News

A lot of things goining on in the IQRF Alliance.
Browse through the news to learn more.

TR-5xB and TR-5xD series are going to be discontinued soon

21 April 2017

Due to discontinuation of key component MRF49XA (RF IC by Microchip), all TR-5xB and TR-5xD series are going to be discontinued soon. Recommended replacement: TR-7xD series.

"Dear Customers,

Thank you for understanding that we have to bring the news on such a short notice but we have to inform you that all of our modules in TR-5xDx and TR-5xBx line as well as all related products based on those modules are going to be discontinued very soon. As much as it was planned and discussed many times, the main reason for the decision is the discontinuation of the main components (namely MRF49XA from Microchip) for the modules, which only sped up the process and is the main reason why we have to make such a decision now.

We want to assure you that we are doing all we can to secure the stock and deliveries of the modules for all your orders that will be placed no later than 5th May 2017.

If it is however inevitable for you to start migrating from TR-5xDx or TR-5xBx to DCTR-7x modules (which as you know bring many advantages and better features together with security tools coming with OS 4.0 and all working with the same development tools) we are ready to support you with the process:

We give all our support to migration TR-5xDx and TR-5xBx to DCTR-7x . Our FAEs and support teams are ready to give maximum effort. You will get the same pricing conditions (SPA) for DCTR-7xDx as they had for (DC)TR-5xDx or TR-5xBx as initial support we offer 20 pcs. of DCTR-7x modules for very special price 5Eur/pc to all our customers forced to migrate.

We are sure that the whole process as much as sudden and difficult, especially at the transition phase, will only bring in time benefits to you. Once more we would like to thank for your understanding.

Should you have any questions or requests, do not hesitate to contact us."

Yours Microrisc team

 

- - -

SIGFOX and IQRF – partners not only in logistics

11 April 2017

Imagine a global network to transfer small data, for example to obtain basic information about your delivery. You can see where it is and in what condition. Upon arrival to your destination you collect detailed data from individual parts and communicate with these parts as needed. Wireless technologies SIGFOX and IQRF are for this use case perfect.

Long-distance transport can carry components that are sensitive to fluctuations in temperature, humidity or impact of other phenomena. The values measured during the journey and information about the movement of your shipment pass through SIGFOX to headquarters. You do not need to solve problems with roaming, SIGFOX is one network. Upon arrival to your destination you connect to the IQRF network and collect detailed status information from various parts of the consignment. You easily find which part is fine and where recommended maximum / minimum values of the environment were exceeded. You can signal in different parts of the supply needed information to help with the subsequent logistics.

 

- - -

 

Interconnection of these two technologies is not a problem. RCD Radiokomunikace company demonstrated its solution based on interconnection of IoT technologies - 

- - -

IQRF and SIGFOX - at Amper 2017. The module IOT 301 / IQRF is a part of a modular IOT system, which is a universal hardware platform for IoT devices. 

Long-distance transport is not the only case where connection of these two technologies is functional and desirable.

Other use case may be automated buildings, where sensory values are measured and in case of exceeding the recommended value messages are sent outside the building into the headquarters.

Thanks to the IQRF wireless network is the coverage reliable. Even in the environment problematic for propagation of the wireless signal you can collect data from devices. It can be temperature, humidity, lighting intensity, gas or chemicals or other values. In most cases if the measured values do not deviate from the expected limits – there is no need to send this information outside the building further into the world. Values may be stored on a local server for further processing and analysis. But if there is a situation deviating from the allowed values (e.g. temperature increase in some rooms above the expected boundary, value from CO sensors exceeds dangerous level of carbon monoxide, unscheduled room lighting appears, etc.), then you can pass this alarming information over the SIGFOX network to the Internet.

SIGFOX network can also provide backup Internet connection in case of failure of the main Internet connection line providing two-way high-speed operation.

 

IQRF coordinator connected to Sigfox

Pic. 1 - IQRF coordinator connected to Sigfox

 

IQRF node connected to Sigfox

Pic. 2 - IQRF node connected to Sigfox

 

Additional information

IQRF® is a complex technological solution allowing electronics manufacturers to innovate their product, equip the product with wireless connectivity and optionally a connection with the rest of the world through Internet. The IQRF is the ideal solution for reliable wireless "mesh" networks.

