CEA-Tech developments for safe and secure IoT ecosystems. Marc Duranton February 20 th,

Size: px
Start display at page:

Download "CEA-Tech developments for safe and secure IoT ecosystems. Marc Duranton marc.duranton@cea.fr. February 20 th, 2015. www.cea.fr"

Transcription

1 CEA-Tech developments for safe and secure IoT ecosystems Marc Duranton February 20 th, 2015

2 Introduction to CEA Tech

3 CEA global organization Military Applications Division (DAM) Nuclear Energy Division (DEN) Technological Research Division (CEA Tech) Materials Sciences Division Life Sciences Division Mission DAM : France s national security independence Mission DEN : France s energy independence Mission DRT : French business economic competitiveness CEA. All rights reserved February

4 Amounts in M CEA Tech: Key figures Annual operating budget > 600 M More than 50 HIGH-TECH START-UP VENTURES over the past 10 years 600 PRIORITY PATENTS applications / year 4,500 EMPLOYEES 500+ CUSTOMERS : CAC 40 and SBF 120 (40%) SMBS and START-UP (45%) A strong growth based on corporate funding External funding CEA funding External funding + 13% / year External funding + 15% / year INTERNATIONAL (15%) Annual Budget CEA. All rights reserved February

5 CEA Tech: Mission Statement Create innovation and transfer it to industry - Main goal: working with and for industry - CEA: state-owned research organization - >80% of our budget comes from RD contracts - Looking for long-term partnerships - Results-oriented : best effort to address partners issues - Project-oriented : reactive and flexible - Making our technology reach the market is our priority - Our concern: seeking fair solutions for both parties CEA. All rights reserved February

6 CEA Tech Research Institutes Laboratory of Electronics and Information Technologies Staff: 1800, Budget: 280 M Laboratory of Integrated Systems and Technologies Staff: 700, Budget: 80 M Laboratoty of Innovation for new Technologies for Energy and Nanomaterial Staff: 1100, Budget: 180 M Solar CEA. All rights reserved February

7 CEA Tech and IoT

8 IoT : Many application domains Smart Cities Smart healthcare Smart Transport Smart Utilities Smart Spaces Smart Shopping istockphoto J.Gallon. Many opportunities CEA. All rights reserved February

9 Source: CISCO, ATT IoT: some figures Cisco predicts 50B of connected object by 2020 X-as-a-service New business models Estimated market value $2 trillion by 2020 Up-to 1 trillion sensors deployed Traffic grows by 25% per year billions Humans Connected objects CEA. All rights reserved February

10 The 4 challenges of IoT: Data deluge Energy consumption Dependability Interoperability

11 The 4 challenges of IoT: Data deluge Energy consumption Dependability Interoperability

12 IoT Challenge #1: Data Deluge Source: Paolo Faraboschi, HP CEA. All rights reserved February

13 Solutions for Data Deluge IoT Challenge #1: Data Deluge New communication protocols Sporadic traffic, asynchronous, decentralized, low power Local based services Indoor ranging, positioning, anchor based/distributed Spectrum harvesting Spectrum scavenging, new bands (millimeter wave, white spaces), coexistence and sharing New Sensors Smart sensors, smart imagers, ultra low power sensor node CEA. All rights reserved February

14 New Communication Protocol Remote Management Security, Protocols, Software update Security within the WSN for connectivity Multi-access support Mobility of WSN Enterprise Cloud Services IP backbone (e.g. Internet) Smart Buidling Smart Home Smart Grid Industrial Networks Low footprint networking and services stacks Low-power radio , IPv6 protocols for low power, robust efficient networking in multi-hop and constrained WSN sensors actuators Make wireless sensor networks easy to deploy, secure and manage In-vehicle WSN Others WiSePRoM components WiSePRoM Software Platform by CEA Tech Wireless IP Sensor Network Protocols and Remote Management CEA. All rights reserved February

15 Power Bandwidth Efficiency Cliquez pour modifier for groupsle of style sensors du / actuators titre Reliability Remote Simultaneous Software Update Runtime, seamless and modular software upgrade framework IPv6 Software Upgrade Server (Linux / Android) Internet/WSN Gateway WSN (6LowPAN) Complement Integrated with ETSI M2M platform (OMA-DM) WSN node Application Software update management Reliable Multicast IPv6 / 6LowPAN MAC + PHY WSN (6LowPAN) WiFi Internet/WSN Gateway (Linux) Internet/WSN Gateway Reliable Multicast IPv6 / 6LowPAN WiSePRoM Unicast UDP IPv6 Reliable multicast Unicast Control server (software update + application server) Application Software update management Unicast UDP IPv MAC + PHY L1+L2 L1+L2 CEA. All rights reserved February

16 Local based services : IR-UWB for localization Track items or individuals within a few centimeters over long ranges SpoonPhone RF IC solution for consumer market Frequency Band 3.2 à 8.8 GHz : 8 channels BW : 500MHz to 1GHz, Data rate up to 5 Mbps Range : up to 2000m, Ranging accuracy <4cm Low Power CEA. All rights reserved February

17 Sigfox : Utra Narrow band radio Provides a unique global cellular connectivity solution, from the customers devices to their software applications RF IC solution for consumer market ISM band 433/868/915 MHz 100 bps to 1kbps Sensitivity -140dBm Global cellular connectivity at low power Can support millions of connected devices CEA. All rights reserved February

18 Spectrum harvesting : High data rate NFC Solution to share and experience content locally with a mobile device Nokia World 11 10s required to download 1 Gigabit of content from battery-less memory tags RF IC solution for consumer market Coupling RFID and IR UWB Data rate from 54 to cm Power consumption : 5mW Low cost CEA. All rights reserved February

