Technology explained


At Miggy, we embrace the latest technological advancements to create solutions that transform the world around us. Our expertise focuses on new sensor technologies and data platform developments, as well as the latest connectivity possibilities.

Our dedication to progress drives us to continuously innovate and push technological boundaries. Whether it's optimizing space management, monitoring soil health in agriculture, preventing water leaks, or providing unparalleled dike monitoring, our technologies are the driving force behind change and advancement.

Select one of the categories below for more information.

Gegevensopslag my.miggy.nl

Your data is stored within the European Union. We use two different data centers to run the Miggy platform (my.miggy.nl):

  • Frankfurt, DE (main data center)
  • Amsterdam, NL (back-up)
Frankfurt

All servers required for the functioning of the Miggy platform and the storage of measurement data are located in Frankfurt, Germany.

Amsterdam

The data center in Amsterdam is used exclusively for storing backups and as a failover in the event of damage to the Frankfurt data center (e.g. due to fire), although the likelihood of this happening is low.

Back-ups

We make daily backups of the entire infrastructure, but have different priorities.

Metrics are given the highest priority in backups. Data such as usernames or tenant information is only backed up once a day, as we assume that this data hardly changes once it is created.

I accidentally deleted my data. Can you restore them?

Yes, but if you delete data or devices despite warnings, you'll be charged a fee to recover the data.

So make sure you only delete data when you're sure you don't need it anymore.

Do you still want to use this repair service? Please contact us.

Ownership

If you use our platform as the basis for your devices and their measurement data (and all other data), they remain your full property.

Access control

When you create a workspace on our platform (which happens automatically with the first login), you are the only one who has access to this workspace. No employee of Miggy or any other person can view the data in your workspace.

Do you want to share access to your workspace with others? Then you must explicitly invite these people. This also applies if you ask for help from a member of the Miggy support team. This person will only have access to your workspace if you add them as a member.

Scope

These principles (ownership and access control) apply to all components within your workspace, including:

  • All devices in your workspace
  • All sub-workspaces and their data/devices
  • In short, everything within your workspace

How we handle data from your devices

You can use the following integrations to connect your devices to the Miggy portal:

  • MQTT
  • REST-API
  • LoRaWAN
  • Particle.io
Anonymous data transfer

The following is true for all integrations and describes how data from your devices gets into the portal and how we process it:

When your device sends data to our system using one of the methods listed, it is always anonymous. No personal data or workspace-related data is sent.

An ID number is used to link measurement data to your device and workspace. This ID has a high entropy, making it indecipherable and does not contain any personal data.

Even if someone were to intercept this information, it would be useless because it doesn't include a description of the type of data being transmitted.

When you access the portal via the web interface or mobile app, the ID number of your workspace is sent to the server as a request. The server then sends back a list of all devices, but the data in this list remains anonymous.

The actual linking of data to your workspace only happens in the front-end of the portal and not on our servers.

In other words, all data from your devices and measurement data always remains anonymous and does not contain any personal information.

Do you share my data?

No. The data of your equipment remains your property, and Miggy will never share it with third parties.

Who can see my data?

On the Miggy platform, every action requires an access token.

  • Each token has a specific scope, which determines which devices it can manage and what workspaces and permissions it has.
  • Users within Miggy work on the basis of these tokens, so each user has their own token.
Can another user see my data?

No. Unless you explicitly give permission to another user to view your data, no one else can view your data.

Where are the vulnerabilities?

The biggest risks are related to the use of tokens, for example:

  • API tokens on IoT devices can be incorrectly secured. We have no control over the security measures that customers apply to their devices, which could result in a third party gaining access to a token.
  • Unencrypted connections: Some third-party IoT devices do not encrypt communications, so a token is sent in plain text and can be intercepted by a "man-in-the-middle" attack.

Please note: Miggy does not accept unencrypted incoming connections. But we cannot influence what happens with external MQTT brokers or third parties.

What is Miggy doing about this? What measures have been taken?

Miggy supports the creation of individual tokens per workspace, using the following security measures:

Automatically generated unique tokens per registered device (via API).

Fine-grained access settings, so that a token is only granted specific permissions (e.g., read-only or read/write for certain devices).

Disconnected data and permissions per device, so that tokens can be disabled and replaced in a targeted manner.

What about LoRaWAN or other IoT platforms?

LoRaWAN network servers or external IoT platforms send us data through webhooks.

  • Although we always enforce encrypted connections, risks can still arise such as replay attacks or the collection of falsified measurement data.
  • That's why the Miggy platform offers an extra layer of security: validation of incoming webhooks with its own token.
  • This token can only access the specific devices for which it is intended, so that other devices or data cannot be read if the token is lost.