More on: www.iqrf.org

 

IQRF Alliance is an international community of developers, manufactures, system integrators, universities, research and innovation centers and business professionals using the IQRF wireless technology. The technology is used for IoT control and M2M communication.

More on: www.iqrfalliance.org

 

RCD Radiokomunikace company was founded in 1993. The main areas of activity of the company include the development and production of high-frequency devices for voice and data transmission as well as the design and delivery of systems for radio coverage of tunnels, underground areas and large objects.

More on: www.rcd.cz

 

SIGFOX is one of the leading technologies for small data transmission from the Internet of Things devices. The advantage is a large range (up to tens of kilometers), and very low power consumption end devices.

More on: www.sigfox.com

 

SimpleCell Networks Inc. is the first Czech public mobile network operator for the Internet of Things. The network is based on the global SIGFOX technology, which operates in 30 countries, and in the Czech Republic was built in cooperation with T-Mobile. Network enables to communicate cheaply, reliably and safely to millions of devices during many years of battery life. It is possible to get data through a simple interface through which the device can be integrated into corporate systems within hours or use dozens of IoT platforms.

More on: www.simplecell.eu

IQRF OS 4.0 online webinar records and PDF presentation

31 March 2017

On the occasion of releasing the IQRF OS 4.0, we have organized an online webinar, in which participants learnt all the new features of the new version of the operating system.

We have prepared a record of webinars in English and Czech. To stay up-to-date, subscribe the IQRF Youtube channel where you can get notifications about the newest videos regarding to the IQRF wireless technology.

 

PDF presentation

 

English:

 

Czech:

IQRF OS 4.0 webinar

29 March 2017

Register for a webinar to learn all about new features in the IQRF OS 4.0. The update is focused on the security to protect your network running on the IQRF wireless technology.

Skype CZ - 10:00 - 11:30 - https://meet.lync.com/iqrf/iqrfalliance/5XHHWXXQ

Skype EN - 13:00 - 14:30 - https://meet.lync.com/iqrf/iqrfalliance/26JCHO26

 

 

The webinar will touch all new features in the IQRF OS 4.0. The update is mainly focused on the security features such as AES-128 encryption, multilayer security, randomly generated passwords and user keys.

Devices in the Internet of Things are in danger nowadays because there are thousands of new threats created (malware, malicious codes, etc.) every day. Therefore, the new operating system IQRF 4.0 brings ultimate security to IQRF networks.

Security of the IQRF OS 4.0 is based on three different protection layers which are built on AES-128 encryption. The first layer is access encryption used for bonding, CATS services, network backup and restore. The second and third layers are networking encryption and user encryption. Networking encryption is based on TR transceivers equipped with 192 b long unique fully random password individually generated at the factory. IQRF OS minimizes the risk of weak password or key by generating random passwords and keys for communication inside the network.

Learn about all those security features and other features of new operating system.

 

Register to get more information and link to webinar.

 

When

CZ language - 30th March, 2017 - 10:00 to 11:30

- - -

 

EN language - 30th March, 2017 - 13:00 to 14:30

- - -

Ultimate security of wireless networks is coming with the new IQRF OS v4.00

23 March 2017

The brand new concept of “Interoperable - Simple - Secure” solution of the IQRF technology, a Wireless Platform for IoT, was presented in the end of the 2016. Now, it is being fulfilled by new versions of the OS v4.00 and the DPA protocol v3.00 bringing higher safety of wireless communication, security of transferred data and higher comfort for users. Interoperability of the whole IQRF Ecosystem is being presented via solutions and IoT applications by the IQRF Alliance members on a daily basis.

"Every wireless system is exposed to potential OTA attacks. But IQRF OS v4.00 brings ultimate security based on industrial standards. Security in IQRF does not mean just an encryption but a complex approach to avoid potential vulnerabilities," explained CEO of MICRORISC, inventor of the IQRF technology, Dr. Vladimir Sulc. This complex approach consists of packets consistency checking, three levels of AES-128 encryption, and dynamic passwords and keys generation.