19 New sensors Characterization of RFID chips (impedance, sensitivity) at MHz Characterization of specific materials Design and test of custom tag antennas Simulation and characterization of read/write range performances at MHz CEA. All rights reserved February

20 The 4 challenges of IoT: Data deluge Energy consumption Dependability Interoperability

21 Solutions for energy IoT Challenge #2: Energy consumption Energy efficient technology: FDSOI ULP IC design, ULP memories, resistive memories, power management, 3D integration, sense react, optical interposer Energy Efficient server ARM 64 bit, FDSOI, Interposers, Low Power Cyber Physical Systems Low power mixed IC design, adaptive matching technologies, low to zero power devices CEA. All rights reserved February

22 Prototype chip from Beigné, ISSCC 14 IoT Challenge #2: Energy consumption Energy efficient technology: FDSOI UTBB-FDSOI performance gain versus conventional Bulk CMOS technology. Blue: no body biasing, Green: FBB = +1V. Demonstrated by CEA Tech and STMicroelectronics ISSCC 2014 Ultra-Wide Voltage Range (UWVR) operations: VDD=[0.39V 1.3V] High-frequency: Fclk > 1.3V Fclk > 0.39V Fully Depleted Silicon on Insulator Improved performance Improved performance-per-watt Adaption to variability of loads CEA. All rights reserved February

23 ONE STOP SHOP IoT Challenge #2: Energy consumption The Silicon enablement platform model Design Center IPs Services Academics ECO SYSTEM IC DESIGN PLATFORM ACCESS TO ADVANCED IPs EMULATOR TEST PLATFORMS INDUSTRIAL MPW SHUTTLE EXPERTISE SERVICES FOUNDRIES DKs Silicon Manufacturing Industrial needs Ideas Innovative products Testchips Production CHAIN VALUE Pre-series line A single partner along product maturation CEA. All rights reserved February

24 IoT Challenge #2: Energy consumption Energy efficient compute nodes for servers Technology FD-SOI 3D silicon integration 64-bit ARM Cores Interposer Passive or active Mature technology node Application specific Medium volume Cost effective assembly Scalable approach: form micro-servers to HPC CEA. All rights reserved February

25 IoT Challenge #2: Energy consumption Power Cyber Physical Systems Responsive Power-Management Unit (PMU) Configuration Management Unit (CMU) Battery / Energy Harvester Leakage management Responsiveness Wake-up Radio Wake-up Sensors Wake-up Imager Wake-up Timers Wake-up Controller Energy control Authent /Securit y Always-Responsive Sub-system Advanced Programmable Wake-Up features Ultra Low Power Lightweight crypto Event/Energydriven CEA. All rights reserved February

26 Co-processing (RF, crypto, data fusion, imager) IoT Challenge #2: Energy consumption L-iot : a flexible architecture for IoT nodes Power-Management Unit (PMU) Battery / Energy Harvester Configuration Management Unit (CMU) Wake-up Radio Wake-up Sensors Wake-up Imager Wake-up Timers Wake-up Controller Energy control Authent /Securit y Always-Responsive Sub-system CPU (Register) Memory (SRAM envm) MCU Radios Sensors Imager On-Demand Sub-system Adaptive Always-Responsive/On-Demand according to energy levels CEA. All rights reserved February

27 Co-processing (RF, crypto, data fusion, imager) IoT Challenge #2: Energy consumption Flexible Wake-up /On Demand platform Applicative Power-Management Unit (PMU) Configuration Management Unit (CMU) Battery / Energy Harvester Leakage management Responsiveness Application-driven CPU (Register) Radios Processing/Communication power Integrity/Confidentiality Memory (SRAM envm) MCU Sensors Imager On-Demand Sub-system CEA. All rights reserved February

28 IoT Challenge #2: Energy consumption Flexible Wake-up /On Demand platform Adaptive Power-Management Unit (PMU) Configuration Management Unit (CMU) Advanced Power Management Unit Gain: POWER/100 Configuration for adaptivity Energy Harvesting Battery / Energy Harvester Leakage management Responsiveness CEA. All rights reserved February

29 The 4 challenges of IoT: Data deluge Energy consumption Dependability Interoperability

30 IoT Challenge #3: Dependability IoT: the Internet of Threats Today security / privacy issues make the newspaper headlines Massive adoption of IoT by citizens relies on confidence in terms of security and privacy CEA. All rights reserved February

31 IoT Challenge #3: Dependability Most of the IoT nodes are accessible to attackers Implementations must be secured-by-design Memory dump, reverse engineering, side channel analysis, bus probing Trustworthy computing (with software) cannot exist until we have trustworthy hardware to build it on Dr. Dean Collins, Deputy Director, DARPA CEA. All rights reserved February

32 Solutions for Dependability IoT Challenge #3: Dependability Reliability Reliable communication systems for M2M, Privacy and trust. Criticity Real-time OS, dynamic compilation, critical cloud data processing, distributed computing, resource agnostic sensor networks Security Privacy and trust, authentication, scalable secure networks, lightweight crypto, homomorphic cryptocomputing CEA. All rights reserved February

33 1. Security assessment and certification 2. Hardware security for IoT nodes IoT Challenge #3: Dependability CEA Tech solutions for security 3. Secure middleware solutions from sensors to gateways 4. Reliable and secure wired/wireless network technologies 5. Design of large scale deployment secured schemes CEA. All rights reserved February

34 Certification ITSEF: licensed laboratory Common Criteria security evaluations up to the highest Evaluation Assurance Level (EAL7) on electronic components and embedded SW French certification scheme International banking schemes IoT Challenge #3: Dependability Security evaluation and certification Security evaluation of embedded systems Software attacks Physical attacks Domains SmartCard Banking, Pay TV, e-identity Automotive ECUs, body control, motor control CEA. All rights reserved February

