Device technologies and the IoT business
The IoT is a Service Application
Frans Frielink - Qorvo
The relevant IoT discussion is not so much about sensors or communication standards, it is about data collection, analytics and self-learning systems that can quantify life. Real IoT applications for the consumer are “things like” lifestyle coaches, home butlers, caretakers, etc. In other words, applications that produce value in our daily lives by providing more security, more comfort, less energy usage, and lower costs while bringing peace of mind. The goal of IoT is to help us all make better, more timely and informed decisions. This is how the IoT becomes a new source for wealth creation in our complex society and in our exciting lives.
IoT Growth Opportunities and Technology Fragmentation
Julian Watson - IHS Markit
IoT devices are proliferating and penetrating many different segments: from consumers and homes, to automotive, transport, lighting, power and energy, medical and many more. This presentation will consider what segments and applications will drive this growth over the next few years. Also up for discussion will be the rapidly evolving IoT technology landscape: the impact of the low power wide area networking (LPWAN) challengers like LoRA and SGFOX, the new 3GPP LPWAN standards Cat-M1, Cat-M2, and EC-GSM and the potential role of 5G in the Internet of Things.
Securing IoT Implementations – How Well Are Your Devices Protected?
James Murphy - IBM Watson
Securing connected systems is a never ending task. It’s a constant struggle to ensure that solutions which involved network connected systems are prevented from attack.
Further, with the understanding that everything can experience an attack and have a vulnerability, detecting, responding, and recovering from attacks is just as important. The IBM Watson IoT Platform has new features to support increased attention to security to help prevent and detect incidents.
We will discuss the existing and emerging capabilities from IBM which we are both building into our IoT platform as well as the solutions built on top of that platform. Security features address the full spectrum of designing, building, deploying, and operating IoT solutions. Both well-established and new technologies such as blockchain-based collaboration are part of these security capabilities.
Unleashing 3GPP's NB-IoT Full Market Potential - Opening Up New Application Domains
Matthias Weiss - Commsolid
Wallets, drilling machines or smart suit cases exchanging data via the Internet? A vision that may soon become reality based on the 3GPP NB-IoT Release 13 standard. It provides the basis for revolutionary IoT applications and a variety of innovative platform solutions enabling rapid development, secure data handling, and efficient data analytics, thus unleashing IoT's full potential. This presentation provides an overview of the associated IoT market, new applications requiring low power wide area solutions and the features NB-IoT offers to these markets. Based on this an outlook of the planned 3GPP Release 14 activities is given, which will further enrich the NB-IoT technology and widen opportunities allowing the cellular IoT market to scale.
IoT Communications - Barriers to Achieving 50 Billion IoT Devices
William Webb - Weightless SIG
Many have predicted 50 billion IoT connections - and at 10 devices per person that sounds entirely plausible. But current volumes are in handfuls of billions and analysts are scaling back forecasts. What has gone wrong? Partly the problem is a lack of a clear connectivity standard that silicon vendors can invest in and device manufacturers can embed in products with certainty of connection. In today's fragmented world of multiple proprietary solutions getting to such a standard seems unlikely and yet history tells us that it will happen. This talk explores how we can accelerate that process to the benefit of all.
IoT Diversity - The billion device 'niche'
All Programmable Technology in the Industrial IoT - Precise, Predictive, and Connected
Dan Isaacs - Xilinx
The Industrial Internet of Things (IIoT) is driving the fourth wave of the industrial revolution that is dramatically altering manufacturing, energy, transportation, cities, medical, and other industrial sectors.
The IIoT enables companies to collect, aggregate, and analyze data for actionable insight to maximize the efficiency of machines and improve overall productivity. This presentation will provide an overview of the Industrial IoT and how programmable technology is a driving force enabling key industrial sectors. Emphasis will be on the use and the differentiating advantages all programmable technology provides from edge to the cloud including discussion on real-time command and control, sensor fusion, predictive analytics and machine learning and the extensive ecosystem. Reflective of the diversity of IIoT, an overview of real world applications and customer use cases will be covered including motion control, machine vision, predictive maintenance, smart energy/grid operation, precision control, big data analytics and functional safety with secure connectivity.
