This page catalogs dozens of IoT wireless protocols to help engineers and security practitioners quickly compare technical trade‑offs and security posture when selecting connectivity. Entries are detailed by core specifications and, distinctively, assessed from a security‑first perspective.
I compiled this research throughout the 2010s and last systematically updated it in 2020; it was originally published at my former website 5G.Security and is now hosted here on PostQuantum.com for reference.
Please use it as a starting point for further research: protocols and implementations evolve quickly, and some details may now be out of date. Always corroborate with current standards, vendor documentation, and recent advisories before relying on these summaries.
5G
6LoWPAN
Ant+
BLE or Bluetooth Smart
Bluetooth
D7A
DECT ULE
DigiMesh
EC-GSM-IoT
EnOcean
GSM/GPRS/EDGE (2G), UMTS/HSPA (3G), LTE (4G)
HART
IEEE 802.11a/b/g/n/ac
IEEE 802.11ah (Wi-Fi HaLow)
IEEE 802.15.4
IEEE 802.16 (WiMax)
Insteon
ISA100.11a
LoRa
LoRaWAN
LTE-MTC Cat 0
LTE-M (Cat M1, Cat M2 ) – eMTC
mcThings
MiWi
MiOTY
NB-IoT
Neul
NFC
RFID
RPMA
Sigfox
Thread
Wavenis
WAVIoT
Weightless (W, N, P)
Wi-SUN
ZigBee
Z-Wave
Wireless technology / standard
5G
Organization that manages the technology / standard
Low-band 5G 600 – 700 MHz /Mid-band 5G 2.5-3.7 GHz / High-band 5G 25 – 39 GHz and higher frequencies up to 80GHz
Approximate Range
Range is correlated with frequency bands – low band 5G has similar range to 4G (tens of kilometers), Mid-band 5G has several km range. High-band 5G has hundreds of meters up to 1.5 km range.
Data Rate
Low-band 5G (600 – 700 MHz) giving download speeds a little higher than 4G at the moment: 30-250 Mbps. Mid-band 5G (2.5-3.7 GHz) currently allowing speeds of 100-900 Mbps. High-band 5G (25 – 39 GHz and higher frequencies up to 80GHz) achieves, at the moment downloading speeds of 1 – 3Gbps.
Power Draw
Low
Topology
Star
Requires hub or gateway
No
Proprietary or Open
Open
Intended Use
Personal, Single building, Campus, LAN, Software defined WAN (SD WAN)
Security
Encryption is evolved from 4G. It is more complex and based on multi-layer & multi-criteria approach. Generally, the level of 5G security is not defined by the number of specified security mechanisms. A multi-stakeholder approach that involves operators, vendors, regulators, policy makers and representatives of 5G subscribers (from different ecosystem segments) is fundamental to the security baseline of trustworthy, cost-efficient and manageable 5G networks.
Common use
Expectations are that 5G will expand boundaries in all domains of modern life such as traveling, driving, production efficiency improvements, smart systems deployment such as smart cities with smart homes, buildings, hospitals, factories, public safety, services management etc. The small cells structure of 5G networks improves the indoor coverage, compared to other cellular communication technologies and at the same time influences the evolution of different HD enterprise services, home VR, holographic communication, telemedicine and other new services.
Comments
The first phase of 5G specifications is defined in 3GPP Release 15. 5G is equipped with new air interface that supports heterogeneous access networks and handles variable bandwidths. Packet core network upgrades are also implemented, where traditional and mobile services share an infrastructure (cloud data centers) for service delivery and operational efficiency.
Wireless technology / standard
6LoWPAN
Organization that manages the technology / standard
6LoWPAN has implemented AES-128 link layer security – which is defined in IEEE 802.15.4 protocol. This security mechanism provides link authentication and encryption. Additional security features are enabled by the transport layer security mechanisms over TCP, as defined in RFC 5246 standard .The transport layer security mechanisms over UDP are supported too – in compliance with RFC 6347 standard.
Common use
There are many applications where 6LoWPAN is being used: automation, industrial monitoring, smart grids (enable smart meters and other devices to build a micro mesh network), smart homes and smart buildings.
Comments
6LoWPAN (IPv6 over Low-Power Wireless Personal Area Networks), is a low power wireless mesh network. It is specified in IETF standard RFC 8138. Every node in the 6LoWPAN network is embedded with its own IPv6 address. This allows the node (typically sensor) to connect directly with the Internet using open standards.
Wireless technology / standard
ANT+ Alliance
Organization that manages the technology / standard
Peer to peer, Star, Mesh, broadcast, ANT – FS, shared cluster.
Requires hub or gateway
Yes
Proprietary or Open
Open
Intended Use
Single Building
Security
ANT supports an 8-byte (64-bit) network key and 128-bit AES encryption for ANT master and slave channels. If further security is required, authentication and encryption can be implemented through the application level.
ANT devices may use the public network key, a private network key, or a privately owned managed network key; but may not use the ANT+ network key, which is reserved for ANT+ devices.
Common use
ANT in residential, commercial and industrial sensing, control applications.
ANT + predominantly in health and wellness – blood pressure monitoring, fitness, cycling, running, continuous glucose monitoring, emergency response alerts, audio control, heart rate measurements, environment (temperature), GPS, speed & distance measurements, etc. (https://developer.garmin.com/ant-program/help/)ANT-FS (File share) and FIT (Flexible and Interoperable Data Transfer) – with the ANT-FS tools (including the FIT SDK) it is enabled to create and share files between ANT devices.
Comments
ANT is a purpose-built ultra-low-power wireless networking protocol operating at 2.4GHz. ANT+ is an implementation of ANT and is an ecosystem of interoperable products built on device profiles.
