NA Tech and Trends - 2024-v1

Download as pdf or txt
Download as pdf or txt
You are on page 1of 22

IoT Technologies

and Trends 2024:


Ramping Up
the 5G Era

korewireless.com
Contents
Introduction 3

The 5G Era 3
Enhanced Mobile Broadband 3
Ultra-Reliable Low Latency Communications and Critical IoT 4
Low Power Wide Area in the 5G Era 4
NB-IoT and LPWA 5
Unlicensed, Non-Cellular LPWA 6
Network Slicing and Private 5G 7
A Note on Private LTE and 5G 8
Public, Private, or Hybrid Networks? 8
4G LTE or 5G for Private Networks? 9
GSMA Goals of the 5G Era 9

eSIM: Single SIM – Global Connectivity 10


SGP.31/SGP.32 11
Building Efficient Systems and Scaling with SGP.32 11
Finding the True eSIM 12
KORE OmniSIMTM Offering 13

Security and Regulatory Requirements 14


Building ‘Security by Design’ 14
SASE Offering Heightened Security Measures 14
Regulatory Requirements for IoT Management
- Ensuring Compliance with Industry Standards 14
Device Compliance and Certification 15
IoT SAFE 15
Intelligent Network Monitoring 16

Trending in IoT 16
IoT Hyperscalers 16
Analytics for Artificial Intelligence and Machine Learning 17
High Bandwidth and Fixed Wireless Access 18
Smart Living 19
The Resurgence of MVNE Mobile Virtual Network Enabler (MVNE) 19
Leveraging iSIM 19
Edge Computing 20

2024 Top of Mind Questions 21

Turn to KORE for Navigating IoT Tech and Trends 22


Introduction
During this decade of IoT, between 2020 and Furthermore,
2030, technology and trends are shifting rapidly
and giving rise to a new era of technology,
computing, and digital applications. In this
5G is anticipated
decade, 2G and 3G will become fully obsolete and
replaced by 4G LTE, 5G, low power wide area to add nearly
(LPWA) networks and short-range technologies.
New ways of compute and storage will proliferate
and data will become massive and critical across
$1 trillion to the
thousands of use cases. In this eBook, we take a
look at the current technology and trends in 2024 global economy
and how it specifically impacts the Internet of
Things.
by 2030.
The 5G Era
eMBB is going to open a lot of opportunities for a
The newest generation of cellular technology is
variety of use cases including:
going to play a major role in IoT innovation during
this decade. GSMA Intelligence1 reports that in Telemedicine: This segment of connected healthcare
2022, 12 percent of the global connections grew during the pandemic and is likely to level off but
(excluding licensed cellular IoT) were 5G and that continue to be utilized. eMBB is going to support the
applications within this use case to help provide quality
number is expected to increase to 54 percent – or
care that is decentralized outside of a clinic, hospital, or
5.3 billion connections) by 2030. Furthermore, 5G doctor’s office.
is anticipated to add nearly $1 trillion1 to the
global economy by 2030. Smart offices: Video conferencing, cloud access for
software applications, remote offices, and virtual training
can be supported by the high quality and speed of eMBB.
Connected events: Concerts and sporting events are two
Enhanced Mobile Broadband examples of public events that tend to experience lag or
no network connectivity due to the large scale of data
Mobile broadband is very similar to broadband, communications. eMBB is positioned to handle such large
which is high-quality, high-speed internet. When scale.
adding mobility to the equation, the end user is
Multimedia: High-definition in multimedia has the
able to enjoy the same high-quality and possibility to be enhanced through eMBB, such as
high-speed internet anywhere through a cellular streaming content and gaming.
connection – in this case, 5G. It creates the ability
to connect a device to a cellular network anywhere Remote field serving: Primarily in industrial applications,
this use case allows technicians to access equipment
and enjoy the same quality of service.
remotely for diagnostics and repair.

www.korewireless.com | 3
Ultra-Reliable Low Latency Communications The two major characteristics of low power wide
and Critical IoT area (LPWA) networks are spelled out in the name
– low power means that this connectivity
The low latency and reliability of 5G for
technology uses low power for a longer battery
mission-critical applications will be realized in
life. The wide area is a nod to its range of at least
ultra-reliable, low latency communications
500 meters from the gateway device to the
(URLLC).
endpoint. Additional benefits of LPWA, according
to GSMA, are low device unit cost, improved
URLLC in the enterprise sector can help power the
outdoor and/or indoor penetration coverage
Fourth Industrial Revolution as factory processes
compared with existing wide-area technologies,
and power systems are automated. URLLC
secure connectivity and authentication, optimized
becomes a critical component of machine
data transfer, simplified network deployment, and
learning, robotics, and autonomous operations
network scalability4. Because LPWA supports
(Automated Guided Vehicles) because a delay
large-scale, widespread IoT deployments that
along the production line due to communication
support low-complexity, low-power devices, it is
blips can wreak havoc. In connected health,
anticipated to create a subset of IoT called
leveraging everything from AR and AVR to
Massive IoT.
robotics, URLLC can play a critical role in making
sure data communications run smoothly without
Analyst organization Omdia projects that NB-IoT
blind spots or lags. Smart grids can utilize data
and LoRa will account for 87 percent of LPWA IoT
aggregation to manage power across an energy
connections in 2027, which will increase from the
grid, especially one that uses multiple energy
current 85 percent of LPWA2 connections.
sources. Transportation can utilize IoT through
drones for traffic control or vehicle-to-vehicle (V2V)
communications for greater safety, or artificial
intelligence (AI) in a move to more autonomous
consumer and fleet vehicles.

