Embedded SIM (eSIM) technology enables the end user to have more reliable connectivity as well as flexibility through the breaking of the bond where the subscription to a cellular network is no longer tied to a single carrier.
The use of eSIM technology, which can be programmed remotely, offers flexibility in managing LTE devices. This technology simplifies network subscription switching, simplifies device deployments and provides tools for automation.
Historically, when individuals, utilities or companies wanted to change a cellular provider, they would have to procure new SIM cards to replace existing SIM cards in devices. The end user had no ownership of the SIM card and had no control over the identity that had been used to register and authenticate onto the cellular network. Using eSIM technology adjusts this ownership structure to allow the end user more control over a device and how it interacts with cellular networks. This is critical for the operation of networks with hundreds of thousands of deployed devices.
Unfortunately, the term eSIM has been marketed in a way that has caused confusion. Questions about what an eSIM profile is, or how to leverage the eSIM form factor, hint at different definitions. An eSIM is an integrated circuit or chip that is physically soldered. This chip can be embedded into a device and that device would not need to have a traditional removeable SIM card inserted into a SIM slot in order to use a cellular provider’s network. All the subscription information that is on the removeable SIM would instead reside on the eSIM in the same device.
However, if a utility wanted to leverage SIM technology, then its devices would not need to contain an eSIM — soldered and nonremovable — because the technology is form factor neutral. Utilities do not have to procure devices with a soldered eSIM to be able to remotely load or change network subscription profiles. They can leverage these capabilities today in devices that rely on traditional removeable SIM cards regardless of the card form factor.
The technology that enables the benefits of eSIM is a computing architecture that can reside within the eSIM chip or within a traditional removeable SIM card. This architecture allows the SIM profile to be independent of any form factor and is referred to as the embedded universal integrated circuit card (eUICC). This technology eases the administrative burden of large deployments and enables the following benefits:
- Remote SIM provisioning
- Zero-touch provisioning
- Subscription management
- Cryptographic key generation
- Zero-trust network execution
By design, SIMs are secure elements. It is a very tiny cryptographic safe or hardware root of trust component that can securely store sensitive keys. SIMs employ analog and digital countermeasures that will become inoperable when tampered with. These secure elements provide cryptography functions by having the capability to encrypt data at the transport layer, and generate public/private key pairs, capabilities offered by GSMA’s IoT SIM Applet For Secure End-to-End communication (IoT SAFE).
There are application programming interfaces (APIs) that can be leveraged by LTE devices to use the SIM as the hardware root of trust. This hardware root of trust can provide the needed attestation for a zero-trust network. To be clear, the SIM would be just one aspect of a zero-trust network. Zero-trust should encompass the entire network where every transaction is authenticated and approved dynamically by a set of inputs.