YOU ARE AT:5GReader Forum: Connect, secure, monetize – building trust in IoT (Pt. 2)

Reader Forum: Connect, secure, monetize – building trust in IoT (Pt. 2)

Gemalto sees three key enablers of trust in order for the IoT economy to prosper

Big data, cloud computing, network virtualization, machine learning, telemetry and so on; all large fields with immense potential and boasting wide application in the “internet of things” world. But all this technical jargon – emanating from different industries – can risk overcomplicating our comprehension of the IoT. To understand IoT’s key enablers, it’s first essential to break it down into its basic components.

IoT assets

There are three key parts to building a connected application: the device (also known as an endpoint), the connectivity (network infrastructure) and the cloud. The endpoints come in various shapes and sizes, ranging from connected vehicles to smartwatches. Regardless, the true potential of a connected ecosystem can only be achieved if multiple endpoints are working in tandem or within a cloud infrastructure. To illustrate the point, imagine the data from many different vehicles’ tires sent to a cloud server, where it’s processed by the automaker or tire manufacturer to improve the tire performance or gain insights which could be used to enhance the future design of the tires. All this information could be exchanged over a cellular network.

gemalto

If you dissect these three parts, you can imagine each being a constituent of three core components: hardware, software and data. In another example, an endpoint, such as a smartwatch (hardware), would have some apps (software) on it, each producing some amount of data (calories, steps walked, call data, etc.).

Connectivity infrastructure uses routers (hardware) with some embedded operating system and applications (software), and data (routing tables, alerts etc.). The cloud is also built on hardware (servers), software (operating system, ERP applications, etc.) and loads of data. These components have to be understood to appreciate the true nature of IoT.

Key enablers of trust

With so many stakeholders, enabling trust is critical for the ecosystem to thrive. There are three key enablers for building trust in IoT:

Reliable connectivity
Connectivity is an inherent part of the internet. If an IoT asset needs to be connected to another, reliability is pivotal. From simple streaming of songs, to mission-critical cases like ECall, connectivity can make or break the behavior of a connected device. The right building blocks will help stakeholders ensure endpoints of different sizes can be reliably connected, while the quality of service can be monitored to enable reliable exchange of data between multiple endpoints, or an endpoint and the cloud.

Reliable security
Software and data is becoming increasingly crucial to our everyday lives. The potential of billions of connected endpoints also opens up new opportunities for cybercriminals. They will try to exploit the vulnerabilities in the different hardware, software and data assets, whether on the devices, in the cloud or over the network.

The security infrastructure in IoT requires a special focus on managing the lifecycle of security components. Numerous IoT devices – endpoints like vehicles, watches, health care devices, etc. – could either be on the move or be deployed in such remote areas that they cannot be easily serviced.

Whether it’s about managing endpoint identities, encryption keys, embedded software or data, a reliable and scalable security framework is pivotal to ensuring every stakeholder’s software, hardware and data assets are secured. Otherwise, there will be inevitable breaches, resulting in a trust deficit.

Agile monetization
Mostly overlooked because of the hype, an agile monetization framework is crucial for the IoT to thrive. The global nature of IoT is such that the assets used to set up a connected infrastructure could come from many different parts of the world. The endpoint could be manufactured in Taiwan, its embedded software developed in Bangalore, the cloud infrastructure in Silicon Valley and the service itself might eventually run in Germany.

How does each contributor ensure that its intellectual property (the IoT asset) is monetized? Where the product (an endpoint) is now being sold “as-a-service,” how do these individual contributors enable their own monetization as a service strategy?

Consider a satellite-based navigation device running in Germany. The company may sell its device on a pay-per-month model. But how do all those stakeholders in Taiwan, Bangalore or Silicon Valley implement their own flexible monetization models? In order for the ecosystem to thrive, each stakeholder needs to trust that it can see return on its investment – and this can only be implemented with a proper licensing and entitlement capability that helps protect individual contributions.

Haider Iqbal is segment marketing manager for IoT, On-Demand Connectivity and Personal Cloud at Gemalto. He is a tech enthusiast and generalist by nature, who loves finding synergies between different technologies, industries and business verticals. He’s on a life-long mission to drive change, drive a 4X4 and drive a golf ball.

Editor’s Note: In an attempt to broaden our interaction with our readers we have created this Reader Forum for those with something meaningful to say to the wireless industry. We want to keep this as open as possible, but we maintain some editorial control to keep it free of commercials or attacks. Please send along submissions for this section to our editors at: [email protected].

ABOUT AUTHOR

Reader Forum
Reader Forumhttps://www.rcrwireless.com
Submit Reader Forum articles to [email protected]. Articles submitted to RCR Wireless News become property of RCR Wireless News and will be subject to editorial review and copy edit. Posting of submitted Reader Forum articles shall be at RCR Wireless News sole discretion.