LoRa technology is groundbreaking in the world of the Internet of Things (IoT). It is the most energy-efficient solution available and perfect for non-powered assets requiring long battery life (3-5 years). With LoRa, it's possible to perform triangulation on radio signals, enabling device positioning without the need for GPS.

Our LoRa devices offer the lowest costs and require minimal maintenance, making them an ideal choice for businesses seeking cost-effective and efficient solutions. At Miggy, we adhere to stringent security standards to ensure the safety of your data. All sensor data is transmitted with dual-layer AES128 encryption, and server traffic is conducted over HTTPS. Additionally, we engage an external party to regularly perform penetration tests to assess the effectiveness of our security measures.

We strictly adhere to GDPR (AVG) practices concerning data collection, usage, and retention. Information regarding the data we collect and store is always available upon request. At Miggy, we never sell or distribute data to third parties.

Our LoRa network is specifically designed for IoT services and complements existing 2G, 3G, and 4G networks. KPN has equipped all of its antenna locations with LoRa gateways, resulting in a high signal overlap. This ensures a highly reliable transmission, allowing us to calculate a location using the Time Difference of Arrival (TDOA) between gateways.

​With LoRa, you don't need a GPS chip for location-based services, resulting in small, energy-efficient, and cost-effective sensor devices. LoRa data rates range from 0.3 kbps to 50 kbps, and the network determines the best settings using Adaptive Data Rate (ADR), depending on the environmental conditions between the sensor device and the gateway.

Our LoRa network can manage the data rate and output power used for communication for each device individually to maximize battery life, range, and overall network capacity. Better coverage results in less power consumption by the device since data can be sent more quickly.​

While the maximum number of messages per day is limited due to the LoRa network operating in the unlicensed 868 MHz ISM band, our devices restrict uploads to a maximum of once every 15 minutes for the sake of conserving battery power.

Choose Miggy for all your LoRa needs and experience a reliable, cost-effective, and energy-efficient solution.


Are you in search of the perfect IoT connectivity solution for your business? Look no further than NB-IoT and CAT-M. Both technologies offer reliable, energy-efficient, and cost-effective connectivity options for a wide range of IoT applications.

So, what is the difference between NB-IoT and CAT-M? NB-IoT is a narrowband technology designed for IoT devices with low bandwidth requirements that require minimal data transfer, such as smart meters. CAT-M, on the other hand, is a Category M1 technology designed for devices that require moderate bandwidth and low latency, such as asset trackers and smart security systems.

NB-IoT offers longer battery life and deeper coverage, making it the ideal choice for devices that require long-lasting connectivity in challenging environments. Conversely, CAT-M provides faster data transfer speeds and lower latency, making it more suitable for applications that require real-time data and monitoring.

Both NB-IoT and CAT-M operate on licensed spectrum, providing greater security and reliability compared to technologies that operate on unlicensed spectrum. Furthermore, the extensive deployment of mobile networks ensures that these technologies offer extensive and seamless coverage for your IoT devices.

Choose the right IoT connectivity solution for your business with NB-IoT and CAT-M. Whether you need deep coverage for smart meters or real-time monitoring for asset tracking, these technologies offer the flexibility, reliability, and security you need to power your IoT applications.


Machine-to-Machine (M2M) communication is revolutionizing the way we do business. With M2M, machines can communicate in real-time and exchange data, enabling companies to optimize their operations, improve efficiency, and reduce costs.

Whether you are in the manufacturing sector, transportation, logistics, or any other industry, M2M communication can help you stay ahead. With M2M, you can remotely monitor your machines, track your assets, and collect valuable data to inform your business decisions.

M2M communication also opens new opportunities for companies to innovate and create new revenue streams. By leveraging M2M technology, businesses can develop new products and services that are smarter, more efficient, and better aligned with customer needs.

Essentially, M2M communication is about connecting machines and devices to the internet, enabling them to communicate and collaborate in ways that were previously impossible. And with the rapid advancement of technology, M2M is becoming more accessible, affordable, and user-friendly than ever before.

Whether you want to streamline your operations, improve profitability, or explore new business opportunities, M2M communication is the key to unlocking the full potential of your company. With M2M, the possibilities are endless.

Bovendien is het de moeite waard op te merken dat Miggy multi-operator SIM-kaarten levert, die de connectiviteit en flexibiliteit van uw M2M-oplossingen verbeteren.

In addition, it's worth noting that Miggy supplies multi-operator SIMs, enhancing connectivity and flexibility for your M2M solutions.