35 IoT Challenge #3: Dependability Network security analysis and testing Analyze threats on industrial protocols Detailed analysis of protocol specifications Information system Implement attacks on wired / wireless multi-protocols industrial sensor networks Develop dedicated tools (SW + HW) to perform security tests Build security test-beds Aggregator / Concentrator / Gateway Analyze the criticality of attacks Propose security solutions Adapt existing solutions to match the industrial network context Develop new solutions Sensors CEA. All rights reserved February

36 IoT Challenge #3: Dependability Hardware integration of security Secure design of components and systems Tradeoff Hardware implementation constraints Resistance to attacks Power consumption Size / volume Cost IoT dedicated cryptography Cost effective solution Tamper resistant chip design Ultra low cost pairing CEA. All rights reserved February

37 Strong network security in resources-constrained wireless sensor networks (WSN) interconnected to larger infrastructures Protect the data transmitted Protect the network infrastructure IoT Challenge #3: Dependability Reliable communication systems for M2M Lightweight IP security protocols adapted to the limited resources of WSN (power, CPU, memory ) Remote adaptive management of WSN security Authentication network access control Dynamic key establishment Threat /Intrusion detection mechanisms in WSN Dynamic security adaptation to react to threats Trust management system for WSN Secure software update for WSN Secure, reliable and resource-efficient sensor software update from a remote server Network access control Adaptive Security Management Key Management CEA. All rights reserved February

38 IoT Challenge #3: Dependability Security hardened Cloud system Secure cloud server end-to-end infrastructure prototype. USIM-based authentication and key establishment. HW-assisted on-the-fly memory encryption. By construction: hypervisor out of the TCB. Code data confidentiality integrity. A unique encryption key per VM. HW-assisted task switching. HSM: Hardware Security Module TCB: Trusted CEA. All rights Computing reserved Base February

39 Anaxagoros Hypervisor for mixed criticality apps. Spatial and temporal security. Resource lending as a design principle. «Day one» use of formal verification (Frama-C). Ability to virtualize Linux, OSEK and PharOS. IoT Challenge #3: Dependability Criticity enforcement CEA. All rights reserved February

40 IoT Challenge #3: Dependability Secure Execution with Innovative Security Tradeoff How to be sure that the remote computing platform will not misuse your data? Current idea: a (micro-)processor processes only clear data What if a processor could work directly on encrypted data without having to disclose any secret? This is where the potential of homomorphic encryption emerges CEA. All rights reserved February

41 IoT Challenge #3: Dependability Homomorphic encryption An homomorphic encryption system is a cryptosystem which, on top of allowing to encrypt and decrypt data, allows to perform (any) calculations in the encrypted domain. In essence, the «cryptocomputer»: Keeps its algorithm private. Can insert any (cleartext domain) data into the calculation. Has access to neither intermediate nor final calculations results. Such (secure) cryptosystems have been shown to exists in Although theoretically efficient, the first systems were totally impractical. But now, we are tackling the first real apps! CEA. All rights reserved February

42 The 4 challenges of IoT: Data deluge Energy consumption Dependability Interoperability

43 Solutions for Interoperability IoT Challenge #4: Interoperability Overcome the fragmentation of verticallyoriented closed systems Move towards open systems and platforms that support multiple applications. CEA. All rights reserved February

44 IoT Challenge #4: Interoperability Today: Domain-centric, vertical solutions SmartHome SmartHealth SmartTransport SmartCity SmartShopping - Monitoring medicine intake - Personalized diabetes assistance - Providing training tips - - Managing parking space - Lighting up a city efficiently - Monitoring Air Quality - - Promoting carpooling - Minimizing taxi delays - Avoiding traffic jams - - Monitoring and controlling - Saving energy comfortably - Interacting with appliances -! - Managing sparkdeals - Getting advice on buying goods - Retrieving discount - Illustrations from the EU FP7 BUTLER project CEA. All rights reserved February

45 IoT Challenge #4: Interoperability Tomorrow: Horizontal smart solutions HW/SW platforms Illustrations from the EU FP7 BUTLER project CEA. All rights reserved February

46 IoT Challenge #4: Interoperability Holistic virtualization platforms of the physical world IoT is about managing resources: Network Heterogeneity and variability management Distributed resources (Linc) Device as a Service (SensiNact) LINC Rapid prototyping and deployment: Management of the unexpected Virtual sensors or resources Continuous integration SensiNact Lightweight distributed CEA Tech developed solution Everything-as-a-service approach Fully OSGi compliant CEA. All rights reserved February

47 IoT Challenge #4: Interoperability sensinact Studio sensinact Studio: tool for IoT application development and deployment Deployment View Navigator View Properties View DSL editor Graphical Editor CEA. All rights reserved February

48 CEA-Tech contribution to EU-Japan projects

49 Cliquez EU-Japan pour ICT modifier Cooperation le style du titre Japan and the European Union are two key players in the ICT field IoT will require interoperability Scale of today s global challenges requires that we work together more closely and effectively In conformity with the mutual interests and the research orientation of the EU and Japan Specific actions dedicated to EU-Japan partnership Specific calls for cooperative projects in H2020 CEA. All rights reserved February

50 ClouT: Cloud of Things for empowering Cliquez pour modifier the citizen le clout style in smart du titre cities AT A GLANCE Project coordinator : Clout-EU: Levent Gürgen, CEA, France ClouT-JP: Yoshio Saito, NTT East, Japan Partners: ClouT-EU Engineering, Italy Universidad de Cantabria, Spain ST Microelectronics SRL, Italy Ayuntamiento de Santander, Spain Comune di Genova, Italy ClouT-JP NTT East NTT RD Keio University Panasonic System Solution National Institute of Informatics Duration: 36 months Total cost: 2,32M for ClouT-EU 1,5M for ClouT-JP, funded by NICT Programme: FP7-ICT EU- Japan Further information: Dr Levent Gürgen CEA-LETI CEA. All rights reserved February

51 Introduction to ClouT (Video) CEA. All rights reserved February

52 Cliquez pour modifier le style of du the project titre First reference architecture and its implementation Main achievements at mid-term 10 use cases from 10 application domains Development of field trials in 4 pilot cities CEA. All rights reserved February

53 City Database Map Tourism Citizen Participation Public City Related Company Database NPO HP Event Info. Sensor Info. Camera Camera Database Interactive city Fujisawa Regular Mode Public API Restrant Info. SNS Local SNS Twitter Private Store Info. Coupon Time Sales Sensor Info.. Interactive Street Santander Illumination Sensor Train Info. Input Data from Sensor or Database Data Format Conversion Storage DB Delivery Daytime CautionMode Nighttime RegularMode Like! Info. From Sensor And Citizens Analysis Anonymity Station Enoshima Station Provide appropriate lighting for food and drink Restaurant Day will sink in an hour. Project the description of real time info. on the wall Next Departure Ofuna 15:15 Fujisawa 15:20 Project the production on the table Street Tourist Info. Center RegularMode Shop/Tourism Info. Info. From Citizens Train/Station Info. Project the description Day will sink in an hour. of real time info. on the wall CEA. All rights reserved February

54 City Database Map Tourism Citizen Participation Public City Related Company Database NPO HP Event Info. Sensor Info. Camera Camera Database Interactive city Fujisawa Emergency Mode Public API Restrant Info. SNS Local SNS Twitter Input Data from Sensor or Database Private Store Info. Coupon Time Sales Sensor Info.. Interactive Street Santander Illumination Sensor Train Info. Data Format Conversion Storage DB Delivery Daytime CautionMode Nighttime RegularMode Like! Info. From Sensor And Citizens Analysis Anonimity Station Enoshima Station Provide appropriate lighting for food and drink Restaurant Disaster prevention Weather information Project the description of Emergency info. on the wall Out of Service Hill Project the production on the table Street Tourist Info.Center EmergencyMode Project the description of Emergency info. on the wall Disaster prevention Evacuation Site Hill CEA. All rights reserved February

55 ClouT Architecture Fujisawa Dashboard Virtualized City Resources Recommended View Fuji Mt. and Sunset In 30 min, CEA. All rights reserved February

56 ClouT: use case CEA. All rights reserved February

57 Mitaka Field Trial Scenario Elderly people get information on the application (called Paw Collection ), will go out if they get motivated by the information and write comments for the other users to motivate to go to the place. The other users read comments of the facilities on Paw Collection,that motivates them to go out. Going out support (Health promotion) Community Creation Revitalization Of City Environment Paw Users Beautiful cherry! [STEP1] Write comments Paw) One reaction [STEP4] Watch the Reaction Paw Registration Information (Paw) Reaction (Reaction Paw) New Paw Arrived [STEP2] Notice a paw to user who meets conditions. I visited I took photos too. Paw readers [STEP3] Registered reaction of Paw(user action) as a Reaction Paw CEA. All rights reserved February

58 Paw Collection in Mitaka We inspect how elderly people get motivated to go out by using Paw Collection. (IC-tags installed in 31 facilities in Mitaka City for this trial) We expect the effect such as health promotion, revitalization of the cities by going out. 牟 礼 コミュニティセンタ CEA. All rights reserved February

59 Brand new H2020 project! Santander FEderated interoperable SmarT ICT services development And testing platforms October 2014-September 2017 CEA. All rights reserved February

60 Real-life testbeds, field trials - Japan Large scale experimentation in real-life environments: Osaka train station Smart city, smart building Smaller scale, experimental platform at Osaka and Kansai area Smart POS, smart energy, smart health, smart transport, Osaka Osampo service(isid) CEA. All rights reserved February

61 Conclusion

62 Cliquez Teaming pour modifier EU-JP pour le style IoTdu projets titre CEA Tech is developing innovative solutions covering most aspects of IoT Special focus on low energy and security CEA Tech allows its partners to access new technologies Design center supporting FDSOI technolgy Ultra low power IPs in sensing, computing and communicating Scalable middleware for networks of IoT nodes Secure and trusted solutions including homomorphic encryption Real-Time hypervisor and virtualization for mixed real-time criticality loads CEA Tech is a key player in EU-JAP cooperative projects on 5G, IoT and cloud technologies We wish to reinforce the current cooperation between CEA Tech and Japan with dedicated programs CEA. All rights reserved February

63 Thank you for your attention Centre de Grenoble 17 rue des Martyrs Grenoble Cedex Centre de Saclay Nano-Innov PC Gif sur Yvette Cedex

Secure data processing: Blind Hypervision

Secure data processing: Blind Hypervision Secure data processing: Blind Hypervision P. Dubrulle, R. Sirdey, E. Ohayon, P. Dore and M. Aichouch CEA LIST Contact : paul.dubrulle@cea.fr www.cea.fr Cliquez pour modifier le style Introduction titre

More information

The Internet of Things: Opportunities & Challenges

The Internet of Things: Opportunities & Challenges The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

2015. 9. 17 ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics ARTIK TM The Ultimate Platform Solution for IoT 2015. 9. 17 MyungKoo Kang (VP) Samsung Electronics Future Changes from IoT Privacy in the Web Security in SmartGrill 2 IoT Market Forecast ($T) 7 6 5 4 3

