News

A lot of things goining on in the IQRF Alliance.
Browse through the news to learn more.

IQRF OS 4.0 online webinar records and PDF presentation

31 March 2017

On the occasion of releasing the IQRF OS 4.0, we have organized an online webinar, in which participants learnt all the new features of the new version of the operating system.

We have prepared a record of webinars in English and Czech. To stay up-to-date, subscribe the IQRF Youtube channel where you can get notifications about the newest videos regarding to the IQRF wireless technology.

 

PDF presentation

 

English:

 

Czech:

IQRF OS 4.0 webinar

29 March 2017

Register for a webinar to learn all about new features in the IQRF OS 4.0. The update is focused on the security to protect your network running on the IQRF wireless technology.

Skype CZ - 10:00 - 11:30 - https://meet.lync.com/iqrf/iqrfalliance/5XHHWXXQ

Skype EN - 13:00 - 14:30 - https://meet.lync.com/iqrf/iqrfalliance/26JCHO26

 

 

The webinar will touch all new features in the IQRF OS 4.0. The update is mainly focused on the security features such as AES-128 encryption, multilayer security, randomly generated passwords and user keys.

Devices in the Internet of Things are in danger nowadays because there are thousands of new threats created (malware, malicious codes, etc.) every day. Therefore, the new operating system IQRF 4.0 brings ultimate security to IQRF networks.

Security of the IQRF OS 4.0 is based on three different protection layers which are built on AES-128 encryption. The first layer is access encryption used for bonding, CATS services, network backup and restore. The second and third layers are networking encryption and user encryption. Networking encryption is based on TR transceivers equipped with 192 b long unique fully random password individually generated at the factory. IQRF OS minimizes the risk of weak password or key by generating random passwords and keys for communication inside the network.

Learn about all those security features and other features of new operating system.

 

Register to get more information and link to webinar.

 

When

CZ language - 30th March, 2017 - 10:00 to 11:30

- - -

 

EN language - 30th March, 2017 - 13:00 to 14:30

- - -

Ultimate security of wireless networks is coming with the new IQRF OS v4.00

23 March 2017

The brand new concept of “Interoperable - Simple - Secure” solution of the IQRF technology, a Wireless Platform for IoT, was presented in the end of the 2016. Now, it is being fulfilled by new versions of the OS v4.00 and the DPA protocol v3.00 bringing higher safety of wireless communication, security of transferred data and higher comfort for users. Interoperability of the whole IQRF Ecosystem is being presented via solutions and IoT applications by the IQRF Alliance members on a daily basis.

"Every wireless system is exposed to potential OTA attacks. But IQRF OS v4.00 brings ultimate security based on industrial standards. Security in IQRF does not mean just an encryption but a complex approach to avoid potential vulnerabilities," explained CEO of MICRORISC, inventor of the IQRF technology, Dr. Vladimir Sulc. This complex approach consists of packets consistency checking, three levels of AES-128 encryption, and dynamic passwords and keys generation.

 

Packets consistency checking

Security starts at basic trust to received data. To avoid transmission errors and process valid data only, IQRF strictly checks all received packets against bit error failures using several block checksums. Additionally, complete packet is protected by standard IBM CRC-16.

 

Encryption

Sensitive data should be hidden for unauthorized users and systems. Encryption is a way how to protect such sensitive data. IQRF utilizes AES-128 encryption, industrial standard for wireless communication. Besides hiding sensitive data, control data encryption increases consistency protection. There are three different protections based on AES-128 encryption.

  • Network communication protection

Protection of standard network communication is the most important as it continues during the whole system life. Protection is based on AES-128 encryption standard. Thus, only systems/users having valid network Password may join network communication and process data. To avoid wrong implementations all network communication has been forced to be encrypted automatically.

  • Unauthorized access protection

Only authorized devices may join the network and only authorized users may have maintenance access to network devices. As communication during bonding and maintenance is encrypted by AES-128, only authorized devices and users with valid access Password are able to join the network or to maintain network devices. Sensitive data, such as network Passwords, exchanged encrypted during bonding, are well protected.

  • User´s data protection

Besides protection of network communication there is an optional way to increase privacy by adding another encryption shield. It utilizes AES-128 and user Key defined by the user to protect sensitive user's data. This protection is fully under user's control and may be used to add extra network protection or to hide sensitive data even from the IQRF platform as shown in the schematics below.

