Evolution of SIM provisioning towards a flexible MCIM provisioning in M2M vertical industries

Harald Bender, Gerald Lehmann
{"title":"Evolution of SIM provisioning towards a flexible MCIM provisioning in M2M vertical industries","authors":"Harald Bender, Gerald Lehmann","doi":"10.1109/ICIN.2012.6376034","DOIUrl":null,"url":null,"abstract":"The fast growing market for wireless Machine-to-Machine (M2M) communication services is facing specific challenges which do not exist comparably in the traditional cellular subscriber market. The challenges are emerging around the changed ecosystem and value chain and dealing with different traffic and load profiles in the network. The significantly reduced ARPDs (average revenue per device) are calling for increased operational efficiency and flexibility and tangible cost reductions. With regard to the requirements arising in this context this paper focuses on new concepts for SIM management (SIM: Subscriber Identity Module) in the M2M domain from a subscription management perspective in order to develop an economic MCIM provisioning process (MCIM: M2M communication identity module). Three technical concepts were addressed and described with a look on the critical features. Essential items are the circle of trust, the grade of flexibility, the complexity of the solution and the impact on security. A further evolution of the Embedded UICC (Universal Integrated Circuit Card) proposal currently handled in standardization is presented and discussed, which gives the device owner and the M2M service provider a more active role and responsibility in the process. This approach enables full flexibility for change of operator and subscription and requires less administrative effort from MNOs (Mobile Network Operators), in particular for devices currently not requiring an active subscription. The respective business processes for MCIM management are presented as blueprints and discussed with regard to the lifecycle phases. There is a need for an increased grade of automation and integration of these workflows going beyond the boundaries of a particular stakeholder participating in the value net.","PeriodicalId":168212,"journal":{"name":"2012 16th International Conference on Intelligence in Next Generation Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 16th International Conference on Intelligence in Next Generation Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIN.2012.6376034","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7

Abstract

The fast growing market for wireless Machine-to-Machine (M2M) communication services is facing specific challenges which do not exist comparably in the traditional cellular subscriber market. The challenges are emerging around the changed ecosystem and value chain and dealing with different traffic and load profiles in the network. The significantly reduced ARPDs (average revenue per device) are calling for increased operational efficiency and flexibility and tangible cost reductions. With regard to the requirements arising in this context this paper focuses on new concepts for SIM management (SIM: Subscriber Identity Module) in the M2M domain from a subscription management perspective in order to develop an economic MCIM provisioning process (MCIM: M2M communication identity module). Three technical concepts were addressed and described with a look on the critical features. Essential items are the circle of trust, the grade of flexibility, the complexity of the solution and the impact on security. A further evolution of the Embedded UICC (Universal Integrated Circuit Card) proposal currently handled in standardization is presented and discussed, which gives the device owner and the M2M service provider a more active role and responsibility in the process. This approach enables full flexibility for change of operator and subscription and requires less administrative effort from MNOs (Mobile Network Operators), in particular for devices currently not requiring an active subscription. The respective business processes for MCIM management are presented as blueprints and discussed with regard to the lifecycle phases. There is a need for an increased grade of automation and integration of these workflows going beyond the boundaries of a particular stakeholder participating in the value net.
在M2M垂直行业中,SIM供应向灵活的MCIM供应的演变
快速增长的无线机器对机器(M2M)通信业务市场正面临着传统蜂窝用户市场所不存在的特殊挑战。这些挑战围绕着不断变化的生态系统和价值链,以及处理网络中不同的流量和负载情况而出现。arpd(每台设备平均收益)的显著降低要求企业提高运营效率和灵活性,并切实降低成本。针对此背景下产生的需求,本文从订阅管理的角度出发,重点研究M2M领域中SIM管理(SIM:订户身份模块)的新概念,以开发经济的MCIM供应流程(MCIM: M2M通信身份模块)。讨论和描述了三个技术概念,并介绍了关键特性。基本项目是信任圈,灵活性等级,解决方案的复杂性和对安全性的影响。提出并讨论了目前在标准化中处理的嵌入式UICC(通用集成电路上卡)提案的进一步发展,它使设备所有者和M2M服务提供商在这一过程中发挥更积极的作用和责任。这种方法为运营商和用户的变更提供了充分的灵活性,并且减少了mno(移动网络运营商)的管理工作量,特别是对于目前不需要活跃用户的设备。MCIM管理的各个业务流程以蓝图的形式呈现,并根据生命周期阶段进行讨论。需要提高这些工作流的自动化和集成的等级,超越参与价值网的特定涉众的边界。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信