ANT devices may use any RF frequency from 2400MHz to 2524MHz, with the exception of 2457MHz, which is reserved for ANT+ devices. Hierarchical wireless communication with master-slave nodes in each of 8 available wireless channels. ANT+ is an application that’s been built on top of ANT. It’s a collection of what we call Device Profiles, built for very specific use cases, each of which has a specification of how to transmit the information related to that use case over the air using ANT.
Wireless technology / standard
BLE (Bluetooth Low Energy) or Bluetooth Smart (Bluetooth 5, 4.2)
Organization that manages the technology / standard
In compliance with the Bluetooth Specification Version 5.0, two Security modes are implemented in BLE: Security mode 1 and Security mode 2.
BLE security mode 1 has 4 layers:
1) No security (without authentication and without encryption).
2) Unauthenticated pairing with encryption (AES-CMAC encryption or AES-128 -is implemented in this layer [DU], during communications when the devices are unpaired).
3) Authenticated pairing with encryption.
4) Authenticated BLE secure connections pairing with encryption (each time after the pairing is initiated Elliptic Curve Diffie-Helman key agreement protocol is used for key exchange BLE secure connections).
BLE security mode 2 has two layers:
1) Unauthenticated pairing with data signing.
2) Authenticated pairing with data signing.
Common use
BLE technology is nowadays an indispensable part of mobile phones, PCs and other types of devices applicable in gaming, sports, wellness, industrial, medical, home and automation electronics. BLE provides wireless connectivity that enables home automation via the control of lights – smart bulbs and outlets, smoke detectors, cameras and other security systems, thermostats, video door bells, smart digital locks, hubs and controllers, different assistant devices, universal remotes, gaming consoles, TVs, etc.
Comments
It is important to notice that Bluetooth and BLE are not compatible technologies. For example, channel bandwidth in Bluetooth technology is 1MHz and in BLE is 2MHz, number of channels in Bluetooth is 79, while BLE is supported by 40 channels. Moreover, they have different waveforms, transmission power, network organization etc. Bluetooth Versions 4.1/4.2/5.0 support both BLE and Bluetooth standards.
Wireless technology / standard
Bluetooth
Organization that manages the technology / standard
Several security modes are recognized in Bluetooth technology, and generally each version of Bluetooth standard supports some of them. These modes are mutually different according to the point of security initiation in Bluetooth devices. Bluetooth devices must operate in one of four available modes from mode 1 (insecure mode) to mode 4 -where security procedures are initiated after link setup. Secure Simple Pairing uses Elliptic Curve Diffie Hellman (ECDH) techniques for key exchange and link key generation in mode 4. This mode was introduced at Bluetooth v2.1 + EDR.
Common use
Bluetooth technology is used for data streaming or file exchange between mobile phones, PCs, printers, headsets, joysticks, mice, keyboards, stereo audio or in the automotive industry.
Comments
Bluetooth is wireless communications technology based on the IEEE 802.15.1 protocol. Bluetooth technology is supported by 1 master & up to 7 slave nodes, while the number of slave nodes is not limited by specification in BLE networks. In the most recent Bluetooth Version 5.0, the new wave-forms and coding techniques are implemented in order to achieve longer ranges, less power consumption and latency, better robustness and support for higher number of subscribers in a single Bluetooth network.
Wireless technology / standard
DASH7 Alliance Protocol (D7A or D7AP)
Organization that manages the technology / standard
Similarly to 802.15.4, AES-CBC is used for authentication and AES-CCM for authentication and encryption.
Common use
Some representative DASH7 use cases are access control, smart energy, location based services, mobile advertising, industry automation, logistics, building access, mobile payments, ticketing, etc.
Comments
D7A complies with the ISO/IEC 18000-7 standard. ISO/IEC 18000-7 is an open standard for the license-free 433 MHz ISM band air-interface for
wireless communications. The 433 MHz frequency provides D7A with long propagation distance and better penetration.
There are four different device classes defined in D7A (Dash7 Alliance Protocol):
• Blinker – it only transmits and does not use a receiver.
• Endpoint – it can transmit and receive the data. It also supports wake-up events.
• Sub controller – it is a full featured device (not always active).Sub controller uses wake on scan cycles similar to end points.
• Gateway – connects D7A network with the other network.It will always be online and always listens unless it is transmitting.
Wireless technology / standard
DECT ULE
Organization that manages the technology / standard
DECT ULE devices use a combination of general DECT security procedures and ULE specific security procedures. General DECT security procedures are device registration (subscription), device and base authentication, key generation (including keys for ULE use), encryption of voice calls, service calls and all non-ULE data calls, device de-registration (termination).
Authentication is using DSAA2 (128 bit key) algorithm and encryption is using DSC (64 bit cipher) or DSC2 (128 bit cipher).
ULE-specific security procedures are used for: bi-directional and uni-directional data packet transport. Compared to standard DECT encryption some enhanced solutions are available for DECT ULE, like 128-bits AES-CCM encryption, re-keying during all calls (at least once per minute), early encryption (of MAC connection without the need for CIPHERREQUEST message) and some additional subscription requirements (limits how long the base will be open for user registration).
Common use
DECT ULE is new technology developed for different IoT use cases like home, office and industrial automation, control and monitoring systems, medical care and security systems.
Comments
DECT Ultra Low Energy (ULE) is a new technology based on DECT and intended for Machine-to-Machine communications such as Home and Industrial automation. DECT ULE standard has advantages of long distance range, no interference and large data rate/bandwidth up to 1 Mbps. It provides backwards compatibility with standard DECT systems and is supported by Panasonic – one of the most representative DECT systems manufacturers in the world.