 

Packets consistency checking

Security starts at basic trust to received data. To avoid transmission errors and process valid data only, IQRF strictly checks all received packets against bit error failures using several block checksums. Additionally, complete packet is protected by standard IBM CRC-16.

 

Encryption

Sensitive data should be hidden for unauthorized users and systems. Encryption is a way how to protect such sensitive data. IQRF utilizes AES-128 encryption, industrial standard for wireless communication. Besides hiding sensitive data, control data encryption increases consistency protection. There are three different protections based on AES-128 encryption.

  • Network communication protection

Protection of standard network communication is the most important as it continues during the whole system life. Protection is based on AES-128 encryption standard. Thus, only systems/users having valid network Password may join network communication and process data. To avoid wrong implementations all network communication has been forced to be encrypted automatically.

  • Unauthorized access protection

Only authorized devices may join the network and only authorized users may have maintenance access to network devices. As communication during bonding and maintenance is encrypted by AES-128, only authorized devices and users with valid access Password are able to join the network or to maintain network devices. Sensitive data, such as network Passwords, exchanged encrypted during bonding, are well protected.

  • User´s data protection

Besides protection of network communication there is an optional way to increase privacy by adding another encryption shield. It utilizes AES-128 and user Key defined by the user to protect sensitive user's data. This protection is fully under user's control and may be used to add extra network protection or to hide sensitive data even from the IQRF platform as shown in the schematics below.

 

Password and Keys manipulation

Keys compromising is very frequent source of security problems. Therefore IQRF minimized and protected also manipulation with keys - network and access keys are not known during physical manipulation as they are generated from respective passwords. Network password is generated randomly with high entropy. The encrypted password is provided to devices that are joining the network during bonding.

 

Future upgrades

Threats coming in the future from more powerful attacking tools and from discovered vulnerabilities should be fixed. All IQRF software layers enable upgrades to keep system secure.

Pic. no. 1: Scheme of the various levels of the IQRF wireless system protection

- - -

 

Further information:

 

IQRF technology selected features:

  • Ultimate security: based on industrial standards (AES-128)
  • Extra low power: < 100 nA standby, 15 µA receiving in XLP mode
  • Simple integration in a few weeks and simple control with DPA protocol (SPI, UART)
  • Sub-GHz ISM bands: 433 / 868 / 916 MHz
  • Range: 500 m with small PCB antenna
  • Easily connectable to Arduino, Raspberry Pi, chipKIT etc.

IQRF OS 4.0 technical information

21 March 2017

New IQRF OS 4.0 is going to be released on March 23rd and is focused mainly on security features.

Security

The new operating system IQRF 4.0 brings ultimate security to IQRF networks.

There are three different protections based on AES-128 implemented:

  • Access encryption

used for

    • bonding
    • CATS services
    • network backup and restore
  • Networking encryption
  • User encryption

Compromising of keys is very frequent source of security problems. Therefore, IQRF OS minimizes and protects also manipulation with keys – network and access keys are not known during physical manipulation as they are generated from respective passwords.

Access encryption

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.

All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.

 

- - -

 

Network encryption

AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.

User encryption

Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.

 

- - -

 

Other features and changes

  • Deep sleep for TR-76D modules
    • consumption < 100 nA
  • Longer RF range of LP/XLP mode
    • the same like for STD mode
  • Improved FRC
    • 1B FRC downloads data from 63 Nodes
    • 2B FRC downloads data from 31 Nodes
  • Device cloning canceled
    • just upload the appropriate HWP and access password to the transceiver and restore network information from the backup
  • DPA demo canceled
  • Coordinator/Node as a one device canceled
  • IQMESH examples removed from Startup Package
    • The only way for IQMESH is DPA.
  • Israel (IL) version of TR modules supported
  • Basic IQRF header file template-basic.h renamed to IQRF.h
  • OS 4.00D is not interoperable with OS 3.08D
  • User OS upgrade to version 4.00D is possible, downgrade back to OS 3.08D is not possible
  • IQRF IDE 4.40 and DPA 3.30 required


More on: www.iqrf.org

 

Ecryption in IQRF OS 4.0

17 March 2017

Security is the main feature in new IQRF OS 4.0 releasing March 23rd. To protect a network running on the IQRF wireless technology, there are various security features and improvements. One of those features is encryption.

