M2M SIM Cards I Distribution
with no nasty shocks when the bill arrives. The portal enables individual profiles to be configured with a specific tariff and roaming options. Individual threshold values for data volumes can be defined. If these are exceeded, an alarm is sent. The same applies if actual usage exceeds the volume defined in the tariff. This is often the case as it is not generally possible to predict the actual data volume. Consequently, extremely high costs may be incurred due to completely incorrect tariff models. Errors when programming the machine or incorrect usage can also lead to unexpectedly high costs that are usually only noticed when the bill arrives from the network provider. The portal for the SIM cards provides end users with a real-time overview at all times. It allows them to adjust tariffs flexibly at any time and issues an immediate warning if unusual usage patterns are detected.
Security at all levels
Along with costs, security is the key factor behind the success of M2M applications. Fears that confidential information and IP addresses can be disclosed, and concerns regarding excessive transparency and vulnerability to attack are among the most significant barriers to the acceptance of Industry 4.0 applications. These fears are not unfounded, as the ever-increasing reach of networks is leading to an exponential increase in the number of weak points and loopholes for malware or spyware. However, outages and improper use can also have disastrous consequences. For this reason, M2M applications require security mechanisms at multiple levels.
The first of these relates to the connection itself, which requires continuous, uninterrupted network coverage. In this context, the SIM cards and chips from m2mAIR offer a unique feature: the roaming option for a particular country enables the connection to switch automatically and seamlessly to another network if the first network should fail. This option is decisive particularly for safety-critical application such as alarm or tracking systems. However, it can also play a role in industrial automation, medicine or other applications. Global network providers will offer continuous coverage from a single source and across national borders. Not only does this guarantee seamless connections worldwide, it also minimises the costs and workload associated with tariff management, services and support. Furthermore, the SIM cards themselves play a decisive role in providing reliable connectivity. For this reason, the m2mAIR cards and chips are specially designed to cope with industrial application requirements.
Access prohibited The second level provides protection against spyware and malware as well as unauthorised use. This is provided by a multi-layered security structure, which integrates the security mechanisms of the mobile phone operator and the firmware of the GSM module or application. It is made up of numerous solutions aimed at ensuring identity protection as well as providing protection against communications interception and data
theft. The core solutions include IPsec VPN tunnelling from the module to the back end using powerful SSL encryption. The allocation of a specific APN (Access Point Name) for the respective tariff prevents a stolen SIM card from being misused. The use of SIM authentication and a PIN code also contribute to security. This is because they require either explicit or hardware-implicit authentication before the connection is established. SMS communication is also secured: an SMSC (Short Message Service Centre)
ensures that each SMS originates from a valid SMSC, which makes it impossible to use a fake IP address to send false commands to an M2M application. The Embedded Jamming Detection diagnostic tool can detect attempts to block the network coverage, either in real time or retrospectively.
Rutronik |
www.rutronik.com
Bernd Hantsche is Marketing Director Wireless at Rutronik
www.cieonline.co.uk
Components in Electronics
September 2014 15
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52