CONFERENCE DAY 2 / FRIDAY 20 MAY 2016
08.30 | WELCOME AND COFFEE | |
CHAIRMAN Aapo Markkanen Principal Analyst Machina Research |
09.00 | IETF Activity | |
Describing IETF working group activities in IoT. Alexander Pelov, Associate Professor, Telecom Bretagne |
||
09.15 | Internet: the Future of LPWA? | |
There are several LPWA radio technologies each having a proprietary, locked-in, non-standard solution for addressing, localization, security, provisioning, AAA, etc. A deep understanding of Internet protocols helped us to address these constrains without breaking the interoperability with the Internet. Describing an innovative approach based on Internet technologies offering network neutrality, rapid service development and deployment and independence from the underlying radio technology. A real-world implementation is already in operation covering the city of Rennes, France. Laurent Toutain, Telecom Bretagne |
||
09.45 | 6TISCH | |
Pascal Thubert, Cisco |
||
10.15 | COFFEE BREAK |
10.45 | From Concept to Product, using IoT Building Blocks from an Electronic Solution Provider | |
Eolane, electronic solution provider and key player in the M2M and IoT ecosystem provides IP building blocks and platforms to enable and accelerate application solution providers with: • IoT platform for wearable and B2C applications • Solution and product reference design for smart & connected fabrics eHealth and wellness applications • LPWAN reference design connectivities for Smart cities, Smart building and smart energy Regis Lauret, Marketing Director, éolane |
||
11.15 | Performance Evaluation of LoRa Radio Solution for PREDNET Wildlife Animal Tracking Project | |
The PREDNET project focuses on two specific use cases: • Jackal behavior understanding and cattle surveillance; • Fight against rhinoceros poaching. The proposed WSN contains wearable devices carried by animals and infrastructure devices (base stations). The key requirements of the system are long range transmissions and low power consumption. Viktor Toldov, University of Lille, IRCICA, Inria |
||
11.45 | Deployment of Country-wide LoRa Networks in Belgium and in the Netherlands | |
In Belgium, Proximus has deployed LoRa in ten major urban and logistic areas as well as in the city of Luxembourg. This deployment included the installation of LoRa base stations and the setup of the central network controllers and management platforms. In the Netherlands, KPN is deploying LoRa base stations on their 3/4G tower locations. KPN and Proximus KPN will be using Actility’s ThingPark Wireless™ solution. Gabor Pop, Solutions Marketing Manager, Actility |
||
12.15 | Critical KPI (Key Performance Indicators) for LPWA Networks | |
Discussing network design, radio environment analysis and scalability (depending on use case), to installation, operation and performance management. A real experience feedback of current installations is shared to point critical KPI (radio budget, cell loading, QoS, latency, power consumption, net topology…) to manage a low-cost but not low-quality LPWA network. Yannick Delibie, CTO, Kerlink |
12.45 | LUNCH |
14.00 | Smart Objects/Smart Things Companies | |
Demonstrating the LPWA ecosystem with presentations from innovative startups. Participants: Smockeo Sensing Labs Wi6Labs IEM Idosens |
||
15.00 | Achieving a Legacy Cellular Security Level | |
SIGFOX and LoRa networks are demonstrating an unrivalled ability to seamlessly enable battery-operated sensors to upload their data onto cloud applications for years without maintenance. Nevertheless, while the simplicity of the communication protocol of such networks is an obvious asset when it comes to saving sensor power compared with 2G/3G/4G, it could become a weakness for those applications requiring a level of security equivalent to legacy cellular. Demonstrating what are the tools and remedies that will solve this question and raise LPWAN on-par with SIM-card enabled networks. Guillaume Crinon, Technical Marketing Manager EMEA, Avnet Memec Silica |
||
15.30 | How the Digital Security Technologies can be Developed to Enable Security and Privacy? | |
Mapping the IoT security threat, and illustrating the risk through uses cases assessing the different solutions to secure the devices, including a Secure Element based on digital security technologies. Explaining how this Secure Element can be efficiently deployed in the IoT chain in a competitive manner. Jean Pierre Delesse, COO, Trusted Objects |
||
16.00 | LoRa Security, Confidentiality & Keys Management Principles - a Comprehensive Insight | |
Starting by an overview of the components and actors you can find in a LoRa Network, we'll go through the security keys management principles to end with an introduction to the secure element, an optional embedded higher level of security that protects the sensitive data inside the device. Arsene Betolaud, Product Manager, Gemalto |
16.30 | COFFEE AND END OF THE CONFERENCE | |