End-to-End M2M, Seventh Edition

End-to-End M2M, Seventh Edition

$3,995.00

Publication ID
MIC0213002
Publication Date
December 17, 2014
Pages
1287
Regions Covered
Publisher
Mind Commerce
Machine-to-machine (M2M) communications has historically represented the integration of microprocessors, microcontrollers and sensors with communications, monitoring and control systems to improve efficiencies and effectiveness of business operations. The introduction of the Internet of Things (IoT) is taking M2M to entirely new level as applications are rapidly expanding beyond traditional boundaries. One of the anticipated impacts of IoT will be rapid growth of consumer oriented M2M applications and increased involvement of consumers as a key element of the M2M value chain.
 
Written by industry experts who have actually designed, implemented and operated M2M applications, the seventh edition of End-to-End M2M provides invaluable information for anyone seeking to better understand the technology, applications, business and regulatory issues. This research distinguishes itself from other publications on this topic by providing the reader with an understanding of M2M, the technologies involved in M2M, reasons to use M2M, key M2M applications, challenges in deploying M2M, and more.
 
The report includes forecast data for the period 2014 – 2019 with analysis of key drivers, success factors, and industry dynamics. All purchases of Mind Commerce reports includes time with an expert analyst who will help you link key findings in the report to the business issues you're addressing. This needs to be used within three months of purchasing the report. Purchasers of this report at the Company-wide License level will receive a complimentary copy of the report “Machine-to-Machine Communications: What Executives and IT Leaders Need to Know about M2M and its Role in Support of IoT
Target Audience:
 