Industrial IoT Requires Fit-For-Purpose Connectivity
Richard Kinder - Wirepas
• The diversity of IoT applications and their requirements, introduces a paradigm shift for connectivity solutions. The ability to flexibly optimize the connectivity solution to the needs of the customer’s business case and application is crucial to the development and growth of IoT based business.
• De-centralized, autonomous device networks enable fast and efficient deployment of large-scale industrial IoT and Smart City applications.
• Case examples of the benefits of the de-centralized network architecture – New business models enable new ways of working and new services.
Thin and Flexible Sensor Patches for Remote Care of Elderly Patients
Markku Ellilä - Enfucell Oy
Why should wearable devices in healthcare be powered by thin and flexible batteries? Is the location of a wearable device for health monitoring limited by user comfort due to bulky batteries? The speaker will go through some of the design criteria for skin-attached sensor patches that are currently in clinical trial phase, and share some findings from the practical use of such devices. A system-level description is also presented, in which the key technologies for the data transmission from the client's skin to a data repository and to user interfaces are accounted for. The linkage between a 24/7 remote care concept for elderly clients living at home, and the Enfucell SmartCare equipment is described from the perspective of the client, the care personnel, and of the family members.
IoT in Healthcare, From Reactive Data Gathering to Proactive Coaching
John Baekelmans - imec
The Internet of Things is entering the healthcare space. Where fitness trackers were typically used by consumers to better understand how they can improve their overall levels of fitness, we slowly start to see a shift to a more professional use of those wearable devices. Instead of reacting to our levels of fitness, imec believes that becoming more pro-active is the way forward and that wearable technologies are key with that transition.
In this session you will learn about the current state of wearable technologies within the healthcare space and about imec’s vision to become a leading enabler for that highly needed more pro-active approach.
Disruptive Approaches to Securing the IoT Ecosystem
Oscar Gámez - Lux Research
As connectivity permeates digital and physical aspects of personal and industrial space, it creates weaknesses and attack surfaces for malicious actors. In this presentation, Oscar will share Lux Research’s proprietary framework for understanding IoT security, which enables a sharper classification of the different measures aimed at protecting the cyberphysical space. Using this framework, he will further outline the challenges that IoT security offerings have to solve to successfully enter the market. Finally, Oscar will draw from Lux Research’s primary research-driven start-up database to illustrate case studies of innovative companies seeking to protect the IoT ecosystem.
An Intuitive and Trusted Connected World
Frank Pasveer - imec
The IoT is radically changing how people interact with their surrounding environment and it is revolutionizing the industry with a new generation of processes, services and products. However, to address the challenges of a deployment of billions of devices, the IoT needs to be an intuitive and at the same time trusted environment. In this presentation we show from an application perspective the challenge of combining intuitive use and control with security and trust. Having many users in a shared environment of devices and networks, makes separation of services, devices and people key to building an intuitive and secure IoT system. Using proximity can bring value in many ways to such an distributed IoT environment as will be presented. Proximity and context-awareness will be used for unique identification and customized services to the right user, at the right place and at the right moment, based on a lightweight solution for secure location awareness of small sensor nodes.
Breaking Barriers: How Can We Establish Ubiquitous Exchange of Information Between Devices of Different Domains
François Ennesser - oneM2M
Ubiquitous exchange of information between devices of different domains is an IoT promise that can only be realized by cross-sector standardization of data model and semantic information, and interoperability standards that support the strong security needed to protect internet-connected systems whose compromise may affect human safety. This requires breaking barriers between traditional sector focused standard bodies and promoting adoption of a single global standard across different industries.
Developing the Supply Chain of Trust for a Secure IoT
Haydn Povey - Secure Thingz
The IoT has huge security issues as seen with recent targeted attacks against smart industry, smart industry and smart home devices. The solution to this pandemic of attacks is to ensure secure foundations within devices, leveraging next generation architectures to deliver to deliver a secure solution that encompasses the entire supply chain, from OEM through manufacture to the end user lifecycle management.
