Wireless Security and the Internet of Things Nick Hunn

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Wireless Security and the Internet of Things Nick Hunn"

Transcription

1 Wireless Security and the Internet of Things Nick Hunn WiFore Consulting

2 The Legal Requirement In the EU proposal for the revision of the R&TTE directive, it states that: Article 3 Radio equipment shall be so constructed that it complies with the following essential requirements: (c) radio equipment incorporates safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected;

3 Some examples of what has been hacked Pacemakers Insulin Pumps Weir Gates Set Top Boxes Fitness Monitors Smart Meters

4 The Consequences of Hacking People know where you are. People know where you aren t. People know who you re with. People know what you re doing. People think you re someone else. Your lights go out. Your bills go up. Things stop working. Things start working differently. Your business fails.

5 What is the Internet of Things? Some are born with Sensors, Some acquire sensors, and Some have sensors thrust upon them.

6 Machine to Machine (M2M) Many current M2M deployments are cellular

7 Appcessories and The Quantified Self Consumer growth is most likely to come from the world of Appcessories. Find out more about Appcessories at

8 The Smart Home It will take time coming, but homes will get monitored.

9 To 40 billion and Beyond

10 Millions The missing 25 billion may be Desirable 14,000 Annual Sales of Appcessories 12,000 10,000 8,000 6,000 4,000 2,000 - Source: WiFore Consulting

11 Which gives 40 billion opportunities to steal or corrupt someone s data. Every second of every day

12 Addressing Security

13 The Topology of the Internet of Things Sensors db & App Where cellular is Integrated with sensors it will remove some steps in the chain.

14 The Simple Case of the Smart Thermostat Senso r Gateway Router Boiler Switch PCT PC Installer Supplied Customer Supplied

15 Phone The Backend Environment Web Interface External Service Provider Router 3 rd Party Data MDMS, etc. I/O Manager db Application & Analysis PC Device Manager Security Manager Service Provision

16 Phone And don t forget the Weak Link PC

17 Elements of Security Most IoT architectures consist of a collection of separate, connected elements, each of which may have their own security. Systems composed of Off the Shelf components generally have different levels of security, which need to be stitched into a whole. This can be trickier than designing from scratch. The order of installation can be critical. But guaranteeing the correct order may be impossible. Existing security of wireless may be a false security.

18 The AES128 Datasheet Misconception But I m using Wi-Fi / Bluetooth / ZigBee. That s got security built in. Why do I need to do anything else?

19 Practical Considerations

20 Build a Security Model You MUST develop a complete end-to-end security model. Just implementing Wireless security is not enough. Write an RMADS as soon as you ve done your first draft of system architecture, and then reiterate both until they work and are consistent. Consider device management, end to end authentication and link key management. db & App BTS / WPA2 TLS TLS / PW Encryption / Authentication

21 Design for Autonomous Operation X X X X db & App Think about what happens when: Internal or external comms links or the web service fail The mobile phone goes out of the house The gateway / router fails or is replaced The consumer moves home The consumer expects their HVAC and lights to continue working

22 Security & Usability No security makes getting to 40 billion devices easy. High security makes it very difficult. But Major security failures scare customers and may kill the market altogether. If the reaction to new security threats is simplistically to add even stronger protection, then the costs of that additional security will result in M2M solutions that are not economically viable. Beecham Research

23 And Pairing remains the biggest problem for most wireless products, both in terms of usability and security. Many of these IoT & M2M products will have much longer lives than current consumer products. That means that new components will be added to the system and existing ones replaced. That is a security challenge. More security = more processing = shorter battery life. Make sure that firmware updates don t compromise the security. Or that the security model doesn t prevent them being deployed. Remember that many of these devices may have NO user interface.

24 Millions But Annual Sales of Appcessories 14,000 12,000 10,000 8,000 6,000 4,000 2, If we get it right, the market is five times bigger than the mobile phone market. It s worth getting it right.

