RPMA DELIVERS ON THE MACHINE BILL OF RIGHTS:
|FULL FEATURED VALUE||RPMA||Sigfox||LoRa|
|Capacity Scalability||Virtually limitless, linear, can add more APs without disrupting current capacity||Very limited, scalability quickly diminishes with a hard cuto||Very limited, scalability quickly diminishes with a hard cutoff|
|Authentication||128 bit||16 bit||32 bit|
|Standards Compliance||NERC CIP 002-009, NIST SP 800-5, FIPS 140-2 Level 2, NISTIR-7628||No||No|
|Other||Device anonymity, mulitcast authenticity, authenticated firmware upgrades, message authenticity, more||No||No|
|Packet Size Flexibility?||Yes, 6 bytes to 10,000 bytes||No, 12 bytes fixed||Yes, up to 11 bytes FCC, up to 51 bytes Europe|
|Firmware Downloads||Yes, without disrupting normal communications||No||No|
|Congestion Management||Yes; handling peak traffic periods and crises designed into protocol||No||No|
|Interference Robustness||Yes; can handle 50% PER, has advanced channel coding, intelligent retransmission scheme, very fast data rate adaptation||No; max 10% PER, open loop retransmission, signal easily destroyed by wideband signals,||No|
|Acknowledged Delivery||Yes; 100%: all messages acknowledged||No||Yes|
|Proven Deployments at Scale||Yes; more than 30 commercial deployments, >4.5 million messages sent each day||Maybe; few known paying customers, <3M messages sent total ever (removed website device counter Aug '15)||No|
Industry Best. Security.
RPMA security is end-to-end and equal to or better than cellular-grade security in all dimensions. Our utility customers drove RPMA development with demanding requirements on end-to-end security including numerous exhaustive security audits. If our technology did not meet the federally mandated standards, our customers would be fined millions of dollars a day. Our public network customers are benefitting from that rigor.
One aspect in particular where other existing LPWA networks are falling short is in the area of authentication. Authentication entails sending a digital signature that only the valid originator of that data can provide. Imagine an attack where false data is injected into a variety of applications. Devices connected to a network that fails to support authentication are better off remaining unconnected rather than creating such an operational risk.
Reliable. Uplink + Downlink Delivery.
The RPMA Broadcast Channel.
Twenty-plus years is a long time to commit to a particular factory-installed firmware image. Every single RPMA customer required the ability to download firmware over the air. How do you send 100 kByte to 1 MByte images to a tremendous number of endpoints without compromising the operation of the system? The solution: broadcast the firmware image to all impacted devices simultaneously.
OTHER USES OF A BROADCAST
No other approach has the ability to do this broadcast operation, including cellular LPWA.