Skip to main content

Cellular IoT Communication

This page describes the possible uplink and downlink message contents when using NB-IoT or LTE-M (cellular IoT) as technology to communicate with the Lobaro IoT Platform, e.g. the firmware WAN parameter must be configured to lte.

Parsed and optionally decrypted Wireless M-BUS data can be viewed and further processed in the Lobaro IoT platform. Third-party systems can be integrated to retrieve Wireless M-BUS data and status information using various platform integrations. This enables seamless data forwarding via protocols like MQTT, HTTP-Push, or REST interfaces without requiring in-depth knowledge of the platform's communication with the device.

For communication between Lobaro products and the Lobaro IoT Platform, an optimized, low-power protocol secured by TLS is used.

SaaS instance Lobaro Platform

The SaaS instance is available at platform.lobaro.com and is free to use for testing purposes. To gain access, please contact Lobaro.

CoAP Protocol

The protocol details of the CoAP implementation are not publicly disclosed and are intended for use exclusively with the Lobaro IoT Platform. For integration with third-party systems, MQTT is the preferred protocol.

If you require access to this and MQTT is not an option, please contact Lobaro directly.

MQTT Protocol

With the V4-Series and app-nrf91-origin firmware family, Lobaro now offers a solution to connect to third-party MQTT brokers. See also the Host parameter description here.

Lobaro offers also a MQTT reference implementation in Python, please contact the Lobaro sales team.

tip

The Lobaro IoT Platform can also function as an MQTT broker or provide device management services alongside an external MQTT broker.

We highly recommend starting with the Lobaro IoT Platform, as it offers a straightforward and secure way to manage your devices and data. Integration with third-party systems can then be implemented step by step for a smoother transition.

Root Certificate and Cipher Suites

Our devices are signed (via an intermediate certificate) by our own Lobaro Root Certificate Authority (CA). Therefore, it is sufficient to trust the Lobaro Root CA to validate all device certificates. Devices may use different intermediate CAs, all of which are signed by the Lobaro Root CA. If your MQTT or CoAP server does not trust this root certificate, the connection will be rejected by design.

The certificate can be downloaded here; if you should add it as a trusted CA on your server.

The cipher suites supported by our device are:

  • TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256
  • TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
  • TLS_ECDHE_ECDSA_WITH_AES_128_CCM
  • TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
RSA Key Length limitation

We recommend using elliptic curve certificates due to their compact size. If you prefer using RSA, please note that the gateway’s crypto hardware (Arm® TrustZone® CryptoCell 310 (CRYPTOCELL)) is limited to 2048-bit key lengths.