What is the best wireless communication protocol?

As you are aware, one of the first steps in collecting data and interacting with “things” in the IoT era is to connect them to the internet. The business need could be addressed in different ways as there are a lot of solutions – communication protocols.
The choice of the optimal solution is dependent on the business and technical requirements.
So, the process of deciding on the best option for your solution is complex, and I would recommend having an experienced company take you through the decision process.
I also believe that having some knowledge will help you to ask the right questions and make better decisions.
Let me give you some facts about available wireless communication protocols.

WiFi
This is probably the first choice for office or building implementation. The apparent reason is the existing infrastructure. However, there are some challenges you have to be aware of:
1. IT (when you are working at or selling to a corporation), in most cases, will ask to have a separate dedicated network for the IoT sensors, and not to connect them to their corporate WiFi.
2. When the IT department is implementing any changes to the existing WiFi network, your sensors will get disconnected and will require re-provisioning.
3. WiFi connectivity is energy demanding so you will have to consider the implications of running battery-operated sensors
Please remember that the WiFi network you are using to connect your computer was designed to deliver a high data rate in an office environment. For a detailed description of the WiFi 802.11 IEEE standard, please go to www.ieee.org. However, I would recommend this only to technical individuals.

WiFi -ah (HaLow)
802.11ah is a standard designed for low data rate, long-range sensors with IoT in mind, and is more relevant than many other WiFi counterparts for building an IoT solution.

2G, 3G, 4G, and 5G
These are all mobile (cellular) network protocols.
2G is the oldest mobile network protocol. It has been phased out, or is in the process of being phased out, in most parts of the world. In some cases, it could be a good solution for your IoT sensors because of cost and power consumption advantages versus faster 3G and 4G alternatives. As with many implementations of IoT solutions, it has enough bandwidth.
In Europe, mobile network operators are working on an implementation of even more IoT focused communication protocol called Narrowband IoT or NB-IoT.
Some mobile network operators will keep 2G running until they are ready with the NB-IoT coverage.
For example, Erik Brenneis, CEO of Vodafone Global Enterprise, said their 2G network in Europe will live on until at least 2025.

3G, 4G and 5G
3G was the first high-speed mobile network. 4G is the following generation of mobile network standards, and most of us are using it today for mobile data. You can use 3G and 4G for your IoT devices, but the devices will consume more energy, and they will need a constant power source or regular recharging.
Though 5G (the next generation of mobile network protocol) will not be available for another few years, it will probably face similar issues as 3G and 4G in regards to IoT. The protocol is designed for high throughput. But we do not know what battery or energy harvesting technologies will be available, and what will be the IoT bandwidth needs at that time.

NB-IoT
NB-IoT (Narrowband IoT) is a protocol to address M2M for low power devices. Huawei, Ericsson, and Qualcomm are active proponents of this protocol, and are involved in putting it together. Some European mobile network operators are investing in NB-IoT. Vodafone and Deutsche Telekom are the first operators committed to NB-IoT coverage in Europe.

LTE 
In the case of LTE, the lower the speed, the lower the power consumption. LTE Cat 0 and 1 are more suitable for IoT solutions. (More information is available in Radio-Electronics: www.radio-electronics.com/info/cellulartelecomms/lte-long-term-evolution/ue-category-categories-classes.php.)

LTE-M1
This is a wireless protocol built for IoT devices. LTE-M1 is not yet evaluable, as in the case of NB-IoT.
LTE allows software upgrades; the LTE base station hardware can stay unchanged. This is a significant cost-saving for mobile network operators. You only need the new end hardware.
European mobile network operators are investing in NB-IoT, so do not expect an implementation of LTE-M1 in Europe soon.

Bluetooth
Bluetooth is a short-range 2.4 GHz personal area network design often used for wireless speakers and headsets and device-to-device file transfers.
In the case of an IoT implementation, you will need an access point (a phone or dedicated gateway) due to its very short range. This protocol also requires key coordination at both endpoint and access point, so setup of your solution will be more difficult.

