Together with the Urbis trade fair, the construction trade fair also took place, showing the latest technology and trends in the construction industry, and it turned out that the IoT solution also penetrated this sector. More and more companies have been interested in expanding their smart device solutions to collect data from a wide range of sensors, and be able to remotely control them.
In addition to professionals from the industry and the professional public, representatives of cities and towns were also interested in smart solutions at the trade fair. The theme of smart cities has repeatedly appeared throughout the fair. Of course, the IQRF Alliance could offer a very large ecosystem consisting of alliance members' products and running projects in the field of parking systems, public lighting, or air quality measurement.
The partners of IQRF Alliance joint stand were companies Protronix and Aledo. Thanks to the membership in the IQRF Alliance, both companies have been given the opportunity to promote their products at very low cost. Protronix was able to capture the attention of visitors with its air quality sensors, as many construction companies are currently considering to use air quality monitoring systems. The system of interior localization of people and objects and their monitoring of Aledo has also found many people interested in implementing a similar solution in production halls and warehouses.
We believe that the Urbis 2017 trade fair has allowed us to broaden our awareness of the IQRF wireless technology and the IQRF Alliance and its members.
Parts of this product are the IQRF kit containing the sensor and relay kit, the popular UP developer board from AAEON and the ready-made connection to Microsoft Azure. Additional sensor hardware can be attached to the kit.
Buy on www.iqrf.shop.
As an IQRF Summit 2017 participant you can buy this excellent equipment for 279 EUR only!
Summit participants can register for free at a practical workshop to learn about installing and configuring individual parts of the new IoT Starter Kit (www.iqrf.org/summit2017).
Thank you for understanding that we have to bring the news on such a short notice but we have to inform you that all of our modules in TR-5xDx and TR-5xBx line as well as all related products based on those modules are going to be discontinued very soon. As much as it was planned and discussed many times, the main reason for the decision is the discontinuation of the main components (namely MRF49XA from Microchip) for the modules, which only sped up the process and is the main reason why we have to make such a decision now.
We want to assure you that we are doing all we can to secure the stock and deliveries of the modules for all your orders that will be placed no later than 5th May 2017.
If it is however inevitable for you to start migrating from TR-5xDx or TR-5xBx to DCTR-7x modules (which as you know bring many advantages and better features together with security tools coming with OS 4.0 and all working with the same development tools) we are ready to support you with the process:
We give all our support to migration TR-5xDx and TR-5xBx to DCTR-7x . Our FAEs and support teams are ready to give maximum effort. You will get the same pricing conditions (SPA) for DCTR-7xDx as they had for (DC)TR-5xDx or TR-5xBx as initial support we offer 20 pcs. of DCTR-7x modules for very special price 5Eur/pc to all our customers forced to migrate.
We are sure that the whole process as much as sudden and difficult, especially at the transition phase, will only bring in time benefits to you. Once more we would like to thank for your understanding.
Should you have any questions or requests, do not hesitate to contact us."
Yours Microrisc team
Long-distance transport can carry components that are sensitive to fluctuations in temperature, humidity or impact of other phenomena. The values measured during the journey and information about the movement of your shipment pass through SIGFOX to headquarters. You do not need to solve problems with roaming, SIGFOX is one network. Upon arrival to your destination you connect to the IQRF network and collect detailed status information from various parts of the consignment. You easily find which part is fine and where recommended maximum / minimum values of the environment were exceeded. You can signal in different parts of the supply needed information to help with the subsequent logistics.
Interconnection of these two technologies is not a problem. RCD Radiokomunikace company demonstrated its solution based on interconnection of IoT technologies -
IQRF and SIGFOX - at Amper 2017. The module IOT 301 / IQRF is a part of a modular IOT system, which is a universal hardware platform for IoT devices.
Long-distance transport is not the only case where connection of these two technologies is functional and desirable.
Other use case may be automated buildings, where sensory values are measured and in case of exceeding the recommended value messages are sent outside the building into the headquarters.
Thanks to the IQRF wireless network is the coverage reliable. Even in the environment problematic for propagation of the wireless signal you can collect data from devices. It can be temperature, humidity, lighting intensity, gas or chemicals or other values. In most cases if the measured values do not deviate from the expected limits – there is no need to send this information outside the building further into the world. Values may be stored on a local server for further processing and analysis. But if there is a situation deviating from the allowed values (e.g. temperature increase in some rooms above the expected boundary, value from CO sensors exceeds dangerous level of carbon monoxide, unscheduled room lighting appears, etc.), then you can pass this alarming information over the SIGFOX network to the Internet.
SIGFOX network can also provide backup Internet connection in case of failure of the main Internet connection line providing two-way high-speed operation.
Pic. 1 - IQRF coordinator connected to Sigfox
Pic. 2 - IQRF node connected to Sigfox
IQRF® is a complex technological solution allowing electronics manufacturers to innovate their product, equip the product with wireless connectivity and optionally a connection with the rest of the world through Internet. The IQRF is the ideal solution for reliable wireless "mesh" networks.
More on: www.iqrf.org
IQRF Alliance is an international community of developers, manufactures, system integrators, universities, research and innovation centers and business professionals using the IQRF wireless technology. The technology is used for IoT control and M2M communication.
More on: www.iqrfalliance.org
RCD Radiokomunikace company was founded in 1993. The main areas of activity of the company include the development and production of high-frequency devices for voice and data transmission as well as the design and delivery of systems for radio coverage of tunnels, underground areas and large objects.
More on: www.rcd.cz
SIGFOX is one of the leading technologies for small data transmission from the Internet of Things devices. The advantage is a large range (up to tens of kilometers), and very low power consumption end devices.
More on: www.sigfox.com
SimpleCell Networks Inc. is the first Czech public mobile network operator for the Internet of Things. The network is based on the global SIGFOX technology, which operates in 30 countries, and in the Czech Republic was built in cooperation with T-Mobile. Network enables to communicate cheaply, reliably and safely to millions of devices during many years of battery life. It is possible to get data through a simple interface through which the device can be integrated into corporate systems within hours or use dozens of IoT platforms.
More on: www.simplecell.eu
Skype CZ - 10:00 - 11:30 - https://meet.lync.com/iqrf/iqrfalliance/5XHHWXXQ
Skype EN - 13:00 - 14:30 - https://meet.lync.com/iqrf/iqrfalliance/26JCHO26
The webinar will touch all new features in the IQRF OS 4.0. The update is mainly focused on the security features such as AES-128 encryption, multilayer security, randomly generated passwords and user keys.
Devices in the Internet of Things are in danger nowadays because there are thousands of new threats created (malware, malicious codes, etc.) every day. Therefore, the new operating system IQRF 4.0 brings ultimate security to IQRF networks.
Security of the IQRF OS 4.0 is based on three different protection layers which are built on AES-128 encryption. The first layer is access encryption used for bonding, CATS services, network backup and restore. The second and third layers are networking encryption and user encryption. Networking encryption is based on TR transceivers equipped with 192 b long unique fully random password individually generated at the factory. IQRF OS minimizes the risk of weak password or key by generating random passwords and keys for communication inside the network.
Learn about all those security features and other features of new operating system.
Register to get more information and link to webinar.
CZ language - 30th March, 2017 - 10:00 to 11:30
EN language - 30th March, 2017 - 13:00 to 14:30
"Every wireless system is exposed to potential OTA attacks. But IQRF OS v4.00 brings ultimate security based on industrial standards. Security in IQRF does not mean just an encryption but a complex approach to avoid potential vulnerabilities," explained CEO of MICRORISC, inventor of the IQRF technology, Dr. Vladimir Sulc. This complex approach consists of packets consistency checking, three levels of AES-128 encryption, and dynamic passwords and keys generation.
Packets consistency checking
Security starts at basic trust to received data. To avoid transmission errors and process valid data only, IQRF strictly checks all received packets against bit error failures using several block checksums. Additionally, complete packet is protected by standard IBM CRC-16.
Sensitive data should be hidden for unauthorized users and systems. Encryption is a way how to protect such sensitive data. IQRF utilizes AES-128 encryption, industrial standard for wireless communication. Besides hiding sensitive data, control data encryption increases consistency protection. There are three different protections based on AES-128 encryption.
- Network communication protection
Protection of standard network communication is the most important as it continues during the whole system life. Protection is based on AES-128 encryption standard. Thus, only systems/users having valid network Password may join network communication and process data. To avoid wrong implementations all network communication has been forced to be encrypted automatically.