25 Questions? Nick Hunn CTO mob: web: Creative Connectivity Blog:

End-to-End M2M and IoT Services

End-to-End M2M and IoT Services End-to-End M2M and IoT Services 2015 Internet of Things Symposium. May 21, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO Presentation Agenda What we will cover Who

More information

Securing the Internet of Things WHITEPAPER

Securing the Internet of Things WHITEPAPER Securing the Internet of Things WHITEPAPER Table of Contents Introduction...1 Expectations of Security Risk...1 Complexity... 2 What is Secure Enough?... 2 Authenticated Sender & Receiver... 3 Accessible

More information

Security for the Internet of Things

Security for the Internet of Things Security for the Internet of Things Moderated by: Robin Duke-Woolley Founder & CEO Beecham Research Sponsored by: Syed Zaeem Hosain Chief Technology Officer Aeris 16 December 2016 Security for the Internet

More information

Secure, Efficient, and Open Standard Internet of Things

Secure, Efficient, and Open Standard Internet of Things Secure, Efficient, and Open Standard Internet of Things Zach Shelby Director of Technology, IoT ARM acknowledges the trademarks and copyrights of 3 rd parties included in this presentation What is the

More information

RIOT CONTROL The Art of Managing Risk for Internet of Things

RIOT CONTROL The Art of Managing Risk for Internet of Things RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Typical asset: valuable, in a remote position, needs to report events about itself (including failures) and/or it environmnent to the company owning

Typical asset: valuable, in a remote position, needs to report events about itself (including failures) and/or it environmnent to the company owning 1 Description of a typical M2M chain: An asset is a machine which needs to communicate over the net, without human operator intervention. There can be one or many assets; one of them used as a network

More information

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com Internet of Things (IoT): Security Awareness Sandra Liepkalns, CRISC sandra.liepkalns@netrus.com So What is the Internet of Things Network of physical objects embedded with: Electronics, software, sensors

More information

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Short-range Low Power Wireless Devices and Internet of Things (IoT) Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February

More information

Short range low power wireless devices and Internet of Things (IoT)

Short range low power wireless devices and Internet of Things (IoT) Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses

More information

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications

Disruption Tolerant Networks and its relevance to IOT/M2M. Extensible NMS Support for DTN Mesh Networks + Applications Disruption Tolerant Networks and its relevance to IOT/M2M Extensible NMS Support for DTN Mesh Networks + Applications MAC80211+OpenWRT Framework for Proprietary Devices Representative SBC computers with

More information

What marketing won t tell you about the Internet of Things

What marketing won t tell you about the Internet of Things What marketing won t tell you about the Internet of Things Elecia White #eelive Produced by EE Times Why are you here? Why am I here? Founder of Logical Elegance, embedded systems consulting firm Author

More information

CARRIOTS TECHNICAL PRESENTATION

CARRIOTS TECHNICAL PRESENTATION CARRIOTS TECHNICAL PRESENTATION Alvaro Everlet, CTO alvaro.everlet@carriots.com @aeverlet Oct 2013 CARRIOTS TECHNICAL PRESENTATION 1. WHAT IS CARRIOTS 2. BUILDING AN IOT PROJECT 3. DEVICES 4. PLATFORM

More information

Smart Grid Security: Ground Zero for Cyber Security. June 2, 2010 at 12:51 PM by Larry Karisny

Smart Grid Security: Ground Zero for Cyber Security. June 2, 2010 at 12:51 PM by Larry Karisny Smart Grid Security: Ground Zero for Cyber Security June 2, 2010 at 12:51 PM by Larry Karisny It was pretty amazing to see the amount of people involved in Conductivity Week in Santa Clara California last

More information

Connecting the Internet of Things Inside the Home

Connecting the Internet of Things Inside the Home Connecting the Internet of Things Inside the Home Russell Haggar 4th Annual Smart Grids & Cleanpower 2012 Conference 14 June 2012 Cambridge www.cir-strategy.com/events Internet of Things: It s Big u Connecting

More information

FDIC Division of Supervision and Consumer Protection

FDIC Division of Supervision and Consumer Protection FDIC Division of Supervision and Consumer Protection Voice over Internet Protocol (VoIP) Informational Supplement June 2005 1 Summary In an attempt to control expenses, consumers and businesses are considering

More information

IoT Security. Introduction. Threat Model

IoT Security. Introduction. Threat Model IoT Security Introduction In this 1248 white paper we summarise the various aspects of security which need to be considered when designing connected products for the Internet of Things. We give a general

