OpenMTC M2M Solutions for Smart Cities and the Internet of Things

March 1, 2016

Machine-to-Machine (M2M) is a paradigm in which the end-to-end communication is executed without human intervention connecting non-IT objects to an IT infrastructure. M2M communication allows organizing, tracing, and managing communicating objects while minimizing related communication costs. The concept behind M2M is not a new one. Supervisory, Control and Data Acquisition (SCADA) systems have been used in manufacturing industries since the 1970s. However, it is predicted that in the next decade the M2M market will witness accelerated growth. The forecasts regarding revenue or number of M2M connections may vary, but it is expected that there will be more objects connected to the Internet than human beings, forming a global Internet of Things (IoT).

Spotlight

Thales eSecurity

Thales eSecurity is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centers and in big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices.

OTHER WHITEPAPERS
news image

Best practices for cellular IoT development

whitePaper | March 28, 2022

This document introduces the main aspects and decisions you need to consider before and during your development phase of a low-power cellular Internet of Things (IoT) product. The sections are structured and ordered chronologically to follow a natural way of designing a cellular IoT device. The first sections cover the initial design decisions you might need to make to get the best possible baseline of your design. This includes overviews about the nRF9160 System in Package (SiP), modem radio, and radio technologies. The importance of network coverage and access is also discussed.

Read More
news image

Different Dimensions of IOT Security

whitePaper | December 20, 2019

IOT is wirelessly connecting things to the internet using sensors, RFID’s and remotely accessing and managing them over our phone or through our voice. IOT uses various communication protocols such as Zigbee, 6LowPan, Bluetooth and has bi directional communication for exchange of information. The database for IOT is cloud which is also vulnerable to security threats. The increasing amount of popularity of IoT and its pervasive usage has made it more recurrent to prominent cyber-attacks such as botnet attack, IoT ransom ware, DOS attack, RFID hack.

Read More
news image

The Global Smart Industry Readiness Index Initiative: Manufacturing Transformation Insights Report 2022

whitePaper | February 14, 2022

The Smart Industry Readiness Index (SIRI) comprises a suite of frameworks and tools to help manufacturers – regardless of size or industry – start, scale and sustain their digital transformation journeys. The ongoing COVID-19 pandemic and the reshaping of production value chains globallyare spurring the manufacturing community to embrace digitalization with greater focus and urgency, motivated not only by potential gains in efficiency.

Read More
news image

Industrial Wireless IoT - The direct path to your Level 0

whitePaper | October 18, 2022

Over the past months, OTORIO’s research team together with researchers from a global leader of cyber security solutions and services, conducted comprehensive research on industrial wireless IoT devices such as industrial cellular gateways/routers and industrial Wi-Fi access points, which resulted in the discovery of broad issues in their implementation.

Read More
news image

Growing 5G+Wi-Fi RF Complexity Demands Innovative, Advanced & Tightly Integrated RFFE Solutions

whitePaper | July 28, 2023

According to Counterpoint Research, the 5G+Wi-Fi 7 market will see cumulative shipments of over 7 billion devices through 2027 and grow at more than 100% annually between now and 2027 driven by leading applications including smartphones, gateways and routers, and the automotive sector.

Read More
news image

Breaking the Silos in V&V: The IoT Way

whitePaper | May 1, 2022

For Years, testing methodologies have focused on individual elements (Silos) of an organized, connected system. Testing is getting performed in isolation for front-end, back-end and field devices. The result – even though an individual element may work well, the chain of connected system may still appear to be broken due to flaws in integration points.

Read More

Spotlight

Thales eSecurity

Thales eSecurity is the leader in advanced data security solutions and services, delivering trust wherever information is created, shared or stored. We ensure that company and government data is secure and trusted in any environment – on premise, in the cloud, in data centers and in big data environments – without sacrificing business agility. Security doesn’t just reduce risk, it’s an enabler of the digital initiatives that now permeate our daily lives – digital money, e-identities, healthcare, connected cars and with the internet of things (IoT) even household devices.

Events