Technologies & Sensors for the Internet of Things

YOLE DEVELOPPEMENT | March 1, 2016

article image
The Internet of Things (IoT) provides big opportunities for technologies. The device business will reach $45B in 2024, contributing to a total IoT market of $400B.The evolution of IoT technologies is mainly focused on heterogeneous integration at device and module levels. The array of technologies available and soon to be available is immense. Nevertheless, sensing modules’ evolution will follow a predefined trend that can be summarized in a series of seven product generations, including large industrial smart sensors, an advanced generation of sensors, and polytronics.

Spotlight

2KLIC Holdings inc.

Based in Laval, Canada, since 2012, 2KLIC is an Internet of Things, IoT, company. It is focusing on developing a solution that brings consumers, properties, devices, features, services, resellers and suppliers together. To integrate the edge of the technology, such as Artificial Intelligence and BigData analytics, 2KLIC opened an office in Montréal, Bengaluru and Ho Chi Minh City.

OTHER ARTICLES

Arm Unveils AI, ML Chips for IoT and Edge

Article | February 11, 2020

Arm wants to help IoT and other embedded devices to think for themselves. Today the company unveiled two chips designed to eliminate the reliance on cloud-based artificial intelligence (AI) by delivering machine learning (ML) capabilities right on the device.“Enabling AI everywhere requires device makers and developers to deliver machine learning locally on billions and ultimately trillions of devices,” said Dipti Vachani, SVP and general manager of Arm’s automotive and IoT line of business, in a statement. The Cortex-M55 processor is the company’s first to leverage the Armv8.1-M architecture and features Arm’s Helium vector processing technology, which is designed with ML and digital signal processing in mind.

Read More

Lock Down Personal Smart Devices to Improve Enterprise IoT Security

Article | February 11, 2020

The presence of internet of things (IoT) devices in employee’s homes is a neglected item in many enterprise threat models. Caution is certainly warranted here, but it’s entirely possible to improve your risk awareness and secure smart devices in a calm and measured way. Overlooking privacy and security risks has consequences. It’s in everyone’s best interest to consider the potential impact of every point of data output in your technological ecosystem. Any of these devices could affect the security of your digital connections. To minimize both personal and enterprise risk, it’s important to adhere to the following IoT security best practices.

Read More

The road to industrial IoT security

Article | February 11, 2020

One of the main topics of this year’s RSA Conference is IT-OT cybersecurity convergence. But what are we talking about? Industrial IoT (IIoT) is all around us: in water, in gas, and electricity distribution networks, running power plants and critical infrastructure, in production lines and transportation networks, and more. In the traditional IT world, security risks involve threats that would undermine the confidentiality, integrity, and availability of data and systems. Given that in 2019, $3.5 billion was lost to known cyber-scams and ransomware according to the FBI’s Internet Crime Report, the impact is largely financial. IIoT drives the physical world where operational technologies (OT) are used. The risk in IIoT environments involves threats that would undermine the operational safety (physical security of goods and people, environmental impact) and the availability or even the physical integrity of the production process. Theft of intellectual property and trade secrets is a major concern, and the impact is not just financial, but also social, human, and ecological.

Read More

Run-Time Provisioning of Security Credentials for IoT Devices

Article | February 11, 2020

To prevent counterfeit devices from joining a network or to limit the opportunity for network attacks, it’s important to authenticate devices attempting to join Internet of Things (IoT) networks and subsequently connect only authorized devices. The standard mechanism to securely authenticate clients connecting to a server is transport-layer-security (TLS) client-side authentication. To implement such authentication in an IoT network, the appropriate certificate authority (CA)—usually the IoT device provider—issues a unique X.509 certificate to each IoT device and the associated private key that functions as a unique security credential for the IoT device. Once the certificate and associated private key are stored on the IoT device, it may use them during the TLS client-authentication process to securely join the IoT network.

Read More

Spotlight

2KLIC Holdings inc.

Based in Laval, Canada, since 2012, 2KLIC is an Internet of Things, IoT, company. It is focusing on developing a solution that brings consumers, properties, devices, features, services, resellers and suppliers together. To integrate the edge of the technology, such as Artificial Intelligence and BigData analytics, 2KLIC opened an office in Montréal, Bengaluru and Ho Chi Minh City.

Events