TOP
Ho-Ho-Ho!

embedded world 2024

Wireless IoT Retrofit

Optimizing Radio Interfaces for IoT Applications

embedded world 2024: Wireless IoT Retrofit

The variety of applications with radio-based data transmission continues to grow at a considerable pace in both the commercial and industrial Internet of Things. Many applications have a very high user benefit, e.g. eCall emergency calls, level-sparking waste containers or automatic energy management systems that use AI to learn user behavior.

The development and marketing of a wireless-based IoT product is still a major challenge. In addition to technical and functional aspects, cybersecurity and numerous regulatory requirements must also be taken into account.

If you are working on your own products and solutions in this area, request our free whitepaper, take advantage of our wireless IoT consultation hour or visit us from April 9 to 11 in Nuremberg at our stand at embedded world 2024 in hall 3 // booth 633A.

We will be happy to help you!

Field-tested Product Concept

The first product version of an IoT solution in the field of sensor data and cloud connections is often derived directly from the proof of concept prototypes.

A maker board with a suitable housing then frequently forms the link between the local wireless interfaces of the sensors and actuators and a cloud platform on the internet.

In terms of time-to-market, this approach is entirely justifiable. However, the ramp-up to a successful market launch often requires cost optimisation in the bill of materials (BoM), functional enhancements for simple deployment and professional cybersecurity. This is why it sometimes makes sense to redesign important technology components at an early stage.

Whitepaper

The white paper "Wireless IoT Retrofit for IoT Radio Applications" shows what needs to be considered in order to turn a prototype into a successful product.

Request Whitepaper

We Invite You!

Just send us a short e-mail and we will send you the code for a free one-day ticket for embedded world.

Request Ticket Code

eDNP/8331: "Virtual" System-on-Module

With the eDNP/8331 we offer a concept for virtual System-on-Module (vSoM) solutions including various wireless IoT components. This allows circuits of a 32-bit embedded Linux computer to be integrated together with various wireless interfaces into own application circuits in a cost-optimised manner.
The results are, for example, sophisticated IoT gateway functions for Wireless-2-LAN (W2L) or Wireless-2-Wireless (W2W) applications with integrated cloud connections based on IEEE 802.15.4, 6LoWPAN, 4G or LEO satellite communication.

The complete hardware and software data of the eDNP/8331 is available as a CAD function block and open source software stack.

The CAD data is integrated into the in-house circuit development as part of an Altium PCB design.

Once finished assemblies are available, the software stack can be transferred as a binary image to a microSD card or an eMMC memory module and then booted.

Cybersecurity

As an accessory, SSV offers a template for W2L or W2W vulnerability assessments for analysing the final assembly. This uses a vulnerability scanner to generate a list of critical software components plus the corresponding version numbers.

This can then be used to query information on known vulnerabilities in vulnerability databases in order to obtain so-called CVE ID numbers (CVE = Common Vulnerability and Exposure). These CVE IDs can be used to create a risk assessment and prioritisation for own modules in order to initiate appropriate protective measures, such as an AI-based embedded intrusion detection system (IDS).

»

The cybersecurity of the eDNP/8331 is an important milestone to us. In addition to OTA software updates and automatic cyber attack pattern recognition in IoT data streams, we can now also generate a software bill of materials (SBoM) for eDNP/8331 applications. This fulfils one of the main requirements of the EU Cyber Resilience Act.«

Jürgen Fitschen // R&D Manager

Wireless IoT Consultation Hour

Do you have a wireless application that you would like to optimize?

Do you have a networked application that you would like to improve by using wireless technology?

Then we invite you to discuss your specific and individual questions with one of our wireless experts free of charge and without obligation.

You tell us about your problem at your leisure and we will provide you with an initial diagnosis and suggestions on how to proceed!

Dates

Every Wednesday 11 AM to 12 PM
(Online meeting via Jitsi or by phone)

Write us a short e-mail and suggest an appointment between 11 AM and 12 PM on a Wednesday.

Request Appointment

Lecture from SSV at Embedded World Conference

Multi-factor Authentication for Embedded Systems

Our R&D manager Jürgen Fitschen is giving a lecture at embedded world entitled: "Insecure Passwords? MFA Methods for Embedded Systems as Problem Solvers!"

Authorizing users based upon username and password is common practice utilized by all sorts of machines and applications ranging from small embedded devices to large-scale cloud platforms.

But this authentication method comes with the inherent risk of identity theft: Humans tend to select weak passwords that can be guessed by attackers easily, passwords are reused among different applications, passwords are shared with other users, and phishing attacks are getting more and more sophisticated and difficult to detect even for experienced users.

This threat has been recognized by politics and has influenced legislation. The EU directive NIS-2 and the upcoming Cyber Resilience Act (CRA) identify password-based authentication as insecure and demand multi-factor authentication (MFA).

The lecture presents secure and yet easy-to-use techniques for user authentication that mitigate the mentioned attack vectors.

We make use of arising technologies like FIDO2 and utilize tools like the programming language Rust in the context of embedded devices.

The lecture will conclude with a quick demo showcasing a compliant multi-factor authentication.

Where and when?

Thursday // 11.04.24 // 10:00 AM - 10:30 AM

Embedded World Conference 2024
SESSION 4.7 SAFETY & SECURITY
Security Architectures & Technologies 1

Here is the complete conference program.

SSV Software Systems GmbH

Dünenweg 5
30419 Hannover

Phone: +49(0)511 · 40 000-0
Fax: +49(0)511 · 40 000-40

sales@ssv-embedded.de


Imprint    ·    Privacy Policy    ·    Terms & Conditions

© 2024 SSV SOFTWARE SYSTEMS GmbH. All rights reserved.

ISO 9001:2015