A lot of things goining on in the IQRF Alliance.
Browse through the news to learn more.

IQRF Alliance exhibited at the Urbis 2017 trade fair

02 May 2017

The Urbis 2017 trade fair took place in Brno, Czech Republic, from April 26 to 29. A clever solutions were introduced at the site, including the IQRF Alliance, which featured the equipment and solutions of its members. The offer of the exhibitors extended the professional accompanying program, which included the presentation of Šimon Chudoba "Innovative solutions built on the IQRF network".

Together with the Urbis trade fair, the construction trade fair also took place, showing the latest technology and trends in the construction industry, and it turned out that the IoT solution also penetrated this sector. More and more companies have been interested in expanding their smart device solutions to collect data from a wide range of sensors, and be able to remotely control them.

In addition to professionals from the industry and the professional public, representatives of cities and towns were also interested in smart solutions at the trade fair. The theme of smart cities has repeatedly appeared throughout the fair. Of course, the IQRF Alliance could offer a very large ecosystem consisting of alliance members' products and running projects in the field of parking systems, public lighting, or air quality measurement.

The partners of IQRF Alliance joint stand were companies Protronix and Aledo. Thanks to the membership in the IQRF Alliance, both companies have been given the opportunity to promote their products at very low cost. Protronix was able to capture the attention of visitors with its air quality sensors, as many construction companies are currently considering to use air quality monitoring systems. The system of interior localization of people and objects and their monitoring of Aledo has also found many people interested in implementing a similar solution in production halls and warehouses.

We believe that the Urbis 2017 trade fair has allowed us to broaden our awareness of the IQRF wireless technology and the IQRF Alliance and its members.


- - -

IoT Starter Kit released!

28 April 2017

New development tool for quick developing of your wireless IoT application released. Build you wireless IoT application in couple of hours!

Parts of this product are the IQRF kit containing the sensor and relay kit, the popular UP developer board from AAEON and the ready-made connection to Microsoft Azure. Additional sensor hardware can be attached to the kit.

Buy on

As an IQRF Summit 2017 participant you can buy this excellent equipment for 279 EUR only!

Summit participants can register for free at a practical workshop to learn about installing and configuring individual parts of the new IoT Starter Kit (


- - -

IQRF Alliance at Embedded IoT 2017

24 April 2017

IQRF Alliance shows solutions and products for IoT at Embedded IoT 2017, Milan, Italy

2017 EMBEDDED IOT will feature insights on the three main application of IoT: Smart Home, Supply Chain Management and Industry 4.0.
Under the spotlight: embedded IoI solutions with sensor networks, IoT platforms, certifications, the most used HMI modules in IoT applications.


- - -

TR-5xB and TR-5xD series are going to be discontinued soon

21 April 2017

Due to discontinuation of key component MRF49XA (RF IC by Microchip), all TR-5xB and TR-5xD series are going to be discontinued soon. Recommended replacement: TR-7xD series.

"Dear Customers,

Thank you for understanding that we have to bring the news on such a short notice but we have to inform you that all of our modules in TR-5xDx and TR-5xBx line as well as all related products based on those modules are going to be discontinued very soon. As much as it was planned and discussed many times, the main reason for the decision is the discontinuation of the main components (namely MRF49XA from Microchip) for the modules, which only sped up the process and is the main reason why we have to make such a decision now.

We want to assure you that we are doing all we can to secure the stock and deliveries of the modules for all your orders that will be placed no later than 5th May 2017.

If it is however inevitable for you to start migrating from TR-5xDx or TR-5xBx to DCTR-7x modules (which as you know bring many advantages and better features together with security tools coming with OS 4.0 and all working with the same development tools) we are ready to support you with the process:

We give all our support to migration TR-5xDx and TR-5xBx to DCTR-7x . Our FAEs and support teams are ready to give maximum effort. You will get the same pricing conditions (SPA) for DCTR-7xDx as they had for (DC)TR-5xDx or TR-5xBx as initial support we offer 20 pcs. of DCTR-7x modules for very special price 5Eur/pc to all our customers forced to migrate.

We are sure that the whole process as much as sudden and difficult, especially at the transition phase, will only bring in time benefits to you. Once more we would like to thank for your understanding.