This alignment of critical stakeholders is reshaping the industry to solve security issues around both application and anti-counterfeiting domains to enable the Supply Chain of Trust, based on strongly enforced cryptographic frameworks. These solutions are now enabling OEMs to securely outsource production to programming houses or contract manufacturers without surrendering control of their critical IP. It ensures that contractor services no longer must consume huge amounts of liability and auditing overhead, and delivers confidence to end users that the devices, sub-assemblies, and products they consume have a robust traceable provenance. These secure foundations enable OEMs to deliver extensive secure services, including lifecycle management and update within a secure and distributed framework.
Secure Key Provisioning for the IoT
Geert-Jan Schrijen - Intrinsic-ID
The Internet-of-Things will connect billions of stand-alone devices that are often embedded in sensitive or even critical systems. Since these systems will take decisions autonomously, methods for securing devices and their data flows need to be put in place. For example, a device in the field needs to be able to authenticate and setup secure channels to other devices it is communicating with.
In order to provide a basis for security, every device needs an embedded security subsystem that is bootstrapped with a set of cryptographic root keys. Existing key storage methods are not suitable for programming device-unique root keys into a wide variety of chips on a large scale as they lead to undesirable liabilities, increased costs or inadequate security. These problems can be resolved by using SRAM Physical Unclonable Function (PUF) technology, enabling every chip to generate its own cryptographic root keys. This removes the barriers for securing a broad range of IoT devices and builds the foundation for an IoT we can trust.
The Need for a Hardware Root of Trust in Endpoint Devices
Chris Torr - Multos
Thanks to some high profile examples of “IoT gone bad” the debate around the security of the IoT is thankfully now gathering pace. The fundamentals around securing the IoT are nothing new and many of the issues have already been solved in the worlds of payment, ID and mobile communications. In all these already ubiquitous scenarios, devices in openly hostile environments are already protected from tampering, are able to mutually authenticate on a network, can encrypt communications and be securely, remotely provisioned and updated. The presentation will discuss how these technologies, proven over twenty years, can help to secure IoT devices of all shapes and sizes and explain why they are needed when so many other options exist.
The Impact of IoT on the Sensor Market
Richard Dixon - IHS Markit
Sensors are often presented as the backbone of IoT. This presentation will examine how IoT impacts the demand for sensors. Which application fields and which use cases will drive a large deployment of sensors? In which application on the other hand is IoT leveraging existing sensors? IHS will show examples of successful applications were connected sensors provide clear return on investment e.g. savings on energy and lighting bills in smart buildings. IHS will also show emerging applications of connected sensors in smart manufacturing for predictive maintenance, increased productivity and safety. Finally IHS will describe the ecosystem sensor suppliers are part of and how they can be successful navigating this complex chain.
Generating Value from the Internet of Things (IoT)
Danny Hughes - VersaSense
The IoT will generate billions of euros of revenue over the next five years across a wide variety of application domains including; factory monitoring, precision agriculture and the smart home. The key question facing industry is how to effectively capture a share of this value, while minimising the attendant costs and risks. This presentation will provide context on IoT technologies for sensing and actuation and a technical perspective on how industry can get to grips with the IoT using reliable, secure and standards-based technologies. The presentation will conclude with a live demonstration of MicroPnP, the world's first truly plug and play system for wireless sensing and actuation. MicroPnP offers extreme high reliability and a battery lifetime of up to 10 years.
3C-SiC Based Sensors For Harsh Environments
Gerard Colston - Advanced EPI Materials & Devices
Sensing is a vital part of increasing efficiency and ensuring safety across many sectors including automotive, industrial, aerospace, environmental and biomedical sensing. Silicon (Si) is one of the predominant materials used in microelectromechanical (MEMS) and sensing devices due to its broad functionality and economics of scale. However, Si based devices are limited to operating temperature of up to ~200 °C and can easily be damaged by the effects of radiation or chemical attack. A solution to these issues is to heavily package the Si devices to protect the active parts, however, this makes final products bulky and expensive. Alternative materials can include ceramics which can operate at significantly higher temperatures but are affected by chemical poisoning and suffer in thermal or mechanical shocks.