More information

The Internet of Things Risks and Challenges

The Internet of Things Risks and Challenges The Internet of Things Risks and Challenges Providing the insight that enables our customers to make informed business decisions. Antony Price 03rd March 2015 Contents Internet of Things - The next threat

More information

Internet of Things. Opportunities for device differentiation

Internet of Things. Opportunities for device differentiation Internet of Things Opportunities for device differentiation What is the Internet of Things? The Internet of Things (IoT) is an emerging market trend impacting semiconductor devices, system OEMs, cloud

More information

Enabling Smart Data on M2M Gateways and Aggregators

Enabling Smart Data on M2M Gateways and Aggregators Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect

More information

bootstrapping security

bootstrapping security ericsson White paper 284 23-3284 Uen February 2016 bootstrapping security THE KEY TO INTERNET OF THINGS ACCESS AUTHENTICATION AND DATA INTEGRITY Security will be a major challenge as billions of devices

More information

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods.

First of all Let's look at how you would connect your laptop via Ethernet, as it is the easier of the two methods. How to get a Internet Connection on your laptop This guide will help you to get an internet connection on your laptop either via Wi-Fi (e.g. in a café or hotel) or via Ethernet (the RJ45 type connector

More information

Erich W. Gunther Chairman and CTO - EnerNex Corporation Chairman UtilityAMI, OpenHAN, AMI-SEC erich@enernex.com

Erich W. Gunther Chairman and CTO - EnerNex Corporation Chairman UtilityAMI, OpenHAN, AMI-SEC erich@enernex.com Field and Device Technologies: Consumer Portals, Home Area Networks and Connected Devices Erich W. Gunther Chairman and CTO - EnerNex Corporation Chairman UtilityAMI, OpenHAN, AMI-SEC erich@enernex.com

More information

Emerging Trends and Opportunities

Emerging Trends and Opportunities Emerging Trends and Opportunities Smart Homes & End User Engagement track_ TEF. Digital 04.11.2014 Emilio Martinez de la Fuente Head of Utilities & Building Energy Efficiency Telefonica M2M Global Unit

More information

Bluetooth low energy 1

Bluetooth low energy 1 1 Bluetooth low energy It is NEW Technology short range world wide robust low cost low power But it fits into the wider Bluetooth wireless ecosystem. 2 Technology Bluetooth low energy wireless technology

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Why ZigBee is needed ZigBee is highly reliable Acknowledgments at each hop Mesh networking to find reliable route Mesh networking essentially provides three enhanced capabilities

More information

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination

More information

Smart Cities. Photo used under Creative Commons from nigelhowe

Smart Cities. Photo used under Creative Commons from nigelhowe Smart Cities Photo used under Creative Commons from nigelhowe Photo used under Creative Commons from tim-166 Cities are for People Citier Smart cities as a web of people, things and services Workshop 2,

More information

Secure and Reliable Data Exchange with IoT Devices. Vinny Sakore & Amit Trivedi February 29, 2016

Secure and Reliable Data Exchange with IoT Devices. Vinny Sakore & Amit Trivedi February 29, 2016 Secure and Reliable Data Exchange with IoT Devices Vinny Sakore & Amit Trivedi February 29, 2016 Mobile and Internet of Things (IoT) Security Risk With IoT Technology Nepal Earthquake (April 25, 2015)

More information

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD CPS: Communications Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD CONTENTS Background/Motivation Wireless Communication Technologies Machine-to-Machine Communication M2M Architecrures Issues in M2M Communicatuon

More information

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper

Securing Patient Data in Today s Mobilized Healthcare Industry. A Good Technology Whitepaper Securing Patient Data in Today s Mobilized Healthcare Industry Securing Patient Data in Today s Mobilized Healthcare Industry 866-7-BE-GOOD good.com 2 Contents Executive Summary The Role of Smartphones

More information

ETH Zürich, COSS. nervousnet. An Overview

ETH Zürich, COSS. nervousnet. An Overview nervousnet An Overview What is nervousnet Measurements over sensor data generated by pervasive & ubiqutous IoT technologies Network of interconnected software clients mobile app Understanding social complexity,

More information

How to Configure Your Account s Privacy Settings

How to Configure Your Account s Privacy Settings Making the Most Out of Facebook s Privacy Settings How to Configure Your Account s Privacy Settings Rik Ferguson, Vice President Security Research Making the Most Out of Facebooks Privacy Settings As a