Wireless technology / standard
DigiMesh
Organization that manages the technology / standard
DigiMesh security features are 128-bit AES encryption and 256-bit AES – available on some products, such as XBee3 and XTend. One command (KZ) sets a password that prevents intruders from sending or receiving unsecured remote AT commands. For added security, this can be used on a device-by-device basis. Simplified preset encryption key, with two configurable parameters.
Common use
Some representative DigiMesh use cases are monitoring in food safety, facility and pharmacy domains, supply chains applicability, transportation and logistics, environmental monitoring etc.
Comments
DigiMesh is a proprietary peer-to-peer wireless networking topology developed by Digi International. The protocol allows for time synchronized sleeping nodes/routers and battery powered operations with low-power consumption.
Wireless technology / standard
EC-GSM-IoT
Organization that manages the technology / standard
Proprietary – The EC-GSM- IoT Group is Open to GSMA Members and Associate Members, however all members must positively contribute to the Group’s high-level objectives, including promoting EC-GSM- IoT technology and encouraging new service and application development.
Intended Use
WAN
Security
The EC-GSM-IoT has improved security, compared to the existing GSM/GPRS networks – offers integrity protection, mutual authentication and implements stronger ciphering algorithms.
Common use
Battery life of up to 10 years can be supported for a wide range of use cases. Coverage extension beyond GSM enables coverage of challenging indoor and outdoor locations or remote areas in which sensors are deployed for agriculture or infrastructure monitoring use cases. Moreover, the coexistence of this technology with other cellular technologies is supported.
Comments
Extended coverage GSM IoT (EC-GSM-IoT) is a standard-based Low Power Wide Area technology specified by 3GPP Rel. 13. It is based on eGPRS and designed as a high capacity, long range, low energy and low complexity cellular system for IoT communications. The EC-GSM-IoT technology implementation is based on software upgrades of the existing GSM networks.
Wireless technology / standard
EnOcean
Organization that manages the technology / standard
The unique 32-bit identification number (ID) of the standard Enocean modules cannot be changed or copied – it is the protection against duplication. This authentication method already offers field-proven secure and reliable communication in building automation. For applications requesting additional data security, the security mode protects battery less wireless communication with enhanced security measures to prevent replay or eavesdropping attacks and forging of messages. One feature is a maximum 24-bit rolling code (RC) incremented with each telegram which is used to calculate a maximum 32-bit cypher-based message authentication code (CMAC). The CMAC uses the AES 128 encryption algorithm. Another mechanism is the encryption of data packets by the transmitter. The data is encrypted using the AES algorithm with a 128-bit key.
Common use
The EnOcean wireless standard (ISO/ IEC 14543-3-1X) in sub 1GHz is optimized for use in buildings, as a radio range of 30m indoors is possible. Enocean representative use cases are smart lighting, temperature and air quality monitoring, positioning and safety systems, smart metering, different actuators and controllers, gateway and building management systems, etc. applicable to smart homes, smart offices or smart buildings.
Comments
The EnOcean wireless standard is geared to wireless sensors and wireless sensor networks with ultra-low power consumption. It also includes sensor networks that utilize energy harvesting technology to draw energy from their surroundings – for example from motion, light or temperature differences. This principle enables electronic control systems to be used that work independently of an external power supply.
Wireless technology / standard
GSM/GPRS/EDGE (2G), UMTS/HSPA (3G), LTE (4G)
Organization that manages the technology / standard
Authentication algorithms were not very strong in 2G networks and were based on master security key . In 3G wireless standard (3GPP based) , the authentication mechanism was enhanced to become a two-way process. In addition, 128-bit encryption and integrity keys were utilized to create stronger security. Some mechanisms were introduced to ensure freshness of the cipher/integrity keys.
In 4G LTE, further security improvements were introduced over 3GPP. Unique identifiers (ID) were added for an end-mobile device (UE) . Secure signaling between the UE and MME (Mobile Management Entity) was added. Finally, security measures were put in place for interworking between 3GPP networks and trusted non-3GPP users – using for example, the EAP-AKA (UMTS Authentication and Key Agreement) protocol.
Common use
2G offered digital communications. 3G has been generic data cellular mobile technology that provided broadband transmissions. 4G is the first all IP cellular data communication technology with dominant data transfer services and IoT support capabilities. Today, there are many module solutions available at the market, supporting all cellular technologies from 2G to 4G, in order to provide necessary connectivity for IoT services.
Comments
Expectations are that the IoT ecosystem and its evolution support will be the most important criteria for further development of cellular mobile technologies.
Wireless technology / standard
HART
Organization that manages the technology / standard
Communications are always encrypted in a HART network. The network uses a 128-bit AES encryption system. The security manager in the WirelessHART gateway administers three parameters: Network ID, Join key and Session key. In addition to individual session keys, a common network key is shared among all devices on a network to facilitate broadcast activity as needed. A separate 128-bit join encryption key is used to keep sent and received data private, during the joining process. The encryption cannot be disabled.
Common use
Typical HART use cases are process industry monitoring (automotive production process, chemical segments, food and beverage, power generation); process optimization , safety enhancements , environment and health monitoring, maintenance optimization, etc.
Comments
“HART” is an acronym for Highway Addressable Remote Transducer. The HART Protocol uses Frequency Shift Keying (FSK) standard to superimpose digital communication signals at a low level on top of the 4-20mA. This enables two-way field communication to take place and makes it possible for additional information beyond just the normal process variable to be communicated to/from a smart field instrument.