 

Password and Keys manipulation

Keys compromising is very frequent source of security problems. Therefore IQRF minimized and protected also manipulation with keys - network and access keys are not known during physical manipulation as they are generated from respective passwords. Network password is generated randomly with high entropy. The encrypted password is provided to devices that are joining the network during bonding.

 

Future upgrades

Threats coming in the future from more powerful attacking tools and from discovered vulnerabilities should be fixed. All IQRF software layers enable upgrades to keep system secure.

Pic. no. 1: Scheme of the various levels of the IQRF wireless system protection

- - -

 

Further information:

 

IQRF technology selected features:

  • Ultimate security: based on industrial standards (AES-128)
  • Extra low power: < 100 nA standby, 15 µA receiving in XLP mode
  • Simple integration in a few weeks and simple control with DPA protocol (SPI, UART)
  • Sub-GHz ISM bands: 433 / 868 / 916 MHz
  • Range: 500 m with small PCB antenna
  • Easily connectable to Arduino, Raspberry Pi, chipKIT etc.

IQRF OS 4.0 technical information

21 March 2017

New IQRF OS 4.0 is going to be released on March 23rd and is focused mainly on security features.

Security

The new operating system IQRF 4.0 brings ultimate security to IQRF networks.

There are three different protections based on AES-128 implemented:

  • Access encryption

used for

    • bonding
    • CATS services
    • network backup and restore
  • Networking encryption
  • User encryption

Compromising of keys is very frequent source of security problems. Therefore, IQRF OS minimizes and protects also manipulation with keys – network and access keys are not known during physical manipulation as they are generated from respective passwords.

Access encryption

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.

All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.

 

- - -

 

Network encryption

AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.

User encryption

Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.

 

- - -

 

Other features and changes

  • Deep sleep for TR-76D modules
    • consumption < 100 nA
  • Longer RF range of LP/XLP mode
    • the same like for STD mode
  • Improved FRC
    • 1B FRC downloads data from 63 Nodes
    • 2B FRC downloads data from 31 Nodes
  • Device cloning canceled
    • just upload the appropriate HWP and access password to the transceiver and restore network information from the backup
  • DPA demo canceled
  • Coordinator/Node as a one device canceled
  • IQMESH examples removed from Startup Package
    • The only way for IQMESH is DPA.
  • Israel (IL) version of TR modules supported
  • Basic IQRF header file template-basic.h renamed to IQRF.h
  • OS 4.00D is not interoperable with OS 3.08D
  • User OS upgrade to version 4.00D is possible, downgrade back to OS 3.08D is not possible
  • IQRF IDE 4.40 and DPA 3.30 required


More on: www.iqrf.org

 

Ecryption in IQRF OS 4.0

17 March 2017

Security is the main feature in new IQRF OS 4.0 releasing March 23rd. To protect a network running on the IQRF wireless technology, there are various security features and improvements. One of those features is encryption.

IQRF OS 4.0 brings three different protection layers based on AES-128. It is – access encryption, networking encryption and user encryption. If you want to know more about those protection layers, read it here.

 

So, what other features in IQRF OS 4.0 are encrypted?

Network passwords are randomly generated with high entropy and delivered encrypted to devices during bonding process.

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding, CATS services and network backup and restore.

Networking encryption is the most important part of the whole process of network communication. Network communication is encrypted by OS itself and user don't have to care about it. Thus, every IQRF network is equally highly secured by default. Only systems with valid Network password are allowed to interact with network and individual devices. AES-128 encryption protocol with 16 B long keys is used together with proprietary Cipher Data Chaining algorithm.

User encryption is another option how to improve security of data transmission. This option is fully under user's control. The key, specified by user, is used. This key is unknown for OS to push security level even further. Data transferred inside of encrypted packets are furthermore encrypted by user's key. This makes readability of data impossible both for OS and anyone who doesn't know the user's key. User encryption/decryption can be performed outside TR e.g. in application itself, which ensures safety even beyond the network.

 

- - -

FOXON is a new member of the IQRF Alliance

17 March 2017

We would like to announce that another company joined the IQRF Alliance. The IQRF Alliance has expanded by Czech company FOXON.

