Wireless Sensors for IOT s

Size: px
Start display at page:

Download "Wireless Sensors for IOT s"

Transcription

1 Track 4 - Session 8 - Wireless Sensors Wireless Sensors for IOT s Jeff Johnson Naval District Washington CIO August [XX], 2017 Tampa Convention Center Tampa, Florida

2 Advantages of Wireless Communication Any data or information can be transmitted faster and with a high speed Maintenance and installation is less cost for these networks IOT devices are using wireless as a means of a more ubiquitous sensor environment Energy Exchange: Connect Collaborate Conserve 2

3 Disadvantages of Wireless Communication An unauthorized person can easily capture the wireless signals which spread through the air. It is important to secure the wireless devices so that the information cannot be misused by unauthorized users Accrediting authority must consider data and security risks as part of the overall design, as wireless may open backdoors to other network devices Energy Exchange: Connect Collaborate Conserve 3

4 Astrolavos Lab What is the problem with IOT? Credit: Manos Antonakakis, PhD Assistant Professor, ECE, Georgia Tech 4

5 DISA STIG Requirements If Wireless devices transmit unclassified DoD data, then they must use FIPS validated cryptographic modules for data in transit. FIPS validation provides assurance that the cryptographic modules are implemented correctly and resistant to compromise. Failure to use FIPS validated cryptographic modules makes it more likely that sensitive DoD data will be exposed to unauthorized people. NOTE: This does not apply to Wireless telemetry sensor data where the accrediting authority has determined the data is not sensitive. Navy Authority: Avoid non-compliant solutions and utilize the approved NAVY architecture ; we have to manage risk and this is an area where we have to wisely prevent the introduction of unnecessary risk. Energy Exchange: Connect Collaborate Conserve 5

6 Bluetooth A Bluetooth technology is a high speed low powered wireless technology link that is designed to connect devises. It uses a low power radio devices that transmits over short distance ( around 30 feet). It is achieved by embedded low cost transceivers into the devices. It utilizes frequency band of 2.45GHz. Bluetooth can connect up to eight devices simultaneously and each device offers a unique 48 bit address with the connections being made point to point or multipoint. History Of Bluetooth: Bluetooth wireless technology was named after a Danish Viking and King, Harald Blatand; his last name means Bluetooth in English. He united Denmark and Norway, just as Bluetooth wireless technology unites disparate devices. Energy Exchange: Connect Collaborate Conserve 6

7 Zigbee A high-level communication protocols used to create networks with small, low-power radios such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for projects which need wireless connection. The technology is intended to be simpler and less expensive than bluetooth or WiFi. Applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment that requires short-range low-rate wireless data transfer. It transmits up to 300ft. Zigbee devices can transmit data over long distances by passing data through a mesh of devices to reach more distant ones. Zigbee name refers to the waggle dance of honey bees after their return to the beehive. Energy Exchange: Connect Collaborate Conserve 7

8 ISA 100 Wireless Systems for Industrial Automation Key technical features of ISA100 Wireless include the following: Distributed control in the field (object technology in smart devices) Multiple protocols, including wired HART, supported in a single network (object technology) Functionality beyond traditional wireless sensor network (WSN) applications Time-enhanced, two-layer AES-128 based security, and support for all AES security levels (one manufacturer has FIPS certification) Provision over the air (OTA) capabilities or directly using out of band (OOB) Scalable and reliable network tested to 500 devices (so far) Proven reliability in congested wireless environments IPv6-based technology (6LoWPAN) for industrial applications, supports the Internet of Things More expensive than Bluetooth or Zigbee but developed for the Industrial Marketplace and can meet DISA STIG requirements Energy Exchange: Connect Collaborate Conserve 8

9 Astrolavos Lab IoT Network Indicators IoT devices are extremely chatty. They tend to connect to tens of different locations in the Internet. 9

10 Astrolavos Lab What is the attack surface for IoTs? Credit: Manos Antonakakis, PhD Assistant Professor, ECE, Georgia Tech 10