Wireless technology / standard
IEEE 802.11a/b/g/n/ac
Organization that manages the technology / standard
Different data rates are enabled in IEEE 802.11 family of standards and their theoretical throughput is 11 Mbps ( IEEE 802.11b), 54 Mbps (IEEE 802.11a and IEEE 802.11g), 100 Mbps (IEEE 802.11n) or 300 Mbps (IEEE 802.11ac).
Power Draw
High
Topology
Star
Requires hub or gateway
No
Proprietary or Open
Open
Intended Use
Single Building
Security
The Wi-Fi Alliance enables the implementation of different security solutions across Wi-Fi networks through the Wi-Fi Protected Access (WPA) family of technologies. Simultaneously with Wi-Fi technology, deployable for personal and enterprise networks, security performances evolve too.
Today there are several available levels of security applicable to Wi-Fi networks that are formatted in WPA protocols, like WPA3 – Personal, WPA3 – Enterprise, WPA2, Open Wi-Fi and Wi-Fi enhanced open.
Common use
Typical Wi Fi use cases are use cases are audio/video streaming applications, centralized management applications, video monitoring ad security systems, etc. Networking of multiple devices such as cameras, lights and switches, monitors, sensors and many others is enabled with this technology.
Comments
The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within the 50m range, it operates in 2.4 GHz and 5GHz frequency bands.
This technology has been developed for wireless networking of computer devices and is commonly called WLAN (Wireless Local Area Network), where the communication is realized between wireless routers typically connected to the Internet and other wireless nodes within its range.
Wireless technology / standard
IEEE 802.11ah (Wi-Fi HaLow)
Organization that manages the technology / standard
Security is typically based on WPA 3 protocol with available personal and enterprise solutions.
Common use
Some representative IEEE 802.11ah use cases are health care, outdoor activities, smart metering, environmental sensing, home security, smart homes and buildings, power management, industrial automation, etc.
Comments
A Wi-Fi HaLow (IEEE 802.11ah) standard works at 900 MHz frequency band in the USA and significantly improves wireless coverage and energy efficiency as one of the most important features for IoT use cases. Wi-Fi HaLow devices have instant internet access like in traditional Wi-Fi networks. Wi-Fi HaLow has better wall penetration and range than Wi-Fi because it uses the lower 900MHz frequency band.
Wireless technology / standard
IEEE 802.15.4
Organization that manages the technology / standard
≈ 20 kbps and 40 kbps (BPSK ), ≈ 250 kbps (O-QPSK with DSSS)
Power Draw
Low
Topology
Star, Mesh, peer-to-peer
Requires hub or gateway
Yes
Proprietary or Open
Open
Intended Use
Single Building
Security
The IEEE 802.15.4 standard protects information at the Medium Access Control (MAC) sublayer of the OSI Reference Model. The implemented cryptographic mechanism in this standard is based on the symmetric-key cryptography and uses keys that are provided by higher layer processes. The establishment and maintenance of these keys are outside the scope of the IEEE 802.15.4 standard. The cryptography mechanism assumes a secure implementation of cryptographic operations and secure and authentic storage of keying material. Used encryption algorithm is 128 bits AES.
Common use
Typical use cases are smart homes and buildings i.e. home security, lighting control, air conditioning and heating systems; industrial automation; automotive sensing; education; consumer electronic devices and personal computer accessories.
Comments
The IEEE 802.15.4 standard defines the
interconnection protocol for the low-rate wireless personal area networks (LR-WPANs). This standard provides short range wireless communications between battery – powered nodes. The power consumption in IEEE 802.15.4 nodes is typically very low.
Wireless technology / standard
IEEE 802.16 (WiMax)
Organization that manages the technology / standard
Different security solutions are enabled in WiMax networks, like Advanced Encryption Standard (AES) with 128-bit key: Rivest, Shamir and Adelman (RSA) with 1024-bit key and Triple Digital Encryption Standard (3-DES).Both Advanced Encryption Standard (AES) and Triple Digital Encryption Standard (3-DES) are symmetric encryption algorithms using a block-cipher method. Rivest, Shamir and Adelman (RSA) is an asymmetrical algorithm.
The air interface in IEEE 802.16 networks is secured by authentication procedures, secure key exchange and encapsulation . With encapsulating data from authorized users, the base station limits the access of unauthorized users. Besides, it supports the Privacy Key Management (PKM) protocol for secure two-layer-key distribution and exchange and real-time confirmation of subscribers’ identification, which ensures secure wireless data transport.
Common use
WiMax applicability is recognized in wireless MAN deployment, provisioning of Internet connectivity and generic user applications, environmental monitoring, smart cities , telemedicine etc.
Comments
IEEE 802.16 technology has been put forward to overcome the drawbacks of WLANs and mobile networks. It provides different QoS scheduling for supporting heterogeneous traffic including legacy voice traffic, VoIP (Voice over IP), voice and video streams and the Internet data traffic. The prominent features of WiMAX include: quality of service, high-speed Internet, facility over a long distance, scalability, security, and mobility.
Wireless technology / standard
Insteon
Organization that manages the technology / standard
915MHz ( USA)
869.85 MHz (EU)
921.00 MHz (Australia)
Approximate Range
≈ 50m
Data Rate
38400bps – via RF
13165bps – via powerlines
Power Draw
Low or battery free (plug-in)
Topology
Mesh
Requires hub or gateway
Yes
Proprietary or Open
Proprietary
Intended Use
Single building
Security
Insteon network security is maintained via linking control to ensure that users cannot create links that would allow them to control a neighbors’ Insteon devices, and via encryption within extended Insteon messages for applications such as door locks and security applications, should those applications choose to implement encryption.
