IOWA DEVICE MANAGEMENT SDK
IoTerop’s IOWA SDK helps reduce the technical challenges and costs of large IoT deployments on constrained networks and devices.
+ Efficient: with the smallest client footprint in the industry (as small as 30KB Flash and 5KB RAM), IOWA supports IoT solutions on the most constrained devices and networks.
+ Industry-Proven: certified by Ericsson, AT&T, and Verizon, used by Itron (Gartner Managed IoT Connectivity 2019 Visionary), and supported by semiconductor manufacturers, like STMicroelectronics among others.
+ Security: enable end-to-end authentication & encryption at the device, application, & data-transport level.
+ Time-To-Market: leverage complete APIs, a tested, mature SDK, sample code, & full documentation to build rich, cost-effective IoT solutions quickly.
+ State-of-the-Art: use the Lightweight M2M standard already supporting tens of millions of devices, pragmatically combining industry-accepted standards & practices.
Want to start developing? Request the IOWA Evaluation SDK or get the regular IOWA SDK to build IoT solutions even faster.
WANT TO SEE WHAT IOWA CAN DO? HERE ARE SOME ADDITIONAL RESOURCES.
USE A WORKING LWM2M INSTANCE
Download the IOWA Android Client application, install it on any Android phone, and connect to CONNECTicut. The phone is now a smart-sensor providing real-time data (accelerometer, light-levels, etc.) that can be controlled centrally from CONNECTicut (lock-out, reboot, etc.).
In the image below we are using CONNECTicut to measure light-levels with an Android phone.
SEE, USE, AND TURBOCHARGE NB-IOT DEVELOPMENT
Start by downloading STMicroelectronics binaries. Flash the binaries onto an ST32 Cube Discovery board with X-Cube cellular, and now you have a working NB-IoT solution (SIM not included) with a few standard IPSO data objects. Once you are ready to start developing, get the source code as part of your SDK.
Are you more hands on?
Some people prefer to see with their own hands. We understand. That is why we decided to make an evaluation version of the IOWA SDK available. Take a moment to fill out the form, and we will do our best to get you the evaluation SDK.
Looking for more Detail?
The award-winning IOWA SDK provides a full set of device management services, including security, data management, granular over-the-air firmware updates, and interoperability, across the broadest range of operating systems and devices, even supporting Android phones.
IOWA is a C-Library ported to ARM and Intel x86 for the major operating systems: ARM mbedOS, FreeRTOS, ThreadX, Linux, Android,… including bare metal. IOWA works over IP (TCP or UDP) or non-IP, star or mesh network, for any of those physical layers: NB-IoT, LTE-M, LORA, 2G/3G/4G, Bluetooth, Wi-Fi, and 802.15.4. IOWA SDK includes sample code for the AT-command line interface to several NB-IoT/LTE-M modules.
IOWA’s industry-leading device footprint is fractional compared to other offerings. Why does this matter? The bigger the footprint, the more costly the hardware and total solution costs.
Our complete implementation of Lightweight M2M 1.1 requires less than 30KB storage and less than 5KB at execution, including a set of standard objects.
Lightweight M2M 1.1 Services and What's Included
Efficiency is critical to reducing costs. Smaller device footprints mean less costly devices and longer device lifespans. Efficient data management means less network and back-end utilization, further driving down costs. Sending data is easy. Sending the right data, only at the right time, is much more challenging.
IOWA supports the most compact object description and encryption (TLV, CBOR, SenML), as well as the most economical end-to-end security solutions (DTLS, OSCORE), and most compressed network payload solution, including non-IP data delivery (NIDD).
As we move from thousands to millions to billions of devices, cumbersome IoT solutions are just inconceivable. Compactness and efficiency, especially on the device level, are critical operational and cost considerations.
By restricting the memory footprint and battery needs, we enable you to deploy at a lower cost. We allow the most compact payload usage by implementing non-IP data delivery, further reducing energy needs. IOWA lets you upgrade firmware incrementally, resuming failed firmware updates without the need to restart saving additional resources.
Devices, by definition, are remote, constrained, and exposed. IoT will never be Fort Knox; however, appropriate IoT security means having the right protection at the right places at the appropriate levels for the right mission. IOWA ensures accepted, standardized, state-of-art security practices and technologies are applied throughout, adaptable to your security objectives.
IOWA implements all security standards mandated by Lightweight M2M 1.1, including, application-layer security, point-to-point system layer security, and a broad set of the associated authentication mechanisms.
Well-documented and supported by a team of experts, you can begin leveraging IOWA’s core services with just a few lines of code. All the hard to do technological plumbing becomes easily accessible services allowing you to focus on business objectives.
IOWA documentation fully details our software development kit content, system abstraction layer, client mode API, and finally, gateway mode API, including the bootstrap server.
Optimized for constrained devices and Networks
IOWA benefits from IoTerop founders’ decades of embedded experience as well as a team of dedicated engineers whose focus is to make IOWA better every day. IoTerop is also a long-time contributor to the Open Mobile Alliance SpecWorks Lightweight M2M standard with IoTerop’s Chief Product Officer, a sitting board member until 2022.
IOWA has been certified by carrier service providers, AT&T and Verizon, as well as by network infrastructure provider Ericsson. Selecting IOWA assures doors are shut.
Technology is not an objective but a means. IOWA allows you to use complementary technology on an as-desired basis to support your unique IoT objectives.
Although we support COAP natively over UDP, you can work in parallel, over TCP, or SMS, or LoRaWAN, or even any non-IP network. Additionally, you are free to choose your authentication mechanism: Pre-Shared Keys, OSCORE, X509 Certificate, or raw public keys. Finally, we provide you the choice between different point to point security mechanisms: DTLS or TLS, and on top of which, we provide end to end security OSCORE. No one in the industry can offer that range of choices.
IoT is increasingly regulated, requiring security equivalent to the importance and vulnerabilities created. IOWA’s standardized device management practices not only assure critical security practices but also exceed what is required by governmental regulations.