Low Power Wide Area in the 5G Era


When the 3GPP standardized the fifth generation of
cellular connectivity, the network technology was
segmented in thirds – eMBB, URLLC, and low
power wide area (LPWA). For cellular LPWA, there is
Narrowband IoT (NB-IoT) and Long Term Evolution
for Machine Type Communications (LTE-M).
87%
NB-IoT and LoRa

LPWA IoT connections

4 | www.korewireless.com
NB-IoT and LPWA

According to GSMA, these standardized LPWA technologies were designed with the following
characteristics3, which make them attractive to IoT:

• Low power consumption that enables devices to operate for 10 years on a single charge
• Low device unit cost
• Improved outdoor and indoor penetration compared with existing wide-area technologies
• Secure connectivity and strong authentication
• Optimized data transfer (supports small,intermittent blocks of data)
• Simplified network topology and deployment
• Integrated into a unified/horizontal IoT platform
• Network scalability for capacity upgrade

While both network technologies share very similar characteristics, they do have key differences that power
different use cases.

LTE-M NB-IoT

LTE-M is an IP-based communication protocol NB-IoT, which is currently most widely used in
designed for higher bandwidth or mobile and Europe and Asia, is built off the LTE physical layer
roaming applications than NB-IoT. LTE-M also and designed to offer extended coverage.
supports Voice over LTE (VoLTE), so it can handle Single-tone transmissions allow for enhanced
more complex IoT devices. latency in poor coverage areas. NB-IoT does not
support VoLTE and is better leveraged in
Use cases include: stationary devices.
• Fleet tracking
Use cases include:
• Asset tracking
• Smart metering • Retail applications for point of sale
• Point of sale devices • Smart home applications
• People/pet tracking • Smart cities
• Smart watches • Smart buildings
(utilities such as alarm systems, HVAC)
• Agriculture
• Smart metering for utilities

www.korewireless.com | 5
Unlicensed, Non-Cellular LPWA

Several proprietary LPWA network options operate in unlicensed spectrum, such as Sigfox and LoRa. When
using licensed spectrum, operators must apply for and obtain a license from local regulatory agencies, such
as OFCOM in the United Kingdom, to own and operate spectrum in exchange for connectivity that is 99.999
percent interference-free.

Unlicensed spectrum doesn’t require any special permit or license to operate, but if multiple providers are
operating in the same area, unlicensed connections have a chance of being subjected to interference.

LoRa and LoRaWAN

The LoRa Alliance has taken its private spectrum and built a public spectrum called LoRaWAN. This specification,
which has been widely used in Brazil, is now deploying globally. LoRaWAN meets the requirements of Massive IoT
well, addressing key objectives such as secure bi-directional communication, mobility, and localization services.
LoRaWAN provides low range, low power, low-cost connectivity, and security for devices and the network.

LoRaWAN Advantages:
• Well designed for single-building applications
• Bi-directional communications are optimized
• Works well with devices that are mobile, such as tracking devices

Agriculture: With a long range that provides reliability in rural applications for devices that don’t have a high data
transmission rate, LoRaWAN supports measuring crop production, tracking cattle, and more in an effort to
optimize operations.

Assets and logistics: Network-based location and tracking abilities at a low cost and optimized battery life make
LoRaWAN suitable for the smart supply chain.

Cities: Public/municipal operations can be made more efficient with LoRaWAN capabilities, including smart
infrastructure, traffic and parking management, street lighting, waste removal, and recycling.

Healthcare: LoRaWAN’s low power, low cost, and reliable performance make it suitable for connected health
applications, such as remote patient monitoring or mobile Personal Emergency Response Systems (mPERS).

Industrial: Industrial IoT, otherwise known as Industry 4.0, is transforming operations by digitizing legacy
processes and equipment, driving profits, keeping costs lower, and maximizing efficiencies.

Utilities: LoRaWAN’s ability to reach sensors that monitor utilities located underground make this a well-suited
connectivity choice for smart metering.

6 | www.korewireless.com
Private networks offer a host of
benefits, some of which are dependent
Sigfox on the use case, but this solution has
many key features that can support
business cases in all verticals:
Sigfox modules are affordable and the connectivity
itself is “as-a-Service.” In certain cases, companies
can deploy and operate the network in-house.
Security: With dependability and
Sigfox Advantages redundancy mechanisms that occur at
every level of the protocol stack, private
• Lightweight protocol that manages networks help secure mission-critical or
smaller data packets efficiently sensitive data.
• Ultra-narrow band technology can
accommodate more channels and Penetration: Private cellular networks can
achieve greater network capacity penetrate through walls and obstructions
• Lower total cost of ownership much better than Wi-Fi can, which makes it
an ideal use case in large campuses and
manufacturing.
Low latency: A strong, reliable network
connection means gaps or interruptions in
communications. This is important in all
data transmission, but critical in
Network Slicing and Private 5G applications such as robotics or
autonomous vehicles/machine operations.
Network slicing for private 5G networks allows
businesses to tailor a network for specific needs Wide range and coverage: Large areas,
with customizable network capabilities like data like those in shipyards, airports, education
or business campuses, and much more can
speed, quality, latency, reliability, and security. enjoy the wide range and coverage of
Network slicing allows communication services dedicated cellular network connectivity.
providers (CSPs) a new value proposition for Control and customization: With full
enterprises. control over design, deployment, and
operations, as well as the option to quickly
If network slicing is the capability, private networks configure the network, private networks
offer greater plasticity than wired
are the application. Private networks, at a high communications or public cellular. Private
level, mean a dedicated network that lies outside networks can also be highly scalable
of public networks. Typically, the reason to use offering flexibility for integrating new
private networks falls under security and applications or physical locations. A
drawback of creating a private network is
bandwidth purposes. While private networks are that it can be time-consuming and costly,
available via 4G LTE, the network slicing so it’s important to approach building
capabilities of 5G make it a much more accessible private networks strategically with a clear
solution. understanding of goals for the specific
business case.

www.korewireless.com | 7
A Note on Private LTE and 5G
Private networks have the ability to offer
heightened security and dedicated bandwidth for
many IoT use cases, but private networks can be
complex and not every use case can benefit from
them, and choosing the right connectivity
technology and infrastructure is important.

