An arduino and some leds connected to a breadboard

Key considerations for IoT sensor devices: 5 – Industrial deployment readiness

Executive Summary:

  • Hardware prototypes are far from deployment-ready
  • IoT sensor productization is an often overlooked, complex, specialized task that drastically impacts time-to-market and cost
  • “Hardware is hard” is not a cliché, especially for highly reliable industrial applications

Details:

As mentioned above, there is a significant challenge going from a well working application prototype to a product ready for real-life field deployments in terms of the required level of effort, specialized skillset, as well as development time and cost. What might work well in climate-controlled lab environment may behave erratically or unreliably under stressed environmental conditions where an industrial device is expected to operate reliably over the course of many years.

Oftentimes, productization aspect is an afterthought, despite being one of the most important factors deciding between a product’s success or failure. Without relevant experience to rely on, many customers fall into a trap of thinking that having their secret sauce firmware ported into an IC vendor’s evaluation board (EVM) is all it takes to create a product ready for deployment. What they don’t realize is that even though the EVMs they use often high quality and sometimes low cost, IC manufactures won’t sell them in any quantities larger than a few units to a single end customer and frequently have legal restrictions in fine print that these EVM’s are only for IC evaluation and product development, forbidden to be used as actual products. Another widely popular prototyping platform are Arduinos. While Arduinos have no legal restrictions as above, they are not reliable industrial grade products designed for industrial environments nor optimized for low power consumption. These solutions are great starting points on a long and arduous road to real industrial product development that may cost upwards of $100K and many months to finish-line. In particular, use of RF circuits, which are required for wireless communication, adds major productization complexity, schedule delays, as well as additional high development and regulatory compliance costs. There is a saying in the industry that “hardware is hard” – these are some of the reasons.

Arduino telemetry

This is typically what prototyping looks like – far from production readiness

AT&T 2G/3G Sunset Timeline

2G/3G Sunset

Our friends at Multitech remind us about impending 2G/3G sunset with the US carriers.

Replacing the cellular-based sensor infrastructure takes time and good planning. Don’t be caught off-guard.

LoRa is a proven, low-cost alternative to LTE, especially for Smart Ag applications. Zenseio has had LoRa sensor solutions deployed on fields for the last year, and customers are happy to dramatically reduce their recurring connectivity costs.

If interested, drop us a line.

Roman Staszewski delivering a speech at the Collide Village Hackathon

IoT Hacking for a Greater Good and Profit

What will happen when you lock a bunch of hackers, entrepreneurs, and mentors into a room for two full weekends, give them powerful tools, dangle a valuable prize, and ask them to come up with an idea for an industrial IoT product? This was an experiment masterminded by my dear friend from college days, Tahir Hussain, who heads a tech accelerator – Collide Village in the Dallas metroplex. And, it was executed just recently.

On a fall afternoon last year, Tahir told me about his hackathon idea and asked me to provide mentorship as well as to sponsor Zenseio IoT hardware for the event. He was lining up the leading IoT companies as partners and successful local businessmen/entrepreneurs as mentors. It sounded like an interesting idea, so I jumped on it without hesitation.

The time commitment for everyone involved was significant. Participants, mentors, and organizers had to sacrifice their two full weekends. This attracted only the most driven, hardcore participants and filtered out just the curious ones. Still, over 120 participants signed up at the “Collidathon” and great majority survived to the finish line.

Lots of ideas flowed freely, and teams quickly formed around the most promising ones. The ideas were rough diamonds in disguise that needed to be shaped, polished, and validated.

Participants eagerly started working on business plans and prototypes. The IoT tools that were available for prototyping were Zenseio IoT devices, STMicroelectronics dev kits, Intel Edison dev kit, Senet LoRaWAN network, Microsoft Azure Analytics, and Ericsson Blockchain.

I was happy to see that the majority of teams picked Zenseio LoRa devices and it all went went very smoothly. In no time, everyone signed up for Senet account, configured Zenseio devices, and was streaming live sensor data to the cloud – Microsoft Azure or myDevices Cayenne. Many teams went way beyond expectations and started modifying hardware and firmware to add their own custom sensors.

