Tondo Smart Lighting also creates an open standards-based Smart City network for connecting sensors and other wireless and wired devices to Tondo's Cloud-IQ management platform.
This can reduce sensor and device deployment costs by 80% or more versus proprietary networks or individual cellular connections, with a 2.7x or greater benefit versus your LED retrofit project, and 3.5x over Smart Lighting alone.
Read more about the Business Case for Smart Lighting on this link.
Normally open(NO) and Normally closed (NC) are terms used to define the states that switches, sensors or relay contacts are under when they are not activated.
A NO contact or a normally open contact is the one that remains open until a certain condition is satisfied such as a button being pressed or some other manner of activation such as those based on temperature, pressure, etc.
A NC contact or normally closed contact is the exact opposite of NO contact by function. It remains closed until a certain condition is satisfied.
Lighting control cabinets typically control a group of street lights or advertising signage from a "control cabinet". These controls have historically provided on-off functionality based on the time of day using an "astronomical clock"-based switch or daylight photosensor. Lights are controlled in groups with no individual control over a specific light.
Although new controllers such as Tondo's Edge-IQ controller have replaced the cabinet-based approach with new technologies that include advanced dimming, remote cloud-control, and support for functionality including sensors and switches, there are many outdoor lights and signs that do not support on-lamp control. Tondo's Cabinet-IQ controller provides new advanced IoT technology support for existing cabinet-controlled lighting.
CAT-M/LTE-M and NB-IoT are similar but have differences that may make one suitable over another, or simply selected based on the support for one or the other that is available in your area.
NB-IoT uses a narrow bandwidth of 200 kHz, where CAT-M uses 1.4 MHz. The maximum data rate for NB-IoT is ~ 250 kb per second, with CAT-M1 reaching ~ 1 Mbps. CAT-M is marginally less energy efficient than NB-IoT. Although NB-IoT has a lower speed, both NB-IoT and CAT-M are suitable for sensor communications since sensors typically do not require much bandwidth.
Both NB-IoT and CAT-M1 are supported under the 5G technology specifications and therefore are ideal for selecting as a standard for sensor communications.
CAT-M wireless (aka LTE-M) is a low-power wide area network (LPWAN) cellular data transmission standard that operates over the data and physical layer. CAT-M was designed for IoT projects, with an average upload speed between 200 kbps and 400 kbps.
Eddystone is an open-source Bluetooth advertising protocol originally designed by Google. It can be used by mobile device applications to deliver improved proximity-based experiences that include applications such as Google Maps.
These packets can be discovered with any Bluetooth LE APIs such as Core Bluetooth on iOS, or android.bluetooth.le on Android. You can also use them with Google’s Nearby Messages API, which can be integrated into an iOS or Android app, and receive “messages” in those apps when a person enters or exits a range of beacons.
Tondo's 2022 estimate was calculated for each lighting category by applying market growth factors for each lighting category between 2015 and 2021 based on U.S. Census data to the DOE dataset.
A RESTful API is an architectural style for an application program interface (API) that uses HTTP requests to access and use data.
The API spells out the proper way for a developer to write a program requesting services from an operating system or other application.
You can read more from the source of this definition at TechTarget here.
A DIN rail is a metal rail of a standard type widely used for mounting circuit breakers and industrial control equipment inside equipment racks.
IP stands for "ingress protection". For IP67, this means:
"6" describes protection of solid particles: No ingress of dust; complete protection against contact (dust-tight). A vacuum must be applied. Test duration of up to 8 hours based on airflow.
"7" describes the protection from water: Ingress of water in harmful quantity shall not be possible when the enclosure is immersed in water under defined conditions of pressure and time (up to 1 meter (3 ft 3 in) of submersion). Test duration: 30 minutes.
Modbus is a data communications protocol originally published in 1979. Modbus has become a de facto standard communication protocol and is now a commonly available means of connecting and communicating with industrial electronic devices.
RS-485, also known as TIA-485(-A) or EIA-485, is a serial communications standard.
Electrical signalling is balanced, and multipoint systems are supported. Digital communications networks implementing the standard can be used effectively over long distances and in electrically noisy environments.
4G devices will work on 4G LTE networks and the earlier cellular technologies, including 3G, EGPRS, and 2G.
Smart city sensors require very little bandwidth, and 3G EGPRS and 4G LTE can easily support the required data rates.
5G networks are relatively new, and most 5G deployments use a combination of 4G and 5G networks.
DALI-2 refers to the latest version of the DALI protocol. While DALI version 1 only included control gear, DALI-2 includes control devices such as application controllers and input devices (e.g. sensors), as well as bus power supplies.
Zhaga Book 18 describes a smart interface between outdoor luminaires and sensing/ communication nodes.
Zhaga Book 18 allows any certified node to operate with any certified luminaire. Certified luminaires and sensing / communication modules are available from multiple suppliers, establishing an ecosystem of compatible products.
The NEMA ANSI C137.4-2021 builds on the NEMA C137.41 7-pin connector standard and the DALI communication protocol. It has additional characteristics and features that align very closely with the D4i family of specifications from the DALI Alliance.
D4i and ANSI C137.4-2021 specify the digital communication between luminaires and devices including sensors and network lighting controllers. The expanded ANSI C137.4-2021 now includes energy reporting data and diagnostics and maintenance data.
The NEMA ANSI C137.10 standard specifies roadway and area lighting equipment connector compatibility. The 3-pin standard does not provide for dimming control, but provides for on/off operation. The later standard C137.41 adds dimming control (5- and 7-pin connectors) and sensor control (7-pin connectors). The newer C137.4-2021 standard provides enhanced functionality and compatibility with the DALI D4i lighting and sensor control standard.
The NEMA ANSI C137.41 standard specifies covers roadway and area lighting equipment connection interoperability. The 7-pin receptacle provides for dimming control and sensor communications.
The NEMA ANSI C137.41 5-pin connector variant adds support for dimming control, but does not include sensor communications support which is supported by the 7-pin connector.
DALI, or Digital Addressable Lighting Interface, is a dedicated protocol for digital lighting control that enables the easy installation of robust, scalable and flexible lighting networks.
Wiring is relatively simple; DALI power and data is carried by the same pair of wires, without the need for a separate bus cable.
The TALQ Consortium has established a globally accepted standard for management software interfaces to configure, command, control and monitor heterogeneous outdoor device networks (ODN) including smart street lighting.
This way interoperability between Central Management Software (CMS) and Outdoor Device Networks (ODN, so called ‘gateways’) for smart city applications from different vendors is enabled, such that a single CMS can control different ODNs in different parts of a city or region.
D4i is the DALI standard for intelligent, IoT-ready luminaires.
By taking care of control and power requirements, D4i makes it much easier to mount sensors and communication devices on luminaires. In addition, intelligent D4i LED drivers inside the luminaire have the capability to store and report a wide range of luminaire, energy and diagnostics data in a standardized format.
Highly reliable hardware, firmware, and software components that perform specific, critical security functions. Because roots of trust are inherently trusted, they must be secure by design. Roots of trust provide a firm foundation from which to build security and trust.
Read more at the National Institute of Standards and Technology: Roots of Trust
The 0.1, 0.2, and 0.5 accuracy class electricity meters established within ANSI C12.20-2015 are accurate to within +/-0.1%, +/-0.2%, and +/-0.5% of true value at a full load.
Tondo's controllers utilize a chipset containing the ARM Cryptocell 300 cryptographic accelerator chip with hardware-protected vault and Root of Trust security. Read more about the ARM 300 family here: ARM Cryptocell 300 Family Overview
The world would collectively achieve 10,546 TWh of energy savings by 2030 [with energy efficient lighting], a sum comparable to over 40% of the world electricity generation in 2011. Saving this amount of energy would prevent the emissions of 5,400 Mt CO2, a figure equivalent to over 15% of the global emissions in 2011.
