Download - M2M, IoT and Security: a Market Overview
![Page 1: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/1.jpg)
M2M and IoT Markets
Godfrey Chua, Principal Analyst
Machina Research
Security of Things Forum Cambridge, MASeptember 2015
![Page 2: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/2.jpg)
M2M connections will grow from 5 billion in 2014 to 27 billion in 2024
• Machina Research defines M2M as “Connections to remote sensing, monitoring and actuating devices, together with associated aggregation devices”
• Based on this definition there were 5 billion M2M connections in 2014 and there will be 27 billion in 2024, a CAGR of 18%
Machina Research 2
Global machine-to-machine connections 2014-24Source: Machina Research 2015
Note: in this edition our Global M2M report, as in the previous editions, we have included in-building network infrastructure within our definition of M2M. As such, devices such as residential modems/ routers are included.
![Page 3: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/3.jpg)
Short-range technologies will dominate M2M
• Over two-thirds of connections in 2024 will be short range (e.g. in-building PLC, WiFi, Zigbee, Z-Wave)
• 14% of connections in 2024 will be LPWA, driven by the simplicity of deployment
Machina Research 3
Global M2M connections 2014-2024 by technologySource: Machina Research 2015
![Page 4: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/4.jpg)
Wide area M2M connections will be dominated by LPWA technologies
• By 2024, almost half of wide area M2M connections will be supported by LPWA technologies
• LPWA technologies are attractive due to:o ease of deployment
o homogeneity of solution
o low price and long battery life
• Cellular connections account for almost one-third because as well as the first two benefits they also deliver high capacity and mobility
Machina Research 4
Wide area M2M connections by technology, 2014-24Source: Machina Research 2015
![Page 5: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/5.jpg)
M2M accounted for 4% of cellular connections in 2014, rising to 18% in 2024
• At the end of 2014 there were over 250 million cellular M2M connections
• By 2024 M2M’s share of cellular connections will have increased to nearly 1 in 5
• M2M accounts for nearly half of the growth in cellular connections from 2014-24
Machina Research 5
Machine-to-machine’s share of cellular connected devices, 2014-2024Source: Machina Research 2015
0%
2%
4%
6%
8%
10%
12%
14%
16%
18%
20%
-
3
6
9
12
15
Handset/Tablet PC/Laptop
M2M % M2M
![Page 6: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/6.jpg)
Connected Car will account for 52% of cellular connections in 2024
• The top application groups for cellular connections will be:o Connected Car
o Connected Living and Working
• The Connected Car is top because it needs features only cellular can provide:o Comprehensive coverage
o High-speed mobility
o High bandwidth
Machina Research 6
Machine-to-machine cellular connections by biggest applications, 2024Source: Machina Research 2015
![Page 7: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/7.jpg)
M2M and IoT solutions are complex and made up of several components
Devices
Networks
Platforms
Internet of Things
Connected things, products, systems, applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 7
![Page 8: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/8.jpg)
M2M and IoT SECURITY must encompass all components
Devices
Networks
Platforms
Internet of Things
Connected things, products, systems, applications, etc.
Security
Storage
ApplicationsData Processing
Machina Research 8
![Page 9: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/9.jpg)
Security is a top of mind concern
Machina Research 9
Source: Xively and Machina Research Survey 2015
![Page 10: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/10.jpg)
Some key elements in security
• Data security and privacy
• Lightweight device controllers
• Firmware security updates
• Pervasiveness
• Passwords (and the human element)
Machina Research 10
![Page 11: M2M, IoT and Security: a Market Overview](https://reader034.vdocuments.us/reader034/viewer/2022052705/58ecd3d81a28ab5d1c8b47c3/html5/thumbnails/11.jpg)
Key considerations in security
• Must be built into the business case
o Align security efforts with business value
• Partner collaboration is essential
o Overall solution security is only as strong as the weakest link
• Contingency planning
o Is 100% security truly possible?
Machina Research 11