  • Mobile network operators
  • M2M/IoT platform providers
  • Wireless infrastructure vendors
  • M2M hardware solution providers
  • M2M system Integrators/consultants
  • M2M enabled application developers
  • M2M platform (CDP, AEP, ADP) providers
  • M2M network security solution providers
  • Cloud & Data as a Service (DaaS) companies
  • VNOs/M2M network connectivity aggregators
  • Embedded module and sub-component vendors
  • Investment firms: private equity and hedge funds
Industry verticals of all types the following segments:
  • Agriculture
  • Automotive
  • Construction
  • Consumer Electronics
  • Healthcare
  • Industrial Automation
  • Intelligent Buildings
  • IT & Networks
  • Logistics
  • Public Safety
  • Retail and Vending
  • Security
  • Smart Cities
  • Transportation
  • Utilities
Report Benefits:
  • M2M forecasts from 2014 – 2019
  • M2M case studies for different industries
  • Understand M2M security issues and challenges
  • Learn leading company strategies and industry impact
  • Understand M2M ecosystem, value chain and platforms
  • Identify factors driving M2M analytics market opportunities
  • Identify challenges and benefits of Big Data from M2M solutions
  • Recognize industry dynamics that are leading towards consolidation
  • Identify leading M2M applications and associated market opportunities
1: INTRODUCTION TO M2M 40
1 Overview 41
2 Introduction to M2M 43
3 Predictions 46
3.1 Predictions of M2M in different sectors 56
3.1.1 Smart Grid 56
3.1.2 Water Meters 57
3.1.3 Healthcare 57
3.1.4 Smart Meters 59
3.1.5 Smart City 60
3.1.6 Retail 60
3.1.7 Connected Building 61
3.1.8 Connected People 61
3.1.9 Connected Vehicles 61
3.1.10 Connected Consumer Gadgets 62
3.1.11 Connected Infrastructure 62
3.1.12 Connected Industrial Process 63
3.1.13 Connected Money 63
3.1.14 Big Data 63
4 Importance of M2M 65
4.1 Mobility 65
4.2 Flexibility 66
4.3 Real-time Access to Information 66
4.4 Profitability 66
4.5 Deployment 67
4.6 Speed & Cost 67
4.7 Replace Existing Processes and Procedures 67
4.8 Efficiency 68
4.9 Competitive Advantage 68
4.10 Integrating IT systems 68
5 Key Barriers to Scaling M2M Technologies 69
5.1 Lack of Universal Standards 69
5.2 Fragmented Value Chain 69
5.3 Communication and Marketing Challenges 70
5.4 Lack of Use Cases 70
5.5 Incompatible Sales Models and Long Sales Cycle 70
6 Applications 72
6.1 Fleet Management 72
6.2 Manufacturing 72
6.3 Healthcare 73
6.4 Automotive and Connected Car 73
6.5 Supply Chain Management 74
6.6 Retail Management 74
6.7 Field Service 74
6.8 Smart Home 75
6.9 Smart Buildings 75
6.10 Safety Compliance 76
6.11 Smart Appliances 76
6.12 Smart Resources Extraction 76
6.13 Smart Grids and Utilities 76
6.14 Security and Surveillance 77
6.15 Usage-based Insurance 77
6.16 Agriculture 77
6.17 Environmental Monitoring 78
6.18 Military 78
6.19 Product Monitoring 79
6.20 Predictive Maintenance 79
7 M2M Basics 80
8 Logical Building-blocks of M2M 81
8.1 Data Acquisition 81
8.2 Data Transmission 83
8.3 Data Analysis 84
9 M2M Ecosystem 86
9.1 End Device / Equipment 86
9.2 Consumer/End-user 87
9.3 Communication Link 87
9.4 Sensors 88
9.5 Applications 88
9.6 Middleware Platform 89
9.7 Embedded Module 91
9.8 Subscriber Identity Module (SIM) 92
10 Overall M2M Ecosystem 93
11 M2M Value Chain 94
11.1 Equipment Supplier 94
11.2 Software Publisher 95
11.3 Telecom Operator 95
11.4 Consulting Firm 95
11.5 Integrator 96
11.6 Distributor 96
12 Vertical and Horizontal Platforms 97
13 Technical Drivers for M2M 99
14 M2M Technology Drivers 100
14.1 Versatile Communications Networks 100
14.1.1 Cellular 101
14.1.2 Satellite 103
14.1.3 WiFi 104
14.1.4 Bluetooth 105
14.1.5 ZigBee 105
14.2 Affordable Geolocation 106
14.3 Lower Cost Specialized Sensors 108
14.4 Integrated, Special-Purpose Devices Now Affordable 111
14.4.1 Readymade M2M devices 112
14.5 Efficiency of Autonomous Software-Driven Decisions 113
14.6 M2M Platform Advantage 115
14.7 Big Data Analytics and Actionable Information 118
15 Internet of Things (IoT) 121
15.1 Government Internet of Things (GIoT) 124
15.2 Business Internet of Things (BIoT) 125
15.3 Industrial Internet of Things (IIoT) 125
16 Role of Satellite in M2M 126
16.1 Satellite for Asset Tracking 127
16.2 Details on Satellite Communication for M2M 129
16.3 Hybrid or Dual Communication for M2M 130
16.4 New Market for Satellite Players 132
16.5 Alliances and Acquisitions in Satellite M2M 134
16.5.1 Orbcomm Acquires GlobalTrak and MobileNet 135
16.5.2 Inmarsat and ORBCOMM in M2M Alliance 136
16.5.3 Inmarsat partners with RacoWireless 137
16.5.4 Orbcomm Acquires Skywave 138
17 Choosing a Wireless Service Provider 139
17.1 SIM Cards 139
17.2 Activations 140
17.3 Cost per SMS / Data Block 140
17.4 SMS / Data Retry Scheme 141
17.5 SMS Delivery Receipt 142
17.6 Store and Forward 142
17.7 Roaming 142
17.8 SLAs 142
17.9 SMS with GPRS and 3G 143
17.10 Billing Services 143
18 Managing M2M Development Projects 145
18.1 Project Manager Assignment 145
18.2 Detailed M2M Development and Launch Plan 145
18.3 Consider Open Source M2M Frameworks 146
18.4 Monitor the M2M Project's Business Model 147
18.5 Budgetary Control throughout Lifecycle 148
18.6 Network Choice 149
18.7 Secured Connectivity 150
18.8 Components Selection 150
19 Standardization 152
19.1 oneM2M 155
19.2 Zigbee 156
19.3 ETSI 159
19.4 GSMA 160
19.5 Global M2M Association (GMA) 161
19.6 M2M World Alliance 162
19.7 AllSeen Alliance 162
19.8 ITU-T 164
19.9 ESO 164
19.10 IIC 164
19.11 Present and Future of M2M Standards 165
20 Concluding Remarks 168
2: VERTICAL MARKET SECMENTS AND APPLICATIONS 169
1 Overview 170
2 Connected Car 173
2.1 Introduction 173
2.2 Safety, Security and other Connected Car Services 174
2.2.1 Breakdown Call (bCall) 175
2.2.2 Stolen Vehicle Tracking (SVT) 175
2.2.3 Remote Diagnostics 176
2.2.4 Insurance Services 176
2.2.5 Connected Navigation 177
2.3 Connected Vehicles 178
2.4 V2X Communication 179
2.5 Connected Car Features 181
2.6 Role of Government in Connected Vehicles 182
2.7 Environmental Benefits of Connected Car 187
2.8 Key Challenges of Connected Car 188
2.9 Downside of Connected Car 190
2.10 Manufacturer Efforts for Connected Car 192
2.11 Future of Connected Car 196
3 Smart City 198
3.1 Essential Elements of a Smart City 202
3.2 Creation of Smart Cities 203
3.3 Smart City Framework 203
3.4 Smart City Features 208
3.5 Cities Most Ready for Smart City Concept 210
3.6 Smart City Progress in China 213
3.7 Smart City Progress in India 215
3.8 Smart City Progress in Spain 218
3.9 EU backs Next Wave of Digital Growth 219
3.10 Wireless Network in Santander 220
3.10.1 Transport 220
3.10.2 Energy 221
3.10.3 Waste Management 222
3.10.4 Environment 222
3.11 Smart City Progress in Brazil 223
3.12 Implementation of Smart City across the Globe 224
3.13 Standards for Smart City 228
3.14 FI-WARE 229
3.15 Concluding Remarks 232
4 Smart Home and Building Automation 233
4.1 Smart Building 234
4.2 Security 237
4.3 Facilities Control 238
4.4 Standardization for Solutions in Smart Home 242
5 Utilities 244
5.1 Smart Meters 244
5.2 Smart Grids 246
5.3 Commercial Energy Management 248
5.4 Personal Energy and Home Energy Management 250
6 Oil and Gas 251
6.1 Remotely Monitored Oil and Gas Assets 252
7 Healthcare 257
7.1 Remote Patient Monitoring 258
7.1.1 Wearable Device Types 260
7.2 Mobile Health (m-Health) 261
7.2.1 mHealth Market Size 263
7.2.2 m-Health Market in Russia 266
7.2.3 Market Barriers and Drivers 267
7.2.4 Trends and Forecasts of m-Health Market Development 268
7.2.5 Medication Management 269
7.2.6 Device Monitoring and Management 270
7.2.7 Assisted living for elderly 270
7.2.8 M2M Healthcare Applications 271
7.2.9 M2M in Healthcare Partnerships 280
8 Manufacturing 284
8.1 M2M and the Factory Floor 284
8.2 M2M Driven Changes to Manufacturing 285
8.3 Future of M2M in Manufacturing 288
8.4 Internet of Things (IoT) Kit 293
9 Distribution 295
9.1 Supply Chain 295
9.2 Remote Inventory Management 297
10 Retail 300
10.1 Challenges faced by Retail Industry 304
10.2 Digital Signage 307
10.2.1 Brands in Retail Stores 309
10.2.2 Healthcare 310
10.2.3 Transportation 311
10.2.4 Waiting Rooms and Break Rooms 311
10.2.5 Advertising 312
10.2.6 Airline Industry 314
10.2.7 Important Factors to consider for Deploying Digital Signage 314
10.2.8 Types of Digital Signage Networks 316
10.2.9 Media Mapping 318
10.2.10 Concluding Remarks 319
10.3 Connected Vending 319
10.4 Point of Sale (POS) 322
10.5 M2M Applications in Market for Retail 324
10.5.1 Revel Systems POS 324
10.5.2 Square Register 325
10.5.3 Solution from Verizon 325
10.5.4 Solution from Sprint 326
10.5.5 Mobile Shopper 328
10.6 Tablets and M2M in Retail Inventory Management 329
10.7 Kiosks and Out of Home Networks 331
10.7.1 Interactive Kiosks 331
10.8 Digital Signage 332
11 Transportation 335
11.1 Commercial Fleets 336
11.2 Monitor and Control Cargo Vessels 340
Rules of the sea 343
11.3 Personal Transportation 343
11.4 Railways 347
12 Asset Tracking (including living things) 350
13 Agriculture 355
13.1 Basics of M2M Application in Agriculture 355
13.2 Challenges for M2M in Agriculture 356
13.3 M2M Benefits to the Agriculture Sector 357
13.4 Supply Chain Aspects of Agriculture 358
