Operators should match their IoT security strategies with their ambitions in the IoT market

Operator’s role in the IoT value chain

We forecast that 6.4 billion IoT connections worldwide will use fixed, mobile and low-power wide-area (LPWA) networks by 2025. As the IoT market grows, so does the security risk. The discussions on how to secure the IoT are increasingly the focus of attention.

An end-to-end IoT project consists of multiple, often diverse, devices, various platforms, layers, and interfaces, creating many dimensions to secure. Security has moved up the list of priorities for IoT projects. Telecoms operators, as IoT service providers, need to develop their IoT security capabilities with relevant products and skills to match their IoT strategy and ambition, says Sherrie Huang and Michele Mackenzie of Analysys Mason.

Telecoms operators need to develop security offerings to match their IoT proposition

Operators have a strong legacy in securing the connectivity layer with carrier-grade, embedded security solutions. Security requirements such as secure transmission, safe data and user authentication have been fused into the operator networks for decades and cellular networks are generally viewed as secure and reliable.

However, in the IoT market, operators increasingly address components beyond connectivity to capture a larger share of revenue. Moving up the value chain requires more specialist security expertise, which CSPs do not always have.

Operators will increasingly need to do the following.

  • Map their security offerings closely to the IoT components of the value chain that they provide, such as the application, device and enabling capabilities like hosting. Providing enhanced security for devices beyond SIM authentication may not be familiar territory.
  • Tailor the security offering for their target verticals. This will require an understanding of the technical component of the offering but also regulatory compliance and business models. Those operating in the EU will need to understand GDPR compliance, for example.
Sherrie Huang

Operators will need to partner or invest to align their security offering with their IoT proposition. Operators that already benefit from an internal cybersecurity unit, like Telefónica and Vodafone, may have the necessary skills to build their own solutions but most will still need to partner for some or all solutions.

A few operators, primarily those that have invested heavily in specific sector expertise, may make strategic investments or acquisitions to bolster their offering.

Bold moves such as this will send a clear message to the market about their intentions and role in the value chain. Interestingly, this bold approach is not confined to the large global operators such as Telefónica or Singtel. Smaller national and regional-focused operators with strong IoT business units, such as KPN and Tele2, have acquired to strengthen their security credentials.

Despite the significant effort and investment required, it is unlikely that security will generate a significant new revenue stream in its own right. However, it will be critical in winning new business and potentially differentiating the operator’s service from that of competitors.

Figure 1: The operator’s role in IoT security must match the operator’s role in the IoT value chain

Security can help operators differentiate and strengthen their LPWA service

By 2025, more than half of the total wide-area IoT connections globally will be on LPWA networks. This will bring new and different challenges. Many of the devices connected to an LPWA network will be low-power devices with limited computing power, factors that will restrict security options.

Operators using 3GPP standards (NB-IoT and LTE-M) have a clear opportunity in the early phase of LPWA market development to differentiate their offering from the proprietary networks by marketing the inherent secure nature of their networks. Operators have been slow to promote the value of embedded standardised security in their cellular networks (although the real value of security may have only recently come to the fore).

Michele Mackenzie

Providing additional security layers by design from the outset of the project will likely add some additional upfront costs but will reduce the overall costs of delivering security for the lifecycle of the project. For example, building in extra layers to secure and update the connected devices.

Operators could position security as a core differentiator to their LPWA proposition and:

  • promote the embedded security attributes of the network and the SIM and market the capabilities of their connectivity and device management platforms in detecting anomalies and mitigating the consequences – for example quarantining devices, OTA updates etc.
  • develop new capabilities internally or through partnerships to provide additional, value-added security layers that are cost effective for LPWA solutions – for example, some operators are exploring the idea of offering additional security in the SIM
  • ensure that their security offering addresses each component of the value chain where they provide solutions and leverage professional services and cybersecurity business units to advise on and implement security solutions.

IoT security could be an important differentiator

Selling IoT security solutions will not necessarily generate substantial revenue for operators. Security at the connectivity layer is embedded but should be a feature that could bolster the value of the connectivity offering. Security for other components of the value chain will be a premium service but is unlikely to generate significant revenue. However, IoT security will be a critical factor in winning IoT business with the potential to differentiate the operator’s service from its competitors.

The authors of this blog are Sherrie Huang, senior analyst and Michele Mackenzie, principal analyst at Analysys Mason

Comment on this article below or via Twitter: @IoTNow_OR @jcIoTnow


FlorLink’s SmartHub solution connects to cloud using Sequans Monarch cellular IoT connectivity tech

Posted on: December 7, 2022

6 December 2022 – Sequans Communications S.A., a provider of cellular IoT chips and modules, and FlorLink, IoT technology and solutions provider, collaborated on FlorLink’s new SmartHub retail solution, which is now connected to the cloud by Sequans Monarch cellular IoT connectivity technology. SmartHub includes a large suite of sensors that can monitor multiple sales

Read more

PLVision launches SONiC Core to help organisations with faster network disaggregation

Posted on: December 7, 2022

1 December 2022 – PLVision, a custom software product development company focused on open networking systems has announced the launch of its SONiC Core initiative aimed at extending the reach of Community SONiC to drive its adoption in new, demanding markets. PLVision’s initiative will help simplify and speed up SONiC deployments and SONiC-based product development.

Read more

The IoT Adoption Boom – Everything You Need to Know

Posted on: September 28, 2022

In an age when we seem to go through technology boom after technology boom, it’s hard to imagine one sticking out. However, IoT adoption, or the Internet of Things adoption, is leading the charge to dominate the next decade’s discussion around business IT. Below, we’ll discuss the current boom, what’s driving it, where it’s going,

Read more

9 IoT applications that will change everything

Posted on: September 1, 2021

Whether you are a future-minded CEO, tech-driven CEO or IT leader, you’ve come across the term IoT before. It’s often used alongside superlatives regarding how it will revolutionize the way you work, play, and live. But is it just another buzzword, or is it the as-promised technological holy grail? The truth is that Internet of

Read more

Which IoT Platform 2021? IoT Now Enterprise Buyers’ Guide

Posted on: August 30, 2021

There are several different parts in a complete IoT solution, all of which must work together to get the result needed, write IoT Now Enterprise Buyers’ Guide – Which IoT Platform 2021? authors Robin Duke-Woolley, the CEO and Bill Ingle, a senior analyst, at Beecham Research. Figure 1 shows these parts and, although not all

Read more

CAT-M1 vs NB-IoT – examining the real differences

Posted on: June 21, 2021

As industry players look to provide the next generation of IoT connectivity, two different standards have emerged under release 13 of 3GPP – CAT-M1 and NB-IoT.

Read more

IoT and home automation: What does the future hold?

Posted on: June 10, 2020

Once a dream, home automation using iot is slowly but steadily becoming a part of daily lives around the world. In fact, it is believed that the global market for smart home automation will reach $40 billion by 2020.

Read more

5 challenges still facing the Internet of Things

Posted on: June 3, 2020

The Internet of Things (IoT) has quickly become a huge part of how people live, communicate and do business. All around the world, web-enabled devices are turning our world into a more switched-on place to live.

Read more

What is IoT?

Posted on: July 7, 2019

What is IoT Data as a new oil IoT connectivity What is IoT video So what’s IoT? The phrase ‘Internet of Things’ (IoT) is officially everywhere. It constantly shows up in my Google news feed, the weekend tech supplements are waxing lyrical about it and the volume of marketing emails I receive advertising ‘smart, connected

Read more