Skip to main content

B2B and B2C will converge in IoT, says Oberthur

The Internet of Things (IoT) will deliver a new form of commerce in the next few years, says Edward Simonet, M2M director, Oberthur Technologies. The B2B and B2C business models will converge and become B2B2C. Someone buying a fitness monitor, for example, is actually buying access to a service that will store and analyse data, says Simonet: “The device is just the tip of the iceberg.”
November 5, 2014 Read time: 1 min

The Internet of Things (IoT) will deliver a new form of commerce in the next few years, says Edward Simonet, M2M director, Oberthur Technologies. The B2B and B2C business models will converge and become B2B2C. Someone buying a fitness monitor, for example, is actually buying access to a service that will store and analyse data, says Simonet: “The device is just the tip of the iceberg.” However, market analysis shows that in the M2M industry, there are concerns about the vulnerabilities of these new devices being connected to open networks. For this reason, several security measures are likely to be installed, such as a digital signature device to ensure the device’s integrity and gateways to guarantee data privacy.

Related Content

  • Kontron introduces box PC for IoT
    November 12, 2015
    Kontron’s new KBox A-202 is a modular box PC supporting Intel gateway solutions for the Internet of Things (IoT). Based on the Intel Atom processor E3800, the low maintenance, fanless and battery-free machine-to-machine platform is designed as an intelligent gateway for data intensive IoT applications including those in industrial automation, transportation and communications.
  • Smart Spanish city trials cell-based traffic management
    November 7, 2013
    David Crawford reports on an urban electronic nervous system. The northern Spanish city of Santander – historically a port - is now an emerging technology showcase attracting global attention as a prototype for a medium-sized smart city of the future. In a move to determine the optimal use of available data, it is creating a de-facto experimental laboratory for sensor and mobile phone-based urban traffic management and environmental monitoring innovations.
  • Pioneering sensors collect weather data from moving vehicles
    January 20, 2012
    ITS International contributing editor David Crawford foresees the vehicle as 'sentinel being'
  • Technologies to protect connected cars ‘not being utilised’
    August 10, 2016
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe