Growth in Machine-Oriented Proximity Services will be Driven largely by IoT Device Interoperability and Security Improvements
Speak directly to the analyst to clarify any post sales queries you may have.
This proximity service (ProSe) market report provides an assessment of the ProSe market including qualitative analysis and forecasts covering devices, sensors, software and services through 2028.
The report evaluates market limitations and opportunities for technology development and solutions involving software and network augmentation. It assesses potential applications in both public safety and commercial sectors such as proximity marketing and payments.
Select Report Findings:
- The global proximity services software market will reach $21.0billion by 2028
- ProSec hardware will be the largest part of the market through2028 at $78.6 billion
- ProSec solutions in IoT networks and systems will reach $13.3billion globally by 2028
- People-oriented ProSec solutions will far exceed machine-oriented solutions through 2028
- Success of emerging use cases in IoT will depend upon certain key interoperability and security factors
- While public safety an important near-term market, the commercial sector growth will out-perform in the long-term
- While LTE predominates mobile networks in the near term, 5Gnetworks and beyond will grow nearly three times faster than 4G networks
- Similarly, WiFi version Six (WiFi6) based market will grow over two times faster than legacy WiFi, which is being rapidly replaced in private networks
Proximity services are a type of location-based technology that utilize various short-range wireless communications, such as Bluetooth Low Energy (BLE), Zigbee, and NFC to enable devices to communicate with each other. These solutions allow for the delivery of location-based services, such as indoor navigation, contactless payments, and targeted marketing. Use cases and benefits include the following:
- Location-Based Services: Proximity services enable the delivery of location-based services, such as indoor navigation, which can provide users with more accurate and useful information about their surroundings.
- Contactless Payments: Proximity services can be used for contactless payments, allowing consumers to make purchases without having to physically handle cash or a credit card.
- Targeted Marketing: Proximity services can be used for targeted marketing, allowing businesses to deliver personalized and relevant messages to customers based on their location and behavior.
- Improved Customer Experience: Proximity services can help improve the customer experience, by providing customers with relevant and useful information and services, and enabling them to interact with businesses in new and innovative ways.
- Internet of Things (IoT) Integration: Proximity services can enhance interactions and automation within IoT ecosystems. Devices equipped with proximity sensors can communicate and trigger actions based on their relative proximity to each other. For example, a smart home system can automatically adjust settings or activate devices when a person enters or leaves a room.
Proximity services can be cost-effective for businesses, as they allow for the delivery of location-based services without the need for expensive hardware or infrastructure. Proximity services also offer opportunities for personalized and context-aware experiences, seamless transactions, and improved convenience.
However, it's important to consider the privacy and security aspects associated with these services, as the exchange of proximity data can involve sensitive user information. Some of the issues and concerns include the following:
- Data Privacy: Proximity services often rely on collecting and processing personal data to deliver targeted content or facilitate interactions. There is a risk of unauthorized data collection, storage, or use of personal information. It's important to ensure that user data is handled securely, with clear consent mechanisms, and in compliance with applicable data protection regulations.
- Unauthorized Access: Proximity services typically rely on wireless communication technologies, such as Bluetooth or Wi-Fi, which can be vulnerable to eavesdropping or unauthorized access. It's crucial to implement appropriate security measures, such as encryption and authentication protocols, to protect the communication and data exchanged between devices.
- Device Spoofing: Proximity services depend on accurate detection and identification of nearby devices. However, malicious actors may attempt to spoof or manipulate device identities, potentially leading to unauthorized access or impersonation. Implementing strong authentication mechanisms and validation processes can help mitigate these risks.
- Location Tracking: Proximity services often rely on tracking the location of devices or users. This can raise privacy concerns, as continuous or extensive location tracking may infringe upon user privacy. Implementing clear policies and obtaining informed consent for location tracking is essential to address these concerns.
- Physical Security: Proximity services can involve physical proximity between devices or users. This physical proximity may introduce additional security risks, such as the potential for theft or unauthorized access to devices or data. Implementing appropriate physical security measures, like device locking or secure storage, can help mitigate these risks.
- Interoperability and Compatibility: Proximity services may involve communication between devices from different manufacturers or platforms. Ensuring interoperability and compatibility between devices and systems is crucial to maintain security and privacy standards across different technologies.
- Data Breaches and Malware: Proximity services can be susceptible to data breaches, where unauthorized individuals gain access to sensitive information. Additionally, malware or malicious applications can exploit vulnerabilities in proximity technologies to gain unauthorized access or compromise devices. Regular security assessments, software updates, and employing security best practices are important to prevent such risks.
It's crucial for developers and service providers to address these security and privacy concerns by implementing robust security measures, adhering to privacy regulations, obtaining user consent, and providing transparency in data handling practices. Users should also be cautious, keep their devices up to date, and review privacy settings to ensure their information is protected.
Table of Contents
1.0 Executive Summary
Companies Mentioned
- ACI Worldwide Inc.
- Alphabet Inc.
- Apple Inc.
- ASTRI
- Autonics Corporation
- Balluff GmbH
- Bleesk
- Cloud and Compass
- Connectivity Standards Alliance
- Datalogic S.p.A.
- Datamatics Global Services Limited
- Deutsche Telekom
- EE Limited (BT Group)
- Ericsson
- Estimote Inc.
- Fargo Controls Inc.
- FirstNet
- FIS (Fidelity National Information Services Inc.)
- GroundTruth
- HID Global Corporation (Bluvision)
- Home Office, UK
- Honeywell International Inc.
- Huawei Technologies Co.
- IDEMIA
- INGENICO
- inMarket Media LLC
- Intel Corporation
- Keyence Corporation
- Knorex Inc.
- KT Corporation
- M87 Inc.
- Mastercard
- Meta Platform Inc.
- Microsoft Corporation
- NEC Corporation
- Nokia Networks
- NTT DoCoMo
- NXP Semiconductors
- OMRON Corporation
- OnePlus
- Panasonic Corporation
- PayPal Holdings Inc.
- Pepperl+Fuchs SE
- Proximity Marketing
- Qualcomm Inc.
- Riko Opto-Electronics Technology Co. Ltd
- Rockwell Automation Inc.
- Safeguard Equipment
- Samsung Electronics
- Sick AG
- Spark Compass
- Square Inc.
- STMicroelectronics
- TIM Group (Telecom Italia Group)
- Visa Inc
- Wi-Fi Alliance
- Zebra Technologies Corporation
- ZigBee Alliance
Methodology
LOADING...