More information

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products

Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Introduction to M2M Technologies What Wireless or Wired Option is Right For Your Company or Products Webinar. December 15, 2015. Syed Zaeem Hosain ( Z ), CTO, Aeris. Syed.Hosain@aeris.net, Twitter: @AerisCTO

More information

A G E N D A I O T P R E S S T O U R

A G E N D A I O T P R E S S T O U R I O T P R E S S T O U R A G E N D A _ Introduction Opening What is IoT The IoT Market _ AVM Strategy What does IoT mean to Avnet Memec? Where does Avnet Memec fit? _ AVM Solutions _ What s Next _ Summary

More information

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.

More information

Supporting The Latest Standards In Connectivity: An Insight Into Thread

Supporting The Latest Standards In Connectivity: An Insight Into Thread Supporting The Latest Standards In Connectivity: An Insight Into Thread Bill Curtis ARM IoT Strategist / ARM Internet of Things Business Unit Thread Group / Board of Directors mbed Sponsored Session /

More information

Sentrollers and The Internet of Things

Sentrollers and The Internet of Things White Paper May-2013 Sentrollers and The Internet of Things By: Cees Links, Founder and CEO GreenPeak Technologies www.greenpeak.com The new buzzword floating around the world is the Internet of Things,

More information

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective Kit Colbert CTO, End-User Computing 2014 VMware Inc. All rights reserved. VMware: Addressing the Market From Data Center

More information

Securing the Growth of IoT and M2M

Securing the Growth of IoT and M2M Securing the Growth of IoT and M2M Svetlana Grant, Director, Future IoT Networks Connected Living Programme, GSMA 9 September 2015 Connected Living - Mobilising the Internet of Things GSMA VISION 2020

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Introduction Corporations, government agencies, the military, and enterprises in fact all medium to large scale wireless LANs have a different set of security requirements compared to the wireless LAN

More information

Making The Internet of ANYthing

Making The Internet of ANYthing Making The Internet of ANYthing 1 The Market Opportunity Accelerate this Curve 2 idigi Device Cloud Enables Any Device, Anywhere to join Any Application, Anywhere 3 Digi s Value Proposition ANY app thing

More information

Hit Hanan & Faisal Faruqi Nexscience

Hit Hanan & Faisal Faruqi Nexscience Leveraging Mobile Technology for Oracle Databases Management Hit Hanan & Faisal Faruqi Nexscience Mobile Market.. The total number of PCs will reach 1.78 billion in three years, while the number of smart

More information

Reti wireless in banda ISM e complementarieta con le reti cellulari

Reti wireless in banda ISM e complementarieta con le reti cellulari www.telit.com Reti wireless in banda ISM e complementarieta con le reti cellulari Milano: 15 giugno 2010 sergio.sciarmella@telit.com M2M Market potential is huge White Goods, HVAC, Smart Grids/AMM Industrial/Park/Building/Stores/Home

More information

Smart Meters, Smart Data, Smart Growth

Smart Meters, Smart Data, Smart Growth Smart s, Smart Data, Smart Growth This leaflet explains how data from smart meters is expected to transform the market for energy services and how your business will be able to access this data. The Great

More information

WISE-4000 Series. WISE IoT Wireless I/O Modules

WISE-4000 Series. WISE IoT Wireless I/O Modules WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud

More information

The Internet of ANYthing

The Internet of ANYthing The of ANYthing Abstract It is projected that by 2020 there will be 50 billion things connected to the. This presents both unprecedented opportunity and challenge. In the global network of things, new

More information

Mobility in the Enterprise: Trends

Mobility in the Enterprise: Trends Mobility in the Enterprise: Trends and Directions with an IoT Focus Leif-Olof Wallin Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed

More information

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP

SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP SECURITY OF WIRELESS HOME AUTOMATION SYSTEMS A WORLD BESIDE TCP/IP WHO ARE WE? Tobias Zillner Senior IS Auditor @Cognosec in Vienna Penetration Testing, Security Audits, Security Consulting Breaking stuff