Public, Private, or Hybrid Networks? With a private network, the network is owned and
Public networks are those owned and operated by operated by the organization leveraging it and
carriers, which is likely the most familiar association only authorized devices can connect. This allows
with network connectivity in enterprise use. When the organization to dedicate the network to only
leveraging cellular for business operations, any its applications which can help increase security,
connected devices and routers are going to dedicate bandwidth, potentially lower latency, and
operate on a network that the organization can provide higher reliability since it is not a shared
essentially rents from the carrier through a contract network.
and is billed monthly.
However, private networks can be expensive,
The benefits of a public network include that it is complex, and require management and
simple to get solutions up and running quickly. maintenance as it is the organization’s
The costs are typically low and there is no responsibility and no longer the Mobile Network
maintenance or upgrading required because the Operator's responsibility. Mining, manufacturing,
network is owned by a third party (the Mobile and government are a few of the use cases where
Network Operator). Coverage is wide and it can it becomes more essential to have a private
be applied across the organization, no matter network versus use cases that do not have higher
where various locations might be. risk in network connectivity.

The downside to a public network is that it is a But there are applications that can benefit from
shared public network and can be more vulnerable having a portion of operations running on a private
to security such as when data privacy and security network while the rest of operations are running on
are mission critical, like with manufacturing, a public network, which is the hybrid approach.
financial tech, healthcare, or government use More mission-critical applications and in house
cases. applications can leverage the private network,
while mobile assets and fleet can leverage the
Another drawback is that the organization is public network as these assets travel from one
dependent on the operator and they do not have location to another.. However it can become
much control over the physical infrastructure. complex managing multiple networks, private and
public.

8 | www.korewireless.com
4G LTE or 5G for Private Networks?
With 4G LTE having many more years of 4G LTE, GSMA Goals of the 5G Era
likely until 2030, and 5G Non-Standalone (NSA) Working closely with the mobile operators
relatively prolific and 5G Standalone (SA) still in pioneering 5G, the GSMA is engaging with
governments, vertical industries including
extremely early iterations, it is equally as viable to
automotive, financial services, healthcare
opt for either network technology. providers, transport operators, utilities, and
other industry sectors to develop businesses
With the continued buildout of 5G NSA and SA cases for 5G5.
networks, private networks are going to become
more accessible, making a choice between the
two network technologies equally viable.
1. Boundless connectivity for all –
Co-exist with 4G LTE networks to provide
5G has been built with backward compatibility to borderless, high speed, secure
4G LTE, so the risk of choosing 4G LTE is not connectivity.
similar to the radical network sunsets seen with 2G 2. Deliver future networks innovatively
and 3G. An upgrade from LTE to 5G will be with optimal economics – Cost-effectively
necessary, but it won’t require recreating new delivers better quality networks either
architecture and hardware or devices. Many independently or through partnerships.
hardware manufacturers have created 5G-ready 3. Accelerate digital transformation of
solutions to deploy now on LTE and upgrade to industry verticals – Establish the networks
and platforms required to drive
5G later. digitalization and automation of industrial
practices and processes.
The majority of private networks in 2022 were LTE
4. Transform the mobile broadband
– 57 percent4 in fact. But in many use cases, LTE experience – Enhanced mobile
and 5G were combined. experience with up to 1 Gbps and <10ms,
providing a platform for cloud- and
artificial intelligence-based services.
5. Drive growth in new use cases for
massive IoT and critical communications
services – Support massive roll-out of
intelligent IoT nodes, as well as
widespread adoption of critical
communication services.

www.korewireless.com | 9
The impacts of 5G are going to be numerous,
but adopting this new cellular generation eSIM: Single SIM – Global
doesn’t come without its challenges, as
identified by the GSMA6: Connectivity
The eSIM (embedded SIM), also known as an
eUICC (Embedded Universal Integrated Circuit
Card) is a type of technology that provides device
1. Business case – To maximize the 5G
opportunity, the mobile industry must users with significantly increased levels of flexibility
identify new services, market segments, through its ability to support multiple cellular
and suitable business models to optimize carrier profiles on a single SIM card.
the network investment.
2. Spectrum availability – Spectrum will Traditionally, a SIM card only contained the
continue to be a scarce resource, and the credentials or subscription required to access a
availability of spectrum, at which frequency
bands, and at what costs will have a
single carrier’s services – changing carriers
significant impact on the 5G business case. required changing SIM cards. With eSIM, users can
remotely provision their devices to switch between
3. Technological improvements and
breakthroughs – To meet the technical support carrier profiles via Over-the-Air (OTA)
expectations of 5G, both the laws of updates. The eSIM represents a revolutionary
physics and current network layouts will be change in the ways cellular services are managed –
challenged, demanding major
eliminating the need for SIM swaps or even
technological advancements in device and
network design. physical access to the device to change service
providers.
4. Fragmentation – Lessons learned from
2G, 3G, and 4G LTE deployments prove
that mobile technology is more successful The eSIM specification has been adopted by the
when fragmentation is limited. Operators global industry as a de facto standard for remote
must standardize from the beginning to service provisioning (RSP) of eSIM-21 connected
avoid future issues.
devices. The specification, known as GSMA
5. Regulation – To rationalize the Embedded SIM specification GGP .02 was
significant investment that 5G deployment
demands, regulatory bodies must support
developed by GSMA specifically for MRM eSIM
transparent policies that encourage implementations. It makes it possible to provision
investment and innovation. The innovation and manage eSIMs in remote devices by pushing
of 5G is significant, which estimates a new profile to the devices OTA. Although eSIM
claiming mobile operators will be able to
grow global revenues at a CAGR of 2.5
solutions have technically been available for
percent during the 5G era6, it is important several years now, it has mostly been in proprietary
to note that 5G deployments must be a solutions for very specific use cases, such as Apple
collaborative effort among key players in iPads. In 2012, GSMA became involved in eSIM
the mobile industry. The way that 5G is
developed, managed, regulated, and
specifications and standardization to ensure SIM
commercialized will fundamentally cards, provisioning systems, and equipment –
establish how closely it meets expectations regardless of manufacturer – will function
of innovation and economic growth. together.