11 Recent Quotes Dams, the power grid and other such infrastructure were once closed network systems. Then they were added to the Internet. "We still thought of them as closed networks -- but they're not," said Lt. Gen. Edward Cardon, commander of U.S. Army Cyber Command and Second Army. "Other systems touch them and that starts to create some problems," such as vulnerabilities to being hacked, he said. Mark Bristow, chief of Incident Response, Department of Homeland Security, Industrial Control Systems-Cyber Emergency Response Team, said there are in the U.S. 84,000 devices running buildings, power plants and other infrastructure, all connected to and part of the "Internet of things," or IoT. Another example, Bristow said, are Nest Learning Thermostats, which are replacing traditional thermostats in ever-increasing numbers. If someone hacked into this system on a large scale, there would be lots of unintended consequences from the design perspective. Mark McLaughlin, chairman of the board, Palo Alto Networks, said there's been a big uptick in ransom attacks at hospitals, where hackers demand ransom money or else they threaten to shut down life-support equipment the hospitals use that's connected to the IoT. McLaughlin added that trust in the IoT "is bleeding out" and that there's a "razor-thin margin between chaos and order" in this IoT-driven society that touches everyone's lives. 1 Energy Exchange: Connect Collaborate Conserve 1

12 Questions 1 Energy Exchange: Connect Collaborate Conserve 2

NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6)

NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6) NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6) 1 Creating Cyber Secure Enterprise Control Systems Networks Agenda US Navy, NDW Industrial Controls overview The new cyber threat

More information

CyberFence Protection for DNP3

CyberFence Protection for DNP3 CyberFence Protection for DNP3 August 2015 Ultra Electronics, 3eTI 2015 DNP3 Issues and Vulnerabilities DNP3 is one of the most widely used communications protocols within the utility space for the purpose

More information

ISA100 Wireless Development and Certification Process

ISA100 Wireless Development and Certification Process ISA100 Wireless Development and Certification Process Penny Chen Principal Systems Architect Yokogawa IA Global Strategic Marketing Center (USMK) Standards Certification Education & Training Publishing

More information

System Architecture Challenges in the Home M2M Network

System Architecture Challenges in the Home M2M Network System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes

More information

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018

Clouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018 Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT

More information

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011

RESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Moving Beyond Zigbee for Star Networks RESOURCES By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Multi-hop mesh protocols, such as Zigbee, are getting

More information

Orientation and Guidance within Doors

Orientation and Guidance within Doors Orientation and Guidance within Doors Marianna Sipos John von Neumann Faculty of Informatics, Budapest Tech sipos.marianna@nik.bmf.hu Abstract: There is a research in Budapest Tech, John von Neumann Faculty

More information

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016

Bluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016 3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment

More information

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

IEEE-SA Internet of Things - Security & Standards

IEEE-SA Internet of Things - Security & Standards IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Internet of Things and M2M

Internet of Things and M2M Internet of Things and M2M Pedram Radmand, Ph.D. Wireless Sensor Network Research Newracom Inc Wireless Technology and IoT newracom.com Direct 949-390-7111 pedrad@gmail.com pedram.radmand@newracom.com

More information

Securing the End Node in a Cloud World

Securing the End Node in a Cloud World Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and

More information

Wireless Mesh Infrastructure Networks for Supporting Water Districts Data, SCADA and Video Requirements

Wireless Mesh Infrastructure Networks for Supporting Water Districts Data, SCADA and Video Requirements Wireless Mesh Infrastructure Networks for Supporting Water Districts Data, SCADA and Video Requirements Standards Certification Education & Training Publishing Conferences & Exhibits Speaker: Matthew Selby

More information

Exploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant.

Exploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant. Exploring the ISA100.11a Standard March 2012 William (Bill) Ayers America s OneWireless Consultant Exploring the ISA100.11a Standard WHY Standards World Leader SolutionsFocused Greatest Flexibility International

More information

Internet of Things: Latest Technology Development and Applications

Internet of Things: Latest Technology Development and Applications Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development

More information

Federal Information Processing Standard (FIPS) What is it? Why should you care?