More information

Smart Cities are the Internet of Things

Smart Cities are the Internet of Things June 20th, 2013 Smart Cities are the Internet of Things Zach Shelby, Chief Nerd 1 About Sensinode Vision The Internet of Things (IoT) is the next evolution of the Internet where devices of all types and

More information

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is 1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the

More information

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University A Systems of Systems perspective on The Internet of Things Johan Lukkien Eindhoven University System applications platform In-vehicle network network Local Control Local Control Local Control Reservations,

More information

Security within a development lifecycle. Enhancing product security through development process improvement

Security within a development lifecycle. Enhancing product security through development process improvement Security within a development lifecycle Enhancing product security through development process improvement Who I am Working within a QA environment, with a focus on security for 10 years Primarily web

More information

HC900 Hybrid Controller When you need more than just discrete control

HC900 Hybrid Controller When you need more than just discrete control HC900 Hybrid Controller When you need more than just discrete control Product Brief: Wireless Communications and HC900 Controllers Background: With the introduction of Honeywell s One Wireless network

More information

It's All About HVAC Systems and Saving Big Bucks Using DDC Systems!

It's All About HVAC Systems and Saving Big Bucks Using DDC Systems! Energy-Facilities Connections Conference Leavenworth, Washington It's All About HVAC Systems and Saving Big Bucks Using DDC Systems! May 12 th, 2010 Session 2, 10-11:20 am by Greg Jourdan 1 Agenda-It's

More information

Introduction To Internet Of Things (IoT) and It s Applications. Dr. Raja Vara Prasad ECE Dept. IIIT Chittoor Andhra Pradesh

Introduction To Internet Of Things (IoT) and It s Applications. Dr. Raja Vara Prasad ECE Dept. IIIT Chittoor Andhra Pradesh Introduction To Internet Of Things (IoT) and It s Applications Dr. Raja Vara Prasad ECE Dept. IIIT Chittoor Andhra Pradesh Outlines What is IoT? Why So Important? Benefits with IoT Anything to do With

More information

WHITE PAPER Security in M2M Communication What is secure enough?

WHITE PAPER Security in M2M Communication What is secure enough? WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In

More information

IOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl

IOT the Last Miles. Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl IOT the Last Miles Tze Chiew (PSM) tze.chiew@advantech.nl Jaap Breepoel (FAE) jaap.breepoel@advantech.nl Embedded IoT Solution Embedded IoT Software Remote Management Security OS Intelligent Systems RISC,

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES

5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES White paper 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING PHI ON PORTABLE DEVICES 2016 SecurityMetrics 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES 1 5 TIPS FOR HIPAA COMPLIANT MOBILE DEVICES PROTECTING

More information

Testing the Internet of Things

Testing the Internet of Things Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

UPnP Internet of Things Dec 2014

UPnP Internet of Things Dec 2014 UPnP Internet of Things Dec 2014 Keith Miller Intel Wouter van der Beek Cisco UPnP Internet of Things Task Force 2014 UPnP Forum Overview Scope Architecture Local components description Sensor Management

More information

Internet Gateways. Bluetooth White Paper. Date 2016-Feb-04. Revision v01. Group Prepared By Smart Environment Study Group

Internet Gateways. Bluetooth White Paper. Date 2016-Feb-04. Revision v01. Group Prepared By Smart Environment Study Group Bluetooth White Paper Date 2016-Feb-04 Revision Group Prepared By Smart Environment Study Group Feedback Email smartenv-main@bluetooth.org Abstract: This white paper describes various options available

More information

White Paper: OSGi-based E-Health / Assisted Living

White Paper: OSGi-based E-Health / Assisted Living White Paper: OSGi-based E-Health / Assisted Living Martin Petzold (Project Manager) Phone: +49 (0) 221 6604 405 E-Mail: m.petzold@prosyst.com Konstantin Kersten (Project Manager) Phone: +49 (0) 221 6604

More information

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015 Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers

More information

Simplifying the Global Deployment of Cellular Enabled Products

Simplifying the Global Deployment of Cellular Enabled Products Simplifying the Global Deployment of Cellular Enabled Products 2014 WHO WILL SURVIVE THE DIGITAL REVOLUTION? Those companies who can. Your speakers Jim Dunlap President Jeth Harbinson Vice President, Global