10 | www.korewireless.com
SGP.31/SGP.32 Building Efficient Systems and Scaling with
SGP.32
The GSMA has published new IoT architecture,
requirements, and technical specifications for Adopting SGP.32 standards for eSIM remote
eSIM remote SIM provisioning (SGP.31/SGP.32). provisioning can significantly enhance the
These standards enable the remote management efficiency and scalability of IoT systems. By
of eSIM profiles, enhancing the flexibility and leveraging these specifications, organizations can
scalability of IoT deployments. By adopting these streamline device management, reduce
specifications, organizations can streamline the operational costs, and improve security. This
provisioning process, reduce operational costs, approach enables the seamless deployment and
and improve the security of IoT systems. This scaling of IoT solutions, driving innovation and
development represents a significant operational excellence.
advancement in the management of IoT
connectivity. SGP.32 will be integrated with AI-driven
management platforms, enabling more intelligent
The adoption of eSIM and remote SIM and automated provisioning and management of
provisioning will become more widespread, driven IoT devices. The adoption of blockchain
by the need for flexible and scalable connectivity technology for secure and transparent
solutions. Future advancements in eSIM provisioning processes will further enhance the
technology will support more dynamic and security and reliability of IoT deployments. As a
automated management of connectivity, enabling result, organizations will be able to scale their IoT
IoT devices to seamlessly switch between different solutions more efficiently and securely, driving
networks and service providers. Additionally, the greater innovation and value.
integration of eSIM with other IoT management
platforms will provide a more comprehensive and
streamlined approach to connectivity
management.

www.korewireless.com | 11
According to the GSMA7, there are several
key impacts to the accelerated adoption
of eSIM

• Adoption of global standards and/or Dual SIM: Some mobile devices support the
specifications versus proprietary solutions use of two SIM cards, described as dual SIM
operations. When a second SIM card is
• 5G pushing greater adoption of cellular installed, it allows users to switch between two
connectivity for solutions, which separate mobile network services manually, has
tangentially would increase eSIM use hardware support for keeping both
• iSIM as another comparable connectivity connections in a “stand-by” state for automatic
technology choice switching, or has individual transceivers for
maintaining both network connections at once.
• eSIM addressing top challenges in IoT
deployment such as integration with Soft SIM: This is a software-based SIM card
existing technologies, the cost of with no actual SIM hardware. An eSIM is either
implementation and security embedded or removable and can be
ruggedized for IoT use.
• IoT companies offering a powerful eSIM
strategy in addition to their main core
Multi-IMSI: A standalone Multi-IMSI SIM
proposition
solution is comprised of a single SIM that has
several IMSIs, which are the unique numbers
that let Mobile Network Operators (MNOs)
authenticate their subscribers so they can
access the network. Multi-IMSI simply means a
device has the ability to connect to several
different networks. So, while Multi-IMIS on its
Finding the True eSIM own can be pre-programmed with the ability to
connect to more than one network, it’s the
The adoption of eSIM is accelerating as IoT is eUICC eSIM that is the ideal global,
becoming a more prolific technology and the future-proofed technology because it can
switch to networks remotely and it allows
economy is becoming more and more global. greater ease and flexibility for global
With a market becoming more saturated with deployments and long-term IoT solutions –
options, it’s important to distinguish a true eUICC ideally for a device’s entire lifecycle. KORE has
solution from similar competitors. been involved in a mission-critical use case of
drone logistics, where eSIM was leveraged to
switch between satellite and cellular
connectivity. Swoop Aero, an Australia-based
drone logistics company, utilizes its drones to
deliver medical supplies and treatments to
remote locations across the globe, most
notably COVID-19 supplies.

12 | www.korewireless.com
When looking for a true, eUICC eSIM to support
future-proofed, out-of-the-box, global connectivity,
KORE OmniSIMTM Offering
look for the following capabilities:

• A single SKU eSIM that is globally


connected Simplify loT complexity with a trusted advisor and
global, independent leader in eSIM capabilities:
• A carrier-agnostic platform that minimizes
roaming costs • Achieve global coverage via a single
eSIM and the KORE eSIM profile, with
• Connecting that has the resilience to support for additional carrier profiles as
overcome network sunsets needed
• Enhance scalability and growth by
• Standards-compliant RSP technology that introducing new business models and
allows remote, automatic connectivity to value propositions enabled via natively
the optimal network connected devices