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Internet of Things 2015/2016

Internet of Things 2015/2016 Internet of Things 2015/2016 The Things Johan Lukkien John Carpenter, 1982 1 What makes up the IoT? IoT versus WSN What are examples? Guiding questions 2 Some definitions of IoT (march 2015) Whatis.com:

More information

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs

15 th TF-Mobility Meeting Sensor Networks. Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs 15 th TF-Mobility Meeting Sensor Networks Torsten Braun Universität Bern braun@iam.unibe.ch www.iam.unibe.ch/~rvs Overview 2 Ubiquitous Computing > Vision defined by Mark Weiser in 1991 Seamless integration

More information

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya dev_bhattacharya@ieee.org Internet of things (IOT) applications covering industrial domain Dev Bhattacharya dev_bhattacharya@ieee.org Outline Internet of things What is Internet of things (IOT) Simplified IOT System Architecture

More information

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing www.internet-of-things-research.eu IERC Internet of Things, 5G, Big Smart Data Interplay The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing 01 st July 2015, Paris,

More information

Smart Systems: the key enabling technology for future IoT

Smart Systems: the key enabling technology for future IoT Smart Systems: the key enabling technology for future IoT Roberto Zafalon Technology Programmes, Director R&D and Public Affairs, Italy STMicroelectronics IoT Large Scale Pilots Brokerage Workshop London

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

Leveraging Multi Domain Links via the Internet of Things

Leveraging Multi Domain Links via the Internet of Things Leveraging Multi Domain Links via the Internet of Things Towards horizontal integration of vertical pilots A. Andrushevich, B. Copigneaux, R. Kistler, A. Kurbatski, F. Le Gall, A. Klapproth rusmart 2013,

More information

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich

End-to-End Security in Wireless Sensor Networks (WSNs) Talk by Claudio Anliker Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich End-to-End Security in Wireless Sensor (WSNs) Talk by Supervised by Dr. Corinna Schmitt CSG@IFI, University of Zurich Content 1. Motivation 2. Security Issues and Principles 3. Internet-of-Things and Wireless

More information

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS

Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Marko Hännikäinen Tampere University of Technology IoT week 17.6.2013 CLOUD-BASED SERVICE PLATFORM FOR WIRELESS SENSOR NETWORKS Outline The WAPS project Development steps 1. Low-power wireless sensor networks

More information

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology

VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Implementation of Wireless Gateway for Smart Home

Implementation of Wireless Gateway for Smart Home Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang

More information

Internet of Things based approach to Agriculture Monitoring

Internet of Things based approach to Agriculture Monitoring Internet of Things based approach to Agriculture Monitoring A. Paventhan ERNET India Regional Centre, Bangalore Asia-Pacific Advanced Network (APAN) 36th Meeting 20th August 2013 1 / 19 Outline 1 IP-based

More information

NVM memory: A Critical Design Consideration for IoT Applications

NVM memory: A Critical Design Consideration for IoT Applications NVM memory: A Critical Design Consideration for IoT Applications Jim Lipman Sidense Corp. Introduction The Internet of Things (IoT), sometimes called the Internet of Everything (IoE), refers to an evolving

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Thingsquare Technology

Thingsquare Technology Thingsquare Technology Thingsquare connects smartphone apps with things such as thermostats, light bulbs, and street lights. The devices have a programmable wireless chip that runs the Thingsquare firmware.

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Applied and Integrated Security. C. Eckert

Applied and Integrated Security. C. Eckert Applied and Integrated Security 1 Joseph von Fraunhofer (1787-1826) Researcher discovery of Fraunhofer Lines in the sun spectrum Inventor new methods of lens processing Entrepreneur head of royal glass

More information

Introduction to Silicon Labs. November 2015

Introduction to Silicon Labs. November 2015 Introduction to Silicon Labs November 2015 1 Company Background Global mixed-signal semiconductor company Founded in 1996; public since 2000 (NASDAQ: SLAB) >1,100 employees and 11 R&D locations worldwide

More information

920MHz Band Multi-hop Wireless Network System

920MHz Band Multi-hop Wireless Network System 920MHz Band Multi-hop Wireless Network System Hiroshi Hashizume Motohiro Inokuma Masayuki Suto Shigeru Fukunaga Motoharu Kawanishi One policy aimed at the growth of OKI Group is the development of a smart

More information

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products.

M2M I/O Modules. To view all of Advantech s M2M I/O Modules, please visit www.advantech.com/products. M2M I/O Modules 14 M2M I/O Modules Overview 14-2 M2M I/O Modules Selection Guide 14-6 ADAM-2510Z Wireless Router Node 14-8 ADAM-2520Z Wireless Modbus RTU Gateway 14-9 ADAM-2031Z ADAM-2632Z ADAM-2017Z ADAM-2018Z

More information

Maximizing Range and Battery Life in Low-Cost Wireless Networks

Maximizing Range and Battery Life in Low-Cost Wireless Networks Maximizing Range and Battery Life in Low-Cost Wireless Networks The proliferation of cost-effective wireless technology has led to the rise of entirely new types of networks across a wide range of applications

More information

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M?

M 2 M IWG. Eclipse, M2M and the Internet of Things. Overview. M 2 M Industry WorkGroup! M2M? M 2 M IWG Eclipse, M2M and the Internet of Things Overview M2M? Technology that supports wired or wireless communication between machines. (TechTarget) M2M Market Opportunity Key Trends 1. New connected

More information

The Internet of Things (IoT)

The Internet of Things (IoT) The Internet of Things (IoT) The New New Thing October 2014 Smart Planet Green Environment Environmental Sensors Water, power leak detection Pollution, weather monitoring Smart Cities Connected Communities

More information

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ

LoRa FAQs. www.semtech.com 1 of 4 Semtech. Semtech Corporation LoRa FAQ LoRa FAQs 1.) What is LoRa Modulation? LoRa (Long Range) is a modulation technique that provides significantly longer range than competing technologies. The modulation is based on spread-spectrum techniques

More information

NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK

NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK NanopowerCommunications: Enabling the Internet of Things OBJECTS TALK When objects can both sense the environment and communicate, they become tools for understanding complexity and responding to it swiftly.