More information

SpiderCloud E-RAN Security Overview

SpiderCloud E-RAN Security Overview SpiderCloud E-RAN Security Overview Excerpt for SpiderCloud Wireless, Inc. 408 East Plumeria Drive San Jose, CA 95134 USA -hereafter called SpiderCloud- Page 1 of 7 Table of Contents 1 Executive Summary...5

More information

An Introduction to the Internet of Things (IoT)

An Introduction to the Internet of Things (IoT) An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E sales@lopezresearch.com W

More information

Thread. Zach Shelby VP Marketing Internet of Things Business Unit. mbed Connect / Shenzhen, China 15 th Dec 2015

Thread. Zach Shelby VP Marketing Internet of Things Business Unit. mbed Connect / Shenzhen, China 15 th Dec 2015 Thread Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 The Need For a New Wireless Network A new era of connected products in homes worldwide Enable

More information

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES

DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES Information Analytics Expertise APRIL 2015 DEFINING THE INTERNET OF THINGS AND IDENTIFYING KEY VERTICAL MARKET OPPORTUNITIES John Byrne, Senior Principal Analyst +1 408 583 3320 John.byrne@ihs.com Internet

More information

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER

Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET

THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET THE CASE FOR M2M DEVICE MANAGEMENT HOW NETWORK OPERATORS CAN HELP BRING M2M TO THE MASS MARKET STRATEGIC WHITE PAPER The machine-to-machine (M2M) industry is focused on extending its reach beyond niche

More information

AT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY

AT&T Digital Life. Home Security and Automation Service. Overview. Service Innovation EXECUTIVE SUMMARY Customer Case Study AT&T Digital Life Home Security and Automation Service EXECUTIVE SUMMARY COMPANY OVERVIEW AT&T is the largest telecom services provider in the world and has a wide range of offerings,

More information

ANTI-COUNTERFEITING HOW TO ADDRESS INTERNET OF THINGS (IOT) FROM A PATENT PERSPECTIVE. www.zacco.com Zacco 2015

ANTI-COUNTERFEITING HOW TO ADDRESS INTERNET OF THINGS (IOT) FROM A PATENT PERSPECTIVE. www.zacco.com Zacco 2015 ANTI-COUNTERFEITING HOW TO ADDRESS INTERNET OF THINGS (IOT) FROM A PATENT PERSPECTIVE 1 www.zacco.com Zacco 2015 Summary Internet of Things is gaining in momentum and the expected growth is paramount both

More information

M2M & Internet of Things Opportunities

M2M & Internet of Things Opportunities M2M & Internet of Things Opportunities The Advent of The Internet of Things Mainframe Minicomputer Desktop PC Internet Mobile Internet (1M+ Units) (10M+ Units) (100M+ Units) (1B+ Units/Users) (3B+ Users)

More information

2016.04.17 Firenze. Iottly, open source Internet of Things distribution

2016.04.17 Firenze. Iottly, open source Internet of Things distribution 2016.04.17 Firenze About me Stefano Terna Technical co-founder @ TomorrowData @stefanoterna stefanoterna stefano.terna@tomorrodata.io About TomorrowData Domain: IoT & Machine Learning for SMEs Open Source:

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

Smart and Connected: Can Machines Exceed Humans? ChipEx 2016, Tel Aviv May 9, 2016

Smart and Connected: Can Machines Exceed Humans? ChipEx 2016, Tel Aviv May 9, 2016 Smart and Connected: Can Machines Exceed Humans? ChipEx 2016, Tel Aviv May 9, 2016 Quiz: What s Common for: 2 Units, Billions Connected Machines: Is it That Simple? Multiple and constantly evolving communication

More information

Internet of Things... Let's Not Forget Security Please!

Internet of Things... Let's Not Forget Security Please! Internet of Things... Let's Not Forget Security Please! Distinguished Engineer Cisco @evyncke Eric Vyncke 2014 Cisco and/or its affiliates. All rights reserved. Cisco Public 1 2014 Cisco and/or its affiliates.

More information

The Internet of Things Wilfrid Laurier University

The Internet of Things Wilfrid Laurier University The Internet of Things Wilfrid Laurier University Wilfrid Laurier University March 11, 2015 Overview Overview? Overview? Overview? Why does one need the other? ? ? Started in about 1950s (USA, DARPA) ?