• Device monitoring to ensure the solution • Eliminate SIM switching costs and
improve operational efficiencies with
is always connected and operating remote eSIM provisioning
properly
• Minimize total cost of ownership and
• Connectivity management tools that maximize returns on loT investments
teams can use to manage connectivity through a consolidated operational
model
profiles, as well as provision data and
devices • Future-proof connected devices with a
single eSIM that can support multiple
• Security that is based on industry carriers and network technologies
standards
• An architecture that can scale along with
the business

“We at Orange are thrilled to partner with KORE, taking an important step to unlock the
full potential of eSIM for customers with IoT use cases that require high performance and
global coverage,” commented Bénédicte Javelot, CEO Orange Wholesale France. “More
than ever, our customers are expecting us to go beyond traditional connectivity to provide
global, innovative and resilient IoT solutions.”

www.korewireless.com | 13
Security and Regulatory SASE Offering Heightened Security Measures
Requirements Secure access service edge (SASE) is a global
cloud-based network and security service that
A more connected ecosystem poses a threat to
initially was leveraged for mainly an enterprise IT
cyber safety and the way we navigate personal and
infrastructure beginning around 2019 on the heels
business information online. The discussion
of software-defined wide area network (SD-WAN)
surround IoT security has hit a critical mass in the
deployments. Now it is evolving into an emerging
industry, but in a positive way. Instead of
trend in IoT to securely manage IoT devices.
considering security to be a value-add or
According to research by Palo Alto Networks, IoT
something to be shored up after a security
devices are subject to a host of security threats –
incident, we’re going to see a bigger push towards
the top three categories being exploits, malware,
security by design.
and user practice issues such as phishing or weak
passwords8. The research states that more than
half of IoT devices are subject to medium- to
Building ‘Security by Design’ high-severity attacks – 57 percent. SASE security
combines cloud-access security brokers, cloud
Incorporating security measures from the outset of
secure web gateways, zero-trust network access,
the IoT development process is crucial. This
firewall-as-a-service, and DNS – alongside its
involves designing hardware and software that
networking services leveraging wide-area
inherently protect against potential threats. Key
networking – to provide a secure, scalable
strategies include implementing secure boot
infrastructure for flexible widespread deployment
processes, encrypted communication channels,
of Internet-connected endpoints. SASE has an
and regular firmware updates. Additionally,
edge component, delivered through Point of
leveraging technologies such as Trusted Platform
Presence (PoPs) or data centers that bring the
Modules (TPM) and Hardware Security Modules
capabilities closer to the device level, which is a
(HSM) can enhance the security of IoT devices. By
growing trend in IoT that helps minimize entry
prioritizing security from the design phase,
points for attacks along data communications.
organizations can mitigate risks and protect
sensitive data throughout the device lifecycle.

Security by design will become a standard Regulatory Requirements for IoT Management
practice, driven by increasing regulatory - Ensuring Compliance with Industry Standards
requirements and the growing sophistication of
cyber threats. Future IoT devices will incorporate
Compliance with regulatory requirements is crucial
advanced security features, such as AI-driven
for the successful deployment and management of
threat detection and response systems, making
IoT systems. This involves adhering to industry
them more resilient against attacks. Moreover, the
standards, such as GDPR for data protection and
development of industry-wide security frameworks
ISO/IEC 27001 for information security
and standards will help ensure consistent security
management. Engaging with regulatory bodies
practices across different IoT applications.
and staying informed about evolving regulations

14 | www.korewireless.com
can help organizations navigate compliance compliance tools will emerge, simplifying the
challenges. Additionally, implementing robust process of obtaining certifications and ensuring
security measures and best practices can mitigate ongoing adherence to standards. Furthermore,
risks and ensure compliance with regulatory the development of global harmonized standards
requirements. for IoT will reduce the complexity and cost of
achieving compliance across different markets.
Regulatory requirements for IoT will become more
stringent, with a focus on security, data privacy,
and environmental sustainability. Automated
compliance monitoring tools will emerge,
enabling organizations to continuously assess their
adherence to regulations and standards. The IoT SAFE
development of global regulatory frameworks will
harmonize requirements across different regions,
simplifying compliance efforts for multinational
organizations. Furthermore, the adoption of
The GSMA, in an attempt to create a universal
privacy-enhancing technologies, such as standard for authentication and authorization of
differential privacy and homomorphic encryption, IoT devices, has created IoT SAFE (IoT SIM Applet
will support compliance with data protection For Secure End-to-End Communication). This
regulations while enabling valuable data analysis. initiative enables IoT device manufacturers and IoT
service providers to use the SIM as a robust,
scalable, and standardized Root of Trust to protect
IoT data communications. A root of trust can be a
hardware, firmware, or software component that
Device Compliance and Certification performs security functions. In the case of IoT
SAFE, the SIM is the hardware root of trust. IoT
Ensuring compliance with industry standards and SAFE delivers a common procedure to secure data
obtaining necessary certifications is crucial for the communications with a reliable SIM, rather than
market success of IoT devices. Regulatory using proprietary and possibly less secure
requirements vary by region and application, hardware elements in the device.
encompassing aspects such as electromagnetic
compatibility (EMC), radio frequency (RF) Benefits of IoT SAFE include:
exposure, and safety standards. Engaging with
• Improvement in the security of solution
certification bodies early in the development offered or reduction in device complexity
process can streamline compliance efforts and
• Secure, seamless cloud onboarding with
prevent costly delays. Additionally, adhering to enterprise connectivity
best practices for design and testing can facilitate
• Extended certificate lifecycle
successful certification and market entry.
management

The regulatory landscape for IoT will continue to • Value-add to SIM/eSIM platform
evolve, with increasing emphasis on security, data • Portability, ease of deployment
privacy, and environmental impact. Automated • Connectivity and protocol agnostic

www.korewireless.com | 15
Trending in IoT
Certainly some of the largest trends in IoT center
on 5G, as this new network technology creates a
lot of new opportunities for use cases as well as the
need for service providers to differentiate and
diversify offerings to meet the needs of the 5G era.

