ESIMs offer security, manufacturing benefits for IoT – TechTarget

Getty Images/iStockphoto
Embedded subscriber identity module technology is more than a decade old, so why is it only recently that eSIMs have made their way from smartphones to smart devices? In addition to obvious benefits, like smaller form factors and improved physical ruggedness, eSIM technology may also unlock new capabilities, use cases and opportunities to improve IoT security and device management.
Critical mass and economies of scale are the main drivers of eSIM adoption, with built-in eSIMs now common in consumer devices. A 2021 report from Juniper Research found that the number of eSIMs installed in connected devices will increase from 1.2 billion in 2021 to 3.4 billion in 2025, with consumer sector adoption as a key driver.
There is also the IoT/machine-to-machine market, which encompasses both removable and physically embedded SIM variants and represents the fastest-growing segment of the total global SIM market, ABI Research reported.
More than 200 mobile network operators now have plans to or have already launched eSIM services. In the industrial sectors, including oil and gas, manufacturing and logistics, eSIM installations will grow from 28 million units in 2021 to 116 million by 2025, Juniper projected.
There are several main benefits to eSIMs. They are more durable than removable SIM cards, less susceptible to user error and offer an updated form factor compared to legacy SIMs. These benefits are already generally well known, so why is interest in eSIM technology now growing among innovative SMBs, SMEs and enterprise IoT?
A SIM’s main purpose is to connect to a cellular network. It is a tiny, tamper-resistant computer that performs a challenge-and-response authentication based on a set of credentials stored inside that is unreadable from outside. A cellular operator can make sure a SIM issued for a subscriber can securely authenticate the subscriber, and there is no way to spoof the identity via SIM duplication.
With these features, why aren’t SIMs used more often as the secure element embedded in an IoT device? For every IoT project, device authentication and secure provisioning represent common elements of undifferentiated heavy lifting. Advanced players in IoT are now examining how eSIM capabilities can reduce this burden while improving IoT security.
Typically, a unique set of credentials must be issued for every device and then provisioned individually during the manufacturing process, which adds nontrivial production cost and lead time. Moreover, each set of credentials must be stored securely to prevent external access. This requires adding secure storage capability to the device spec, with a corresponding increase in bill of material cost.
If an IoT project uses the eSIM as an authentication token, there is no need to provision initial credentials because the eSIM can authenticate the device when it is turned on. It is possible to uniquely authenticate the device even without having an authentication back end if the eSIM provider offers it as part of the service.
Plus, such devices do not require secure storage just to store authentication credentials because eSIM is a tamper-tolerant device. If bootstrapping based on eSIM authentication is performed every time the device is turned on, the subsequent credentials can be only in the RAM, and there is no need for persistent storage.
ESIM use also reduces manufacturing errors. With eSIM technology, IoT innovators no longer need to insert a SIM card into the device during manufacturing or end-user activation. Removing this step can both reduce production cost and eliminate a significant point of failure related to human or mechanical error.
ESIMs also bring future-proofing into device design. There is a Global System for Mobile Communications Association standard subscription management for embedded universal integrated circuit card (eUICC) subscription management.
In many cases, eSIMs have the eUICC capabilities, and they enable the user to download multiple profiles and switch between them without changing the eSIM chips. Even if eUICC capabilities are not supported, if the issuing provider supports a proprietary multi-international mobile subscriber identity solution, it should be possible to switch cellular subscriptions within the provider.
Between their built-in physical advantages and their potential to improve IoT security and streamline IoT deployments when implemented correctly, eSIMs are clearly ready for their moment as IoT expands worldwide. For teams that work on the leading edge, the next generation of embedded connectivity is now arriving.
Beyond eSIMs, integrated SIMs (iSIMs) combine the IoT hardware communications module and SIM or eSIM capability within a single, purpose-built system on a chip. ISIMs address several IoT deployment challenges and enable significant reductions in the circuit board footprint, circuit complexity and manufacturing cost. ISIMs also simplify the supply chain by removing the need for sourcing an additional eSIM chip and offer meaningful improvements in power consumption for low-power IoT devices.
About the author
Kenta Yasukawa is CTO and co-founder of Soracom, where he has led deployment of the industry’s most advanced cloud-native telecom platform, designed specifically for the needs of connected devices. Before co-founding Soracom, Kenta served as a solutions architect with AWS and conducted research for connected homes and cars at Ericsson Research in Tokyo and Stockholm. Kenta holds a Ph.D. in engineering from the Tokyo Institute of Technology, with additional studies in computer science at Columbia University’s Fu Foundation School of Engineering and Applied Science.

The pandemic has sent many enterprises into survival mode, which altered the scope of the enterprise architect’s role once again,…
Bellabeat is a women’s health company that has added a private key encryption feature for app users to better protect their data.
The Digital Markets Act and Digital Services Act focus on bolstering business competition and consumer control over data online.
Despite being only a year old, Hive ransomware has grown into a prominent ransomware-as-a-service operator. The decryptor tackles…
Five conservative Supreme Court justices were reportedly doxxed by threat actors that claim to have obtained credit card numbers,…
Microsoft’s Patch Tuesday release for July brought dozens of fixes for security flaws in Windows, an Azure disaster recovery tool…
A Florida man has been charged with running a counterfeit operation that duped hospitals, schools, government agencies and the …
Vendors are pushing heavily on the benefits of predictive analysis to automatically identify and remediate network issues. But …
The H3C Magic BE18000, powered by a Qualcomm chipset, offers several significant Wi-Fi 7 features, including multilink operation …
Nvidia’s QODA platform bridges the chasm between quantum and classical environments. It could set the stage for quantum …
IBM’s new line of lower-end Power servers packs more processing power for smaller IT shops to deliver AI services faster, with a …
File Server Resource Manager can help data center admins keep track of what files get stored on their servers and how much space …
New release of the open source NoSQL database adds an optimized I/O scheduler to accelerate read and write operations and improve…
Chief data officers often run into difficulties getting projects off the ground. Here are six challenges hindering modern CDOs’ …
As data use increases and organizations turn to business intelligence to optimize information, these 10 chief data officer trends…
All Rights Reserved, Copyright 2005 – 2022, TechTarget

Privacy Policy
Cookie Preferences
Do Not Sell My Personal Info

source

Share:

More Posts

Market Research

Pulse Surveys

Turn feedback into action

Our survey platform makes it easy to measure and understand feedback so you can drive growth and innovation

Pulse Handshak

Pulse Handshak

Collaborative online survey tool for the market research industry. Remote assisted surveying just like face-to-face interviews. Here interviewers can talk to the respondent over the web-console without the need for any other communication channel and share the same Q're with responses and click actions.

Pulse FE

Pulse FE

Pulse Field Expert or Pulse FE is the main platform for both offline and online survey at softofficepro.com. It is robust and used by hundreds of clients over tens of years with millions of responses. Do it once Q're and deploy on both offline devices (android) and online forms makes it a great cost effective platform for any kind of responses

Pulse Ultimate

Pulse Ultimate

Pulse Ultimate is targeted for tracking studies and retail audits. An offline survey system offering extreme field control including processes like data quality check, back-check, rework, comparison with previous wave data etc. helps to get the best results on a day-to-day basis

Pulse LS

Pulse LS

Use a managed Limesurvey and our expertise for creating complex forms and token based user management. Use optional mailing system to send survey invitation to each participant and track progress of the response status. Industry standard SPSS / R output supported