FOXON offers products and services in an industrial automation area since 2006. The company has many external collaborators in addition to its own employees to ensure high quality and fast delivery of its products and services to the customers not only in Czech Republic or Slovakia, but also to Germany and other European countries.

The company FOXON offers proven components for industrial automation and third-party manufacturers such as control systems for SIEMENS. Battery CPUs for BOSH Rexroth, HITACHI or Panasonic, programming adapters for MITSUBISHI Electric, WAGO or Schneider Electric, etc.

We greatly appreciate FOXON's entry into the IQRF Alliance. We believe that both sides will benefit from this cooperation. The IQRF Alliance can offer better market coverage through its sales partners and FOXON will surely bring other members of the alliance interesting technical solutions.

 

- - -

Three security levels in new IQRF OS 4.0

16 March 2017

Currently, security in the area of IoT is a frequent topic of many discussions. Security is now more important than ever before. Our computers and smartphones are very vulnerable despite all kinds of advanced antivirus and security applications. But what about devices in the Internet of Things?

The Internet of Things is still a very young technology area that is not protected well yet. The company MICRORISC, author of the IQRF wireless technology, understands this and works on many ideas how to continually improve the security of its technology and devices built on it.

The next big update of the IQRF operating system, the IQRF OS 4.0 will be released on March 23rd and will be mainly focused on the security. The update will bring for example the AES-128 encryption protocol, which provides security at three different levels – access encryption, networking encryption and user encryption.

 

Access encryption

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.

All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.

 

Network encryption

AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.

 

User encryption

Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.

 

More news about IQRF OS 4.0 coming soon.

 

Online webinar - registration is running

CZ language - 30th March, 2017 - 10:00 to 11:30

EN language - 30th March, 2017 - 13:00 to 14:30

 

IQRF OS 4.0 security layers

The IQRF Alliance has a new member – Dazzle Light Europe

16 March 2017

We are very pleased to announce that the company Dazzle Light Europe decided to join the IQRF Alliance.

Dazzle Light Europe, Ltd. is a Bulgarian company, founded in the town of Sofia, in 2016. The company is focused on LED-lighting technologies, representing a fully complete business process - starting from design and engineering, trough the production and delivery of LED lighting products for public and industrial use.

Dazzle Light offers more than 20 models of LED lamps suitable for industrial and public areas. The company aims for efficiency and power and cost savings which can be achieved by implementing the IQRF wireless technology. The IQRF data transceivers can read various parameters (current, temperature, etc.) from the light and thus optimize lighting management.

The IQRF Alliance sees opportunities on both sides. Dazzle Light Europe will be able to provide customers with intelligent lighting solution based on the IQRF technology and the IQRF Alliance will be able to manage the cooperation between Dazzle Light and other members to ensure the most efficient way to bring high quality solutions on the market in the shortest possible time.

 

- - -

Visit two important IoT events in 8 days!

10 March 2017

IoT TechExpo - Europe’s largest Internet of Things (IoT) event will return to Berlin for its 2nd annual event on the 1-2nd June, where it will host 4,000 attendees and explore the entire IoT ecosystem. There will be 6 conference tracks, with 200+ industry leading speakers discussing their real-life use-cases of IoT/M2M technology and solutions, attracting C-Level Executives from across the board.

- - -

 

For the chance to get 20% off:


Contact:

Thomas Blades | +44 739 710 1013 | +44 117 980 9023 | www.iottechexpo.com | tom@iottechexpo.com

 

- - -

 

Enjoy city of Berlin and then move to beautiful spring Prague to the IQRF Summit 2017.

 

IQRF Summit 2017 – 7-8 June, Prague

- - -

 

Come to discover IQRF Ecosystem that will enable you to quickly develop, manufacture, promote and deploy your wireless IoT product. Get inspired, find new business opportunities, learn technical features, talk to top professionals, touch real IoT products and solutions.

IQRF Alliance and partners invite you at a two-day summit where you can expect more than 30 interactive presentations and 12 hands-on workshops from the IoT field. You will find here real examples from areas of smart cities, smart buildings and homes, industry, security and transportation.

 

- - -

 

Contact:

Ivona Spurna | +420 777 775 735 www.iqrf.org/summit2017 | ivona.spurna@microrisc.com

IQRF Alliance is the partner of the IoT Tech Expo Europe - https://www.iottechexpo.com/europe/all-partners/

 

O2 IT Services wants to improve the air quality at schools. Prague students will test the project.