Should you have any questions or requests, do not hesitate to contact us."

Yours Microrisc team


- - -

SIGFOX and IQRF – partners not only in logistics

11 April 2017

Imagine a global network to transfer small data, for example to obtain basic information about your delivery. You can see where it is and in what condition. Upon arrival to your destination you collect detailed data from individual parts and communicate with these parts as needed. Wireless technologies SIGFOX and IQRF are for this use case perfect.

Long-distance transport can carry components that are sensitive to fluctuations in temperature, humidity or impact of other phenomena. The values measured during the journey and information about the movement of your shipment pass through SIGFOX to headquarters. You do not need to solve problems with roaming, SIGFOX is one network. Upon arrival to your destination you connect to the IQRF network and collect detailed status information from various parts of the consignment. You easily find which part is fine and where recommended maximum / minimum values of the environment were exceeded. You can signal in different parts of the supply needed information to help with the subsequent logistics.


- - -


Interconnection of these two technologies is not a problem. RCD Radiokomunikace company demonstrated its solution based on interconnection of IoT technologies - 

- - -

IQRF and SIGFOX - at Amper 2017. The module IOT 301 / IQRF is a part of a modular IOT system, which is a universal hardware platform for IoT devices. 

Long-distance transport is not the only case where connection of these two technologies is functional and desirable.

Other use case may be automated buildings, where sensory values are measured and in case of exceeding the recommended value messages are sent outside the building into the headquarters.

Thanks to the IQRF wireless network is the coverage reliable. Even in the environment problematic for propagation of the wireless signal you can collect data from devices. It can be temperature, humidity, lighting intensity, gas or chemicals or other values. In most cases if the measured values do not deviate from the expected limits – there is no need to send this information outside the building further into the world. Values may be stored on a local server for further processing and analysis. But if there is a situation deviating from the allowed values (e.g. temperature increase in some rooms above the expected boundary, value from CO sensors exceeds dangerous level of carbon monoxide, unscheduled room lighting appears, etc.), then you can pass this alarming information over the SIGFOX network to the Internet.

SIGFOX network can also provide backup Internet connection in case of failure of the main Internet connection line providing two-way high-speed operation.


IQRF coordinator connected to Sigfox

Pic. 1 - IQRF coordinator connected to Sigfox


IQRF node connected to Sigfox

Pic. 2 - IQRF node connected to Sigfox


Additional information

IQRF® is a complex technological solution allowing electronics manufacturers to innovate their product, equip the product with wireless connectivity and optionally a connection with the rest of the world through Internet. The IQRF is the ideal solution for reliable wireless "mesh" networks.

More on:


IQRF Alliance is an international community of developers, manufactures, system integrators, universities, research and innovation centers and business professionals using the IQRF wireless technology. The technology is used for IoT control and M2M communication.

More on:


RCD Radiokomunikace company was founded in 1993. The main areas of activity of the company include the development and production of high-frequency devices for voice and data transmission as well as the design and delivery of systems for radio coverage of tunnels, underground areas and large objects.

More on:


SIGFOX is one of the leading technologies for small data transmission from the Internet of Things devices. The advantage is a large range (up to tens of kilometers), and very low power consumption end devices.

More on:


SimpleCell Networks Inc. is the first Czech public mobile network operator for the Internet of Things. The network is based on the global SIGFOX technology, which operates in 30 countries, and in the Czech Republic was built in cooperation with T-Mobile. Network enables to communicate cheaply, reliably and safely to millions of devices during many years of battery life. It is possible to get data through a simple interface through which the device can be integrated into corporate systems within hours or use dozens of IoT platforms.

More on:

IQRF OS 4.0 online webinar records and PDF presentation

31 March 2017

On the occasion of releasing the IQRF OS 4.0, we have organized an online webinar, in which participants learnt all the new features of the new version of the operating system.

We have prepared a record of webinars in English and Czech. To stay up-to-date, subscribe the IQRF Youtube channel where you can get notifications about the newest videos regarding to the IQRF wireless technology.


PDF presentation





IQRF OS 4.0 webinar

29 March 2017

Register for a webinar to learn all about new features in the IQRF OS 4.0. The update is focused on the security to protect your network running on the IQRF wireless technology.