IoT Hyperscalers
Intelligent Network Monitoring
The world of the internet and digital solutions has
traditionally been pretty fragmented and required
a lot of laborious custom building. To create an
Security is a critical element of any IoT
employee tracking system at an enterprise, it
deployment. Many connectivity management required buying or building compute and storage
platforms cannot detect fluctuations in usage at and then configuring applications. Now, with data
the device level. Those fluctuations are important storage and compute, it’s as simple as going
to flag, however, as they could potentially indicate
security breaches or device malfunctions.
online and purchasing what you want from one of
Intelligent network monitoring platforms have the cloud hyperscalers, such as Google Cloud,
become a holistic approach to network and device Microsoft Azure, or AWS. It’s simple, easy, and a
monitoring to help manage the complex network very common way of buying and operating digital
and usage details of IoT deployments.
solutions.
The most powerful platforms include:
The same holds true for IoT – early iterations of IoT
• Real-time traffic monitoring
were complex, even for simpler solutions. IoT
• Monitoring of multiple conditions, solutions are even more complex now. Endpoints
including IP address or IMEI changes,
must communicate at all times. Connectivity must
anomalous communication patterns, loss
of connection, and more travel with solutions or support massive or critical
applications. Data needs to be cleansed and
• Insight via complex rules with actions,
including condition alerts, notifications of communicated securely to the cloud for analytics
SIM status changes, advanced threat that delivers powerful results, like artificial
actions, and more intelligence and machine learning.
• Endpoint management
IoT is headed toward that democratization where
leveraging solutions is as simple as going online
and clicking a button. What this is going to require
is strong partnerships across the ecosystem and
the rise of IoT hyperscalers, including cloud
hyperscalers.

16 | www.korewireless.com
Hyperscaler has traditionally been rooted in the Analytics for Artificial Intelligence and Machine
major players of cloud services, but IoT Learning
hyperscaler is a term dedicated to a similar level of
The enhancement of analytics is going to be a
scale as those major cloud service providers, but
massive tidal wave as more and more data is
dedicated solely to IoT.
collected through both LPWA- and 5G-connected
devices. The push toward artificial intelligence (AI)
IoT is well beyond a connectivity proposition, but
and machine learning (ML) is creating a push for a
the true value lies in combining resilient
significantly lessened lag between data collection
connectivity with the ability to easily ramp and
and processing/analysis. This in particular is a large
manage in an effective, low-cost approach, or
area that can be addressed by an IoT hyperscaler
democratization. IoT is moving toward a massive
with key partnerships in the IoT ecosystem –
scale, and this needs to be accomplished from
especially with cloud hyperscalers, such as
build to deployment and management in a global,
Microsoft Azure, AWS, and Google Cloud.
flexible manner. An IoT hyperscaler can manage
each touchpoint through simplistic, secure
An IoT hyperscaler works diligently the endpoint
offerings under a single roof, which addresses a
of devices and device management, the
significant gap in the market. IoT hyperscalers can
connectivity, and the IoT platform that helps
offer to users the plug-and-play approach to IoT
deliver the data (which also needs to be cleansed
that lessens CapEx, enhances ROI, and is built to
and normalized) for the greatest analytics results.
scale.
An IoT platform also helps customers manage and
monitor devices, whether a deployment has a fleet
Transforma Insights identifies a successful IoT
of devices in the thousands or is dispersed
hyperscaler as being able to provide a massive
globally. A comprehensive and streamlined IoT
scale, low-cost management, and combined
core provides organizations with the ability to
device and/or connectivity offerings9. Connectivity
select their preferred communication protocol,
in IoT is becoming simply table stakes, as well as
allowing them to receive telemetry data from
the broad management of connectivity through a
devices. It also provides the means for
connectivity management platform.
management of devices and device policies from
the cloud while also issuing OTA commands and
End-to-end solutions are of high value10 in the IoT
configuration update back to devices.
industry and an IoT hyperscaler offers the
comprehensive, robust set of solutions needed to
deploy, manage, and scale IoT.

www.korewireless.com | 17
Additionally, IoT core also provides a secure
method for data communication, as it only allows
authenticated devices to access your system in the
cloud, and protects the transported telemetry data
with end-to-end encryption.

Some early use cases in IoT of leveraging artificial


intelligence is highly focused on AI-enabled video
analytics – video management systems, computer
vision systems, and object recognition are a few
subsets that can enhance security and safety in
many applications such as construction, smart Installation is a major boon of FWA as there is no
cities, manufacturing, fleet management, and need for digging trenches to allow for wires. In this
healthcare, to name a few. sense, FWA is “Day 0 connectivity” for new
locations that need to get up and running quickly
without waiting for the highly physical
implementation of traditional wireless
High Bandwidth and Fixed Wireless Access
connectivity.
Fixed wireless access (FWA) leverages 4G LTE or
5G connectivity to create fixed broadband access FWA can be leveraged as a primary of a secondary
that uses cellular radio frequencies instead of connection for failover. In many applications, it is
wired cables. Essentially, it is much like high-power pertinent to consider the value of using hardware
WiFi, but it does not have the same risk as wired that is 5G ready. While 5G standalone (5G SA) is
connections and it also supports greater still in development, the backward compatibility of
bandwidth. Enterprises and organizations that 4G LTE can be leveraged in 5G-ready routers.
have typically relied on wired solutions are looking Once 5G SA is available, there would be no need
more toward FWA as digitization grows and to replace hardware.
connectivity becomes a mission-critical
component. Fixed wireless access will give enterprises and
retailers a powerful approach to high bandwidth
FWA is also beneficial for those interested in IoT use cases. A great example is retail, particularly
reduced latency for tasks such as streaming video in the restaurant industry. Leveraging connected
for training purposes in local retail establishments devices for ordering and point of sale is likely to
or data localization for improved Quality of increase, partially due to the convenience but also
Experience (QoE). as a means of mitigating workforce challenges.
Online ordering and integration into third-party
Smart cities, homes, buildings, and universities are delivery applications, offering on-site wireless
top use cases for FWA, in addition to retail. But connectivity, and connected appliances are other
FWA can also help mitigate traditional challenges elements in such use case that would demand
like digital deserts, where access to wireless greater bandwidth, and more reliable, than what
broadband has been lacking, and thus providing traditional wireless broadband can offer.
high-speed internet.

