{"id":2300,"date":"2020-03-05T02:52:08","date_gmt":"2020-03-04T23:52:08","guid":{"rendered":"http:\/\/kusuaks7\/?p=1905"},"modified":"2024-01-02T12:52:26","modified_gmt":"2024-01-02T12:52:26","slug":"an-innovative-framework-that-will-help-the-iot-industry-scale-into-the-billions","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/an-innovative-framework-that-will-help-the-iot-industry-scale-into-the-billions\/","title":{"rendered":"An innovative framework that will help the IoT industry scale into the billions"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2300\" class=\"elementor elementor-2300\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-6bab30 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6bab30\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-135776d8\" data-id=\"135776d8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4fcc2fb2 elementor-widget elementor-widget-text-editor\" data-id=\"4fcc2fb2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe Internet of Things (IoT) is on an explosive growth trajectory. According to IDC, the number of IoT-connected devices is projected to increase to 43 billion worldwide by 2023. That\u2019s almost a three-fold increase from 2018.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1502028 elementor-widget elementor-widget-text-editor\" data-id=\"1502028\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tMuch of this growth will be fueled by the coming 5G revolution, which will enable businesses and consumers to take advantage of a wide range of increasingly sophisticated connected devices, including wearables, security cameras, smart speakers, industrial sensors, connected vehicles and more.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-006b89e elementor-widget elementor-widget-text-editor\" data-id=\"006b89e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tBut for all the value that these new IoT devices and applications are expected to bring to consumers and businesses, there are some fundamental challenges within the IoT ecosystem that still need to be addressed. Securely scaling is one of the biggest challenges, given the growth projections for IoT adoption.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-06aa002 elementor-widget elementor-widget-text-editor\" data-id=\"06aa002\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\nThe IoT today is based on a hard-coded reference model, which makes it very similar to way the internet was 50 years ago. In those early days, the internet was entirely hard-coded, too. Tens of thousands of websites and their corresponding addresses were stored in a single host file. It remained this way for another 20 years until we developed the modern domain name system (DNS), a key innovation that enabled the internet to grow on a massive scale.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ab700b elementor-widget elementor-widget-text-editor\" data-id=\"5ab700b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo extend the comparison, domain names are a lot like IoT devices. A domain name has an owner, and the owner can point that domain to any website on the internet. For example, if I buy the \u201cexample.ca\u201d domain, we can point it to a website that\u2019s all about me, or I can point it to another site that\u2019s about something else altogether. It\u2019s completely up to me.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b0ea4a elementor-widget elementor-widget-text-editor\" data-id=\"0b0ea4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA generic IoT device also has an owner, and the owner can theoretically make it work with any application. If I have a security sensor on my front door, for example, I can point it to any security service I like, whether it\u2019s ADT, AlarmForce or some other provider. Again, it\u2019s up to me.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b9a6a5 elementor-widget elementor-widget-text-editor\" data-id=\"7b9a6a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe difference is that pointing a domain name to a different website is very simple, whereas the IoT\u2019s hard-coded model makes associating an IoT device to a new application very challenging, if not impossible.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-07f37ce elementor-widget elementor-widget-text-editor\" data-id=\"07f37ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tHere\u2019s an example that illustrates the scope of this challenge. Imagine that the city of Ottawa buys thousands of smart, internet-connected parking meters that it deploys around the city. And imagine that these meters are all connected to a fictional application provider called ParkoServ. Each meter has an eSIM card installed in it that is hard-coded to work with ParkoServ only.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6720c83 elementor-widget elementor-widget-text-editor\" data-id=\"6720c83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tIf at some point in the future the city\u2019s IT department wants to take advantage of a more cost-effective and technologically superior solution offered by another provider (let\u2019s call it CarParkServ), there\u2019s no easy, secure way for them to do it.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1e75d4 elementor-widget elementor-widget-text-editor\" data-id=\"c1e75d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tInstead, if they want to make the switch, IT staff will have to locate and manually configure thousands of hard-coded parking meters individually to associate them with CarParkServe. It\u2019s not hard to see that this approach is incredibly labour-intensive, time-consuming, error-prone and expensive.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24e19d0 elementor-widget elementor-widget-text-editor\" data-id=\"24e19d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWhat if, on the other hand, the city\u2019s IT department could automate the process of switching to the new application provider, while ensuring that it was done securely?\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9f32f8a elementor-widget elementor-widget-text-editor\" data-id=\"9f32f8a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThis is where\u2019s the Secure IoT Registry we\u2019re developing at CIRA Labs comes in. The Secure IoT Registry is an innovative framework that will allow the world\u2019s mobile eSIM enabled (IoT Safe) IoT devices to seamlessly and securely connect between any manufacturer, owner, service provider and network operator.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-73e75b3 elementor-widget elementor-widget-text-editor\" data-id=\"73e75b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tGoing back to our parking meter example, the Registry would sit between the parking meters, the application providers and the wireless mobile networks. To start the process of reconfiguring the parking meters to talk to the CarParkServe system, the Secure IoT Registry would gather all the relevant information about each individual parking meter, the wireless provider and the new application provider and the eSIM unique identification number.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87223ed elementor-widget elementor-widget-text-editor\" data-id=\"87223ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tUsing this information, it would then generate a unique security certificate for each parking meter. By adding end-to-end encryption to the unique private and public keys, the Secure IoT Registry protects the zero-touch provisioning process against malicious \u201cman in the middle\u201d attacks and any mobile network operator meddling.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b6d8df elementor-widget elementor-widget-text-editor\" data-id=\"0b6d8df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tTo complete the process, it would send these encrypted credentials electronically to the parking meter via wireless mobile network operator, and the switchover would be complete. All the parking meters would now be connected to the new CarParkService application.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9baa1e0 elementor-widget elementor-widget-text-editor\" data-id=\"9baa1e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tThe zero-touch approach enabled by the Secure IoT Registry is seamless, secure, requires minimal effort on the part of the IT department, and is highly cost-effective. What\u2019s more, if the city ever needs to switch to a different application provider in future, the process will be the same.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f0ec0 elementor-widget elementor-widget-text-editor\" data-id=\"d7f0ec0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tLooking at the big picture, this is the ideal IoT security system that we at CIRA want to see in place in the IoT ecosystem by 2025. With the Secure IoT registry, any eSIM-equipped, generic IoT device will work with any application. Not only would this help prevent platform\/vendor lock-in, it would also allow the IoT ecosystem to scale exponentially and securely. It would also allow device manufacturers to focus on developing innovative devices and application developers and cloud service providers to focus on providing IoT services and solutions that provide superior value to their customers. You can learn more at cira.ca\/iot.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Much of IoT growth will be fueled by the coming 5G revolution, which will enable businesses and consumers to take advantage of a wide range of increasingly sophisticated connected devices, including wearables, security cameras, smart speakers, industrial sensors, connected vehicles and more. But for all the value that these new IoT devices and applications are expected to bring to consumers and businesses, there are some fundamental challenges within the IoT ecosystem that still need to be addressed. Securely scaling is one of the biggest challenges, given the growth projections for IoT adoption.<\/p>\n","protected":false},"author":741,"featured_media":3888,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[93],"ppma_author":[3586],"class_list":["post-2300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-internet-of-things"],"authors":[{"term_id":3586,"user_id":741,"is_guest":0,"slug":"jacques-latour","display_name":"Jacques Latour","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","user_url":"","last_name":"Latour","first_name":"Jacques","job_title":"","description":"Jacques Latour is Chief Technology Officer and Chief Security Officer for the Canadian Internet Registration Authority (CIRA), a national not-for-profit best known for managing the .CA top level domain and developing new cybersecurity products."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/741"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=2300"}],"version-history":[{"count":5,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2300\/revisions"}],"predecessor-version":[{"id":35313,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/2300\/revisions\/35313"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/3888"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=2300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=2300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=2300"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=2300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}