Skype CZ - 10:00 - 11:30 -

Skype EN - 13:00 - 14:30 -



The webinar will touch all new features in the IQRF OS 4.0. The update is mainly focused on the security features such as AES-128 encryption, multilayer security, randomly generated passwords and user keys.

Devices in the Internet of Things are in danger nowadays because there are thousands of new threats created (malware, malicious codes, etc.) every day. Therefore, the new operating system IQRF 4.0 brings ultimate security to IQRF networks.

Security of the IQRF OS 4.0 is based on three different protection layers which are built on AES-128 encryption. The first layer is access encryption used for bonding, CATS services, network backup and restore. The second and third layers are networking encryption and user encryption. Networking encryption is based on TR transceivers equipped with 192 b long unique fully random password individually generated at the factory. IQRF OS minimizes the risk of weak password or key by generating random passwords and keys for communication inside the network.

Learn about all those security features and other features of new operating system.


Register to get more information and link to webinar.



CZ language - 30th March, 2017 - 10:00 to 11:30

- - -


EN language - 30th March, 2017 - 13:00 to 14:30

- - -

Ultimate security of wireless networks is coming with the new IQRF OS v4.00

23 March 2017

The brand new concept of “Interoperable - Simple - Secure” solution of the IQRF technology, a Wireless Platform for IoT, was presented in the end of the 2016. Now, it is being fulfilled by new versions of the OS v4.00 and the DPA protocol v3.00 bringing higher safety of wireless communication, security of transferred data and higher comfort for users. Interoperability of the whole IQRF Ecosystem is being presented via solutions and IoT applications by the IQRF Alliance members on a daily basis.

"Every wireless system is exposed to potential OTA attacks. But IQRF OS v4.00 brings ultimate security based on industrial standards. Security in IQRF does not mean just an encryption but a complex approach to avoid potential vulnerabilities," explained CEO of MICRORISC, inventor of the IQRF technology, Dr. Vladimir Sulc. This complex approach consists of packets consistency checking, three levels of AES-128 encryption, and dynamic passwords and keys generation.


Packets consistency checking

Security starts at basic trust to received data. To avoid transmission errors and process valid data only, IQRF strictly checks all received packets against bit error failures using several block checksums. Additionally, complete packet is protected by standard IBM CRC-16.



Sensitive data should be hidden for unauthorized users and systems. Encryption is a way how to protect such sensitive data. IQRF utilizes AES-128 encryption, industrial standard for wireless communication. Besides hiding sensitive data, control data encryption increases consistency protection. There are three different protections based on AES-128 encryption.

  • Network communication protection

Protection of standard network communication is the most important as it continues during the whole system life. Protection is based on AES-128 encryption standard. Thus, only systems/users having valid network Password may join network communication and process data. To avoid wrong implementations all network communication has been forced to be encrypted automatically.

  • Unauthorized access protection

Only authorized devices may join the network and only authorized users may have maintenance access to network devices. As communication during bonding and maintenance is encrypted by AES-128, only authorized devices and users with valid access Password are able to join the network or to maintain network devices. Sensitive data, such as network Passwords, exchanged encrypted during bonding, are well protected.

  • User´s data protection

Besides protection of network communication there is an optional way to increase privacy by adding another encryption shield. It utilizes AES-128 and user Key defined by the user to protect sensitive user's data. This protection is fully under user's control and may be used to add extra network protection or to hide sensitive data even from the IQRF platform as shown in the schematics below.


Password and Keys manipulation

Keys compromising is very frequent source of security problems. Therefore IQRF minimized and protected also manipulation with keys - network and access keys are not known during physical manipulation as they are generated from respective passwords. Network password is generated randomly with high entropy. The encrypted password is provided to devices that are joining the network during bonding.


Future upgrades

Threats coming in the future from more powerful attacking tools and from discovered vulnerabilities should be fixed. All IQRF software layers enable upgrades to keep system secure.