BLE
BLE is a Bluetooth designed for lower-power solutions that need less data. It remains in sleep mode except when a connection is initiated to reduce power consumption. This is a good option for fitness trackers and health monitors.

ZigBee
This is a 2.4 GHz mesh LAN (local area network) protocol designed for building automation and control solutions. It is a short range solution, but it gives you the benefits of a mesh protocol: resilient physical system architecture; and the ability to modify or expand your network without system disruption.

6LoWPAN
6LoWPAN uses lower data rate mesh networks. It is an open IoT network protocol like ZigBee, and it is primarily used for home and building automation.
In my opinion, it is one of the best options for IoT sensors in an office/building environment:
1. Low power consumption – sensors can run on battery power (The power consumption depends on the particular communication protocol implementation and the power consumption of physical sensors. For example, gas sensors demand more power to operate, and sometimes the need to be on for a long time in order to deliver an accurate reading.)
2. Easy to install – commissioning is similar to a mobile phone solution – just switch on the node. Sensors/actuators could be installed by a person without technical experience.
I like most an easy to implement and very reliable 6LoWPAN SmartMesh solution from Linear Technologies (www.linear.com/dust_networks)

Thread
Thread is an open standard, built on IPv6 and 6LoWPAN protocols. It has simple commissioning which is similar to 6LoWPAN; all IPv6 security options are available; and there is no single point of failure as if the Leader fails, another router or edge router will take its place. (More about Thread: www.threadgroup.org)

SigFox
SigFox is a French wireless network operator. SigFox and their partners set up a global LPWA (Low Power Wide Area) network to connect low-energy objects such as electricity meters and parking sensors, which need to be continuously on and emitting small amounts of data.
Significant of Western Europe is already covered. (More info about SigFox and its coverage: www.sigfox.com/en)

LoRaWAN
LoRaWAN is a media access control (MAC) protocol for wide area networks managing communication between gateways and end-node devices. It is designed to allow low-powered devices (sensors or actuators) to communicate with Internet-connected applications over long-range wireless connections. (More information: www.lora-alliance.org/technology)

NFC
Near Field Communication is a network protocol used for very close communication. It is currently used for contactless payments with a credit card or phone.

RFID
There are two types of RFID (radio-frequency identification): passive and active. This protocol was designed to enable devices without batteries to send a signal. In most implementations, a powered RFID reader creates an electromagnetic field, which induces an electric current in an RFID tag. The tag gets enough power to wirelessly send data back to the reader.
RFID solutions are most popular in retail (inventory management) and access control implementations.

My list does not cover all the possible options. I have focused on the most popular and, in my opinion, most relevant wireless protocols.
When designing your solution in addition to the cost of relevant components and cost of connectivity (in case of 2G or 3G), you will have to consider a certification costs. In some cases using a more expensive and certified module can give you a better option from a cost perspective.
As you can see, there is a lot of different ways to connect your IoT things, and in most of the cases, you will have more than one suitable option. In addition to purely technical and financial details of your implementation, please consider the level of experience you and your partner have with particular technology. It will limit your risk and reduce the time needed for project implementation.
I always recommend starting with Concept Design and Proof of Concept to test your assumptions.

You have a number of options to use and you will have to make a business decision.