Insteon enforces linking control by requiring users to have physical possession of devices, or knowledge of their unique Insteon IDs in order to create links. Firmware in Insteon devices prohibits them from identifying themselves to other devices unless a user either physically presses a button on the device during the installation process or explicitly addresses the device via a central controller. Linking to a device by sending Insteon messages (e.g., from a central controller) requires knowledge of the address of the target Insteon device. As these addresses are unique for each device and assigned at the factory (and displayed on a printed label attached to each device), users must have physical access to the device to read the device address from the label and manually enter it when prompted during installation.
Common use
INSTEON is optimized for home and office automation and allows networking of different devices like light switches, thermostats, home audio, remote controls, leak sensors, pumps,
motion sensors, alarms, HVAC systems, security sensors or different remote controls.
Comments
INSTEON allows home automation devices to communicate through power lines, radio frequencies or a combination of both.
All INSTEON devices are known as peers. This is because any device can transmit, receive, or repeat the messages from other devices. In doing this, devices neither require any master device controller nor any routing software. More are the devices in the INSTEON network, more stronger is the INSTEON signal.
Wireless technology / standard
ISA100.11a
Organization that manages the technology / standard
ISA 100.11a standard is embedded with integrity checks and optional encryption at data link layer of the OSI reference model. Moreover, security mechanisms are provided in transport layer. too. 128 bits keys are used in both transport and data link layers. A shared global key, a private symmetric key or certificate are necessary for a sensor node to join a ISA 100.11a network.
Common use
The most important use cases are reliable monitoring and alerting, asset management, predictive maintenance and condition monitoring, open – loop control and closed loop control industrial applications.
Comments
ISA 100.11a low data rate connectivity is supported with increased security and system management levels. In compliance with best practices, optimal number of nodes in the network is 50-100.
Wireless technology / standard
LoRa
Organization that manages the technology / standard
License-free sub-gigahertz radio frequency bands like 433 MHz, 868 MHz, 915 MHz, 923 MHz .
Approximate Range
≈ 30km
Data Rate
50kbps
Power Draw
Low
Topology
Star
Requires hub or gateway
Yes
Proprietary or Open
Open
Intended Use
WAN
Security
Based on security for IEEE 802.15.4 wireless networks, AES encryption with the key exchange is implemented in LoRa. In higher OSI levels built over the LoRa PHY layer, two layers of security are utilized – one for the network and one for the application layer. The network layer security ensures the authenticity of the device in the network, while the application layer security ensures that the network operator does not have access to the end user’s application data.
Common use
Typical LoRa use cases are power metering , water flow, gas or similar quantitative monitoring; logistics and transportation monitoring; smart home, office and smart city appliances; environmental sensing like air pollution, flooding, avalanche, forest fires; smart security systems, agriculture and industrial automatization, and low-cost private networks with modest throughput requirements as an alternative to commercial networks.
Comments
LoRa provides wireless, low-cost and secure bi-directional communication for Internet of Things (IoT) applications. LoRa is optimized for long range communication, low power consumption and is designed to support large networks deployment.
LoRa is built using Semtech’s LoRa modulation scheme. LoRa is the PHY layer for a LPWAN technology that uses Chirp Spread Spectrum to send data from one point to another.
LoRaWAN is different from LoRa – it is a media access control (MAC)-layer protocol built on top of LoRa PHY layer .
Wireless technology / standard
LoRaWAN
Organization that manages the technology / standard
433 MHz, 868 MHz (Europe), 915 MHz (Australia and North America) and 923 MHz (Asia)
Approximate Range
≈ 15km
Data Rate
≈ 0.3-50 kbps
Power Draw
Low
Topology
Star of Stars
Requires hub or gateway
Yes
Proprietary or Open
Open
Intended Use
WAN
Security
The fundamental properties that are supported in LoRaWAN security are mutual authentication, integrity protection and confidentiality.
Mutual authentication is established between a LoRaWAN end-device and the LoRaWAN network as part of the network join procedure. This ensures that only authorized devices will be joined to authentic networks. LoRaWAN MAC and application messaging are origin authenticated, integrity protected, replay protected and encrypted. Moreover, LoRaWAN supports end-to-end encryption between the sensor nodes and application servers.
Common use
Some representative LoRaWAN use cases are smart homes and buildings, smart city applications and utility companies , smart metering, agriculture, civil infrastructures and industrial facilities as well.
Comments
LoRaWAN is a Low Power Wide Area Network (LPWAN) technology. It provides wireless, low-cost and secure bi-directional communication for Internet of Things (IoT) applications. LoRaWAN is optimized for long range communication, low power consumption and is designed to support large networks deployment.
Wireless technology / standard
LTE-MTC Cat 0
Organization that manages the technology / standard
LTE technology frequency bands are used LTE-MTC Cat 0 (700MHz, 800 MHz, 900MHz, 1700MHz, 1800MHz, 1900MHz, 2300MHz, 2400MHz, 2500MHz, 2700MHz).
Approximate Range
Range is variable and depends on frequency bands, propagation conditions etc. typically it is ≈ 10km
Data Rate
≈ 1 Mbps
Power Draw
Low
Topology
Star
Requires hub or gateway
No
Proprietary or Open
Open
Intended Use
WAN
Security
System and security management is more complex in LTE-MTC compared to LTE, as there are massive numbers of devices in LTE MTC network. At the same time, the request defined in 3GPP TS 22.368 is “LTE MTC optimizations shall not degrade security compared to non-MTC communications”.
Common use
LTE MTC can be applicable to various use cases including industrial automation and control, intelligent transportation, automatic meter reading, smart electricity distribution and management, smart homes/offices/shops, smart lighting, smart industrial plants, smart water supply, environmental monitoring, public safety and e-health.
Comments
LTE-MTC Cat 0 (LTE machine type communications) is determined in 3GPP Rel. 12 specification.
