01 Dec 2021 | IN-6357
Related Service
Related Insights
IoT Device Management and the FIDO Alliance: Has the Time Come for Zero-Touch Device Onboarding?
Insight | 1Q 2022 | IN-6458
Competitive & Market Intelligence
Sharpen positioning, deliver actionable insights, and support key stakeholders.
Executive & C-Suite
Drive organizational success, capture growth, and mitigate risks with rapid access to strategic intelligence.
Marketing
Boost engagement, repurpose compelling content, and generate qualified leads with research-driven thought leadership.
Product Strategy
Accelerate product success, secure executive buy-in, gain third-party endorsement, and strengthen positioning.
Startup Leader & Founder
Validate markets, secure funding, raise awareness, and scale confidently.
Users & Implementers
Maximize ROI, streamline adoption, find the best partners, and optimize outcomes with expert guidance.
Hyperscalers
Adapt quickly, stay competitive, and meet customer demands amid AI disruption and shifting geopolitical challenges.
Industrial & Manufacturing
Accelerate digital transformation, secure operations, and turn competitive advantages into measurable revenue.
Industry & Trade Organizations
Boost membership, unify stakeholders, accelerate standards, and strengthen influence to deliver member value.
Semiconductor
Secure operations, advance digital transformation, and maintain market leadership with confidence and clarity.
Supply Chain
Build resilience, reduce risks, and streamline operations while driving digital transformation success.
Telco & Communications
Monetize 5G, capture enterprise opportunities, and accelerate cloud-native transformation for sustainable growth.
All News & Resources
Log In to unlock this content.
This content falls outside of your subscription, but you may view up to five pieces of premium content outside of your subscription each month
You have x unlocks remaining.
What Does the Future Hold for IoT Device Management Platforms? |
NEWS |
A core purpose of deploying a commercial IoT solution is to reduce truck rolls for businesses. Remote hardware configurability has the potential to directly improve truck roll–related performance metrics. It can form a core part of the value proposition for future IoT device management services. Remote hardware configurability is the ability to turn on or off certain elements of the hardware, such as low-power wide-area transmitters and receivers. The trend toward common standards in the IoT industry includes not only newer industry standards like the Lightweight Machine-to-Machine (LWM2M) protocol but also FIDO Device Onboard (FDO). The former makes it possible to have remote hardware configurability while the latter addresses concerns about security when deploying IoT devices that are expected to become increasingly sophisticated in their hardware configurability functions in the field.
The Increasing Need for Remote Hardware Configurability |
IMPACT |
For many device management customers, remote hardware configurability requires more than just hardware; it requires device managers to fulfill certain security criteria and for device managers to also offer group policies for connected things. The group policies facilitate the configuration of a group of sensors deployed in a certain area of the factory or a fleet of sensors (telematics units) attached to a group of automotive vehicles. Remote hardware configuration can be performed on multiple devices instead of manually on each individual device. To deliver these services, a sophisticated over-the-air update mechanism is important since (1) it allows security fixes to be provided and (2) managing a mid–device firmware upgrade failure often requires reverting the firmware and system files back to the previous version. These are all core functions of a device manager, and therefore device managers are vital for facilitating remote hardware configurability in bulk and in maintaining a secure environment.
Chipset vendors such as Qualcomm have started offering chipsets that are LWM2M compliant, and this not only simplifies both interoperability and the onboarding process but also introduces the potential for remote hardware configuration on an entire fleet of devices. LWM2M is a key driver in accelerating hardware configurability in certain industry verticals like utilities and energy (smart meters and water leak sensors) that can run on a datagram transport layer security network protocol. Also, since LWM2M-compliant chipsets have device agents natively built in (See “IoT Solutions Transition from Proof-of-Concept to Deployment: How Device Agents Enable Critical Device Management Services,” IN-6301), it is possible to leverage those device agents and configure hardware level settings remotely by switching the on or off components within the sensor (such as transmitters or receivers) to preserve battery life.
What Are the Headwinds Facing Remote Hardware Configurability? |
RECOMMENDATIONS |
Implementing remote hardware configurability in IoT deployments requires more than just hardware. The benefits can only be leveraged once a device management platform is ready to deliver remote configuration from instructions on the user’s dashboard to the device itself. Most importantly, remote hardware configurability gives customers the flexibility to optimize their IoT deployment by balancing energy efficiency with performance requirements. This gives the customer greater control over their IoT fleet and provides them with flexibility to adjust the fleet’s hardware regarding data-driven insights, which are generated through predictive analytics.
Remote hardware configuration has been held back in resource constrained environments due to energy constraints caused by cloud computing since a greater amount of data transfer to a server for running analytics would lead to greater use of network connectivity and accelerate energy consumption on battery powered devices. This hurdle has been overcome in large part due to edge-computing environments with an analytics framework such as Tiny Machine Learning (TinyML) that can function on low-compute devices. Since advancements in edge compute now go beyond business rules (i.e., it’s more than a contingency rule when device connectivity with the cloud falters) and includes performing analytics with a lower latency response at the edge instead of higher latency cloud-based analytics applications, it becomes possible to leverage remote hardware configuration. This is because the analytics are performed at a relatively lower cost to energy consumption than before, and so TinyML addresses the energy constraints and the analytics have to be implemented, making remote hardware configurability a useful feature in avoiding truck rolls.
To conclude, remote hardware configurability has historically faced hesitancy from hardware manufacturers (including module and gateway original equipment manufacturers). This hesitancy has been confirmed by numerous research interviews conducted by ABI Research’s IoT Network & Services Research Service. The main motivation behind hardware vendors’ preventing remote configuration of hardware is an overriding concern of security—especially fears that a hostile actor could exploit a remote hardware configuration mechanism and execute malicious code. These concerns are being addressed through access control that helps to prevent hackers from leveraging one compromised device to access other devices on the network. While FDO addresses concerns about knowledge-based secrets (passwords) being compromised and about device onboarding, the role of secure boot and trusted platform modules requiring a hardware root of trust while remotely configured devices have an altered boot sequence remains an open question in order for hardware configurability to truly surmount hurdles.
Insight | 1Q 2022 | IN-6458