As cities integrate more connected devices into their infrastructure, ensuring the security and integrity of Smart Roadway Lighting and Smart City control devices is crucial.
One of the key debates in the field of IoT security is the effectiveness of Hardware Security Modules (HSMs) and cryptoprocessors versus traditional software-based security certificate approaches. Tondo Smart utilizes advanced cryptographic hardware to secure their IoT devices.
Here, we explore the advantages of these hardware-based security measures over software-based solutions, as well as the benefits of Tondo’s fully managed back-end cloud platform.
Understanding Hardware Security Modules and Cryptoprocessors
Hardware Security Modules (HSMs) are physical devices that manage digital keys, perform encryption and decryption functions, and provide secure storage for cryptographic keys. HSMs are designed to be tamper-resistant, ensuring that keys cannot be extracted or manipulated.
Cryptoprocessors are specialized microprocessors designed to execute cryptographic algorithms. They enhance security by offloading cryptographic operations from the main CPU, reducing the risk of exposure to attacks that target general-purpose processing units.
Enhanced Security
HSMs and cryptoprocessors provide a higher level of security compared to software-based solutions. By isolating cryptographic operations in dedicated hardware, these devices minimize the risk of key exposure and tampering. The ARM Cryptocell 310 and Microchip ATECC608B used by Tondo’s controllers ensure that cryptographic keys are securely stored and managed, making unauthorized access extremely difficult.
Tamper Resistance
Hardware-based security devices are designed to be tamper-resistant. They include physical protections and mechanisms that detect and respond to tampering attempts. For example, the Microchip ATECC608B HSM includes tamper-evident features that provide additional layers of security, which are not possible with purely software-based approaches.
Performance Efficiency
Cryptoprocessors are optimized to perform cryptographic operations efficiently. Offloading these tasks from the main CPU reduces the processing burden on IoT devices, leading to better performance and lower power consumption. This is particularly important for Smart City IoT devices, which often operate under power and performance constraints.
Scalability
As Smart City projects scale, the number of IoT devices increases significantly. Managing security certificates and cryptographic keys through software can become cumbersome and error-prone. HSMs and cryptoprocessors, however, offer scalable solutions that can handle a large volume of keys and certificates securely and efficiently.
Compliance and Certification
Many industries and governmental regulations require the use of certified hardware for cryptographic operations. HSMs and cryptoprocessors often come with certifications that validate their security capabilities, ensuring compliance with stringent security standards. Tondo’s use of ARM Cryptocell 310 and Microchip ATECC608B HSM aligns with these regulatory requirements, providing assurance to city administrators and stakeholders.
Comparing with Software-Based Security Certificate Approaches
While software-based security certificates offer flexibility and ease of deployment, they are inherently more vulnerable to various types of attacks. Here are some examples of security vulnerabilities that are inherent in software-based certificate security but are not present in HSM and cryptoprocessor architectures:
Key Exposure
Software-Based Security: Keys stored in software can be exposed through memory dumps, malware, or unauthorized access to the software environment.
HSMs/Cryptoprocessors: Keys are stored in tamper-resistant hardware, making extraction extremely difficult. Even if the device is physically tampered with, the hardware is designed to zeroize the keys, rendering them useless.
Malware Attacks
Software-Based Security: Malware can infiltrate software environments, gaining access to cryptographic keys and sensitive operations. This is a common attack vector for stealing certificates and keys.
HSMs/Cryptoprocessors: By isolating cryptographic operations within secure hardware, the risk of malware accessing keys and operations is significantly reduced.
Man-in-the-Middle (MitM) Attacks
Software-Based Security: Software-based keys can be intercepted during transmission or compromised through vulnerabilities in the software stack, allowing attackers to perform MitM attacks.
HSMs/Cryptoprocessors: Secure key storage and cryptographic operations within hardware prevent keys from being intercepted or tampered with during transmission.
Insider Threats
Software-Based Security: Insiders with access to the software environment can extract keys or manipulate cryptographic operations.