IQRF OS 4.0 brings three different protection layers based on AES-128. It is – access encryption, networking encryption and user encryption. If you want to know more about those protection layers, read it here.

 

So, what other features in IQRF OS 4.0 are encrypted?

Network passwords are randomly generated with high entropy and delivered encrypted to devices during bonding process.

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding, CATS services and network backup and restore.

Networking encryption is the most important part of the whole process of network communication. Network communication is encrypted by OS itself and user don't have to care about it. Thus, every IQRF network is equally highly secured by default. Only systems with valid Network password are allowed to interact with network and individual devices. AES-128 encryption protocol with 16 B long keys is used together with proprietary Cipher Data Chaining algorithm.

User encryption is another option how to improve security of data transmission. This option is fully under user's control. The key, specified by user, is used. This key is unknown for OS to push security level even further. Data transferred inside of encrypted packets are furthermore encrypted by user's key. This makes readability of data impossible both for OS and anyone who doesn't know the user's key. User encryption/decryption can be performed outside TR e.g. in application itself, which ensures safety even beyond the network.

 

- - -

FOXON is a new member of the IQRF Alliance

17 March 2017

We would like to announce that another company joined the IQRF Alliance. The IQRF Alliance has expanded by Czech company FOXON.

FOXON offers products and services in an industrial automation area since 2006. The company has many external collaborators in addition to its own employees to ensure high quality and fast delivery of its products and services to the customers not only in Czech Republic or Slovakia, but also to Germany and other European countries.

The company FOXON offers proven components for industrial automation and third-party manufacturers such as control systems for SIEMENS. Battery CPUs for BOSH Rexroth, HITACHI or Panasonic, programming adapters for MITSUBISHI Electric, WAGO or Schneider Electric, etc.

We greatly appreciate FOXON's entry into the IQRF Alliance. We believe that both sides will benefit from this cooperation. The IQRF Alliance can offer better market coverage through its sales partners and FOXON will surely bring other members of the alliance interesting technical solutions.

 

- - -

Three security levels in new IQRF OS 4.0

16 March 2017

Currently, security in the area of IoT is a frequent topic of many discussions. Security is now more important than ever before. Our computers and smartphones are very vulnerable despite all kinds of advanced antivirus and security applications. But what about devices in the Internet of Things?

The Internet of Things is still a very young technology area that is not protected well yet. The company MICRORISC, author of the IQRF wireless technology, understands this and works on many ideas how to continually improve the security of its technology and devices built on it.

The next big update of the IQRF operating system, the IQRF OS 4.0 will be released on March 23rd and will be mainly focused on the security. The update will bring for example the AES-128 encryption protocol, which provides security at three different levels – access encryption, networking encryption and user encryption.

 

Access encryption

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.

All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.

 

Network encryption

AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.

 

User encryption

Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.

 

More news about IQRF OS 4.0 coming soon.

 

Online webinar - registration is running

CZ language - 30th March, 2017 - 10:00 to 11:30

EN language - 30th March, 2017 - 13:00 to 14:30

 

IQRF OS 4.0 security layers

The IQRF Alliance has a new member – Dazzle Light Europe

16 March 2017

We are very pleased to announce that the company Dazzle Light Europe decided to join the IQRF Alliance.

Dazzle Light Europe, Ltd. is a Bulgarian company, founded in the town of Sofia, in 2016. The company is focused on LED-lighting technologies, representing a fully complete business process - starting from design and engineering, trough the production and delivery of LED lighting products for public and industrial use.

Dazzle Light offers more than 20 models of LED lamps suitable for industrial and public areas. The company aims for efficiency and power and cost savings which can be achieved by implementing the IQRF wireless technology. The IQRF data transceivers can read various parameters (current, temperature, etc.) from the light and thus optimize lighting management.

The IQRF Alliance sees opportunities on both sides. Dazzle Light Europe will be able to provide customers with intelligent lighting solution based on the IQRF technology and the IQRF Alliance will be able to manage the cooperation between Dazzle Light and other members to ensure the most efficient way to bring high quality solutions on the market in the shortest possible time.

 

- - -

This site uses cookies to offer you a better browsing experience. More info