Putting the oneM2M Standard into Action: ATIS OS-IoT Software

Machine-to-machine (M2M) services are now present in almost every area of social and economic activity. From personal fitness to city-wide environmental monitoring, data is being collected, processed and summarized to support smart services. With this explosion comes important challenges such as ensuring the reliability, maintainability, scaling and security of these innovations. To provide a platform to address these areas, the oneM2M global partnership has developed a technical standard defining a common M2M Service Layer that can be readily embedded within various hardware and software, and relied upon to connect the myriad of devices in the field with M2M application servers ...
Read More

Joining Forces to Make the FCC’s Robocalling Initiative a Reality

The Federal Communications Commission (FCC) has acted to resolve one of the biggest scourges of modern times: malicious robocalling and caller ID spoofing. A formal recommendation on unwanted call blocking made in September 2017 builds on the output of the industry-wide Robocall Strike Force, consisting of telecom services providers, technology experts and consumer groups, to continue work on eliminating this nuisance. At September’s inaugural Mobile World Congress Americas, FCC Chairman Ajit Pai reiterated that stopping bogus calling is the number one consumer priority of the FCC, and that a group of stakeholders should come together and bring their individual expertise ...
Read More

Why Time May Not Be on Your Side

The ATIS Synchronization Committee (SYNC) is at the forefront of the industry in doing work to examine GPS vulnerability and methods of GPS backup for time and frequency synchronization.   The group has recently published a technical report which discusses this in detail, GPS Vulnerability (ATIS-0900005). GPS (Global Positioning System) has become so ubiquitous in everyday life that most people take it for granted, although it is used in cars, planes, computers, smartphones, and wearables, to name a few common examples. While GPS is associated primarily with navigation, location tracking and mapping, it is also critical to providing precise time, time ...
Read More
Securing the Connected Vehicle

Securing the Connected Vehicle: Why a Collaborative Approach is Critical for Success

Connected vehicles have the potential to deliver tremendous value to both consumers and the transportation industry.  As part of the larger intelligent transportation ecosystem changes, connected vehicle applications provide connectivity between and among vehicles, infrastructure, and wireless devices. This, in turn, can to assist in preventing crashes, easing traffic congestion and delivering new and exciting applications directly to the vehicle. As connected vehicles become more prevalent on our highways and applications become more sophisticated and integrated into our everyday lives, the threat of cyber intrusion also grows.  This makes it critical that the connectivity provided between and among vehicles, infrastructure, ...
Read More
The App-ID Registry: Securing the Internet of Things

App-ID Registry: Securing the Internet of Things (IoT)

The number of connected Internet of Things (IoT) devices continues to grow rapidly, driven by an increasing range of use cases and business models combined with declining device costs.  Cisco[1] predicts upwards of 14 billion connected IoT[2] devices by 2021, while according to the most recent Ericsson Mobility Report[3], the number will reach 18 billion by 2022.  This growth rate is staggering and the need for connectivity, security and interoperability between applications and devices has never been more critical. In fact, ATIS sees it as essential to unlocking the IoT’s limitless potential. The M2M/IoT market has been evolving from vertical, ...
Read More