The Internet of Things:



Similar documents
Safeguards and Security

Advanced Safeguards Measurement, Monitoring and Modelling Laboratory (AS3ML) at JRC-ITU-Ispra

FORRESTER CONSULTING INTERNET OF THINGS SURVEY - KEY FINDINGS. Building Value from Visibility: 2012 Enterprise Internet of Things Adoption Outlook

Business models in the Internet of Things. Miriam Cordero Head of Strategy - BT

RFID System Description for Logistics & Inventory

A Modern Process Automation System Offers More than Process Control. Dick Hill Vice President ARC Advisory Group

Security for Railways and Metros

Future Directions for Internet of Things Work

How To Use Big Data Effectively

The Internet of Things From a User Perspective: Enhancing user experience in networks with multiple devices

Internet of Things: Consumerisation of Technology.

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Performance Evaluation of a UWB-RFID System for Potential Space Applications Abstract

Nuclear Security Glossary

Growth through partnerships and licensing technologies

Science/Safeguards and Security. Funding Profile by Subprogram

Applying ICT and IoT to Multifamily Buildings. U.S. Department of Energy Buildings Interoperability Vision Meeting March 12, 2015 Jeff Hendler, ETS

NATIONAL NUCLEAR SECURITY ADMINISTRATION

Overview of Nuclear Detection Needs for Homeland Security. Abstract

International Safeguards Infrastructure Development

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

RFID: The Solution to Automating IT & Data Center Asset Management

Factories of the Future Horizon 2020: LEIT ICT WP FoF : Digital Automation

Use of electronic seals and remote data transmission to increase the efficiency of safeguards applied in a static Plutonium store

How To Develop An Open Play Context Framework For Android (For Android)

Overview of US and UK Cooperation to Address Technical Challenges in Verification of Nuclear Disarmament

Environmental IT Monitoring for serious professionals Detects all risks instant alerting ingeniously simple

Kepware Whitepaper. Enabling Big Data Benefits in Upstream Systems. Steve Sponseller, Business Director, Oil & Gas. Introduction

Ahead of the Curve with Intelligent. Transportation

WHITE PAPER ON. Operational Analytics. HTC Global Services Inc. Do not copy or distribute.

The Internet of Things

IoT Solutions for Upstream Oil and Gas

HARDCAT SABRE IS A COMPLETE END TO END LAW ENFORCEMENT INFORMATION MANAGEMENT SYSTEM

Enterprise Application Enablement for the Internet of Things

Affordable Building Automation System Enabled by the Internet of Things (IoT)

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

CYBER PHYSICAL IIS

The Industrial Internet of Things. Overcoming Adoption Challenges to Release the Value Within IIoT

Data Analytics. How Operational Analytics can transform the grid. Sameer Tiku. Product Architect. Bentley Systems

Evangelos Kranakis, School of Computer Science, Carleton University, Ottawa 1. Network Security. Canada France Meeting on Security, Dec 06-08

Cosmic Ray Muon Scattering Tomography for Security Applications

Emerging Technologies in Healthcare:

Biorepository and Biobanking

SiteSense Equipment Tracking

Smarter Nuclear Power: Using a Maturity Model to Help Prepare for the Nuclear Renaissance

Factories of the Future Horizon 2020: LEIT ICT WP FoF : Digital Automation

Leveraging Network Infrastructure to Bring Critical Information to Users

The IT Guide to RFID Solutions for Schools. UHF RFID Technology: The Basics. The Technology, Applications, and Benefits

Integrating Physical Protection and Cyber Security Vulnerability Assessments

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

An Introduction to the Internet of Things (IoT)

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Spreading the Word on Nuclear Cyber Security

TRANSITION- WORKS SOLUTIONS

Reconfigurable System-on-Chip Design

Data Security Concerns for the Electric Grid

The Smarter Way to Build the Internet of Everything

InfraStruxure Management Software

Mobile Commerce and Ubiquitous Computing. Chapter 6

The Analytics Value Chain Key to Delivering Value in IoT

Internet of Things for Smart Crime Detection

ERÖFFNUNG DES INNOVATIONSZENTRUMS ADAPTSYS

Radiological Assessment Display and Control System

Big Data Analytics and its Impact on Supply Chain Management

ICT deployment status in factory and development trend under the concept of Industry 4.0

IPSC Institute for the Protection and Security of the Citizen. Stephan Lechner IPSC Director

Design for Management Information System Based on Internet of Things

The ebbits project: from the Internet of Things to Food Traceability

Security for the Internet of Things

Management and Interpretation of Real-time Data Collected by US EPA s Environmental Air Radiation Monitoring Network (RadNet)

APPENDIX B ABOUT U.S. CUSTOMS AND BORDER PROTECTION: MISSION AND CORE VALUES

Panel Session: Lessons Learned in Smart Grid Cybersecurity

Development and Outlook of Internet of Things in China. CATR of MIIT June 5, 2012

INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology

SCADA System Overview

Iknaia Asset and Personnel Tracking Management System for the Healthcare Industry

Infinite Integration: Unlocking the Value of Enterprise Asset Management through Technology Integration May 2010

Transcription:

The Internet of Things: Revolutionizing the Next Generation of Safeguards and Arms Control Verification KIT CONKLIN GLOBAL SECURITY TECHNOLOGY & POLICY PACIFIC NORTHWEST NATIONAL LABORATORY 1

Introduction Key Challenge Integrating cyber and physical capabilities Objective Internet of Things Introduce a new concept that could transform the way we think about safeguards and, eventually, arms control verification. Areas Examined Nuclear Safeguards Arms Control Verification Photo: PNNL - PACRAT 2

Scene Setter: Internet of Things (IOT) What is IOT? Ubiquitous network of remote monitoring sensors capable of thinking, feeling, and talking to each other. Context-aware computing Smart Homes & Grid Goal: Centralized application capable of monitoring and controlling all aspects of a home s security, entertainment, energy, and communications systems. Apply the IOT concept to nuclear safeguards and arms control verification. Photo: General Electric Reports & Visualizations http://www.gereports.com/ges-ces-debut-smart-homes-evs-aninteractive-desert-quest/ 3

Areas Examined: IAEA Safeguards Safeguards Objectives: Timely detection of diversion of significant quantities of nuclear material Deterrence of such diversion by the risk of early detection Challenges Nuclear Renaissance Stagnant IAEA budget: IAEA Needs 2013-14: 0.3% real increase 2015: zero real growth vs. 14 Regime transition: criteria-based information-driven Continued development of remote monitoring systems Improve inspection efficiency Increase analytical capabilities Cyber Security Safeguards By Design Understand cyber security threats 4

IOT-based Applications Centralized Remote Monitoring Capabilities Containment and Surveillance, Environmental Sampling, Nuclear Material Accountancy and Control Real-time facility and state-level bulk nuclear materials monitoring Networked, Facility-level Smart Sensors: Volume/density, flows, scales, distributed measurement of radiation levels, liquid presence detection, asset control, etc. Pioneer Systems Already Exist IOT is not reinventing the wheel. It s just connecting the wheel to the axel, transmission, engine, breaks, and steering column. 5

IOT Pioneers Generations of IOT Supply Chain Surveillance Remote Monitoring and Control Radio Frequency Identification (RFID) Smart Tags Canisters of Nuclear Material Give IAEA data on all canisters, not just a few. K-Area Material Storage (KAMS) Facility at Savannah River Site Monitor shock, drum-lid closure, temperature, radiation levels. Multi-sensor Data Fusion Unattended cylinder verification station Improved plutonium canister assay systems (ipcas) Photo: Yung Liu, Packaging Certification and Life-cycle Management, Argonne National Laboratory http://www.dis.anl.gov/projects/rfid.html 6

Initial Findings Improved Inspection Efficiency Continuous and secure real-time data could lower number of required inspections. Lower time needed in-facility. Increased Analytical Efficiency Analysts: Improved access to facility data, NM location, etc. Expedited processing Improved Systems Security Trigger things to turn on and off in response to an event. Automated alerts if seals/sensors/cameras detect an anomaly. 7

Technical Readiness Levels Today TRL 1-2: Basic principles observed and tools being developed for simulation and analysis Focus on safeguards Research flexibility Supports immediate need Planned Next Steps Proof of Concept verification Begin applied Arms Control Verification research once safeguards concepts are demonstrated in a prototype environment Photo: IAEA http://www.iaea.org/technicalcooperation/mulitmedia/pod casts-radio/ 8

Areas Examined: Arms Control Verification Information Age Paradigm Shift Data Creation & Security Near-term Applications Chain of Custody Monitoring Fission Product Tagging Behavior Monitoring Future Treaties Cells-based Approach Identity Verification Systems Remote Control of Distant Objects Photo: U.S. Embassy Beijing - Department of State http://iipdigital.usembassy.gov/st/english/inbrief/2013/09/20130919283 179.html#axzz2n6JmiYov 9

Challenges Data Issues Security: Data integrity throughout the monitoring, converting, reporting, and storage processes Stovepipes: Surveillance systems, radiation detectors, barcode readers, electronic scales, applicationprogramming interface (API), time synchronization, and continuous data flows Big Data: What do we do with data? On-site/remote station/iaea HQ? Information Barriers Photo: PNNL Radiological Detection and Nuclear Sciences Group http://www.technet.pnnl.gov/sensors/nuclear/projects/es4infobar.stm Protect proprietary/sensitive info Compartmentalization 10

Conclusions: A New Age Paradigm Shift Inspection-based vs. Information Driven Connecting Cyber & Physical Transitional Period Technology is outpacing policy Tremendous opportunities Questions Remain Can the IOT concept be applied to other nonproliferation and arms control problem spaces? Photo: PNNL 11