06 March 2017

O2 IT Services (O2 ITS), a subsidiary of O2 Czech Republic, is launching together with several partners the pilot project Smart City “Environment – Healthy school” in the area of air quality measurements. O2 ITS is attracting an attention to the issue of the optimal environment at schools and its impact on health and the focus of students and teachers. The project was launched in February this year and will last several months.

Testing operation takes place at Smíchovská Secondary School (SSPŠ), which is due to its structure and location ideal for testing in harsh city environment and dense urban traffic. Another advantage is that it is a technically oriented school that wants to use the results of measurements in the context of vocational education.

"We would like to use the project 'Healthy School' to open a discussion about quality of urban environment and its impact on our health. We believe that innovative technologies can significantly contribute to its improvement," said Václav Provazník, Managing Director of O2 IT Services.

"By participating in the project, we expect not only to improve the quality of indoor environment for our students and school staff, but we also appreciate the possibility of involving students in measurements and experiments. Practical experience with new technologies, which can students obtain thanks to O2 ITS, are the most valuable," added Radko Sáblík, the director of SSPŠ.

 

How does it work

The subject of the pilot project are long-term measurements of the internal environment in selected classrooms and the external environment beyond the walls of the school in the direction to the street and the courtyard. The ten classes are equipped with sensors that continuously measure the level of contamination of indoor air by the carbon dioxide (CO2) in the air, the relative humidity and the temperature. There are also two sensors placed at the school to measure the level of external air pollution via dust particles. Finally, there are several places in front of the school windows, where the noise is measured as well. There will be many experiments during the pilot project to verify impact of those actions on changes of the internal environment at the school.

Individual sensors transmit 24 hour a day real time data (temperature, CO2 levels, humidity, etc.) to an internal O2 ITS system, which make it possible to track the current climate in classrooms at any time. At the same time, selected students record specific information about events in the classroom, e.g. time or number of students. Thanks to this data it will be possible to analyse in detail the results of measurements and provide specific recommendations.

 

Project benefits

After the end of the pilot project, O2 IT Services will perform an analysis together with other partners of the project. This analysis will describe a relationship between the level of pollution of internal and external environment and specific situations at the school. The analysis will help to prepare individual steps how to control different situations in the area of environment during the time when students and teachers are in the building. Another benefit is the verification of the technology and determining the required number of components for smart environmental management in buildings.

 

Project partners

The project includes following technology companies that deal with the environment and smart city:

 

PROTRONIX s.r.o. - provided the sensors to monitor indoor air quality. The sensor measures the concentration of carbon dioxide (CO2) at a resolution of up to 5000 ppm, temperature and relative humidity.

CAMEA, spol. s r.o. – installed two sensors on the school building in the direction to street and courtyard for fully automatic monitoring of external air pollution, the sensors measure dust particles and the concentration of carbon monoxide (CO) in the air and also temperature, humidity and air pressure.

IQRF Alliance s.r.o. - linked various industrial partners and academic institutions utilizing the IQRF wireless technology as a communication platform. Companies O2, Protronix and MICRORISC are the members of the IQRF Alliance.

MICRORISC s.r.o. – provided the IQRF data transceivers forming a transmission system that ensures wireless transmission of sensor data.

Ochrana životního prostředí, s.r.o. - performs accredited measurements. Provided a sound sensor for the project that will continuously measure and record the equivalent sound pressure level at various places in front of the school windows.

 

More on www.o2its.cz and www.smartcity.cz

 

About O2 IT Services

O2 IT Services, a 100% subsidiary and a member of the O2 Czech Republic a.s. group, is an expert in information technology. The portfolio consists of IT/business consulting, system integration, application development and managed services development, operation services and optimization of IT and IT security solutions.

O2 IT Services appropriately combines standardized solutions for IT products and customized solutions. Thanks to the use of standardized building block of IT services they are not only easily adaptable to customer requirements, but also repeatable – without need to build new solution from scratch. Customers of O2 IT Services always receive the optimal model, which brings them a significant added value, increasing their effectiveness and enables them to dynamically adapt to changing needs.

This site uses cookies to offer you a better browsing experience. More info