More information

Home Passport Gateway Series Simplify your Life with Smart Solutions

Home Passport Gateway Series Simplify your Life with Smart Solutions Home Passport Gateway Series Simplify your Life with Smart Solutions HPGW Series - Home Passport Gateway Series HPGW Series is Home Passport Gateway, representing a breakthrough product in the intrusion

More information

Reducing Configuration Complexity with Next Gen IoT Networks

Reducing Configuration Complexity with Next Gen IoT Networks Reducing Configuration Complexity with Next Gen IoT Networks Orama Inc. November, 2015 1 Network Lighting Controls Low Penetration - Why? Commissioning is very time-consuming & expensive Network configuration

More information

IPv6 Based Sensor Home Networking

IPv6 Based Sensor Home Networking KRNET 2005 IPv6 Based Sensor Home Networking KRNET 2005 Soohong Daniel Park Mobile Platform Laboratory, SAMSUNG Electronics. soohong.park@samsung.com KRNET 2005 2/29 Trend of Home Networking Digital World

More information

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015 Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers

More information

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0 LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does

More information

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC As wireless standards develop and IPv6 gains widespread adoption, more and more developers are creating smart devices

More information

Security Threats on National Defense ICT based on IoT

Security Threats on National Defense ICT based on IoT , pp.94-98 http://dx.doi.org/10.14257/astl.205.97.16 Security Threats on National Defense ICT based on IoT Jin-Seok Yang 1, Ho-Jae Lee 1, Min-Woo Park 1 and Jung-ho Eom 2 1 Department of Computer Engineering,

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

11 Internet of Things (IoT) Protocols You Need to Know About

11 Internet of Things (IoT) Protocols You Need to Know About 11 Internet of Things (IoT) Protocols You Need to Know About by RS Components There exists an almost bewildering choice of connectivity options for electronics engineers and application developers working

More information

A G E N D A I O T P R E S S T O U R

A G E N D A I O T P R E S S T O U R I O T P R E S S T O U R A G E N D A _ Introduction Opening What is IoT The IoT Market _ AVM Strategy What does IoT mean to Avnet Memec? Where does Avnet Memec fit? _ AVM Solutions _ What s Next _ Summary

More information

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things

Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Connecting IPv6 capable Bluetooth Low Energy sensors with the Internet of Things Johanna Nieminen (Nokia), Future Internet SHOK preconference 30.05.2012 IoT Taxonomy ZigBee 802.5.4 Bluetooth Video RFID

More information

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China

IoT: New Opportunities for Semiconductor Industry Growth. Andrew C. Russell Vice President Marketing Greater China IoT: New Opportunities for Semiconductor Industry Growth Andrew C. Russell Vice President Marketing Greater China Agenda The Internet of Things ( IoT ): An Exciting, Disruptive Technology and Application

More information

Hardware Acceleration for Just-In-Time Compilation on Heterogeneous Embedded Systems

Hardware Acceleration for Just-In-Time Compilation on Heterogeneous Embedded Systems Hardware Acceleration for Just-In-Time Compilation on Heterogeneous Embedded Systems A. Carbon, Y. Lhuillier, H.-P. Charles CEA LIST DACLE division Embedded Computing Embedded Software Laboratories France

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

Mobile and Embedded/IoT market Overview and Trends. June 2014

Mobile and Embedded/IoT market Overview and Trends. June 2014 Mobile and Embedded/IoT market Overview and Trends June 2014 2 Ubiquitous Connectivity Quantified Self Ultra HD Media Streaming Global Wireless Broadband Wearables 3 Contactless Payments Wearable Momentum

More information

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy

INTRODUCTION TO WIRELESS SENSOR NETWORKS. Marco Zennaro, ICTP Trieste-Italy INTRODUCTION TO WIRELESS SENSOR NETWORKS Marco Zennaro, ICTP Trieste-Italy Wireless sensor networks A Wireless Sensor Network is a self-configuring network of small sensor nodes communicating among themselves

More information

Short range low power wireless devices and Internet of Things (IoT)

Short range low power wireless devices and Internet of Things (IoT) Short range low power wireless devices and Internet of Things (IoT) White paper Author Mats Andersson Senior Director Technology, Product Center Short Range Radio, u-blox Abstract This paper discusses

More information

CEA LIST activity on Cable Monitoring and Diagnosis

CEA LIST activity on Cable Monitoring and Diagnosis CEA LIST activity on Cable Monitoring and Diagnosis Contact : Mr Josy COHEN Responsable de projet ingénieur chercheur Josy.cohen@cea.fr +33 1 69 08 78 07 www.cea.fr Cliquez CEA pour experience modifier

More information

Get the best performance from your LTE Network with MOBIPASS

Get the best performance from your LTE Network with MOBIPASS Get the best performance from your LTE Network with MOBIPASS The most powerful, user friendly and scalable enodeb test tools family for Network Equipement Manufacturers and Mobile Network Operators Network

More information

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China

NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China NXP and the Internet of Things ( IoT ) Andrew C. Russell VP Marketing Greater China Agenda The Internet of Things ( IoT ): a New and Exciting Application Space A typical IoT application Lighting for Home