Silicon carbide (SiC) is a wide bandgap semiconductor with properties similar to diamond and is resistant to radiation and all chemical etchants in ambient environment. SiC based devices can also operate up to temperature of 600 °C and beyond. With their novel cubic silicon carbide growth process, Advanced Epi is developing a range of SiC based sensors suitable for low-cost mass production using current Si based fabrication processes. These sensors will be suitable for a variety of applications such as temperature, pressure, air flow or UV sensing in harsh and demanding applications.
Configurability is the Key to IoT Innovation and Profitability
Mike Noonen - Silego Technology
IoT is driving the electronics industry. However, unlike previous market drivers, IoT is not one product that sells 100 million units but 1000s devices with a myriad of sensors, connectivity, power supplies and sensors hubs combinations. This presentation will show how configurability through anti-fuse non-volatile memory can economically address this diversity. Several examples of Configurable Mixed-signal ICs will show how IoT products can be developed faster, with lower cost, more integration and with lower power than with traditional discrete, standard products or full custom designs. In addition, Configurable Mixed-signal IC with Asynchronous State Machines also have inherent security and performance advantages over existing MCU-based sensor hubs.
Presentation title to be confirmed.
A Novel Approach To How The World Senses: Highly Sensitive, Real-time Response, Light-weight And Flexible Sensor Systems
Ulrich Herleb - Brewer Science
In this presentation, we will introduce a set of newly developed flexible sensors and some of their applications.
The number of connected sensors in the IoT world is projected to grow rapidly in the coming years. For many future applications, sensing devices must be ultralow power, flexible, lightweight, and printable on a variety of substrates and in different form factors. Applications range from medical devices, gaming, wearables, and industrial monitoring. Brewer Science, a global technology leader, has developed a suite of innovative sensors with a unique set of features that will be discussed in this presentation.
IoT Device - level research, development, manufacturing and supply chain
Building High-performing Supplier Relationships
If anything, the supply chain is even more important in the IoT than for other industries. This is because every aspect of the supply chain must maximise productivity and economy to enable interconnected devices at a competitive cost. Achieving economy of scale is a critical roadblock to mass IoT adoption, and a strong supply chain with high performing supplier relationships is clearly part of the solution. So what does a strong supply chain look like? A high-performing supply chain involves careful selection and planning. The depth of each relationship and engagement must be tailored to the specific business situation, with each partner sharing a mutual trust and respect, and in turn equal risk and reward. This presentation will examine the infrastructure of today’s supply chain, different relationship types, and the key factors in managing successful relationships, including best practices and example case studies.
Towards a Truly Comprehensive Internet of Things
Jurgen Sturm - The Alliance for Internet of Things Innovation
The growth potential of IoT is undisputed – in theory. However, what needs concretely to be done to create the right legal, economic , social, scientific and technical framework in Europe and worldwide? The members of the Alliance for Internet of Things innovation (AIOTI) have embedded these fundamental questions in their raison d’etre since its creation in 2015. The creation of new and innovative ecosystems that cut across existing vertical applications is a prerequisite to define such framework. Only if all stakeholders whose current realities are touched by the technological developments around IoT are adequately involved in the debate, the vision of the hyperconnected world can become true. In this context, the presentation will highlight which socio-economic, legal and political questions need to be addressed to ensure that IoT can develop to its full potential.
Semiconductor ASIC, catalyst of Internet of Things adoption
Cedric Mayor - Presto Engineering
Designers developing products for the Internet of Things (IoT) must struggle to meet cost targets and wrestle with the hardware supply chain in their attempts to achieve an average selling price (ASP) low enough succeed in the market. While the valuation of services and game-changing reshuffling of the value chain are certainly driven by data mining and solid analysis, device connectivity must, ultimately, be enabled by chipsets and modules, like today’s machine-to-machine (M2M) communications. Defining a cost-effective hardware solution is only the tip of the iceberg, leaving difficult questions about maintaining security and differentiating intellectual property, while preserving interoperability yet to be answered.
The semiconductor supply chain and application specific integrated circuit (ASIC) flow can certainly provide today’s IoT connectivity at less than $5 (USD) per node. We will discuss briefly the approaches to select the best silicon and packaging technologies, which are key enablers for an IoT strategy based on resilience of secured hardware, low power radio connection, and cost-effective ASIC manufacturing with short-term pay back.