Value creation

Working for and with companies creating IoT solutions and with businesses buying them I have observed an interesting trend.
The companies which are struggling with selling IoT solutions are focused on the wrong problem.
It is probably obvious for most of you that customers buying IoT solutions are not buying technology, IoT hardware nor IoT software. They are buying a solution which either giving them cost reduction, or increasing their profit, or both.
In the IoT space, a value is not coming from hardware, or software, or connectivity. The value is created by transforming data into information to optimise their operation, support, production and/ or new product development.
Technology itself is not adding value. It needs to be aligned with the relevant business model.
The IoT business model evolves from selling products (with IoT features) thought selling service to selling results/outcome.
My company was recently working on a demo to demonstrate benefits of IoT technology. We created a greenhouse model. The demo has simple set of temperature, humidity, light and air pressure sensors and actuators: heating, misting, light, window opening and fan. Sensors are sending data to the Cloud, and the actuators are updated based on a set of rules evaluated in the Cloud.
It is a beautiful and simple demo, and I will use it as the example to explain the business model evolution.
In case of product sell a customer will be buying an instrumentation of a greenhouse and will be able to set-up rules and remotely manage and supervise her greenhouse. She will benefit from additional feature she will be able to use. However, she will have to pay the cost of the solution as it is implemented.
The following business model is focused on selling services. In this case, a customer will be buying a function of having access to a dashboard with real-time sensor readings and ability to set-up rules and remotely manage and supervise her greenhouse. She will be paying a monthly, or a yearly fee for using the service. In this scenario, the cost of installation and maintenance has to be covered by the greenhouse instrumentation company.
The last business model is more difficult to explain using this example, but let me try.
This business model is based on the idea of paying for results a customer using infrastructure (greenhouse with sensors, actuators and smart management) and she will be paying only for level yields achieved. (In our economy paying for results is not broadly implemented for example how nice it would be to pay for our kids academic results and not for a college, or paying for result of medical procedure and not for a procedure itself, or for how relaxed we are after a holiday and not for a flight, hotel, …) All the cost of creating and maintain the infrastructure has to be covered by the greenhouse company. The customer will be paying for the outcome only (low risk and high benefit).
In the example of the company selling service or being paid for the outcome could benefit from the collected data and improve its efficiency, and can generate additions income stream by selling data to other institutions. They could as well work together with companies buying the production of the greenhouse (for example flowers) and companies selling seeds, fertilizers, … It would enable the creation of an ecosystem of working in a perfect lockstep where the right seeds are getting deliver when the greenhouse is ready and in the right time to have flowers ready when there is demand. And the right fertilizers are being delivered when needed. And finally by collecting and analysing the weather, yields and greenhouse environmental data you can further optimise production and reduce cost.
The examples are a relatively simple explanation of the IoT business models and how they can evolve in the future. The existing hardware, software, and connectivity technologies are allowing to implement it, but first, the decision which business model to choose has to be done base on the market, cost and risk analysis

Security

Security is a really hot topic right now.
Events like NHS cyber-attack in May, remind us that security must be an intrinsic part of each and every technology implementation.
Deciding on the right level of security for your business can be an emotive topic which may increase the stress levels of already busy people, and most will immediately think that the right technology will solve their security problems.
However, security is not just a technology discussion; security is a business discussion.
I am not going to recommend a specific software, hardware or process to solve your security needs. I would like, instead, to give you my perspective, a high-level observation, which can help you make the right choices; and here is the first thing: deciding on the right security solution is a compromise.
Also, you will not be deciding whether or not to protect your system from cyber-attacks, you will actually be making decisions about the right the level of risk, the cost of the solution and ease of usability of the process. You will be making a compromise.
For example, you can have a high security with the low cost if you disconnect all your devices from internet and power and lock them in a safe; great security – unusable business solution.
Realistically, you will need to consider risk, cost, and ease of use jointly to decide upon the optimal blend for you and your business. These considerations need to be made across all areas of your business.
What is the risk level I/my company can accept in a particular area?
What is the cost level I/my company can accept in a particular area?
How easily will this integrate into existing procedures?
The complexity of the correct solution becomes even greater as you also need to evaluate security risk in your specific business in conjunction with three more areas: technology, process and people.
Any solution also need to work in your specific business environment where you might have different people using the same technology for the same purpose, or the same people using different technologies for different purposes, the permutations are almost endless, and when coupled with a diverse level of security awareness within your team you will quickly see that there is no “one size fits all” solution.
It is common sense, but not always common practice.
Security is a risk evaluation decision.