Wireless technology / standard
LTE-M (Cat M1, Cat M2 ) – eMTC
Organization that manages the technology / standard
LTE-M technology offers SIM-based security features requiring device authentication to connect to the network. Although it shares the LTE security standards, security system and management is more complex in LTE-M (eMTC) due to massive connectivity that is supported in LTE-M (eMTC) networks .
Common use
LTE M (eMTC) technology supports many use cases, like smart cities, smart agriculture, logistics and transportation, industry and manufacturing automation.
Comments
LTE-M Cat M1 is specified by 3GPP Rel.13 and LTE-M Cat M2 is specified by 3GPP Rel.14. Voice over LTE (VoLTE) is usable on LTE- eMTC communications. Two new features are enabled in eMTC, like extended Discontinuous Reception (eDRX), and Power Saving Mode (PSM). The former allows longer paging cycles, while the latter allows nodes to be inactive for an indefinite period of time. Both aim at reducing the power consumption. eMTC also supports handover, which makes it usable when considering mobile IoT applications.
Wireless technology / standard
mcThings
Organization that manages the technology / standard
mcThings technology is embedded with 128 bits AES encryption algorithm.
Common use
Some representative mcThings use cases are asset tracking, industrial automation, maintenance optimization, location monitoring, security systems (theft and loss prevention), status monitoring, agriculture and food industry automation, environmental monitoring (temperature, humidity, air quality, etc.), smart cities, etc.
Comments
mcThings is a good solution for use-cases that have sets of sensors in some urban areas (neighboring buildings). The technology is power efficient and requires minimal maintenance efforts. Network is expandable with bridges, and sensors have long-life batteries (up to 10 years).
Wireless technology / standard
MiWi
Organization that manages the technology / standard
The MiWi protocol follows the MAC security definition specified in IEEE 802.15.4 and is based on 128-bit AES model. MiWi security mechanisms can be categorized into three groups:
• AES-CTR mode encrypts MiWi protocol payload.
• AES-CBC-MAC mode ensures the integrity of the MiWi protocol packet.
• AES-CCM mode combines the previous two security modes to ensure both the integrity of the frame and encrypt the MiWi protocol payload.
Common use
MiWi is designed for low-power, cost-constrained networks, such as industrial monitoring and control, home and building automation, remote control, wireless sensors, lighting control, HVAC systems and automated meter reading.
Comments
MiWi uses small, low-power digital radios based on the IEEE 802.15.4 standard. Although the MiWi software can all be downloaded for free from its official website, it is a proprietary solution that requires use only with Microchip microcontrollers. It was created for short-range networks and designed to help customers reduce their products’ time to market values.
Wireless technology / standard
MiOTY
Organization that manages the technology / standard
Fraunhofer Institute for Integrated Circuits & BTI Ltd. Toronto
Some MiOTY use cases are optimized maintenance models, inventory optimization for parts, asset management and tracking, condition and environmental monitoring, smart metering, augmented reality innovative applications, product R&D, improved customer support, etc.
Comments
MIOTY is a low-power, wide-area network (LPWAN) protocol that is purpose-built for massive industrial and commercial IoT deployments. Fraunhofer’s patented Telegram Splitting – the core of the MIOTY protocol, is designed to provide the scalability and overcome interference and mobility issues of existing wireless IoT technologies.
Wireless technology / standard
NB-IoT – Narrowband-IoT (LTE Cat NB1 and LTE Cat NB2)
Organization that manages the technology / standard
Multilayer security is applied in NB-IoT- network level and application level security, including support for user identity confidentiality, entity authentication, data integrity, and mobile device identification.
Common use
Some NB – IoT use cases are smart metering (electricity, gas and water), facility management services, security systems, connected personal appliances measuring health parameters tracking of persons, animals or objects, smart city and industrial appliances.
Comments
NB-IoT is is determined in 3GPP Rel. 13 specification (LTE Cat NB1) and 3GPP Rel. 14 specification (LTE Cat NB2).
NB-IoT has good indoor coverage and supports a massive number of low throughput end devices – sensors. It has low delay sensitivity, low device power consumption, optimized network architecture and it is cost – effective. LTE Cat NB2 has improved features like throughput, higher location accuracy, multicast transmission mode, enhanced mobility, new 14 dBm power class and support for multi-carrier mode with up to 15 non-anchor carriers, which can support up to 1,000,000 connected NB-IoT devices per square kilometer.
Wireless technology / standard
Neul
Organization that manages the technology / standard
The wireless communications links between the gateway (base station) and the network nodes are encrypted.
Common use
The Neul communications technology is a wide-area wireless networking technology designed for the IoT and created to compete against existing cellular communications technologies solutions, applicable to smart metering, facility management services, security systems, logistics and transportation, industrial automation etc.
Comments
Neul leverages very small slices of the TV White Space spectrum to deliver high scalability, high coverage, low power and low-cost wireless networks. Systems are based on the Iceni chip, which communicates using the white space radio to access the high-quality UHF spectrum, available due to the analogue to digital TV transition. Devices can consume as little as 20 to 30mA from 2xAA batteries, meaning 10 to 15 years in the field. Neul has some old and new standard versions (obsolete Neul version is Weightless-W, Weightless-P is the last one).
Wireless technology / standard
NFC
Organization that manages the technology / standard
One of the security mechanisms implemented in NFC is Digital Signature (defined in the NFC Forum Signature RTD 2.0) with asymmetric key exchange [RD]. The Digital Signature is a part of the NFC Data Exchange Format (NDEF) message, which includes also a Certificate Chain and a Root Certificate. Moreover, each NFC device has a private and a public key.