13.4.1 Smart Logistics 360
13.5 M2M Application Potential for Agriculture 361
13.5.1 Ammonia Tank Monitoring 363
13.5.2 “Precision Agriculture” for Planting, Cultivation, and Harvesting 363
13.5.3 Remote Monitoring – Environmental and Plant and Livestock 364
13.5.4 Automatic Irrigation 364
13.5.5 Farm Monitoring 365
13.6 M2M Applications in Market for Agriculture 365
13.6.1 Monitoring of Lactation cycles of Animals 365
13.6.2 Application using RFMicron 367
13.6.3 Telematics Solution from CLAAS 370
13.6.4 Crop Solution 372
13.6.5 Remotely Control Greenhouse 372
13.6.6 Solution in Farming 373
13.6.7 Solution Providers in M2M Agriculture 374
13.6.8 Urban Agriculture 379
14 Military 387
15 Environmental Sciences 390
15.1 M2M Applications in Environmental Sciences 390
15.1.1 Collecting Forest Information 390
15.1.2 Projects and Technologies 391
15.1.3 Battling Forest Fires 392
16 Insurance Industry 394
16.1 UBI in European Market 396
16.1.1 Onward and Upward with UBI 397
16.1.2 The Rest of Europe 398
16.1.3 Italy 399
16.1.4 United Kingdom 400
16.1.5 France and Germany 400
16.1.6 The Value of Value-added Services 402
16.1.7 The Role or German OEMs 402
16.1.8 Other UBI Drivers 403
16.1.9 The Google Wild Card 404
16.2 Insurance Applications 405
17 Security and Surveillance 409
17.1 Safety Features for Aircrafts 409
17.2 Safety Features for Safe Living based on M2M 410
17.3 Safety Features for Travel based on M2M 411
17.4 Safety Features for Workplace based on M2M 411
18 Wearable M2M 412
18.1 Basics of Wearable M2M 412
18.2 Latest Wearable Devices 413
19 Concluding Remarks 421
3: M2M RELATED TECHNOLOGIES 422
1 Overview 423
2 Introduction 425
3 Block # 1: The Field-Deployed Hardware and Firmware Technology 426
3.1 Analog-to-Digital and Digital-to-Analog Converter 429
3.2 Memory 430
3.3 Input / Output (I/O) 430
3.4 Power Module 431
3.5 Processor and Clock 431
4 Block # 2: Connectivity - Wireless Service Standards, Technology and Protocols 434
4.1 Wireless Standards 434
4.1.1 GSM (Global System Mobile) 435
4.1.2 CDMA (Code Division Multiple Access) 437
4.1.3 WiMAX 439
4.2 The Technologies and Bearers of Choice 440
4.2.1 GPRS (General Purpose Radio Service) 441
4.2.2 CDPD (Cellular Digital Packet Data Protocol) 442
4.2.3 1xRTT or CDMA2000 443
4.2.4 Control Channel – SMS, Analog Control Channel 443
4.2.5 3G Wireless 448
4.2.6 Circuit Switched 450
5 Block # 3: Back-end Server Technology 453
5.1 Gateway to Wireless Carrier or Service Provider 453
5.1.1 3G–GPRS, 1xRTT Packet 454
5.1.2 Delivery of SMS to the Internet 454
5.2 Server Processes via Out-bound M2M Message 457
5.2.1 Add a Layer of Security 457
5.2.2 Provide Billing Services 457
5.2.3 Enable Customer Care 458
5.2.4 Log and Manage Traffic 459
5.2.5 Interpret Inbound and Outbound M2M Messages 459
5.3 Software to Display, Create and Monitor M2M 460
5.3.1 Developer’s dilemma 463
5.3.2 Platform Types 465
6 Wireless Technology Recommendations 470
6.1 GSM SMS 472
6.2 CDMA 1xRTT 473
6.3 WiFi 473
6.4 WiMAX 474
6.5 ZigBee 475
6.6 6LoWPAN 476
6.7 iBeacon 477
7 M2M Application Deployment Challenges 481
7.1 Privacy and Security Issues 481
7.2 Fragmentation and Slow Growth 483
7.3 Deployment of IPV6 484
7.4 Deployment of M2M application 485
8 Small Cells Technology for M2M 486
8.1 Picocell 486
8.2 Femtocell 488
8.3 MicroCells 489
8.4 Metrocells 491
8.5 Advantages and Working Principles 492
8.6 Comparing Microcells, Picocells, and Metrocells 494
9 3G 496
10 4G 498
11 LTE 501
12 RFID Overview 505
12.1 Benefits of RFID technology 505
12.2 RFID Technology and Applications 506
12.3 RFID Basics 507
12.4 History of RFID 508
12.5 RFID Developments 510
12.6 Active RFID 510
12.7 UHF RFID History 511
12.8 RFID Tag Elements 513
12.9 RFID Tag Types 514
12.10 RFID Reader elements 519
12.11 RFID Printers 520
12.12 Antenna Basics 522
12.13 RFID Privacy 523
12.14 RFID Standards Bodies 526
13 Near Field Communications (NFC) 528
13.1 NFC Basics 528
13.2 NFC Applications 529
13.3 NFC History and NFC Forum 531
13.4 NFC vs. other Wireless Technologies 532
13.5 NFC Technology RF Interface 533
13.6 NFC Data Transfer 534
13.7 NFC Device Types 534
13.8 NFC Standards and Capabilities 536
13.9 NFC Tag Basics 536
13.10 NFC Tag Type Definitions 537
13.11 NFC Tag Operation 539
13.12 NFC Tag Design and Manufacture 540
13.13 NFC Security Basics 541
13.14 Eavesdropping 542
13.15 Data Corruption 543
13.16 Data Modification 544
13.17 Man-in-the-middle 544
13.18 NFC Secure Channel 545
14 Embedded Systems 547
15 Sensors 552
15.1 Sensor Classification 552
16 M2M Sensors 556
16.1 M2M Sensor Challenges 558
16.2 M2M Sensor Requirements 562
17 Wireless Sensor Networks 564
17.1 WSN Definition 564
17.2 WSN Integration Approaches 566
17.3 Challenges of WSNs in IoT 569
17.3.1 Security 569
17.3.2 Quality of Service 570
17.3.3 Configurations 571
17.4 Standards 571
18 Future of Sensors 576
18.1 Sensors Working in Unison for M2M Applications 577
19 Concluding Remarks 581
4: CASE STUDIES 582
1 Overview 583
2 Connected Car 585
2.1 Case: Connected Electric Vehicle 585
2.1.1 The Challenge 585
2.1.2 The Solution 585
2.1.3 The Result 586
2.1.4 Author’s Note 587
2.2 Case: Real-time Vehicle Management Information 588
2.2.1 The Challenge 588
2.2.2 The Solution 588
2.2.3 The Result 589
2.2.4 Author’s Note 590
3 Smart City 591
3.1 Case: Enhance Safety and Improve Traffic Flow 591
3.1.1 The Challenge 591
3.1.2 The Solution 591
3.1.3 The Result 593
3.1.4 Author’s Note 594
3.2 Case: Transaction Processing for Parking Meters 594
3.2.1 The Challenge 594
3.2.2 The Solution 595
3.2.3 The Result 596
3.2.4 Author’s Note 597
3.3 Case: Smart Loo 597
3.3.1 The Challenge 597
3.3.2 The Solution 597
3.3.3 The Result 599
3.3.4 Author’s Note 599
3.4 Case: Smart Bin 600
3.4.1 The Challenge 600
3.4.2 The Solution 601
3.4.3 The Result 602
3.4.4 Author’s Note 602
3.5 Case: SmartSantander (City-scale Experimental Research Facility) 603
3.5.1 The Challenge 603
3.5.2 The Solution 603
3.5.3 The Result 604
3.5.4 Author’s Note 605
4 Smart Home and Buildings 606
4.1 Case: Solution for Improved Oil Efficiency 606
4.1.1 The Challenge 606
4.1.2 The Solution 606
4.1.3 The Result 607
4.1.4 Author’s Note 607
4.2 Case: Monitor Structural Moisture Conditions in Real-time 607
4.2.1 The Challenge 607
4.2.2 The Solution 608
4.2.3 The Result 609
4.2.4 Author’s Note 609
5 Utilities and Energy Management 610
5.1 Case: Energy Data Management 610
5.1.1 The Challenge 610
5.1.2 The Solution 612
5.1.3 The Result 613
5.1.4 Author’s Note 616
5.2 Case: Reducing A/C Power Consumption 616
5.2.1 The Challenge 616
5.2.2 The Solution 618
5.2.3 The Result 618
5.2.4 Author’s Note 619
5.3 Case: Energy Optimization 619
5.3.1 The Challenge 621
5.3.2 The Solution 622
5.3.3 The Result 622
5.3.4 Author’s Note 623
6 Utilities Oil and Gas Management 624
6.1 Case: Cost Saving and Safety Benefits for Oil & Gas Industry 624
6.1.1 The Challenge 624
6.1.2 The Solution 625
6.1.3 The Result 626
6.1.4 Author’s Note 627
6.2 Case: High-Value Asset Monitoring 627
6.2.1 The Challenge 627
6.2.2 The Solution 628
6.2.3 The Result 630
6.2.4 Author’s Note 633
6.3 Case: Propane Monitoring 633
6.3.1 The Challenge 633
6.3.2 Ecosystem 635
6.3.3 The Solution 636
6.3.4 The Result 637
6.3.5 Author’s Note 639
7 Healthcare 641
7.1 Case: Wearable M2M Empowering the Elderly 641
7.1.1 The Challenge 641
7.1.2 The Solution 641
7.1.3 The Result 642
7.1.4 Author’s Note 643
7.2 Case: Comprehensive Remote Patient Monitoring Solutions 644
7.2.1 The Challenge 645
7.2.2 The Solution 646
7.2.3 The Result 647
7.2.4 Author’s Note 648
7.3 Case: Remote Cardiac Monitoring Solution 648
7.3.1 The Challenge 649
7.3.2 The Solution 649
7.3.3 The Result 651
7.3.4 Author’s Note 652
7.4 Case: Breathing Assistance for sleep Apnea Patients 652
7.4.1 The Challenge 653
7.4.2 The Solution 653
7.4.3 The Result 654
7.4.4 Author’s Note 654
7.5 Case: Self-monitor Key Vital Signs 654
7.5.1 The Challenge 654
7.5.2 The Solution 655
7.5.3 The Result 656
7.5.4 Author’s Note 656
7.6 Case: Reduce Need for Re-hospitalization 656
7.6.1 The Challenge 656
7.6.2 The Solution 659
7.6.3 The Result 660
7.6.4 Author’s Note 660
8 Manufacturing 661
8.1 Case: Generate Real-time alerts 661
8.1.1 The Challenge 661
8.1.2 The Solution 661
8.1.3 The Result 662
8.1.4 Author’s Note 662
9 Supply Chain Management (SCM) 663
9.1 Case: Increase Visibility in Supply Chain 663
9.1.1 The Challenge 663
9.1.2 The Solution 664
9.1.3 The Result 664
9.1.4 Author’s Note 665
10 Preventive Maintenance 666
10.1 Case: Preventive Maintenance using Predictive Analysis 666
10.1.1 The Challenge 666
10.1.2 The Solution 667
10.1.3 The Result 667
10.1.4 Author’s Note 668
11 Retail Management 669
11.1 Case: ATM Management 669
11.1.1 The Challenge 669
11.1.2 The Solution 669
11.1.3 The Result 670
11.1.4 Author’s Note 671
11.2 Case: Vending Machine Solution 671
11.2.1 The Challenge 671
11.2.2 The Solution 672
11.2.3 The Result 672
11.2.4 Author’s Note 673
11.3 Case: M2M to Help Bakers Protect Dough Quality 673
11.3.1 The Challenge 673
11.3.2 The Solution 674
11.3.3 The Result 675
11.3.4 Author’s Note 678
11.4 Case: Digital Displays for Marketing 678
11.4.1 The Challenge 678
11.4.2 The Solution 679
11.4.3 The Result 681
11.4.4 Author’s Note 683
11.5 Case: Vending Machine 683
11.5.1 The Challenge 684
11.5.2 The Solution 684
11.5.3 Business Model 687
11.5.4 The Result 693
11.5.5 Author’s Note 694
12 Transport 695
12.1 Case: Monitor EV Charging Stations 695
12.1.1 The Challenge 695
12.1.2 The Solution 696
12.1.3 The Result 698
12.1.4 Author’s Note 699
12.2 Case: Transportation Safety 700
12.2.1 The Challenge 700
12.2.2 The Solution 701
12.2.3 The Result 702
12.2.4 Author’s Note 703
12.3 Case: Fleet Scalability using Application Enablement Platform 703
12.3.1 The Challenge 703
12.3.2 The Solution 704
12.3.3 The Result 705
12.3.4 Author’s Note 705
12.4 Case: Track and Manage Truck Fleet 705
12.4.1 The Challenge 706
12.4.2 The Solution 706
12.4.3 The Result 707
12.4.4 Author’s Note 707
12.5 Case: Fleet Management 707
12.5.1 The Challenge 707
12.5.2 Ecosystem 708
12.5.3 The Solution 709
12.5.4 The Result 711
12.5.5 Author’s Note 713
13 Asset Tracking / Fleet Management 714
13.1 Case: Global and Secured Fleet Tracking Solution 714
13.1.1 The Challenge 715
13.1.2 The Solution 716
13.1.3 The Result 717
13.1.4 Author’s Note 719
13.2 Case: Tracking and Monitoring Valuable Assets 719
13.2.1 The Challenge 720
13.2.2 The Solution 721
13.2.3 The Result 721
13.2.4 Author’s Note 721
13.3 Case: M2M Connectivity for GPS Tracking 721
13.3.1 The Challenge 722
13.3.2 The Solution 722
13.3.3 The Result 723
13.3.4 Author’s Note 723
14 Agriculture 724
14.1 Case: Internet of Bees to ensure Adequate Pollination 724
14.1.1 The Challenge 724
14.1.2 The Solution 725
14.1.3 The Result 725
14.1.4 Author’s Note 726
14.2 Case: Remote Control of Grain Silos 726
14.2.1 The Challenge 726
14.2.2 The Solution 727
14.2.3 The Result 727
14.2.4 Author’s Note 727
14.3 Case: Bats to Assist in Protecting Crops 728
14.3.1 The Challenge 728
14.3.2 The Solution 728
14.3.3 The Result 729
14.3.4 Author’s Note 729
14.4 Case: Irrigation Management 729
14.4.1 The Challenge 729
14.4.2 The Solution 730
14.4.3 The Result 730
14.4.4 Author’s Note 731
14.5 Case: Weather systems 731
14.5.1 The Challenge 731
14.5.2 The Solution 732
14.5.3 The Result 733
14.5.4 Author’s Note 733
14.6 Case: Monitor Agricultural Produce In-transit 733
14.6.1 The Challenge 733
14.6.2 The Solution 734
14.6.3 Business Model 735
14.6.4 Connectivity Architecture 737
14.6.5 The Result 738
14.6.6 Author’s Note 739
15 Military and Police 740
15.1 Case: Connecting Police Fleets for Increased Safety 740
15.1.1 The Challenge 740
15.1.2 The Solution 741
15.1.3 The Result 742
15.1.4 Author’s Note 743
16 Environmental Sciences 744
16.1 Case: Real-time Water Quality Monitoring Network at the Ganges 744
16.1.1 The Challenge 745
16.1.2 The Solution 746
16.1.3 The Result 747
16.1.4 Author’s Note 748
16.2 Case: Reduce Waste Water 748
16.2.1 The Challenge 748
16.2.2 The Solution 749
16.2.3 The Result 750
16.2.4 Author’s Note 751
16.3 Case: Track and Trace Illegally Harvested Timber 752
16.3.1 The Challenge 752
16.3.2 The Solution 752
16.3.3 The Result 754
16.3.4 Author’s Note 754
17 Safety, Security and Surveillance 755
17.1 Case: Tracking Device for Child Safety 755
17.1.1 The Challenge 755
17.1.2 The Solution 755
17.1.3 The Result 756
17.1.4 Author’s Note 756
17.2 Case: Security Monitoring Solution 757
17.2.1 The Challenge 757
17.2.2 The Solution 757
17.2.3 The Result 758
17.2.4 Author’s Note 759
18 Remote Monitoring 760
18.1 Case: Remote Monitoring for Hunters and Wildlife Enthusiasts 760
18.1.1 The Challenge 760
18.1.2 The Solution 760
18.1.3 The Result 761
18.1.4 Author’s Note 761
18.2 Case: Remote Monitoring solution for Wastewater Management 762
18.2.1 The Challenge 763
18.2.2 The Solution 764
18.2.3 The Result 765
18.2.4 Author’s Note 766
19 Concluding Remarks 767
5: COMPANY INFORMATION AND M2M STRATEGIES 768
1 Overview 769
2 Focus on M2M by Telecom Servicer Providers 771
2.1 New Avenues 771
2.2 Regulatory Requirements 771
2.3 Low Capex Requirement 772
2.4 Scale of Market and Revenue Increase 772
2.5 Spread across Value Chain 772
2.6 Threat from Cloud Service Providers 773
2.7 Unwilling to be a mere Bystander 773
3 Go to Market Factors for Mobile Operators 774
3.1 Business Alignment 774
3.2 People 775
3.3 Route to Market 775
3.4 Collaboration 776
3.5 Branding 777
3.6 Result 778
4 Coexistence of Cellular Communications and M2M 779
4.1 Challenges and Risks faced by Telecom Service Providers 781
4.1.1 Optimum Spread in Value Chain 782
4.1.2 Managing Alliances and Partnerships 783
4.1.3 Optimistic Predictions 783
4.1.4 Need for Technology Standardization 783
4.1.5 Technology Development 784
4.1.6 New Business Models 784
4.1.7 Intense Competition 784
4.1.8 Differing Nature of Services 785
4.2 Industry Analysis 785
5 Five Forces Analysis 786
5.1 Threat of Entry 787
5.1.1 Customer Switching Costs 788
5.1.2 Capital Requirements 788
5.1.3 Incumbency Advantages Independent of Size 789
5.1.4 Restrictive Government Policy 790
5.1.5 Expected Retaliation 790
5.2 Power of Suppliers 791
5.3 Power of Buyers 791
5.4 Threat of Substitutes 792
5.5 Rivalry among Existing Competitors 793
6 Need for Collaboration in M2M 796
7 Strategies adopted by Telecom Service Providers 800
7.1 Establishing M2M platform Capabilities 801
7.2 Establishing M2M competence centers or Digital divisions 803
7.3 Establishing an M2M Sales Force 804
7.4 Engaging Vertical Partners 804
7.5 Partnering to Extend Reach 804
7.6 Providing M2M Developer Tools 805
7.7 Partnering to Share Technology and Knowledge 805
8 Telecom Carriers 806
8.1 Introduction 806
8.2 AT&T 806
8.2.1 Introduction 806
8.2.2 M2M related Products and Services 807
8.2.3 Important Alliances in M2M 810
8.3 Telekom Austria 815
8.3.1 Introduction 815
8.3.2 M2M related Products and Services 817
8.3.3 Important Alliances in M2M 817
8.4 China Unicom 822
8.4.1 Introduction 822
8.4.2 M2M related Products or services 824
8.4.3 Important Alliances in M2M 824
8.5 Deutsche Telekom 826
8.5.1 Introduction 826
8.5.2 M2M related Products and Services 829
8.5.3 Important Alliances in M2M 842
8.6 Etisalat 849
8.6.1 Introduction 849
8.6.2 M2M related Products and Services 851
8.6.3 Important Alliances in M2M domain 856
8.7 Everything Everywhere 861
8.7.1 Introduction 861
8.7.2 M2M related Products and Services 862
8.7.3 Important Alliances in M2M 865
8.8 France Telecom/Orange/Orange Business Services 869
8.8.1 Introduction 869
8.8.2 M2M related Products and Services 869
8.8.3 Important Alliances in M2M 873
8.9 KPN 879
8.9.1 Introduction 879
8.9.2 M2M related Products and Services 880
8.9.3 Important Alliances in M2M 882
8.10 Roger Communication 886
8.10.1 Introduction 886
8.10.2 M2M related Products and Services 886
8.10.3 Important Alliances in M2M 889
8.11 SingTel 892
8.11.1 Introduction 892
8.11.2 M2M related Products and Services 892
8.11.3 Important Alliances in M2M 894
8.12 Telefónica 896
8.12.1 Introduction 896
8.12.2 M2M related Products and Services 898
8.12.3 Important Alliances in M2M domain 901
8.13 Telenor 908
8.13.1 Introduction 908
8.13.2 M2M related Products and Services 909
8.13.3 Important Alliances in M2M 912
8.14 TeliaSonera 917
8.14.1 Introduction 917
8.14.2 M2M related Products and Services 917
8.14.3 Important Alliances in M2M 919
8.15 Telstra 920
8.15.1 Introduction 920
8.15.2 M2M related Products and Services 920
8.15.3 Important Alliances in M2M 922
8.16 Turk Telekom 925
8.16.1 Introduction 925
8.16.2 Important Alliances in M2M 925
8.17 Verizon 926
8.17.1 Introduction 926
8.17.2 M2M related Products and Services 927
8.17.3 Important Alliances in M2M 931
8.18 Vodafone 934
8.18.1 Introduction 934
8.18.2 M2M related Products and Services 934
8.18.3 Important Alliances in M2M 937
9 Company Information and Major Stakeholders 947
9.1 Jasper Wireless 947
9.1.1 Introduction 947
9.1.2 M2M related Products and Services 948
9.1.3 Important Alliances in M2M 951
9.2 Axeda 965
9.2.1 Introduction 965
9.2.2 M2M related Products and Services 966
9.2.3 Important Alliances in M2M domain 967
9.3 Numerex 971
9.3.1 Introduction 971
9.3.2 M2M related Products and Services 972
9.3.3 Important Alliances in M2M 973
9.4 Raco Wireless 976
9.4.1 Introduction 976
9.4.2 M2M related Products and Services 976
9.4.3 Important Alliances in M2M 977
9.5 KORE Telematics 980
9.5.1 Introduction 980
9.5.2 M2M related Products and Services 981
9.5.3 Important Alliances in M2M 982
9.6 Sierra Wireless 984
9.6.1 Introduction 984
9.6.2 M2M related Products and Services 985
9.6.3 Important Alliances in M2M 987
9.7 Hitachi Communication Technologies America, Inc. 988
9.7.1 Introduction 988
9.7.2 M2M related Products and Services 989
9.7.3 Important Alliances in M2M 989
9.8 Digi International 991
9.8.1 Introduction 991
9.8.2 M2M related Products and Services 992
9.8.3 Important Alliances in M2M 992
9.9 Telit 994
9.9.1 Introduction 994
9.9.2 M2M related Products and Services 994
9.9.3 Important Alliances in M2M 996
10 Company Information Satellite Players 1003
10.1 Inmarsat 1003
10.1.1 Introduction 1003
10.1.2 M2M related Products and Services 1005
10.1.3 Important Alliances in M2M 1005
10.2 SpaceQuest 1007
10.2.1 Introduction 1007
10.2.2 M2M related Products and Services 1008
10.3 Globalstar 1009
10.3.1 Introduction 1009
10.3.2 M2M related Products and Services 1010
10.3.3 Important Alliances in M2M 1011
10.4 ORBCOMM 1014
10.4.1 Introduction 1014
10.4.2 M2M related Products and Services 1015
10.4.3 Important Alliances in M2M 1016
10.5 SkyBitz 1017
10.5.1 Introduction 1017
10.5.2 M2M related Products and Services 1018
10.5.3 Important Alliances in M2M 1018
10.6 Iridium 1019
10.6.1 Introduction 1019
10.6.2 M2M related Products and Services 1021
10.6.3 Important Alliances in M2M 1021
11 Concluding Remarks 1023
6: SECURITY AND PROVACY ASPECTS OF M2M 1024
1 Overview 1025
2 Security and Privacy for M2M 1027
3 Attacks Observed in Past 1029
4 Complexity in M2M Security 1032
4.1 Promiscuity across Networks 1032
4.2 Connected Devices Lack Intelligence 1032
4.3 Missing Pieces 1033
4.4 Denial of Power Attacks 1033
4.5 Innovative Ways to Combat Risks 1033
4.6 Designing with Security in Mind 1034
4.7 Stealing Bandwidth 1035
4.8 Antivirus Software 1035
4.9 Time-to-market vs. Security Considerations 1035
5 Control and Security Measure for M2M 1037
5.1 Temporary Access 1037
5.2 Different Level of Authority for Users 1037
5.3 Limited Access 1038
5.4 Open-source Software 1038
5.5 Disclosure of Vulnerabilities 1039
5.6 Analyze Attack Surface 1039
5.7 Secure Design 1040
5.8 Code Signing 1041
5.9 Security in all Layers of Value Chain 1041
5.10 All Stakeholders to Work together for Security 1042
5.11 Usual Security Measures 1045
6 Two points of Attack 1046
6.1 Physical Attacks on Device 1046
6.2 Increase Security on Physical Side (Devices) 1048
6.3 Network Attacks 1048
6.4 Increase Security on Network Side 1050
7 M2M Communication over GSM 1051
8 Collaborations and Standards for Safety 1052
8.1 M2M Standardization Task Force 1052
8.2 IETF 1052
8.3 AllSeen Alliance 1053
8.4 Mobile App Security Working Group 1053
8.5 Standards by Verticals 1055
9 Control vs. Monitoring and Tracking 1056
10 Security Goals of Sensor Networks 1057
10.1 Primary Security Goals 1057
10.1.1 Data Confidentiality 1057
10.1.2 Data Authentication 1057
10.1.3 Data Integrity 1058
10.1.4 Data Availability 1058
10.2 Secondary Security Goals 1058
10.2.1 Data Freshness 1059
10.2.2 Self-Organization 1059
10.2.3 Time Synchronization 1059
10.2.4 Secure Localization 1059
11 Types of Attacks in M2M Sensor Networks 1061
11.1 Passive Attack 1061
11.1.1 Attacks against Privacy 1062
11.2 Active Attack 1063
11.2.1 Routing Attacks in Sensor Networks 1063
11.2.2 Denial of Service 1065
11.2.3 Node Subversion 1066
11.2.4 Node Malfunction 1066
11.2.5 Node Outage 1066
11.2.6 Physical Attacks 1067
11.2.7 Message Corruption 1067
11.2.8 False Node 1067
11.2.9 Node Replication Attacks 1067
11.2.10 Passive Information Gathering 1068
11.3 Security Mechanisms to combat Active and Passive Attacks 1069
11.3.1 Low-Level Mechanism 1069
11.3.2 High-Level Mechanism 1071
11.4 Challenges for Sensor Networks 1073
11.4.1 Wireless Medium 1073
11.4.2 Ad-Hoc Deployment 1073
11.4.3 Hostile Environment 1074
11.4.4 Resource Scarcity 1074
11.4.5 Immense Scale 1074
11.4.6 Unreliable Communication 1075
11.4.7 Unattended Operation 1075
11.5 Active and Passive Security Attacks on WSN 1076
12 Security Requirements for M2M 1078
12.1 Confidentiality 1078
12.2 Integrity 1078
12.3 Authentication 1078
12.4 Non-repudiation 1079
12.5 Access control 1079
12.6 Availability 1079
12.7 Privacy 1079
13 Design Security & Privacy into the System 1081
14 Mechanisms for M2M Security 1083
14.1 Early Detecting Node Compromise in M2M Domain 1083
14.2 Bandwidth Efficient Cooperative Authentication 1084
15 Evolving Elements of Security 1085
16 Security vs. Price or at any Price? 1086
17 Securing the Internet not the Devices 1087
18 Use of IPV6 for M2M Devices 1088
19 Use of Certificate for Security 1089
20 Security to be Deployed by Skilled Personnel 1091
21 Security Threats on OSI layers for WSN 1092
21.1 Physical Layer of OSI Model 1093
21.1.1 Attacks in Physical Layer 1094
21.1.2 Countermeasures for attack in Physical layer 1096
21.2 MAC Layer of OSI Model 1100
21.2.1 Attacks in MAC Layer 1101
21.2.2 Countermeasures for Attack in MAC Layer 1103
21.3 Network Layer of OSI Model 1107
21.3.1 Attacks in Network Layer 1108
21.3.2 Countermeasures for Attack in Network Layer 1112
21.4 Application Layer of OSI Model 1116
21.4.1 Attacks in Application Layer 1116
21.4.2 Countermeasures for Attack in Application Layer 1118
21.5 Concluding Remarks 1120
22 Sensor Network Standardization 1121
23 Privacy Concerns 1123
23.1 Control Factor 1124
23.2 Data Ownership Factor 1125
23.3 Government Initiatives 1126
23.4 Geography 1127
23.5 New aspects of Privacy 1127
24 Privacy & Security Concerns for Big Data 1129
24.1 Automated Access 1129
24.2 Business Continuity Risk 1131
24.3 Non-standard Access Control 1132
24.4 Best Practices 1133
25 Privacy Issues in Cloud Computing 1135
26 Privacy by Design 1137
27 Industry Security Survey 1139
27.1 Introduction 1139
27.2 Survey Participants 1140
27.3 Geographic Reach 1141
27.4 Role of M2M in Application 1142
27.5 Topmost Concerns Deploying M2M Solution 1143
27.6 Topmost Security Concerns Deploying M2M 1144
27.7 Security Solution 1146
27.8 Concluding Remarks on Industry Survey 1147
28 Concluding Remarks 1148
7: CLOUD, BIG DATA, M2M AND ANALYTICS 1150
1 Overview 1151
2 Introduction 1153
3 Three Elements of M2M Application 1155
3.1 Data Mobility 1155
3.2 Big Data 1155
3.3 The Cloud 1155
4 Big Data 1157
4.1 Industry Perspective of Big Data 1159
5 Making Sense out of Data 1166
6 Big Data Business Implications 1171
6.1 Big Data is Catalyst not the Result 1171
6.2 View on Data Sourcing and Permissions 1172
7 M2M and Big Data Applications 1178
7.1 Wireless Carriers 1179
7.2 Better Energy Management 1179
7.3 Auto Insurance 1180
7.4 Smart Cars 1181
7.5 Smart Homes 1183
7.6 Robotics 1184
7.7 Insurance 1184
7.8 Logistics 1185
7.9 Auto Manufacturers Supply Chain 1185
7.10 Manufacturing 1186
7.11 Healthcare 1186
7.12 Utility 1187
7.13 Security and Surveillance 1188
7.14 Asset Tracking 1188
7.15 Enterprises in any Sector 1189
8 Challenges of M2M and Big Data 1191
8.1 Privacy and Data Ownership 1191
8.2 Authenticity and Security 1191
8.3 Skills Scarcity 1192
8.4 Changing Attitudes 1193
9 The Cloud 1194
9.1 Cloud Computing Model 1195
9.2 Characteristics 1195
9.3 Strategic Fit for Cloud Adoption 1197
9.4 M2M and Cloud Integration 1199
9.5 Application Benefits of M2M using Cloud 1201
9.5.1 IaaS 1203
9.5.2 PaaS 1204
9.5.3 SaaS 1204
9.5.4 MaaS 1205
9.5.5 CaaS 1205
9.5.6 Xaas 1205
9.6 Analysis 1208
9.7 Barriers and Challenges to Cloud Adoption 1210
9.7.1 Enterprises Reluctance to Change 1210
9.7.2 Responsibility of Data Security Externalized 1210
9.7.3 Security Concerns 1211
9.7.4 Cyber Attacks 1211
9.7.5 Unclear Agreements 1213
9.7.6 Complexity is a Deterrent 1215
9.7.7 Cloud Interoperability 1217
9.7.8 Audit of Service Provider 1218
9.7.9 Viability of Third-party Providers 1219
9.7.10 Acceptance Issues 1220
9.7.11 Cost 1221
9.7.12 Lack of Integration Features in the Public Cloud 1222
10 Data Analytics 1223
10.1 Factors Driving M2M Analytics Opportunity 1224
10.1.1 M2M Data Growth 1224
10.1.2 New Analytics Technologies 1224
10.1.3 Business Value through Data Analysis 1225
10.2 M2M Analytics Ecosystem 1226
10.3 Competitive Vendor Analysis 1228
10.3.1 Device manufacturers 1228
10.3.2 SI and Professional Services 1229
10.3.3 Management Platform Providers 1229
10.3.4 Software and Application Developers 1229
10.3.5 Communication Service Providers 1230
11 Concluding Remarks 1231
8: M2M ANALYSIS AND FORECASTING 1232
1 Overview 1233
2 Global M2M Industry Size 2014 - 2019 1234
3 Global M2M Market Revenue 2014 - 2019 1235
4 Global M2M Service Revenue 2014 - 2019 1236
5 Global M2M Connections 2014 - 2019 1237
6 Global M2M Data Traffic 2014 - 2019 1238
7 M2M in Industry Verticals Globally 1239
8 Global M2M Module Pricing 1240
9: FUTURE OF M2M 1241
1 Overview 1242
2 M2M Adoption 1244
3 Market Point-of-View 1246
4 Steps Required for Better M2M Services 1248
4.1 Making it Easier to use M2M Connectivity 1249
4.2 Making it Easier to Develop, Launch and Maintain Applications Flexibly 1250
4.3 Need for Open Platforms 1251
5 Industry Point-of-View on Open Platform 1253
6 Future of M2M Industry 1257
7 Anticipated Trends for Next Few Years 1259
7.1 Ecosystems Evolve 1259
7.2 Big Data Aligned with M2M 1259
7.3 Standards Strengthen 1260
7.4 Open Hardware 1261
7.5 More Innovation by Start-ups 1261
7.6 M2M based Consumer Electronics will Reach Consumers 1261
7.7 Connected cars in Spot-light 1262
7.8 Transport Management Extends 1263
7.9 New Products for Insurance Industry 1263
7.10 More Smart Meter Installations 1264
7.11 Smart Cities Thrive 1264
8 Network-agnostic SIM Cards 1266
9 Future Applications 1269
10 Road Ahead for M2M Technology 1280
10.1 Same Customers, New, and Enhanced M2M Apps 1280
10.2 Mature Horizontal and Vertical Platforms 1280
10.3 High Speed Devices and Higher Bandwidth Consumption 1281
10.4 Security 1281
10.5 Better Analytics 1282
10.6 Distributed Analytics will Emerge 1282
10.7 Integrated Cloud and Network 1283
10.8 Giant Companies will join the Race 1283
10.9 Global Growth will Begin to Catch up to Growth in Developed Countries 1283
10.10 Mainstream Developers will Join-in 1284
11 Concluding Remarks 1285

Tables
Table 1: Communication Networks 103
Table 2: Difference between Bluetooth and Zigbee 108
Table 3: Smart City Analysis 209
Table 4: Top 15 Companies by Healthcare projects 267
Table 5: Spec Comparison of Microcells, Picocells and Metrocells 497
Table 6: App Comparison of Microcells, Picocells and Metrocells 497
Table 7: Advantages and Disadvantages of Passive RFID Tags 517
Table 8: Advantages and Disadvantages of Active RFID Tags 517
Table 9: Market Forecast for High-Value Asset Monitoring 633
Table 10: Five Year Revenue Forecast for High-Value Asset Monitoring 633
Table 11: Managed Service Revenue for High-Value asset Monitoring 634
Table 12: Propane Statistics 635
Table 13: Propane ROI 641
Table 14: Medical Condition Analysis 659
Table 15: Cost and Cash Flow Analysis 661
Table 16: Market Forecast for Vending Machine 689
Table 17: Five year revenue forecast for Vending Machine 690
Table 18: Cost Benefit Analysis for Vending Machine 694
Table 19: Five Year Revenue forecast for Vending Machine 694
Table 20: Revenue / Savings Opportunity for Vending Machine 695
Table 21: Cost and Savings Analysis for Fleet Management 714
Table 22: Cost Analysis for Irrigation Management 732
Table 23: ROI and NPV Analysis for Agriculture 738
Table 24: Value Creation Mechanisms through M2M Analytics 1228
Table 25: Global M2M Module Pricing by Technology 2014 - 2019 1242

Figures
Figure 1: Basic Building Blocks of M2M 83
Figure 2: The M2M Ecosystem (A) 88
Figure 3: The M2M Ecosystem (B) 90
Figure 4: The M2M Ecosystem © 91
Figure 5: The M2M Ecosystem (D) 93
Figure 6: The M2M Ecosystem 95
Figure 7: M2M Value Chain 96
Figure 8: Cellular and Satellite support of M2M 109
Figure 9: Sensors in an M2M Network 112
Figure 10: Wireless Sensor Communications Module 114
Figure 11: Pre-configured Sensor Board Optimized for Agriculture Applications 115
Figure 12: Conceptual Rendering of M2M Platform 120
Figure 13: Lexus Advanced Active Safety Research Vehicle 198
Figure 14: Smart City Framework 208
Figure 15: Intelligent Building Monitoring and Control 241
Figure 16: Intelligent Building Functionality 266
Figure 17: Proportion of mHealth Solutions 271
Figure 18: M2M Enabled Pill Jar 274
Figure 19: Viking Life Saving Equipment 277
Figure 20: M2M Enabled Vending Machine 334
Figure 21: M2M Enabled Vending Machine 339
Figure 22: Typical Smart Home Monitoring for Elderly 356
Figure 23: Smart Logistics 363
Figure 24: UBI Solution 397
Figure 25: SmartBand SWR1O 416
Figure 26: LG Life Band Touch 417
Figure 27: LG Heart Rate 417
Figure 28: BodyMedia FIT 419
Figure 29: Nike+ Shoes with Embedded Sensors (A) 420
Figure 30: Nike+ Shoes with Embedded sensors (B) 420
Figure 31: Heart-rate Chest Strap 421
Figure 32: MOTOACTV 422
Figure 33: M2M related Technology 425
Figure 34: Measuring Water Level 430
Figure 35: Typical Processor Module Architecture 434
Figure 36: Compact all in one Device 435
Figure 37: GSM Operator Technology Deployments 438
Figure 38: CDMA Operator Technology Deployments 440
Figure 39: Comparison - GSM, CDMA, iDEN, AMPS 442
Figure 40: Back-end Server Integration with Carriers Infrastructure 456
Figure 41: SMS Delivery to Internet 458
Figure 42: Combined Back-End Servers, Processor and Monitoring Client 462
Figure 43: Platforms ease the Way to Production-Level M2M Solutions 469
Figure 44: Man-in-the-middle Attack 547
Figure 45: Independent Network 568
Figure 46: Hybrid Network 569
Figure 47: Access Point Network 569
Figure 48: Protocol Stack for Low-power WSN 575
Figure 49: UHF Architecture 639
Figure 50: Fleet Management Architecture 713
Figure 51: Next Generation M2M in the Cloud 740
Figure 52: Go to Market Factors for Mobile Operators 776
Figure 53: Porters Five Forces Analysis for Telecom Carriers 789
Figure 54: Strategies adopted by Telecom Service Providers 803
Figure 55: Industry View of M2M 1143
Figure 56: Geographic Reach of Companies 1144
Figure 57: Topmost Concerns for Deploying M2M Solution 1146
Figure 58: Topmost Security aspects Deploying M2M Solutions 1148
Figure 59: Interest in Big Data vs. Cloud Computing 1160
Figure 60: Distinguishing Big Data Companies 1165
Figure 61: Evaluating Forest Fire Risk 1172
Figure 62: Decreasing Reliability of Data over Time 1194
Figure 63: The M2M Cloud 1197
Figure 64: Comparison of Cloud Application and Services by Priority 1210
Figure 65: Competitive Vendor Analysis 1230
Figure 66: Global M2M Industry Size 2014 - 2019 1236
Figure 67: Global M2M Market Revenue 2014 - 2019 1237
Figure 68: Global M2M Service Revenue 2014 - 2019 1238
Figure 69: Global M2M Connections 2014 - 2019 1239
Figure 70: Global M2M Data Traffic 2014 - 2019 1240
Figure 71: Proportion of M2M by Industry Vertical by Year 2019 1241
  1. Aether Wire
  2. AIRDESK
  3. Alien Technology
  4. Ambient Devices
  5. AT&T
  6. Augusta Systems
  7. Axeda
  8. Cadi Scientific
  9. CardioNet
  10. Centerpoint Energy
  11. Cimetrics
  12. Comverge/6D
  13. controlGen
  14. Crossbow Technology
  15. Datasweep
  16. Digi International
  17. Dust
  18. Echelon
  19. eDevice
  20. Ember Corporation
  21. emWare
  22. Espial
  23. FleetBoss Telematics
  24. Geotab
  25. Hitachi Communication Technologies
  26. IBM
  27. Industrial Objects
  28. Intermac
  29. Isochron
  30. Itron
  31. Jasper Wireless
  32. KORE Telematics
  33. Lantronix
  34. MeshNetworks
  35. Millennial Net
  36. NetSilicon
  37. nPhase
  38. Numerex
  39. Oceana Sensor
  40. Opto 22
  41. Questra
  42. Radiant RFID
  43. Sensoria
  44. SensorLogic
  45. Sierra Wireless
  46. Skybility
  47. SmartSignal
  48. SmartSynch
  49. Sprint
  50. TCM Enginy
  51. Tekelec
  52. Telefonica
  53. Telemetric
  54. Telenor
  55. Texi AS
  56. ThingMagic
  57. Tridium
  58. ValidSoft
  59. Versus Technology
  60. Wavenis Technology
  61. Wireless Innovation
  62. XcelleNet
  63. Xsilogy
  64. Zetron
How to buy market research report?
 

Process to buy a market research report from us

Step 1: Select publication license from Publication Type dropdown.
Step 2: Click Add To Cart button.
Step 3: The report is added to your cart and you are redirected to cart page.
Step 4: Enter Coupon Code (if applicable) and click on Apply to order button.
Step 5: Review your cart and either click on Checkout button to proceed or click on Checkout with PayPal button for Express Checkout. Please note PayPal option is not available for buyers from India.
Step 6: Enter your E-mail Address and choose your desired Username and Password for a new account or login with your existing account.
Step 7: Enter your Billing Information.
Step 8: Choose your Payment Method from either 2Checkout (default option) or PayPal and click on Review order button.
Step 9: Review your order and click on Submit order button to go to payment gateway and make payments.
Step 10: You can change your language and currency if you have selected 2Checkout as your payment option. Your billing information is pre-filled, so you can proceed to Payment Method tab.
Step 11: Enter your Credit/Debit Card details and click Submit Payment button to make payment and complete purchase process.
 
Please contact us if you need an Invoice or any other information regarding purchase process.

Do you have more questions related to this market research report after going trhough the description and table of contents?

We are here to help. Please use the form given below to let us know your questions related to this report.

Kindly use your official email address and contact number to ensure speedy response.

CAPTCHA
This question is for testing whether you are a human visitor and to prevent automated spam submissions.
12 + 0 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.

SINGLE USER LICENSE (PDF)

  • This license allows for use of a publication by one person.
  • This person may print out a single copy of the publication.
  • This person can include information given in the publication in presentations and internal reports by providing full copyright credit to the publisher.
  • This person cannot share the publication (or any information contained therein) with any other person or persons.
  • Unless a Global License is purchased, a Single User License must be purchased for every person that wishes to use the publication within the same organization.
  • Customers who infringe these license terms are liable for a Global license fee.

 

SITE USER LICENSE (PDF)*

  • This license allows for use of a publication by all users within one corporate location, e.g. a regional office.
  • These users may print out a single copy of the publication.
  • These users can include information given in the publication in presentations and internal reports by providing full copyright credit to the publisher.
  • These users cannot share the publication (or any information contained therein) with any other person or persons outside the corporate location for which the publication is purchased.
  • Unless a Global License is purchased, a Site User License must be purchased for every corporate location by an organization that wishes to use the publication within the same organization.
  • Customers who infringe these license terms are liable for a Global license fee.

 

GLOBAL USER LICENSE (PDF)*

  • This license allows for use of a publication by unlimited users within the purchasing organization e.g. all employees of a single company.
  • Each of these people may use the publication on any computer, and may print out the report, but may not share the publication (or any information contained therein) with any other person or persons outside of the organization.
  • These employees of purchasing organization can include information given in the publication in presentations and internal reports by providing full copyright credit to the publisher.

*If Applicable.

Note: Product cover images are only for representative purpose only and may vary from those shown above.

Shopping cart

0 Items $0.00
Not able to find what you are looking for?
Call Us
WHY CHOOSE MARKET RESEARCH REPORTS?
1
Trusted By Leaders
2
Shop With Confidence
3
Customer Centric
4
Personalized Solutions
5
Secure Checkout

User login

Related Market Research Reports

Clients Who Trust Us

Orange, Google, Microsoft, Barclays, CassidianIntel, TPG, Elit Net, Cross Business Producers, AcmavolpakP&G, Cisco, Gemalto, General Insurance Corporation of India, Aviva, Cognizant, InoxWindB. Braun, Cobham, fiserv, Harris, Wipro, AonAl Meera, Nomura Research Institute, Tata Consultancy Services, Amara Raja, Hiranandani EnergyMunich Re, Lotte Chemical, National Post, First Data