cellular IoT solution using best practices for all aspects of managing the IoT solution. Starting with an introduction to the top IoT markets and solutions in the context of an enterprise’s digital transformation, this book will show you how this leads to cost savings and new business models. You’ll grasp all you need to know about the IoT system components, life cycle, and best practices for implementing an IoT solution. While the book explains all the leading IoT wireless technologies, the focus is on LTE and 5G cellular technologies. With a review of real-world cellular IoT solution case studies and future IoT trends, you'll be ready to work with wireless IoT technologies, devices, and architectures. By the end of this book, you'll be able to identify the best wireless technologies for your IoT use cases and successfully implement cellular IoT solutions addressing key issues in the solution life cycle.
Table of Contents (16 chapters)
Part 1: Entering the World of the Internet of Things
Part 2: Deep Dive into Cellular IoT Solutions
Part 3: Cellular IoT Solution Life Cycle and Future Trends

Proposed IoT security framework

The need for an end-to-end security solution that is adaptable to the various IoT connectivity models and varied IoT device types is an essential requirement in any enterprise IoT solution. Security needs to be deployed at various points in the ecosystem, and these security solutions need to be coupled to provide multiple layers of security. The best approach is a multi-layered security framework that covers all points in the IoT ecosystem, as shown in Figure 7.2.

Figure 7.2 – IoT solution security framework

Figure 7.2 – IoT solution security framework

In reviewing this multi-layer security approach, let us start with the device endpoint layer.

Endpoint layer

The physical security of the IoT device is a critical component of any IoT solution. Ensuring that devices are not compromised can help ensure that the data from them is not corrupted. There are various device-side security solutions available today. Some examples of these are as follows: