Javascript Menu by Deluxe-Menu.com

CONFERENCE DAY 2 / FRIDAY 20 MAY 2016

08.30   WELCOME AND COFFEE
     
   
CHAIRMAN

Aapo Markkanen
Principal Analyst
Machina Research
internet role Session
     
09.00   IETF Activity
    Describing IETF working group activities in IoT.

Alexander Pelov, Associate Professor,
Telecom Bretagne
     
09.15   Internet: the Future of LPWA?
    There are several LPWA radio technologies each having a proprietary, locked-in, non-standard solution for addressing, localization, security, provisioning, AAA, etc. A deep understanding of Internet protocols helped us to address these constrains without breaking the interoperability with the Internet. Describing an innovative approach based on Internet technologies offering network neutrality, rapid service development and deployment and independence from the underlying radio technology. A real-world implementation is already in operation covering the city of Rennes, France.

Laurent Toutain, Telecom Bretagne
     
09.45   6TISCH
   

Pascal Thubert,

Cisco
     
10.15   COFFEE BREAK
BUILDING BLOCKS SESSION
10.45   From Concept to Product, using IoT Building Blocks from an Electronic Solution Provider
    Eolane, electronic solution provider and key player in the M2M and IoT ecosystem provides IP building blocks and platforms to enable and accelerate application solution providers with:
• IoT platform for wearable and B2C applications
• Solution and product reference design for smart & connected fabrics eHealth and wellness applications
• LPWAN reference design connectivities for Smart cities, Smart building and smart energy

Regis Lauret, Marketing Director, éolane
     
11.15   Performance Evaluation of LoRa Radio Solution for PREDNET Wildlife Animal Tracking Project
    The PREDNET project focuses on two specific use cases:
• Jackal behavior understanding and cattle surveillance;
• Fight against rhinoceros poaching.
The proposed WSN contains wearable devices carried by animals and infrastructure devices (base stations). The key requirements of the system are long range transmissions and low power consumption.

Viktor Toldov, University of Lille, IRCICA, Inria
     
11.45   Deployment of Country-wide LoRa Networks in Belgium and in the Netherlands
    In Belgium, Proximus has deployed LoRa in ten major urban and logistic areas as well as in the city of Luxembourg. This deployment included the installation of LoRa base stations and the setup of the central network controllers and management platforms. In the Netherlands, KPN is deploying LoRa base stations on their 3/4G tower locations. KPN and Proximus KPN will be using Actility’s ThingPark Wireless™ solution.

Gabor Pop, Solutions Marketing Manager, Actility
     
12.15   Critical KPI (Key Performance Indicators) for LPWA Networks
    Discussing network design, radio environment analysis and scalability (depending on use case), to installation, operation and performance management. A real experience feedback of current installations is shared to point critical KPI (radio budget, cell loading, QoS, latency, power consumption, net topology…) to manage a low-cost but not low-quality LPWA network.

Yannick Delibie, CTO, Kerlink
12.45   LUNCH
ROUND TABLE
14.00   Smart Objects/Smart Things Companies
    Demonstrating the LPWA ecosystem with presentations from innovative startups.

Participants:
Smockeo
Sensing Labs
Wi6Labs
IEM
Idosens
     
SECURITY SESSION
     
15.00   Achieving a Legacy Cellular Security Level
    SIGFOX and LoRa networks are demonstrating an unrivalled ability to seamlessly enable battery-operated sensors to upload their data onto cloud applications for years without maintenance. Nevertheless, while the simplicity of the communication protocol of such networks is an obvious asset when it comes to saving sensor power compared with 2G/3G/4G, it could become a weakness for those applications requiring a level of security equivalent to legacy cellular. Demonstrating what are the tools and remedies that will solve this question and raise LPWAN on-par with SIM-card enabled networks.

Guillaume Crinon, Technical Marketing Manager EMEA, Avnet Memec Silica
     
15.30   How the Digital Security Technologies can be Developed to Enable Security and Privacy?
    Mapping the IoT security threat, and illustrating the risk through uses cases assessing the different solutions to secure the devices, including a Secure Element based on digital security technologies. Explaining how this Secure Element can be efficiently deployed in the IoT chain in a competitive manner.

Jean Pierre Delesse, COO, Trusted Objects
     
16.00   LoRa Security, Confidentiality & Keys Management Principles - a Comprehensive Insight
    Starting by an overview of the components and actors you can find in a LoRa Network, we'll go through the security keys management principles to end with an introduction to the secure element, an optional embedded higher level of security that protects the sensitive data inside the device.

Arsene Betolaud,
Product Manager, Gemalto
16.30   COFFEE AND END OF THE CONFERENCE
     


Brochure in PDF







Event Partners