More information

ZigBee Technology Overview

ZigBee Technology Overview ZigBee Technology Overview Presented by Silicon Laboratories Shaoxian Luo 1 EM351 & EM357 introduction EM358x Family introduction 2 EM351 & EM357 3 Ember ZigBee Platform Complete, ready for certification

More information

Making Sense of Internet of Things Protocols and Implementations

Making Sense of Internet of Things Protocols and Implementations Making Sense of Internet of Things Protocols and Implementations Author: Kim Rowe, RoweBots Higher level protocols for Internet of Things have various features and offer different capabilities. Most of

More information

Propsim enabled Mobile Ad-hoc Network Testing

Propsim enabled Mobile Ad-hoc Network Testing www.anite.com Propsim enabled Mobile Ad-hoc Network Testing Anite is now part of Keysight Technologies Lab-based, end-to-end performance testing of systems using Propsim MANET channel emulation A Mobile

More information

Using RFID Techniques for a Universal Identification Device

Using RFID Techniques for a Universal Identification Device Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,

More information

ARM mbed IoT Device Platform. November 3 rd, 2014

ARM mbed IoT Device Platform. November 3 rd, 2014 ARM mbed IoT Device Platform November 3 rd, 2014 1 The Big Picture What? At TechCon 2014 we announced the ARM mbed IoT Device Platform consisting of: An expanded partner ecosystem spanning silicon to the

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

Key Challenges in Cloud Computing to Enable Future Internet of Things

Key Challenges in Cloud Computing to Enable Future Internet of Things The 4th EU-Japan Symposium on New Generation Networks and Future Internet Future Internet of Things over "Clouds Tokyo, Japan, January 19th, 2012 Key Challenges in Cloud Computing to Enable Future Internet

More information

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection WHITE PAPER WEP Cloaking for Legacy TM Encryption Protection Introduction Wired Equivalent Privacy (WEP) is the encryption protocol defined in the original IEEE 802.11 standard for Wireless Local Area

More information

www.mindteck.com 6LoWPAN Technical Overview

www.mindteck.com 6LoWPAN Technical Overview www.mindteck.com 6LoWPAN Technical Overview 6LoWPAN : Slide Index Introduction Acronyms Stack Architecture Stack Layers Applications IETF documents References Confidential Mindteck 2009 2 6LoWPAN - Introduction

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research

The Wireless World - 5G and Beyond. Björn Ekelund Ericsson Research The Wireless World - 5G and Beyond Björn Ekelund Ericsson Research 9X Mobile data Traffic by 2020 Monthly consumption per device type 2014 2020 4.2 GB 17.3 GB 1.9 GB 8.4 GB 1.0 GB 4.9 GB Ericsson Internal

More information

A Transport Protocol for Multimedia Wireless Sensor Networks

A Transport Protocol for Multimedia Wireless Sensor Networks A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless

More information

«A 32-bit DSP Ultra Low Power accelerator»

«A 32-bit DSP Ultra Low Power accelerator» «A 32-bit DSP Ultra Low Power accelerator» E. Beigné edith.beigne@cea.fr CEA LETI MINATEC, Grenoble, France www.cea.fr Low power SOC challenges : Energy Efficiency Fine-Grain AVFS solutions FDSOI technology

More information

Triathlon of Lightweight Block Ciphers for the Internet of Things

Triathlon of Lightweight Block Ciphers for the Internet of Things NIST Lightweight Cryptography Workshop 2015 Triathlon of Lightweight Block Ciphers for the Internet of Things Daniel Dinu, Yann Le Corre, Dmitry Khovratovich, Leo Perrin, Johann Großschädl, Alex Biryukov

More information

The ebbits project: from the Internet of Things to Food Traceability

The ebbits project: from the Internet of Things to Food Traceability The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella

More information

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application Introduction Security continues to be a hot topic in all areas of technology, including machine-tomachine (M2M) applications.

More information

Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications. Centre for Wireless Communications University of Oulu, Finland

Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications. Centre for Wireless Communications University of Oulu, Finland Two Novel Technologies Enabling IoT: Mobile Clouds and Visible Light Communications Marcos Katz Centre for Wireless Communications University of Oulu, Finland Introduction: Internet of Things (IoT) What

More information

Wireless Day / Night Cloud Camera TV-IP751WIC (v1.0r)

Wireless Day / Night Cloud Camera TV-IP751WIC (v1.0r) (v1.0r) TRENDnet s Wireless Day / Night Cloud Camera, model, takes the work out of viewing video over the internet. Previously to view video remotely, users needed to perform many complicated and time

More information

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware

INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware 1 INTERNET OF THE THINGS (IoT): An introduction to wireless sensor networking middleware Dr Antoine Bagula ISAT Laboratory, University of Cape Town, South Africa Goal of the lecture 2 The lecture intends

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols.

Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. 1 LCA Easy-Flow: Comparing and integrating Wireless and PLC Medium Access Control Protocols. Christina Vlachou, Julien Herzen, Patrick Thiran (EPFL) Marc Sommer, Hervé Dedieu (HEIG-VD) Gérôme Bovet, Jean

More information

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

WIND RIVER INTELLIGENT DEVICE PLATFORM XT WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but

More information

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities

Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities Session S14: Safeguards Needs at Geological Repositories and Encapsulation Facilities Secure and Reliable Wireless Communications for Geological Repositories and Nuclear Facilities Richard E. Twogood Dirac

More information

Growth through partnerships and licensing technologies

Growth through partnerships and licensing technologies Growth through partnerships and licensing technologies Standards support Innovation Jens N. Albers, CEO AIM-D board member International Conference on Standardization and Innovation @ CERN, Geneva Overview

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Coherent sub-thz transmission systems in Silicon technologies: design challenges for frequency synthesis