More information

Intel Remote Keyboard. User Guide

Intel Remote Keyboard. User Guide Intel Remote Keyboard User Guide INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS

More information

SCOTT input. Focus in SCOTT

SCOTT input. Focus in SCOTT SCOTT input Focus in SCOTT 1 SCOTT - our comments! Use cases of interest (harmonisation)! technology blocks (which technologies do we need, and how can they concentrate)! Concepts (secure and distributed

More information

Top 10 Security Checklist for SOHO Wireless LANs

Top 10 Security Checklist for SOHO Wireless LANs Expert Reference Series of White Papers Top 10 Security Checklist for SOHO Wireless LANs 1-800-COURSES www.globalknowledge.com Top 10 Security Checklist for SOHO Wireless LANs David Coleman, AirSpy Networks

More information

Privacy and Security Challenges in Internet of Things Manik Lal Das

Privacy and Security Challenges in Internet of Things Manik Lal Das Privacy and Security Challenges in Internet of Things Manik Lal Das DA-IICT, Gandhinagar Disclaimer Many third party copyrighted material is reused within this talk under the 'fair use' approach, for sake

More information

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE

BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE BLACKJACKING: SECURITY THREATS TO BLACKBERRY DEVICES, PDAS, AND CELL PHONES IN THE ENTERPRISE About the Author. Acknowledgments. Introduction. Chapter 1 Understanding the Threats. Quantifying the Threat.

More information

Enterprise Application Enablement for the Internet of Things

Enterprise Application Enablement for the Internet of Things Enterprise Application Enablement for the Internet of Things Prof. Dr. Uwe Kubach VP Internet of Things Platform, P&I Technology, SAP SE Public Internet of Things (IoT) Trends 12 50 bn 40 50 % Devices

More information

Next Internet Evolution: Getting Big Data insights from the Internet of Things

Next Internet Evolution: Getting Big Data insights from the Internet of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Access Control in Home Networking

Access Control in Home Networking Access Control in Home Networking Jukka Tornberg Helsinki University of Technology jstornbe@cc.hut.fi Abstract The Home Networking is coming more and more popular all the time. In the past, a home network

More information

REASONS TO CHOOSE A SMART ALARM

REASONS TO CHOOSE A SMART ALARM 6 REASONS TO CHOOSE A SMART ALARM INFINITY SYSTEMS CANADA 2 Powering the Connected Home Home security systems are nothing like they used to be. Compared to systems even 10 years old, with limited capabilities

More information

Over-the-Air Software Updates: Deployment Strategies

Over-the-Air Software Updates: Deployment Strategies Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?

More information

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks

More information

Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products

Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products Technical Document - Establishing Wireless Communications with Revolectrix Charge Control Software (CCS) Products Document Updated: September 29, 2014 Written by: Tim Marks, President, FMA, Inc. Introduction

More information

Mobile and Embedded/IoT market Overview and Trends. June 2014

Mobile and Embedded/IoT market Overview and Trends. June 2014 Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum

More information

Advancing Together. Dell IoT Solutions Partner Program Guide. Learn more

Advancing Together. Dell IoT Solutions Partner Program Guide. Learn more Advancing Together Dell IoT Solutions Partner Program Guide Learn more Partner Program Tiers Executive Partner Executive Partners constitute our most strategic partnership tier and have formed the closest

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

Embedded Firmware Diversity for Smart Electric Meters

Embedded Firmware Diversity for Smart Electric Meters Embedded Firmware Diversity for Smart Electric Meters Stephen McLaughlin, Dmitry Podkuiko, Adam Delozier, Sergei Miadzvezhanka, and Patrick McDaniel 1 Smart Meters Electromechanical Smart Meter 2 3 Concerns

More information

ARM mbed IoT Device Platform. November 3 rd, 2014

ARM mbed IoT Device Platform. November 3 rd, 2014 ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the

More information

Industrial IOT Gateway Family Datasheet

Industrial IOT Gateway Family Datasheet Industrial IOT Gateway Family Datasheet GW-Series Overview Samsara IoT gateways securely connect sensor data to the Samsara cloud. All models include WiFi and built-in cellular connectivity, storage, and

More information