18 | www.korewireless.com
Smart Living specific niche markets (with unique content
offerings), they are thereby distinguishing
With the rise of city-based living, IoT solutions can
themselves from MNOs. Launching a mobile
help consumers and businesses navigate in a way
virtual network should not be complicated and
that goes beyond voice-enabled assistants and
customers are now looking toward those fully
smart locks to address sustainability. For the EU,
managed offerings, where they can build their own
specifically, there has been discussion regarding
propositions and offer tailormade connectivity
EV charging stations and ways to make cleaner
services by creating their own rate plans and
fuels more widely available. There has also been a
roaming footprint. The overall goal is to launch
distinct movement from basic telematics to
mobile brands to the marketplace with minimum
connected video technology to boost fleet safety
upfront investment so they can focus on running
and efficiency. In-vehicle video solutions can
their business.
provide near real-time alerts for driver distractions,
unsafe road conditions, and vehicle status –
allowing fleet operators to act quickly in a move
toward an ultimate reduction of risk. With each of Leveraging iSIM
these smart living advancements, the need for While traditional and eSIM modules will remain a
high-speed, IoT-specific network connections popular choice, iSIM will rise an attractive option
grows. Especially as solutions scale and deploy in due to its small size.
more locations, there’s an increased need for
carrier flexibility and improved coverage. These Integrated SIM (iSIM) incorporates the SIM
applications of IoT where LPWA technologies will operating system into the cellular chipset, also
be highly useful. known as system-on-chip (SoC) design. This
technology will be well utilized in low-power use
cases, and it also creates a space saver in hardware
since there is no need for a physical chip or tray for
The Resurgence of MVNE Mobile Virtual
a SIM within the device. Power savings will occur,
Network Enabler (MVNE)
as well, since the device will not have to power a
Service offerings are nothing new, but as mobile separate SIM card. The iSIM technology carries
cellular connections continue to rise worldwide, very similar benefits to eSIM and builds on eUICC
Mobile Virtual Network Operators (MVNOs) have functionality. It can be provisioned automatically
started to challenge traditional MNOs. They are and over-the-air, which makes it a global,
doing this by providing SIM-only mobile future-proofed cellular connectivity option.
subscriptions to consumers seeking alternative
mobile plans. As well as looking to address
www.korewireless.com | 19
Edge Computing Hardware: This infrastructure includes servers,
routers, end devices, and other physical
Multi-access edge compute (MEC) is the standard
infrastructure that resides in a data center.
architecture for edge computing and it isn’t
synonymous with edge computing. Edge
Physical location: This is where the edge
computing is more of a broad concept, while MEC
computing physical infrastructure is placed,
is the infrastructure. According to ETSI, a
whether it’s the telco site, the telco tower center,
European Standards Organization that has worked
or the network premise.
to define global MEC standards, its MEC
standardization initiative has been developed to,
essentially, create a common thread between
telcos, cloud service providers, and the IT world.
MEC, ETSI states, allows application developers
and content providers an approach to cloud
computing and IT services at the network edge.
Through MEC, MNOs can open their Radio Access
Network (RAN) on the edge, allowing developers
to create edge applications and services.

The Edge Stack


The edge is comprised of many different
components that are necessary for creating overall
value. It’s important to understand the overall
infrastructure of the edge stack in order to make
the best decisions in creating deployments.

Generally speaking, the edge is created of:


Services and applications: The topmost layer of Use cases for MEC, as identified by ETSI, include:
the stack is the end user application that delivers
the benefits of edge computing. Application • V2X
development: This layer involves the network • Video analytics
functions, APIs, and application software that • Location services
power the end user applications. IoT/enablement
• Optimized local content distribution
platform: The IoT enablement and computing
platform is the center where applications are • IoT
hosted and run, which includes the virtualization • Augmented reality
layer. This very crucial component of the
technology stack is what drives the significant
value of edge computing solutions and needs to
be nimble and flexible to allow for greater
management and scalability.