HSMs/Cryptoprocessors: Physical security measures and tamper resistance make it difficult for insiders to access or manipulate keys and operations without detection.
Software Bugs and Vulnerabilities
Software-Based Security: Bugs in software can lead to vulnerabilities that expose cryptographic keys or weaken security mechanisms.
HSMs/Cryptoprocessors: Dedicated hardware for cryptographic operations reduces the risk of bugs and vulnerabilities affecting key management and security.
Tondo’s Fully Managed Back-End Cloud Platform
In addition to utilizing advanced cryptographic hardware, Tondo Smart Ltd. provides a fully managed back-end cloud platform for its customers. This approach offers significant advantages over competitors who provide customers with software-based security certificate management tools that are accessible by employees within a customer’s organization.
Customers are not exposed to the back-end, but are only provided with the Tondo Cloud IQ front-end management console that focuses on city operational priorities and delivering actionable insights via Tondo’s Deep Learning AI.
Advantages of Tondo’s Managed Cloud Platform
Simplified Device Management
Tondo: Manages device commissioning and de-commissioning through a secure, centralized cloud platform, eliminating the complexity and risk associated with manual processes.
Competitors: Require customers to manage these processes internally, increasing the risk of errors and security breaches.
Secure Chain of Trust
Tondo: Ensures a secure chain of trust through its supply chain, from manufacturing to deployment, by embedding security at every stage.
Competitors: Rely on customers to manage security certificates and key management, which can be vulnerable to insider threats and mismanagement.
Reduced Risk of Human Error
Tondo: Automates key management and security processes, reducing the likelihood of human error and ensuring consistent security practices.
Competitors: Depend on manual processes and employee vigilance, which can lead to inconsistencies and increased risk of security incidents.
Enhanced Compliance and Reporting
Tondo: Provides comprehensive compliance and reporting features through its managed platform, ensuring that customers meet regulatory requirements with minimal effort.
Competitors: Require customers to implement and maintain compliance measures internally, which can be resource-intensive and prone to lapses.
Scalability and Flexibility
Tondo: Offers a scalable solution that can easily accommodate the growing number of IoT devices in a Smart City environment, with seamless updates and management through the cloud.
Competitors: Customers must scale their internal infrastructure and processes to manage increasing device numbers, which can be costly and complex.
Conclusion
As cities continue to adopt Smart City IoT technologies to enhance their infrastructure and services, the importance of robust cybersecurity cannot be overstated. HSMs and cryptoprocessors offer significant advantages over software-based security approaches, providing enhanced security, tamper resistance, performance efficiency, scalability, and regulatory compliance.
Additionally, Tondo’s fully managed back-end cloud platform simplifies device management, ensures a secure chain of trust, reduces the risk of human error, and enhances cybersecurity compliance for cities.
By leveraging advanced cryptographic hardware and a comprehensive managed cloud platform, Tondo sets a high standard for IoT cybersecurity, addressing the critical need for robust protection in Smart City infrastructure.
We are thrilled to announce that Tondo’s latest innovation, the SC220 smart controller, has been awarded certification for North American deployment (link). With approvals from CSA/UL, FCC, CE, and RoHS, the SC220 is now ready to bring advanced, AI-powered lighting...
Seattle, Washington, September 12, 2024 – Tondo Smart USA Inc., a leader in smart lighting and smart city technologies, is proud to announce the granting of a patent (US Patent 12,098,831) for Tondo’s Edge IQ smart lighting wireless controller. This...
The installation of the Edge IQ controller is designed to be straightforward, ensuring that even those with minimal technical experience can complete it efficiently.
If you don't consent, everything still works. No personally identifying information is collected from our site unless you fill out a form on the site and send it to us. However, if you fill out a form on the site, it will not send to us unless you Accept Cookies first, because we use Google reCaptcha to limit spam.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.We use anonymous statistics so we know whether our website is serving you well. That's it!
Marketing
We only get your personally identifying information if you fill out a form on the site and send it to us.