What has traditionally been hard about hardware was actually the easiest step here. This afforded the aspiring entrepreneurs more time to focus on the core product concepts, business and application development. As some applications were using GPS for localization or asset tracking, they were able to immediately run outdoor pilots and to remotely collect reliable data with the Zenseio devices, without dangling wires as typical with Arduino and other prototyping dev kits.

At the end, the rough ideas were turned into actionable business plans and demonstrated with the functional full end-to-end prototypes. It was amazing to see what was accomplished in such a short time. And, the IoT applications that were championed strived to make the world a better place. Some examples using Zenseio devices:

  • Using environmental sensors to learn about daily patterns of elderly folks living alone and to provide immediate notification to caregivers in case of unexpected events or emergencies
  • Turn the trash in “smart” commercial dumpsters into monetized “gold”, using sensors and blockchain
  • Gamify recycling and proper trash disposal into “smart” bins to make the planet greener
  • Provide easy localization guidance for emergency responders to quickly find victims in case of emergency

The Collidathon turned out to be a success. While it was a close race, three teams won cash and an invitation to the Collide Village incubation program, totaling $20K.

For me, personally, I gained a few friends and valuable connections, and I was glad to see that Zenseio devices made very easy and quick for entrepreneurs to prototype and pilot their IoT ideas. There is nothing more inspiring than a complex IoT ecosystem of products and participants working harmoniously to address human challenges and striving to make the world a better place.

And, by the way, for fun, we also celebrated the Chinese New Year of Rooster on Saturday night at the annual “Different Approaches” party hosted by Mike and Quyen Courtney, featuring a live rooster 🙂

Tags:HACKATHON

Closeup of a Volkswagen symbol on a cars front grille

IoT Security and 100 Million of Volkswagens

Researchers just published a startling discovery we’d never want to read about. It turns out that 100 Million Volkswagen vehicles sold since 1995 can be relatively easily hacked to open doors wirelessly without having the key.

It turns out 100 million vehicles used only a handful of private shared keys. Once a single private key is breached, millions of vehicles are compromised. The way cryptography based on Pre-Shared Key (PSK) works is that two devices (a vehicle and a key fob, in this case) share a secure private key that was programmed at a factory or at a dealership. This private cryptographic key, along with a rolling code are used for encrypted wireless transmission of authenticated commands to open/close doors.

With enough compute power, pretty much any secure communication can be cracked with brute force attack. But, in many cases, this may not be practical. The older VW Remote Keyless Entry (RKE) systems were trivial to crack, but the latest schemes ones are more robust. However, another, easier attack, is to snoop the memories of vehicle’s electronics for the private keys. This is what happened here. The secret keys were not so securely stored, and they were read out from the vehicle microcontrollers by people skilled at this. Normally, only one vehicle would be compromised (and only after hackers broke into the vehicle’s interior, in the first place). But, whether by ignorance, laziness, or mindless “cost-cutting”, 100 millions of vehicles and their key fobs were programmed with just a few common secret keys used worldwide over decades. So, once one vehicle got hacked, millions of others were compromised. Oops, another of Volkswagen’s expensive screwups. (To be fair, VW is not the only large corporation to suffer from such a security breach, but this one has been the most spectacular so far.)

IoT Security

So, how does this relate to security of IoT connected devices and sensors? Think of Volkswagens as IoT devices. Similar cryptography schemes are used to secure the communications between sensors and cloud services. While older obsolete cryptographic algorithms offer little protection to eavesdropping or spoofing, more advanced algorithms, such as AES-CCM are considered state-of-art for resource-constrained devices.

They use secret Pre-Shared Key along with another piece of information, called Initialization Vector (IV) are used for authentication and encryption of the information being transmitted. The IV is additionally incremented with a monotonic counter, so that the transmissions with the same payload data, always generate different encrypted messages. If there is enough secret key and IV bit length and randomness, this scheme can be very effective in resisting brute force hacking and spoofing attacks, especially for low-cost IoT devices that use low-power, long-range wireless communication.

But, these state-of-art cryptographic algorithms are only as good as the secrecy of the private keys, the design of the security system, and deployment methodologies being followed. Just like your credit cards are secure as long as you are careful whom you hand them to and how well you protect your wallet.

IoT security is a rightfully serious vulnerability today because, many times, it is designed and deployed by people who don’t understand the interplay of the technology nuances and the application’s  business risks. When cost pressures inevitably show up (these are supposed to be low cost devices, after all), wrong compromises are made. While there were many security breaches similar to the Volkswagen’s, and a few were as well publicized, my feeling is that the majority received little press and many more are the “ticking time-bombs” still waiting to happen.

Zenseio’s IoT device platform offers strong built-in security features. The private keys are uniquely and randomly generated for each device and stored in secure hardware crypto vault. After being written once, private keys can never be read back. Our devices will also prevent revealing of internal secrets through physical hacking or reverse-engineering, such as probing for voltage, temperature, frequency, light, or electromagnetic field signatures. Even if one of the devices is cracked with brute force cryptanalysis, others are unaffected. Additionally, as each device uses unique internal secrets for authentication of messages, spoofing attacks are also prevented.

Not every IoT application needs this high level of security. In fact, most applications are better served by less stringent key management schemes, but still using the state-of-art cryptography algorithms (which we support out-of-box) as they are easier to use and maintain. However, if your application needs ironclad security, we have built-in hardware features to deliver a hacker-resistant solution.

Sources:

https://www.wired.com/2016/08/oh-good-new-hack-can-unlock-100-million-volkswagens/
https://www.documentcloud.org/documents/3010178-Volkswagen-amp-HiTag2-Keyless-Entry-System.html#document/p1
Numerous clocks representing the passage and monitoring of time

IoT Epoch Time Disaster? Only Time Will Tell

Ever heard of the “epoch time”? I’m not talking here about  history periods or geology. Epoch time is simply a standardized time and date reference used in UNIX and many other computers. It defines time, measured in seconds, starting from January 1, 1970 epoch. This is based on an arbitrary, somewhat historical epoch, but, what matters is that it is a commonly followed standard.

Why is this important and what does it have to do with IoT? Many IoT sensor devices have to keep track of time, so when they collectdata readings from sensors, they time-stamp them. IoT devices may collect sensor data for hours, days or weeks before sending them to the Cloud for Big Data analytics. Time-stamping helps to precisely know when the data was measured, not when it was received by a Cloud server. This is very important if the data analytics is to be correct and accurate.

Many IoT devices use what is called Real Time Clock (RTC, for short) to keep track of time. It’s a very low power electronic circuit that counts pulses from an internal clock generator. These pulse counts are converted to seconds and, then, the seconds are counted. What is the count referenced to? A convenient epoch (and, sometimes, the only one possible) is the time of the device power up. But then, the time reference would vary greatly from one device to another. If one device was powered up a month ago and another one yesterday, they  would be both showing different timestamps for the data measured at the same time, say an hour ago. Exacerbating the problem, this time-stamp reference could never be relied upon in absolute terms since the devices could be powered up at arbitrary time. It’s only good for relative time-stamps.

So, this is where the epoch time can be helpful. It’s the standard that all Cloud servers already use. There are standard software libraries written to convert human readable time to epoch time. These libraries have been ported even to IoT devices and utilized to support the epoch time reference (provided they have a communication downlink to synchronize the time reference from the Cloud server, in the first place).

Looks peachy – so, what’s the problem? Well, the IoT devices are very resource constrained because of their low power and low cost requirements. They typically use 32-bit counters for keeping the epoch time. A 32-bit signed counter can hold up to 2^32 values. That is 2,147,483,647 seconds. A quick calculation shows that this seconds counter will overflow sometime on 19 January 2038 – about 21 years from now. For industrial IoT devices this is definitely within their active deployment lifespan. But until the time rolls around, few will worry about these device limitations.

