Wireless Security and the Internet of Things Nick Hunn
|
|
- Louisa Paul
- 8 years ago
- Views:
Transcription
1 Wireless Security and the Internet of Things Nick Hunn WiFore Consulting
2 The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall be so constructed that it complies with the following essential requirements: (c) radio equipment incorporates safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected;
3 Some examples of what has been hacked Pacemakers Insulin Pumps Weir Gates Set Top Boxes Fitness Monitors Smart Meters
4 The Consequences of Hacking People know where you are. People know where you aren t. People know who you re with. People know what you re doing. People think you re someone else. Your lights go out. Your bills go up. Things stop working. Things start working differently. Your business fails.
5 What is the Internet of Things? Some are born with Sensors, Some acquire sensors, and Some have sensors thrust upon them.
6 Machine to Machine (M2M) Many current M2M deployments are cellular
7 Appcessories and The Quantified Self Consumer growth is most likely to come from the world of Appcessories. Find out more about Appcessories at
8 The Smart Home It will take time coming, but homes will get monitored.
9 To 40 billion and Beyond
10 Millions The missing 25 billion may be Desirable 14,000 Annual Sales of Appcessories 12,000 10,000 8,000 6,000 4,000 2,000 - Source: WiFore Consulting
11 Which gives 40 billion opportunities to steal or corrupt someone s data. Every second of every day
12 Addressing Security
13 The Topology of the Internet of Things Sensors db & App Where cellular is Integrated with sensors it will remove some steps in the chain.
14 The Simple Case of the Smart Thermostat Senso r Gateway Router Boiler Switch PCT PC Installer Supplied Customer Supplied
15 Phone The Backend Environment Web Interface External Service Provider Router 3 rd Party Data MDMS, etc. I/O Manager db Application & Analysis PC Device Manager Security Manager Service Provision
16 Phone And don t forget the Weak Link PC
17 Elements of Security Most IoT architectures consist of a collection of separate, connected elements, each of which may have their own security. Systems composed of Off the Shelf components generally have different levels of security, which need to be stitched into a whole. This can be trickier than designing from scratch. The order of installation can be critical. But guaranteeing the correct order may be impossible. Existing security of wireless may be a false security.
18 The AES128 Datasheet Misconception But I m using Wi-Fi / Bluetooth / ZigBee. That s got security built in. Why do I need to do anything else?
19 Practical Considerations
20 Build a Security Model You MUST develop a complete end-to-end security model. Just implementing Wireless security is not enough. Write an RMADS as soon as you ve done your first draft of system architecture, and then reiterate both until they work and are consistent. Consider device management, end to end authentication and link key management. db & App BTS / WPA2 TLS TLS / PW Encryption / Authentication
21 Design for Autonomous Operation X X X X db & App Think about what happens when: Internal or external comms links or the web service fail The mobile phone goes out of the house The gateway / router fails or is replaced The consumer moves home The consumer expects their HVAC and lights to continue working
22 Security & Usability No security makes getting to 40 billion devices easy. High security makes it very difficult. But Major security failures scare customers and may kill the market altogether. If the reaction to new security threats is simplistically to add even stronger protection, then the costs of that additional security will result in M2M solutions that are not economically viable. Beecham Research
23 And Pairing remains the biggest problem for most wireless products, both in terms of usability and security. Many of these IoT & M2M products will have much longer lives than current consumer products. That means that new components will be added to the system and existing ones replaced. That is a security challenge. More security = more processing = shorter battery life. Make sure that firmware updates don t compromise the security. Or that the security model doesn t prevent them being deployed. Remember that many of these devices may have NO user interface.
24 Millions But Annual Sales of Appcessories 14,000 12,000 10,000 8,000 6,000 4,000 2, If we get it right, the market is five times bigger than the mobile phone market. It s worth getting it right.