Developed by HID – NFC tag manufacturer, another security mechanism is a Trusted Tag. It is fully compliant with NFC Forum Tag Type 4 and works with any NFC Forum compatible devices. The Trusted tag is protected from cloning and embedded with cryptographic code that is generated by every “tap” or click on NFC button. This cryptographic code protects the content of the transmitted information.
Common use
Some representative NFC use cases are ticket confirmation for sports events, concerts, at theaters, cinemas; welfare performances improvement – syncing workout data from a fitness machines with personal user device; personalized content sharing – viewing special offers on your phone in museums, shopping malls and stores; loaders of translated content in different services, like menus in the restaurants; check-in and check-out in hotels, airports etc. security systems – unlocking an NFC-enabled door locks, etc.
Comments
NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. There are three available modes of NFC communication:
– Read/write (e.g. for reading tags in NFC posters)
– Card emulation (e.g. for making payments)
– Peer-to-peer (e.g. for file transfers)
NFC technology is power efficient – much more than other wireless technologies.
Wireless technology / standard
RFID
Organization that manages the technology / standard
A number of organizations have set standards for RFID, including the International Organization for Standardization (ISO), the International Electrotechnical Commission (IEC), ASTM International, etc.
RFID standards include: ISO 11784/11785, ISO 14223, ISO/IEC 14443, ISO/IEC 15693, ISO/IEC 18000, ISO/IEC 18092, ISO 18185, ISO/IEC 21481, ASTM D7434, ASTM D7435, ASTM D7580, ISO 28560-2https://rfid4u.com/rfid-basics-resources/basics-rfid-regulations/
4kbps – 640kbps (depending on the active or passive type of device and frequency range).
Power Draw
Low
Topology
point to point
Requires hub or gateway
Yes
Proprietary or Open
Open
Intended Use
Single building
Security
The implementation of security mechanisms in RFID technology is based on confidentiality, integrity, and availability. Confidentiality is the information protection from unauthorized access. Integrity is related to data protection from modification and deletion by unauthorized parties. Availability represents the capability for data access when needed.
If any of these mechanisms is not operational, the security is broken.
Common use
Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. Moreover, this technology is very important for people identification, as it is deployed in the latest biometric passports. Some other typical use cases are access control, library books, personal ID cards, gaming chips, vehicle tracking, auto manufacturing, mining, construction, asset tracking.
Comments
Commonly, a RFID system has three main components: RFID tag, RFID reader and RFID application software. RFID tags can be active (with microchip, antenna, sensors and power supply) or passive (without power supply). RFID reader is another hardware component that identifies a RFID tag and transmits its status to the RFID software application. RFID software applications (very often mobile applications) are responsible for monitoring and administering the RFID tags. They usually exchange information with RFID readers via different beacon technologies or Bluetooth.
Wireless technology / standard
RPMA (Random Phase Multiple Access)
Organization that manages the technology / standard
Security in RPMA wireless technology is built on 128 b AES. It offers security features such as: mutual authentication, message integrity and replay protection, message confidentiality, device anonymity, authentic firmware upgrades and secure multicasts.
Common use
RPMA is applicable for many use cases such as asset tracking, agriculture, oil fields automation, environmental monitoring, smart city, fleet management and logistics, industrial automation, connected cars, etc.
Comments
Before IoT, Ingenu (previously OnRamp) was selling metering infrastructure that collected low power information from electricity meters.
Ingenu has created random phase multiple access (RPMA), which uses Direct Sequence Spread Spectrum (DSSS) and is similar to code division multiple access (CDMA) cellular protocols.
Wireless technology / standard
Sigfox
Organization that manages the technology / standard
The Sigfox technology globally works within the ranges from 862 to 928 MHz
Approximate Range
≈ 40km
Data Rate
600bps
Power Draw
Low
Topology
Star
Requires hub or gateway
Yes
Proprietary or Open
Proprietary
Intended Use
WAN
Security
Security first comes within devices During the manufacturing process, each Sigfox Ready device is provisioned with a symmetrical authentication key. Security is also supported by radio technology. The SigFox technology encryption is designed in collaboration with CEA-LETI institute, specifically for use with short Sigfox messages. In compliance with customers requests, end-to-end encryption solutions are applicable to the SigFox networks.
Common use
SIGFOX applicability potential is great. Some representative use cases are supply chain & logistics automation, manufacturing automation, smart cities, smart buildings and smart utilities & energy management and monitoring, smart agriculture etc.
Comments
SIGFOX protocol is a patented and closed technology. While it’s hardware is open, the network however isn’t and customers must be subscribed to it. Note that while there are strict limitations of SIGFOX in terms of throughput and utilization, it is intended for systems sending small and infrequent bursts of data. Data for various sensors can typically fit within these constraints.
Wireless technology / standard
Thread
Organization that manages the technology / standard
Thread utilizes a network-wide key that is used at the Media Access Layer (MAC) for encryption. This key is used for standard IEEE 802.15.4 authentication and encryption. IEEE 802.15.4 security protects the Thread network from over-the-air attacks originating from outside the network. Each node in the Thread network exchanges frame counters with its neighbors via an MLE handshake. These frame counters help protect against replay attacks. Thread allows the application to use any internet security protocol for end-to-end communication.
Common use
Thread provides wireless connectivity for home automation via the control of lights – smart bulbs and outlets, smoke detectors, cameras and other security systems, thermostats, utilities measurements, smart digital locks, hubs and controllers, different gateways, thermostats, smoke detectors, etc.
Comments
Thread was designed with the Internet’s proven, open standards to create an Internet Protocol version 6 (IPv6) based mesh network, with 6LoWPAN as its foundation.
Thread can securely connect up to 250 devices in a wireless mesh network .
