Cellular eSIM Connectivity for IoT Applications: Frequently Asked Questions
IoT For AllIoT For All
The machines we use to run our businesses are increasingly connected—and these connections are increasingly happening on cellular networks. By 2025, there will be as many as 5 billion IoT devices exchanging data on the same systems that connect our smartphones, predicts Ericsson. The mobile network operators (MNOs) that operate these networks have always needed a way to identify, authenticate, and secure interactions with valid users. Since the early 1990s, they have accomplished this task with subscriber identification module (SIM) cards. That’s true for the machine-to-machine (M2M) protocols that power the industrial IoT as well as consumer IoT products, from e-scooters to smart fridges. Each SIM card is preprogrammed with a unique operator identifier and authentication codes, then shipped to the user. If you want to change an IoT machine’s operator, you have to swap out the SIM card. You have to do the same to switch network carriers. In this era of cloud computing, that’s hardly an ideal scenario—hence the drive toward embedded SIMs (eSIMs).
Are eSIMs really secure? Will MNOs support them in all markets? Is this really a transformative technology? Find out some of the key considerations for eSIM adoption in this guide.
These eSIMs are hard-wired into the mobile device and when combined with the software component, called eUICC, allow for remote provisioning, or changing MNOs and operator credentials over the air—that is, through the cloud, without physical logistics trains. As attractive as this is for IoT users and device manufacturers alike, questions remain. Are eSIMs really secure? Will MNOs support them in all markets? Is this really a transformative technology, or is it all hype?   Â
Whether you’re an IoT device manufacturer or a business moving toward a more connected workplace, this FAQ covers some of what you need to know as you consider adopting eSIMs. Â
There’s a lot of excitement surrounding eSIMs. Why all the buzz? This technology addresses some serious challenges associated with traditional SIMs. The advantages of cellular eSIM technology break down differently for manufacturers of IoT devices and their users, although there are plenty for each:Â
These are only a few of the benefits of cellular eSIMs—but they’re enough to explain all the headlines this technology is earning.
Today, eSIMs remain in the early stages of widespread use. While they may become the dominant technology across applications, their advantages have led to increased adoption in a few distinct use cases so far:Â
Again, this list is meant to be illustrative, not comprehensive.      Â
Roaming agreements are a valuable source of income for MNOs, and the ability to switch networks threatens that status quo. We’ve even suggested that carriers will remain reluctant to invest in architecture for a technology that can limit customer loyalty. Still, there’s evidence that more MNOs will support eSIM and other multi-carrier solutions—and that the shift is already underway. After all, connecting to cellular eSIM devices is also a strong revenue stream.Â
Meanwhile, powerful manufacturers like Apple and Tesla have already moved to eSIMs, placing pressure on MNOs to support them or lose market share to a competitor who will. Finally, MNO resistance to sharing customers is primarily a U.S. phenomenon; the European Union, for instance, tightly regulates the rates carriers can charge customers and each other for roaming, reducing the drive for restrictive contracts.       Â
The short answer is: yes. According to GSMA, which defines protocols for global IoT devices, eSIM “provides an equivalent level of security as the removable SIM card.” To comply with GSMA standards, M2M eSIMs must reach an assurance level of EAL4+ according to GSMA’s Common Criteria Protection Profile. It must also ensure production environment and process security according to the GSMA Security Accreditation Scheme, and show functional compliance based on GSMA testing protocols. Consumer eSIMs must meet similarly rigid standards. In short, GSMA has taken steps to ensure that eSIMs remain as secure as their predecessors.Â
Of course, every cellular eSIM implementation is unique, and no single FAQ can tell you everything you need to know to ensure successful adoption. To learn more, check out our coverage of eSIM localization—and get answers to all of your eSIM questions from the experts themselves at this free webinar with Aeris.
The Most Comprehensive IoT Newsletter for Enterprises
Showcasing the highest-quality content, resources, news, and insights from the world of the Internet of Things. Subscribe to remain informed and up-to-date.
New Podcast Episode
Recent Articles