20 | www.korewireless.com
2024 Top of Mind Questions What does cloud native mean and how does it
relate to IoT?
The Cloud Native Computing Foundation defines
Why is the adoption of NB-IoT slower than other
cloud native as tools and applications that
LPWA technologies?
empower organizations to build and run scalable
NB-IoT adoption was sluggish since its launch in applications in public, private, and hybrid clouds12.
2017 alongside LTE-M and then with other Essentially, software development can be
competing technologies in LoRaWAN and Sigfox. accomplished faster and at greater scale when the
The issue lies in network operators not wanting to applications are cloud native. A few other key
deploy vast networks without high demand, yet benefits include cost efficiency, a great
device manufacturers not wanting to roll out vendor-agnostic approach to cloud services, as well
massive quantities of NB-IoT enabled devices as automation and flexibility such as agile workflow
without the proper network support. The benefits of and DevOps culture.
the technology were not diluted, it was just a matter
of investment in terms of MNOs and OEMs.
What is the Internet of Everything?
However, NB-IoT is catching up, with IoT Analytics
reporting a 2022 growth of 61 percent The nomenclature for IoT has progressively
year-over-year11 for the LPWA technology. changed over the years, with the earliest name
being Machine-to-Machine, or M2M. The Internet
of Things was coined by Proctor & Gamble
How important is the integration of the IoT in the computer scientist Kevin Ashton when proposing
cloud to manage data? the use of RFID for asset tracking in the supply
The integration of IoT devices with cloud platforms chain. The Internet of Everything is likely a new
is essential for efficient data management. Cloud iteration as the technology proliferates and more
platforms offer scalable storage, advanced analytics and more devices are connected in life and
capabilities, and real-time processing of IoT data. business.
By leveraging cloud services, organizations can gain
actionable insights, enhance decision-making
Will iSIM overtake eSIM?
processes, and optimize operations. Key
In short, no. Both SIM options are incredibly similar
considerations include selecting the appropriate
and boast the same benefits of out-of-the-box,
cloud provider, ensuring data security and privacy,
global, and future-proofed connectivity. The key
and implementing robust data governance policies.
difference in iSIM, according to Kigen, is iSIM
supports system-on-a-chip (SoC) architecture,
Edge computing will complement cloud integration which allows for less real estate occupied by the
by processing data closer to the source, reducing SIM card13. A great use case for this would be
latency and bandwidth usage. This hybrid approach wearable devices – the less room there is on the
will enable more efficient and responsive IoT physical device, the less space there is for a SIM
systems. Moreover, advancements in AI and card.
machine learning will enhance cloud-based
analytics, providing deeper insights and predictive
capabilities. Cloud-native IoT platforms that offer
seamless integration with various IoT devices and
protocols will become the norm, simplifying
deployment and management.
www.korewireless.com | 21
How important are local downloadable profiles locations, or both, bringing those new devices
to eSIM? online is simple when done in bulk.
Local downloadable profiles, in addition to
zero-touch provisioning, is a major differentiator in a The ability to have a single SKU that can be
true eUICC eSIM and a Multi-IMSI solution. provisioned to specific carriers also helps provide
Multi-IMSI can hold multiple carrier profiles and it is significant flexibility in logistics management both
more of a failover solution if the connection in an in ordering, shipping, and receiving.
area is poor. An eUICC eSIM allows you to connect
to the local profile and download it, rather than just What is ZigBee protocol for IoT?
be stored. This is an extremely key feature that
ZigBee is a low power consuming IEEE 802.15.4
makes it possible to achieve global connectivity.
(2003) standard-based specification, and the
brainchild of 16 automation companies. What
What is zero-touch provisioning for eSIM? makes it novel is the use of mesh networking,
One of the key benefits of eSIM is its flexibility, and which makes utilization of communication
that comes in several forms when considering eSIM resources much more efficient. ZigBee-based IoT
for enterprises. The first major capability of eSIM nodes can connect to the central controller making
for enterprises in relation to flexibility is zero-touch use of in-between nodes for propagating the data.
provisioning. Zero-touch provisioning allows for It makes both the transmission and handling of
eSIM to be activated with the touch of a single data robust.
button. For thousands of devices deployed across
a widespread geography, this can streamline the
process significantly.

Turn to KORE for Navigating IoT Tech and Trends


The same over-the-air (OTA) provisioning allows
for carrier changes to take place remotely. If a
thousand devices in Germany need to switch KORE is the global pure-play IoT hyperscaler and
network operators, then an engineer in the United provider of Connectivity, Solutions, and Analytics
States can manage that remotely in a matter of across key industries to make it simple to deploy,
minutes. manage, and scale IoT. Whether you need
pre-configured or custom-built solutions that involve
The key in these situations, as well, is the ability to hardware, connectivity, platforms, data telemetry,
auto-provision in bulk. When it comes time to KORE can help.
scale operations with more devices, or more
Want to learn more? Reach out, we’d love to talk!

Sources:
1
https://www.gsma.com/mobileeconomy/wp-content/uploads/2023/03/270223-The-Mobile-Economy-2023.pdf
2
https://www.rcrwireless.com/20230426/internet-of-things-4/nb-iot-and-lorawan-leave-rivals-for-dust-as-lpwa-iot-jumps-23-per-year
3
https://www.gsma.com/iot/mobile-iot/
4
https://www.rcrwireless.com/20220928/5g/almost-900-organizations-deploy-lte-5g-private-networks-gsa
5
https://www.gsma.com/futurenetworks/wp-content/uploads/2018/04/Road-to-5G-Introduction-and-Migration_FINAL.pdf
6
https://www.gsma.com/iot/mobile-iot-commercial-launches/
7
https://www.gsma.com/iot/wp-content/uploads/2022/03/MWC22-eSIM-Summit-Master.pdf
8
https://unit42.paloaltonetworks.com/iot-threat-report-2020/
9
Transforma Insights, Who’s Winning the Race to Become a Hyperscale IoT Connectivity Provider
10
https://www.rcrwireless.com/20211006/5g/top-3-hyperscalers-and-how-they-are-impacting-5g
11
https://iot-analytics.com/number-connected-iot-devices/
12
https://www.cncf.io/
13
https://kigen.com/resources/blog/sim-esim-isim-whats-the-difference/

22 | www.korewireless.com

You might also like