I O T The Internet Of Things

This page is under construction” in that it is an area I am exploring and suffering some amazement as to how much I did not know (no surprises there then).

NarrowBand IOT - DATED IN 2015

https://www.3gpp.org/news-events/1733-niot

September 17, 2015, Phoenix, USA

A major milestone was achieved this week in RAN (Plenary meeting #69) with the decision to standardize NB-IOT, a new narrowband radio technology to address the requirements of the Internet of Things (IoT). The new technology will provide improved indoor coverage, support of massive number of low throughput devices, low delay sensitivity, ultra-low device cost, low device power consumption and optimized network architecture.

It sounds to me like current offers to building owners are continuing to be traditional BAC wired systems and these will have the following characteristics:

 traditional hard- wired BAC (Building Automation and Control) systems are 

costly to install, as I understand it the cost reduction is VAST, for example 10 Eur for ten years: https://1nce.com/en/pricing/ I have not tested this, but if true it compares to thousands (£8,000 for one building I know) of infrastructure wired costs not being required. The order process requires business to business only and is of German origin.

difficult to extend, and (difficult because building wiring is not easy)

inflexible when it comes to adding new functions that match evolving building use. (same reason as above, no plug and play here).

So why has a supplier not offered a modern solution?

Source: 

resources.lora-alliance.org/smart-buildings/augmenting-bacnet-with-lorawan-wireless-iot

MORE DEPTH

http://lora-alliance.org/search-site/?_sf_s=British%20Telecom

Search for your desired suppliers, there are quite a few.

https://en.wikipedia.org/wiki/Machine_to_machine

LoRa is the de facto wireless platform of Internet of Things (IoT).

LoRaWAN®?The LoRaWAN open specification is a low power, wide area networking (LPWAN) standard based on Semtech’s LoRa devices, leveraging the unlicensed radio spectrum in the Industrial, Scientific and Medical (ISM) band. The http://www.lora-alliance.org/, a nonprofit association and fast growing technology alliance, drives the standardization and global harmonization of the LoRaWAN standard. LoRaWAN is recognized by the International Telecommunication Union (ITU) as an LPWAN standard.LEARN MORE

LoRa Alliance®

The LoRa Alliance® is an open, non-profit association with the mission to support and promote the global adoption of the LoRaWAN® standard, the leading LPWAN.

Members collaborate in a vibrant ecosystem of device makers, solution providers, system integrators and network operators, delivering interoperability needed to scale IoT across the globe, using  public, private, and hybrid networks.

Look for the LoRaWAN® certified mark on end-devices to ensure consistent performance of IoT sensors.

Buildings

LoRaWAN®  has already become the de facto wireless protocol for smart buildings by providing low power, long range connectivity within large-scale commercial implementations. LoRaWAN® allows building managers, owners, tenants and service providers to view building functions remotely and ensure all the things within the building work in harmony.

It’s not all good read this:

Defences

https://duckduckgo.com/?q=iot+ransomeware+defences&ia=web
https://blog.cybermdx.com/3-ryuk-ransomware-defenses
https://www.itminister.co.uk/blog/ransomware-defense/
https://azure.microsoft.com/en-us/resources/azure-defenses-for-ransomware-attack/
I have had only BAD experiences with Trend Micro, however maybe you have not so:
https://www.trendmicro.com/vinfo/us/security/news/internet-of-things/iot-security-101-threats-issues-and-defenses
https://blog.trendmicro.ch/iot-and-ransomware-a-recipe-for-disruption/

Veeam_Ransomware_Retrospective.indd

Successful backups are the last line of defense for cyberattacks and can be the deciding factor to prevent considerable downtime, data loss and paying a costly ransom.

and from VEEAM to quote:

Veeam_Ransomware_Retrospective.indd

Mitigating ransomware attacks

End-user education (20%), bolstering backup storage resiliency (19%) and securing internet access (16%) are the top choices of ransomware mitigation globally. Similar results are seen from a geo perspective where NA, LATAM and EMEA/MEA are more apt to invest in detection, while NA was more likely to use additional network monitoring for mitigation.
To better mitigate ransomware vulnerabilities, customers are now focused on bolstering backup storage resiliency, through immutability, investing in end-user education and securing internet access.

MY OPINION

See above where it says immutability?” It has seemed to me for some time that aside from totally offline (that means disconnected sitting on a shelf) this is the ONLY type of backup defence that can be viewed as likely to be effective. It looks like the experession backup resiliency” (which means nothing at all unless defined) is used to mean immutability”. Ok adding in to it expressions like education” and securing access” are not in my view backup methods, they are defences, for sure, but they are not part of backups. So my whole paragraph here reduces all online defences that are capable of being effective are solely only and nothing else except immutabilty. That means copying your data to a W O R M drive. And no one can have rights to that drive, bceause if someone physically steals it all is for nought. So it needs to be off site and in the cloud so no one actually knows where it is. In reality this leaves small businesses etc with Amazon S3 type storage as the only current provider I am aware of. Backblaze offers compatible resources.

All of that said I think what surprises me is the absence from common knowledge about immutable storage

W O R M stands for Write Once Read Many; so once written it can be read but never deleted (written again). That means immutable”. I plan to have another look at Veeam, but I THINK they are not aimed at small biz.

Other Quoted from Intertrust paper

According to a study by the Ponemon Institute, 63% of CISOs believe that participation in IoT will increase cybersecurity risks in the future8, and that over 80% of professionals predict that their organization will experience a catastrophic data breach caused by an unsecured IoT device.

The industry is still grappling with how to secure IoT deployments. A comprehensive security approach takes into consideration different technologies, policies, and processes. Organizations interested in exploring security standards for IoT can refer to (NISTIR) 82229, Industrial Internet Consortium10 and IoT Security Foundation11. These specify security frameworks for IoT and tell how to assess and improve their ability to prevent, detect, and respond to security incidents.

and I agree with this:

IoT is disruptive technology that is growing rapidly. However, without proper security, it will never reach its full potential.

I would add to that, that ordinary folk need access to all this tech without any massive uplift in prices. So that’s retail, but IOT retail” - so to provide context for example one present business offer is ten years unlimited worldwide IOT cellular service for only ten Euros, just as an example to compare with the current 50 Euros per month type offers.

August 25, 2025


Previous post
How To Run Up Fees Don’t like your professional’s fees? Don’t waste their time. Pay attention when asked. Focus on their requests. Provide 100% of what they ask for.
Next post
Iht Home Doc dated 18 April 2025 In the UK, the inheritance tax (IHT) allowance regarding the matrimonial home is primarily covered under two main