- Unauthorized access protection
Only authorized devices may join the network and only authorized users may have maintenance access to network devices. As communication during bonding and maintenance is encrypted by AES-128, only authorized devices and users with valid access Password are able to join the network or to maintain network devices. Sensitive data, such as network Passwords, exchanged encrypted during bonding, are well protected.
- User´s data protection
Besides protection of network communication there is an optional way to increase privacy by adding another encryption shield. It utilizes AES-128 and user Key defined by the user to protect sensitive user's data. This protection is fully under user's control and may be used to add extra network protection or to hide sensitive data even from the IQRF platform as shown in the schematics below.
Password and Keys manipulation
Keys compromising is very frequent source of security problems. Therefore IQRF minimized and protected also manipulation with keys - network and access keys are not known during physical manipulation as they are generated from respective passwords. Network password is generated randomly with high entropy. The encrypted password is provided to devices that are joining the network during bonding.
Threats coming in the future from more powerful attacking tools and from discovered vulnerabilities should be fixed. All IQRF software layers enable upgrades to keep system secure.
Pic. no. 1: Scheme of the various levels of the IQRF wireless system protection
- Register for a webinar to learn all about new features in the IQRF OS 4.0 30th March, 2017 - 13:00 to 14:30 CET: http://www.iqrfalliance.org/news/114-iqrf-os-4-0-webinar
- Detailed technical information is available here: http://www.iqrf.org/technology/os-history
IQRF technology selected features:
- Ultimate security: based on industrial standards (AES-128)
- Extra low power: < 100 nA standby, 15 µA receiving in XLP mode
- Simple integration in a few weeks and simple control with DPA protocol (SPI, UART)
- Sub-GHz ISM bands: 433 / 868 / 916 MHz
- Range: 500 m with small PCB antenna
- Easily connectable to Arduino, Raspberry Pi, chipKIT etc.
The new operating system IQRF 4.0 brings ultimate security to IQRF networks.
There are three different protections based on AES-128 implemented:
- Access encryption
- CATS services
- network backup and restore
- Networking encryption
- User encryption
Compromising of keys is very frequent source of security problems. Therefore, IQRF OS minimizes and protects also manipulation with keys – network and access keys are not known during physical manipulation as they are generated from respective passwords.
Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.
All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.
AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.
Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.
Other features and changes
- Deep sleep for TR-76D modules
- consumption < 100 nA
- Longer RF range of LP/XLP mode
- the same like for STD mode
- Improved FRC
- 1B FRC downloads data from 63 Nodes
- 2B FRC downloads data from 31 Nodes
- Device cloning canceled
- just upload the appropriate HWP and access password to the transceiver and restore network information from the backup
- DPA demo canceled
- Coordinator/Node as a one device canceled
- IQMESH examples removed from Startup Package
- The only way for IQMESH is DPA.
- Israel (IL) version of TR modules supported
- Basic IQRF header file template-basic.h renamed to IQRF.h
- OS 4.00D is not interoperable with OS 3.08D
- User OS upgrade to version 4.00D is possible, downgrade back to OS 3.08D is not possible
- IQRF IDE 4.40 and DPA 3.30 required
More on: www.iqrf.org
IQRF OS 4.0 brings three different protection layers based on AES-128. It is – access encryption, networking encryption and user encryption. If you want to know more about those protection layers, read it here.
So, what other features in IQRF OS 4.0 are encrypted?
Network passwords are randomly generated with high entropy and delivered encrypted to devices during bonding process.
Access encryption is used to secure all sensitive OTA network operations. It is used for bonding, CATS services and network backup and restore.
Networking encryption is the most important part of the whole process of network communication. Network communication is encrypted by OS itself and user don't have to care about it. Thus, every IQRF network is equally highly secured by default. Only systems with valid Network password are allowed to interact with network and individual devices. AES-128 encryption protocol with 16 B long keys is used together with proprietary Cipher Data Chaining algorithm.
User encryption is another option how to improve security of data transmission. This option is fully under user's control. The key, specified by user, is used. This key is unknown for OS to push security level even further. Data transferred inside of encrypted packets are furthermore encrypted by user's key. This makes readability of data impossible both for OS and anyone who doesn't know the user's key. User encryption/decryption can be performed outside TR e.g. in application itself, which ensures safety even beyond the network.