Wireless technology / standard
Wavenis
Organization that manages the technology / standard
Wavenis technology is supported by 128-bit AES encryption.
Common use
Some Wavenis use cases are different metering solutions (gas, electricity, water, etc.) applicable to environmental monitoring, smart cities, utilities companies etc.
Comments
Wavenis is a wireless technology created by Coronis in the year 2000. It is developed for ultra low power and long range Wireless Sensor Networks(WSNs). It has become popular due to promotion by Wavenis Open Standard Alliance.
Wireless technology / standard
WAVIoT (NB-Fi – Narrowband Fidelity)
Organization that manages the technology / standard
All WAVIoT data is encrypted bidirectionally from the device to the server using an XTEA 256 bit key block cipher.
Common use
Typical WAViOT use cases are smart cities, smart buildings, smart metering, utilities monitoring and metering like water, power – electricity, gas, heat, etc.
Comments
NB-Fi (Narrowband Fidelity) is a narrow band protocol which communicates on the sub 1GHz ISM sub bands. DBPSK is used as the modulation scheme in the physical layer. WAVIoT gateways can provide -154 dBm of receiver sensitivity, and cover over 1 million nodes. On WAVIoT-developed devices, short data bursts use 50mA of current, and in idle mode – a few µA are used. Devices have a lifetime of up to 20 years, and a 176 dBm link budget.
Wireless technology / standard
Weightless (W, N, P)
Organization that manages the technology / standard
In Weightless standard AES-128/256 encryption and authentication of both the terminal and the network guarantees integrity whilst temporary device identifiers offer anonymity for maximum security and privacy. OTA security key negotiation or replacement is possible whilst a future-proof cipher negotiation scheme with a minimum key length of 128 bits protects long term investment in the network integrity.
Common use
Typical Weightless use cases are smart metering, vehicle tracking, asset tracking, smart cars – vehicle diagnostics and upgrades, health monitoring, traffic sensors, smart appliances, rural broadband, smart ePayment infrastructure, industrial machine monitoring, temperature readings, tank level monitoring, metering, and more.
Comments
The Weightless Special Interest Group (SIG) offers three different protocols— Weightless-N, Weightless-W, and Weightless-P.
Weightless-W open standard is designed to operate in the TV white space (TVWS) spectrum. Weightless-W represents a model the Neul was trying to develop before they were acquired by Huawei.
Weightless-N is an ultra-narrowband system that is very similar to SigFox and initially developed by Nwave . It uses the differential BPSK modulation in narrow frequency channels, and is intended for uplink sensor data.
Weightless-P is the latest Weightless technology. It offers two-way features and supports quality of service. Weightless – P uses Gaussian minimum shift keying (GMSK) as a standard modulation, and quadrature phase shift keying (QPSK), which is much more advanced.
Wireless technology / standard
Wi-SUN
Organization that manages the technology / standard
The Wi-SUN security is specified by implementation of the x.509 certificate-based, public-key infrastructure to authenticate devices, as well as Advanced Encryption Standard (AES) encryption and message integrity check.
Devices protect their digital credentials either by storing them in hardened cryptographic processors that are resistant to physical tampering or by using physically unclonable function (PUF) technology.
Common use
Some typical Wi-Sun use cases are smart metering, smart cities, smart buildings, industrial automation, environmental sensing, etc.
Comments
The term Wi-Sun is the short form of Wireless Smart Utility Network. Wi-Sun technology is a successful derivation of IEEE 802.15.4 wireless standard that supports IPv6 protocol.
Wireless technology / standard
ZigBee
Organization that manages the technology / standard
ZigBee is considered to be a secure wireless communication protocol, with security architecture built in accordance with IEEE 802.15.4 standard. Security mechanisms include authentication – authorized access to network devices, integrity protection and encryption with key establishment and transportation.
Device authentication is the procedure of confirming a new device that joins the network as authentic. The new device must be able to receive a network key and set proper attributes within a given time frame to be considered authenticated. Device authentication is performed by the Trust Center.
Integrity protection is realized on the frame level using message integrity checks (MIC) to protect the transmitted frames and ensure they are not accessed and manipulated. A 128-bits symmetric-key cryptography is implemented in ZigBee’s security architecture.
Common use
Some representative ZigBee use cases are correlated with smart homes and smart buildings applications, like different smart home gateways, sensors and alarms that are monitoring almost everything – from temperature, humidity, or lighting and movement, smart plugs and relays, power and water consumption and other utilities measurements, etc.
Comments
ZigBee is wireless PAN (Personal Area Network) technology evolved from IEEE 802.15.4 wireless standard and supported by the ZigBee Alliance. IEEE 802.15.4 standard defines the physical and data link layer with all details about the robust radio communication and medium access control. ZigBee Alliance provides content standardization of the transmitted messages from network layer to application layer. It is a non-profit association, responsible for open global ZigBee standard development and interoperability.
Wireless technology / standard
Z-Wave
Organization that manages the technology / standard
Z-wave provides packet encryption, integrity protection and device authentication services. End-to-end security is provided on application level (communication using command classes). It has in-band network key exchange and AES symmetric block cipher algorithm using 128-bit key length.
Common use
It is a wireless communications protocol used primarily for home automation. Important Z-wave use cases are smart homes and buildings, smart offices, smart sensors, smart wall switches, smart bulbs, thermostats, windows, locks and security systems, swimming pools and garage door openers etc.
Comments
Z-Wave protocol was developed by Sigma Designs, Inc. and determined by ITU G.9959 recommendation. Like other protocols and systems developed for the home and office automation , a Z-Wave system can be controlled via the Internet from a smart phone, tablet or computer.