25 Questions? Nick Hunn CTO mob: web: Creative Connectivity Blog:
Securing the Internet of Things WHITEPAPER
Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible
More informationEnd-to-End M2M and IoT Services
End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who
More informationSecure, Efficient, and Open Standard Internet of Things
Secure, Efficient, and Open Standard Internet of Things Zach Shelby Director of Technology, IoT ARM acknowledges the trademarks and copyrights of 3 rd parties included in this presentation What is the
More informationSecurity for the Internet of Things
Security for the Internet of Things Moderated by: Robin Duke-Woolley Founder & CEO Beecham Research Sponsored by: Syed Zaeem Hosain Chief Technology Officer Aeris 16 December 2016 Security for the Internet
More informationInternet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com
Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors
More informationRIOT CONTROL The Art of Managing Risk for Internet of Things
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
More informationThe Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
More informationTypical asset: valuable, in a remote position, needs to report events about itself (including failures) and/or it environmnent to the company owning
1 Description of a typical M2M chain: An asset is a machine which needs to communicate over the net, without human operator intervention. There can be one or many assets; one of them used as a network
More informationSmart Grid Security: Ground Zero for Cyber Security. June 2, 2010 at 12:51 PM by Larry Karisny
Smart Grid Security: Ground Zero for Cyber Security June 2, 2010 at 12:51 PM by Larry Karisny It was pretty amazing to see the amount of people involved in Conductivity Week in Santa Clara California last
More informationEnabling Smart Data on M2M Gateways and Aggregators
Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect
More informationInternet of Things. Opportunities for device differentiation
Internet of Things Opportunities for device differentiation What is the Internet of Things? The Internet of Things (IoT) is an emerging market trend impacting semiconductor devices, system OEMs, cloud
More informationDisruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications
Disruption Tolerant Networks and its relevance to IOT/M2M Extensible NMS Support for DTN Mesh Networks + Applications MAC80211+OpenWRT Framework for Proprietary Devices Representative SBC computers with
More informationShort range low power wireless devices and Internet of Things (IoT)
Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses
More informationFirst of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.
How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector
More informationShort-range Low Power Wireless Devices and Internet of Things (IoT)
Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February
More informationTNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
More informationSecuring Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper
Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones
More informationCARRIOTS TECHNICAL PRESENTATION
CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM
More informationWHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
More informationIoT Security. Introduction. Threat Model
IoT Security Introduction In this 1248 white paper we summarise the various aspects of security which need to be considered when designing connected products for the Internet of Things. We give a general
More informationConnecting the Internet of Things Inside the Home
Connecting the Internet of Things Inside the Home Russell Haggar 4th Annual Smart Grids & Cleanpower 2012 Conference 14 June 2012 Cambridge www.cir-strategy.com/events Internet of Things: It s Big u Connecting
More informationBluetooth low energy 1
1 Bluetooth low energy It is NEW Technology short range world wide robust low cost low power But it fits into the wider Bluetooth wireless ecosystem. 2 Technology Bluetooth low energy wireless technology
More informationThe Internet of Things Risks and Challenges
The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat
More informationMobility in the Enterprise: Trends
Mobility in the Enterprise: Trends and Directions with an IoT Focus Leif-Olof Wallin Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed
More informationRight-Sizing M2M Security: The Best Security is Security Tailored to Your Application
Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.
More informationBYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective
BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center
More informationAn Introduction to the Internet of Things (IoT)
An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E sales@lopezresearch.com W
More informationFDIC Division of Supervision and Consumer Protection
FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering
More informationTop 10 Security Checklist for SOHO Wireless LANs
Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN
More informationEmerging Trends and Opportunities
Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 04.11.2014 Emilio Martinez de la Fuente Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit
More informationReti wireless in banda ISM e complementarieta con le reti cellulari
www.telit.com Reti wireless in banda ISM e complementarieta con le reti cellulari Milano: 15 giugno 2010 sergio.sciarmella@telit.com M2M Market potential is huge White Goods, HVAC, Smart Grids/AMM Industrial/Park/Building/Stores/Home
More informationSECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP
SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff
More informationWhat marketing won t tell you about the Internet of Things
What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author
More informationSmart Cities. Photo used under Creative Commons from nigelhowe
Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,
More informationCPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD
CPS: Communications Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD CONTENTS Background/Motivation Wireless Communication Technologies Machine-to-Machine Communication M2M Architecrures Issues in M2M Communicatuon
More informationSecure and Reliable Data Exchange with IoT Devices. Vinny Sakore & Amit Trivedi February 29, 2016
Secure and Reliable Data Exchange with IoT Devices Vinny Sakore & Amit Trivedi February 29, 2016 Mobile and Internet of Things (IoT) Security Risk With IoT Technology Nepal Earthquake (April 25, 2015)
More informationEmerging Technology Analysis: The Internet of Things Creates Semiconductor Business Opportunities at Several Levels
Gartner for Business Leaders G00248942 Emerging Technology Analysis: The Internet of Things Creates Semiconductor Business Opportunities at Several Levels Published: 27 February 2013 Analyst(s): Jim Tully
More informationSentrollers and The Internet of Things
White Paper May-2013 Sentrollers and The Internet of Things By: Cees Links, Founder and CEO GreenPeak Technologies www.greenpeak.com The new buzzword floating around the world is the Internet of Things,
More informationHow to Configure Your Account s Privacy Settings
Making the Most Out of Facebook s Privacy Settings How to Configure Your Account s Privacy Settings Rik Ferguson, Vice President Security Research Making the Most Out of Facebooks Privacy Settings As a
More informationIOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl
IOT the Last Miles Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl Embedded IoT Solution Embedded IoT Software Remote Management Security OS Intelligent Systems RISC,
More informationANTI-COUNTERFEITING HOW TO ADDRESS INTERNET OF THINGS (IOT) FROM A PATENT PERSPECTIVE. www.zacco.com Zacco 2015
ANTI-COUNTERFEITING HOW TO ADDRESS INTERNET OF THINGS (IOT) FROM A PATENT PERSPECTIVE 1 www.zacco.com Zacco 2015 Summary Internet of Things is gaining in momentum and the expected growth is paramount both
More informationDEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES
Information Analytics Expertise APRIL 2015 DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES John Byrne, Senior Principal Analyst +1 408 583 3320 John.byrne@ihs.com Internet
More informationErich W. Gunther Chairman and CTO - EnerNex Corporation Chairman UtilityAMI, OpenHAN, AMI-SEC erich@enernex.com
Field and Device Technologies: Consumer Portals, Home Area Networks and Connected Devices Erich W. Gunther Chairman and CTO - EnerNex Corporation Chairman UtilityAMI, OpenHAN, AMI-SEC erich@enernex.com
More informationTesting the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
More informationIntroduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products
Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO
More informationM2M & Internet of Things Opportunities
M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)
More informationThe Internet of ANYthing
The of ANYthing Abstract It is projected that by 2020 there will be 50 billion things connected to the. This presents both unprecedented opportunity and challenge. In the global network of things, new
More informationOverview of the Internet of things
Overview of the Internet of things Tatiana Kurakova, International Telecommunication Union Place des Nations CH-1211 Geneva, Switzerland Abstract. This article provides an overview of the Internet of things
More informationA G E N D A I O T P R E S S T O U R
I O T P R E S S T O U R A G E N D A _ Introduction Opening What is IoT The IoT Market _ AVM Strategy What does IoT mean to Avnet Memec? Where does Avnet Memec fit? _ AVM Solutions _ What s Next _ Summary
More informationSecuring the Growth of IoT and M2M
Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020
More informationREASONS TO CHOOSE A SMART ALARM
6 REASONS TO CHOOSE A SMART ALARM INFINITY SYSTEMS CANADA 2 Powering the Connected Home Home security systems are nothing like they used to be. Compared to systems even 10 years old, with limited capabilities
More information2016.04.17 Firenze. Iottly, open source Internet of Things distribution
2016.04.17 Firenze About me Stefano Terna Technical co-founder @ TomorrowData @stefanoterna stefanoterna stefano.terna@tomorrodata.io About TomorrowData Domain: IoT & Machine Learning for SMEs Open Source:
More informationHit Hanan & Faisal Faruqi Nexscience
Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart
More informationConnecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things
Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID
More informationHow To Understand The Concept Of Internet Of Things (Iot)
Privacy and Security Challenges in Internet of Things Manik Lal Das DA-IICT, Gandhinagar Disclaimer Many third party copyrighted material is reused within this talk under the 'fair use' approach, for sake
More informationIt's All About HVAC Systems and Saving Big Bucks Using DDC Systems!
Energy-Facilities Connections Conference Leavenworth, Washington It's All About HVAC Systems and Saving Big Bucks Using DDC Systems! May 12 th, 2010 Session 2, 10-11:20 am by Greg Jourdan 1 Agenda-It's
More informationSecurity within a development lifecycle. Enhancing product security through development process improvement
Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web
More informationTop 10 Security Checklist for SOHO Wireless LANs
Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks
More informationHow To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
More informationHong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
More informationSmart Cities are the Internet of Things
June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and
More informationSecurity by Design WHITE PAPER
Security by Design WHITE PAPER Trilliant helps leading utilities and energy retailers achieve their smart grid visions through the Trilliant Communications Platform, the only communications platform purpose-built
More informationInternet of IPod - Connected to Intelligent Devices
Evolution of the Internet of Things From Connected to Intelligent Devices September 2014 INTRODUCTION The Internet of Things, or IoT, has recently become a strategic priority for organizations in all industries
More informationMaking The Internet of ANYthing
Making The Internet of ANYthing 1 The Market Opportunity Accelerate this Curve 2 idigi Device Cloud Enables Any Device, Anywhere to join Any Application, Anywhere 3 Digi s Value Proposition ANY app thing
More informationWISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
More informationAchieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
More informationInternet Gateways. Bluetooth White Paper. Date 2016-Feb-04. Revision v01. Group Prepared By Smart Environment Study Group
Bluetooth White Paper Date 2016-Feb-04 Revision Group Prepared By Smart Environment Study Group Feedback Email smartenv-main@bluetooth.org Abstract: This white paper describes various options available
More informationWWW.SILENTCIRCLE.COM
INTRODUCING THE WORLD S FIRST ENTERPRISE PRIVACY PLATFORM Why Privacy? PRIVACY IS INCREASINGLY UNDER THREAT IN TODAY S MOBILE WORLD Traditional security solutions weren t built for mobile environments
More informationMobile and Embedded/IoT market Overview and Trends. June 2014
Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum
More informationRunning Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University
Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1 Awareness of BYOD Security Concerns Benjamin Tillett-Wakeley East Carolina University AWARENESS OF BYOD SECURITY CONCERNS 2 Abstract This paper will
More informationTHE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET
THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET STRATEGIC WHITE PAPER The machine-to-machine (M2M) industry is focused on extending its reach beyond niche
More information920MHz Band Multi-hop Wireless Network System
920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart
More informationWhite Paper: OSGi-based E-Health / Assisted Living
White Paper: OSGi-based E-Health / Assisted Living Martin Petzold (Project Manager) Phone: +49 (0) 221 6604 405 E-Mail: m.petzold@prosyst.com Konstantin Kersten (Project Manager) Phone: +49 (0) 221 6604
More informationAT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY
Customer Case Study AT&T Digital Life Home Security and Automation Service EXECUTIVE SUMMARY COMPANY OVERVIEW AT&T is the largest telecom services provider in the world and has a wide range of offerings,
More informationResearch Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era
Sponsored by Oracle Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era Introduction About Survey Respondents The Internet of Things (IoT) and the rise of
More informationUPnP Internet of Things Dec 2014
UPnP Internet of Things Dec 2014 Keith Miller Intel Wouter van der Beek Cisco UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description Sensor Management
More informationSHUBHA N BHAMBHANI DDG (NT-COI), DOT
M2M SHUBHA N BHAMBHANI DOT DDG (NT-COI), M2M M2M is the technology that establishes intelligent communication between things AGENDA Introduction Basic Definitions How it works How it is different Key features
More informationInternet of Things... Let's Not Forget Security Please!