What will happen is that the sensor data time-stamps suddenly wrap around to start from January 1, 1970. Remember “Y2K bug” deja-vu, anyone? Perhaps the Big Data analytics AI algorithms may get very confused about this and draw wrong decisions and cause massive damage. Or perhaps, the AI may be smart enough to figure out what’s wrong and readjust the timestamps without a hiccup. Only time will tell.

But, why risk it? There are solutions that can be used today, that make this epoch time overflow a non-issue.

At Zenseio, we specialize in robust, industrial IoT sensor devices. In our hardware platform, we pay attention to details big and small, so our customers don’t have to worry about them. We are quality freaks.

LoRaWAN Logo

Low Power, Wide Area Networking and its Advantages in Agriculture 

In the ever-evolving landscape of agriculture in 2024, the integration of Internet of Things (IoT) systems has become a key aspect of a successful operation. When deciding to implement IoT systems into an agricultural project, it is important to consider which networking solution is right for the application. Among the array of options, Low Power, Wide Area Networking (LPWAN) emerges as a frontrunner, offering many advantages that cater specifically to the agricultural space’s diverse needs. 

Longer Range for Rural Environments: 

One standout feature of LPWAN is its impressive range, making it an ideal choice for the expansive and often remote landscapes of gorw sites. With a effective range often spanning from 2 km to up to 20 km, LPWAN excels in providing connectivity even in a long distance environment. This extended reach ensures that agricultural operations covering vast areas can stay connected, facilitating efficient data transmission across fields large and small. 

Enhanced Connectivity in Challenging Terrain: 

IoT for agriculture often needs to be deployed in a diverse range of terrain, from dense forests to vast open fields. LPWAN’s ability to penetrate through obstacles and navigate irregular topographies makes it well-suited for such environments. This adaptability ensures that critical data can be transmitted reliably, even in the face of geographical features that would interfere with other methods of networking, providing farmers with a reliable real-time understanding of their land, often in areas that other technology cannot be effusively deployed. 

Low Power Consumption: 

When operational efficiency is paramount, as is the case with managing labor and natural resources, the low power consumption of LPWAN stands out as a key advantage. Unlike traditional networking solutions that may require frequent battery replacements or significant dedicated energy sources, LPWAN devices boast prolonged battery life, only turning on when transmitting, and only for exactly as long as needed. This directly translates to reduced maintenance efforts and costs, allowing farmers to focus on optimizing their processes without the constant concern of powering or replacing devices. 

Cost-Effectiveness: 

Implementing IoT solutions in agriculture can be a significant investment. LPWAN, with its cost-effective open-source infrastructure, presents an attractive option for farmers looking to enhance their operations without breaking the bank. The extended range of LPWAN also means fewer base stations are required to cover large areas, further contributing to the overall cost efficiency of adopting this technology. 

Diverse Applications: 

The adaptability of LPWAN technology is one of its primary strengths, enabling a range of applications in agriculture. From soil monitoring and crop management to depth sensing and smart irrigation systems, LPWAN provides a versatile platform for implementing a huge set of use cases from a single device. This versatility empowers farmers to tailor their use of LPWAN according to their specific needs, fostering innovation and efficiency across various aspects of agriculture and telemetry. 

As the agricultural industry continues to embrace the era of IoT, Low Power, Wide Area Networking emerges as a compelling choice, offering an extended range, adaptability to challenging terrains, low power consumption, cost-effectiveness, and a versatile platform for diverse applications. In a world where precision and real-time data are paramount, LPWAN stands as a testament to the potential synergy between technology and agriculture, helping usher in a new era of smart and connected farming. Zenseio produces versatile, open-source technology that is designed to allow a maximum level of flexibility while minimizing cost and power consumption. To learn more about how Zenseio can enhance your IoT, visit: https://zenseio.com.