Pic. no. 1: Scheme of the various levels of the IQRF wireless system protection

- - -


Further information:


IQRF technology selected features:

  • Ultimate security: based on industrial standards (AES-128)
  • Extra low power: < 100 nA standby, 15 µA receiving in XLP mode
  • Simple integration in a few weeks and simple control with DPA protocol (SPI, UART)
  • Sub-GHz ISM bands: 433 / 868 / 916 MHz
  • Range: 500 m with small PCB antenna
  • Easily connectable to Arduino, Raspberry Pi, chipKIT etc.

IQRF OS 4.0 technical information

21 March 2017

New IQRF OS 4.0 is going to be released on March 23rd and is focused mainly on security features.


The new operating system IQRF 4.0 brings ultimate security to IQRF networks.

There are three different protections based on AES-128 implemented:

  • Access encryption

used for

    • bonding
    • CATS services
    • network backup and restore
  • Networking encryption
  • User encryption

Compromising of keys is very frequent source of security problems. Therefore, IQRF OS minimizes and protects also manipulation with keys – network and access keys are not known during physical manipulation as they are generated from respective passwords.

Access encryption

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding and only authorized devices and users with valid Access password can join the network or to maintain network devices. CATS services, network backup and restore use Access encryption.

All sensitive data exchanged during bonding, such as network password, NID and Node address are transferred encrypted with access encryption.


- - -


Network encryption

AES-128 with 16 B long keys and additional proprietary CDC (Cipher Data chaining) algorithm is used for Networking encryption. Every TR transceiver is equipped with a 192 b long unique fully random password individually generated at the factory. The 128 b long keys in given network are derived from the password of the Coordinator. The password is passed to Nodes securely, while bonding, encrypted by Access encryption.

User encryption

Besides protection of network communication, there is an optional way to increase privacy by adding another encryption shield to hide user's payload data (either networking or non-networking) or to enhance network protection. User encryption is fully under user's control. It utilizes User key specified by the user. User encryption and/or decryption can optionally be performed outside TR transceivers which allows to hide user's data not only when OTA transferred but also outside IQRF platform.


- - -


Other features and changes

  • Deep sleep for TR-76D modules
    • consumption < 100 nA
  • Longer RF range of LP/XLP mode
    • the same like for STD mode
  • Improved FRC
    • 1B FRC downloads data from 63 Nodes
    • 2B FRC downloads data from 31 Nodes
  • Device cloning canceled
    • just upload the appropriate HWP and access password to the transceiver and restore network information from the backup
  • DPA demo canceled
  • Coordinator/Node as a one device canceled
  • IQMESH examples removed from Startup Package
    • The only way for IQMESH is DPA.
  • Israel (IL) version of TR modules supported
  • Basic IQRF header file template-basic.h renamed to IQRF.h
  • OS 4.00D is not interoperable with OS 3.08D
  • User OS upgrade to version 4.00D is possible, downgrade back to OS 3.08D is not possible
  • IQRF IDE 4.40 and DPA 3.30 required

More on:


Ecryption in IQRF OS 4.0

17 March 2017

Security is the main feature in new IQRF OS 4.0 releasing March 23rd. To protect a network running on the IQRF wireless technology, there are various security features and improvements. One of those features is encryption.

IQRF OS 4.0 brings three different protection layers based on AES-128. It is – access encryption, networking encryption and user encryption. If you want to know more about those protection layers, read it here.


So, what other features in IQRF OS 4.0 are encrypted?

Network passwords are randomly generated with high entropy and delivered encrypted to devices during bonding process.

Access encryption is used to secure all sensitive OTA network operations. It is used for bonding, CATS services and network backup and restore.

Networking encryption is the most important part of the whole process of network communication. Network communication is encrypted by OS itself and user don't have to care about it. Thus, every IQRF network is equally highly secured by default. Only systems with valid Network password are allowed to interact with network and individual devices. AES-128 encryption protocol with 16 B long keys is used together with proprietary Cipher Data Chaining algorithm.

User encryption is another option how to improve security of data transmission. This option is fully under user's control. The key, specified by user, is used. This key is unknown for OS to push security level even further. Data transferred inside of encrypted packets are furthermore encrypted by user's key. This makes readability of data impossible both for OS and anyone who doesn't know the user's key. User encryption/decryption can be performed outside TR e.g. in application itself, which ensures safety even beyond the network.


- - -

This site uses cookies to offer you a better browsing experience. More info