Internet of Things... Let's Not Forget Security Please! Distinguished Engineer Cisco @evyncke Eric Vyncke 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2014 Cisco and/or its affiliates.
More informationConnecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
More informationA Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University
A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,
More informationSecure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 12 November 2014 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
More informationIOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015
Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers
More informationSecure Cloud and Remote Service Connections for AllJoyn Applications
Secure Cloud and Remote Service Connections for AllJoyn Applications Art Lancaster CTO, Affinegy Chair, Gateway Agent Working Group 5 February 2015 AllSeen Alliance 1 Agenda 1. Gateway Agent Working Group
More informationIOT 2.0: when the IOT and the micro-location converge As you understood from my bio, I spent all my career in the industry where I had the chance to
IOT 2.0: when the IOT and the micro-location converge As you understood from my bio, I spent all my career in the industry where I had the chance to experience the whole value chain of the industry from
More informationApplying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
More informationSecurity Threats on National Defense ICT based on IoT
, pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,
More informationWi-Fi, Bluetooth, and the Internet of Things
WHITEPAPER Mindtribe Product Engineering 25 Kearny St. Suite 200 San Francisco, CA 94108 Introduction, Bluetooth, and the Internet of Things The Internet of Things (IoT) has an increasing number of our
More informationTechnical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products
Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products Document Updated: September 29, 2014 Written by: Tim Marks, President, FMA, Inc. Introduction
More informationThe Internet of Things Wilfrid Laurier University
The Internet of Things Wilfrid Laurier University Wilfrid Laurier University March 11, 2015 Overview Overview? Overview? Overview? Why does one need the other? ? ? Started in about 1950s (USA, DARPA) ?
More informationMobile Application Security
Mobile Application Security Jack Mannino Anand Vemuri June 25, 2015 About Us Jack Mannino CEO at nvisium UI and UX development impaired Enjoys: Scala, Elixir Tolerates: Java Allergic To: Cats, Pollen,.NET
More informationSpiderCloud E-RAN Security Overview
SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5
More informationDeterrent and detection of smart grid meter tampering and theft of electricity, water, or gas
Deterrent and detection of smart grid meter tampering and theft of electricity, water, or gas Jeff McCullough Introduction This white paper was inspired by real concerns regarding smart grid electric meters
More informationDemystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
More informationGive Vendors Access to the Data They Need NOT Access to Your Network
Give Vendors Access to the Data They Need NOT Access to Your Network Acumera AirGap Architecture By the year 2020 just five years from now it is estimated that 25 billion devices will be connected to the
More informationSolutions. Machine-to-Machine. Arrow Electronics. Complete, end-to-end solutions over the life of your product.
AR R OW E L E CTR O N I CS A MERI CA S CO MP ONENTS machine machine-to- CAPABILITIES Arrow Electronics Americas Components m2m@arrow.com Arrow Electronics Machine-to-Machine Solutions Complete, end-to-end
More informationWLAN Security Networking with Confidence
WLAN Security Networking with Confidence Introduction So you ve just installed a new wireless local area network (WLAN) in your small business or home. The access point is on and connected, the client
More informationBLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE
BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.
More informationPCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
More informationHC900 Hybrid Controller When you need more than just discrete control
HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network
More informationNew Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices. September 25, 2013
New Devices Mean New Risks: The Potential for Liability When Software is a Component of Medical Devices September 25, 2013 The Hartford Insuring Innovation Joe Coray Dan Silverman Providing insurance solutions
More information