Coherent sub-thz transmission systems in Silicon technologies: design challenges for frequency synthesis Coherent sub-thz transmission systems in Silicon technologies: design challenges for frequency synthesis Alexandre Siligaris www.cea.fr Cliquez pour modifier le style du Outline titre Introduction-context

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Cisco Aironet 1520 Series Lightweight Outdoor Access Points

Cisco Aironet 1520 Series Lightweight Outdoor Access Points . Data Sheet Cisco Aironet 1520 Series Lightweight Outdoor Access Points Outdoor Access Points Flexible, Secure Mesh Platform for Demanding Environments Self-configuring and self-healing mesh in response

More information

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions

Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions Supporting Municipal Business Models with Cisco Outdoor Wireless Solutions EXECUTIVE SUMMARY Outdoor wireless networks are playing a vital role in helping municipalities deliver critical services to citizens.

More information

Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE

Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Sensing, monitoring and actuating on the UNderwater world through a federated Research InfraStructure Extending the Future Internet SUNRISE Grant Agreement number 611449 Announcement of the Second Competitive

More information

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战

Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Mobile Cloud Computing: Paradigms and Challenges 移 动 云 计 算 : 模 式 与 挑 战 Jiannong Cao Internet & Mobile Computing Lab Department of Computing Hong Kong Polytechnic University Email: csjcao@comp.polyu.edu.hk

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.

M2M Communications and Internet of Things for Smart Cities. Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom. M2M Communications and Internet of Things for Smart Cities Soumya Kanti Datta Mobile Communications Dept. Email: Soumya-Kanti.Datta@eurecom.fr WHAT IS EURECOM A graduate school & research centre in communication

More information

Short-range Low Power Wireless Devices and Internet of Things (IoT)

Short-range Low Power Wireless Devices and Internet of Things (IoT) Short-range Low Power Wireless Devices and Internet of Things (IoT) Mats Andersson, CTO, connectblue Phone: +46 40 630 71 00 Email: mats.andersson@connectblue.com Web: www.connectblue.com Version 1.1 February

More information

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description

More information

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments

ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Call 5 NCP briefing 12th May 2009 ICT WP 09-10 Obj. 1.3 Internet of Things and Enterprise Environments Peter Friess, Project officer, Head of Cluster Alain Jaume, Deputy Head of Unit D4 Cristina Martinez,

More information

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008

RFID Tags. Prasanna Kulkarni Motorola. ILT Workshop Smart Labels USA February 21, 2008 RFID Tags Prasanna Kulkarni Motorola ILT Workshop Smart Labels USA February 21, 2008 Agenda RFID tags Brief overview Roadmap of key attribute needs Existing tag technologies Emerging tag technologies Critical

More information

Wireless Technologies for the 450 MHz band

Wireless Technologies for the 450 MHz band Wireless Technologies for the 450 MHz band By CDG 450 Connectivity Special Interest Group (450 SIG) September 2013 1. Introduction Fast uptake of Machine- to Machine (M2M) applications and an installed

More information

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices

Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Service and Resource Discovery in Smart Spaces Composed of Low Capacity Devices Önder Uzun, Tanır Özçelebi, Johan Lukkien, Remi Bosman System Architecture and Networking Department of Mathematics and Computer

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Reti wireless in banda ISM e complementarieta con le reti cellulari

Reti wireless in banda ISM e complementarieta con le reti cellulari www.telit.com Reti wireless in banda ISM e complementarieta con le reti cellulari Milano: 15 giugno 2010 sergio.sciarmella@telit.com M2M Market potential is huge White Goods, HVAC, Smart Grids/AMM Industrial/Park/Building/Stores/Home

More information

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology

More information

Developments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL

Developments in 900 MHz wireless connectivity systems. Guido Dolmans Holst Centre / Imec-NL Developments in 900 MHz wireless connectivity systems Guido Dolmans Holst Centre / Imec-NL 3 HOLST CENTRE PROJECTS SUB-GHZ NUTSHELL 900 MHz UHF RFID European project Pasteur for sensor-enhanced RFID for

More information

The Impact of IoT on Semiconductor Companies

The Impact of IoT on Semiconductor Companies Advisory The Impact of IoT on Semiconductor Companies Rajesh Mani Director, Strategy and Operations April 15, 2015 The Internet of Things (IoT) has been defined in multiple ways here s our take! The collection

More information

Key Priorities for Sub-GHz Wireless Deployment

Key Priorities for Sub-GHz Wireless Deployment Key Priorities for Sub-GHz Wireless Deployment Silicon Laboratories Inc., Austin, TX Introduction To build an advanced wireless system, most developers will end up choosing between two industrial, scientific

More information

European Commission - DG CONNECT E1 Deputy Head of Unit "Network Technologies"

European Commission - DG CONNECT E1 Deputy Head of Unit Network Technologies Internet of Things Smart Appliances Workshop 27 May, Brussels Bernard BARANI European Commission - DG CONNECT E1 Deputy Head of Unit "Network Technologies" "The views expressed in this presentation are

More information

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS

PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS PKI: THE SECURITY SOLUTION FOR THE INTERNET OF THINGS TABLE OF CONTENTS 2 EXECUTIVE SUMMARY 3 THE EMERGENCE OF THE INTERNET OF THINGS 4 SECURITY RISKS IN NETWORKED DEVICES 6 PKI S FOUNDATION OF STRONG

More information

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013

WiLink 8 Solutions. Coexistence Solution Highlights. Oct 2013 WiLink 8 Solutions Coexistence Solution Highlights Oct 2013 1 Products on market with TI connectivity 2004 2007 2009-11 2013 Use cases: BT voice, WLAN data Features: TDM based operation Strict protection

More information