Federal Information Processing Standard (FIPS) What is it? Why should you care? Federal Information Processing Standard (FIPS) 140-2 What is it? Why should you care? SECURITY IS BECOMING A GROWING CONCERN The migration from TDM to IP communication networks has drastically increased

More information

Complying with RBI Guidelines for Wi-Fi Vulnerabilities

Complying with RBI Guidelines for Wi-Fi Vulnerabilities A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines

More information

Comprehensive Networking Solutions

Comprehensive Networking Solutions Comprehensive Networking Solutions End to End Networking Solutions in the Water and Wastewater Sectors Standards Certification Education & Training Publishing Conferences & Exhibits Aug 5-7, 2014 Orlando,

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation

Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation Discovering the Unknown Rising demand for monitoring of process values by Increasing efficiency, reducing waste (raw materials,

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.

Data Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices. Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise

More information

Securing Medical Devices Using Adaptive Testing Methodologies

Securing Medical Devices Using Adaptive Testing Methodologies SESSION ID: ASD-R10 Securing Medical Devices Using Adaptive Testing Methodologies Daniel Miessler Director of Advisory Services IOActive, Inc. @danielmiessler SESSION ID: ASD-R10 Securing Medical Devices

More information

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies

Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th

More information

DoD Wireless Smartphone Security Requirements Matrix Version January 2011

DoD Wireless Smartphone Security Requirements Matrix Version January 2011 DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation

More information

The Internet of Light the key to the Internet of Things

The Internet of Light the key to the Internet of Things The Internet of Light the key to the Internet of Things Tridonic s innovative net4more toolbox enables light to become the backbone of the Internet of Things. 13 March 2016 More connected devices than

More information

Securing Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017

Securing Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017 Securing Your Data ATA Spec 42 Regan Brossard - The Boeing Company June 2017 Agenda PKI - Use in the Aviation Industry and why is it necessary Guidance for Transitioning to Connected Airplanes Choosing

More information

Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016

Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016 Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs January 27, 2016 1 Agenda About Me Silicon Labs Who are we? What do we do? Applications Engineering Functions Skills needed IoT

More information

Addressing Unique Smart Grid Challenges with Converged Gateways

Addressing Unique Smart Grid Challenges with Converged Gateways April 5, 2011 Addressing Unique Smart Grid Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI Smart Grid Workshop 5-6 April 2011, Sophia Antipolis, France Where

More information

Omar Alrawi. Security Evaluation of Home-based IoT Deployments

Omar Alrawi. Security Evaluation of Home-based IoT Deployments Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar

More information

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients

Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,

More information

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri

SDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri SDCI 2012 Student Project 6 Sensing Capabilites Go Wireless Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri Overview Wireless Sensor Network Is a collection of nodes organized into a cooperative

More information

Keynote Speakers CyberC 2010

Keynote Speakers CyberC 2010 Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential

More information

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities

Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure

More information

Modulation. Propagation. Typical frequency bands

Modulation. Propagation. Typical frequency bands References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,

More information

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,

More information

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS

BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet

More information

Presentation by Ms. Salome Tshikomba(Colleen)

Presentation by Ms. Salome Tshikomba(Colleen) HOW WIRELESS ELECTRICITY THEFT DETECTION CAN ASSIST IN REDUCING THE THEFT OR STEALING OF ELECTRICITY 9 October 2018 Presentation by Ms. Salome Tshikomba(Colleen) 1 Introduction The presentation looks at

More information

WIRELESS DLM WATTSTOPPER. Intelligent Secure Scalable. Digital Lighting Management. designed to be better.

WIRELESS DLM WATTSTOPPER. Intelligent Secure Scalable. Digital Lighting Management. designed to be better. WIRELESS DLM Intelligent Secure Scalable WATTSTOPPER Digital Lighting Management designed to be better. DESIGNING IN AN ERA OF CHANGE 1986 Analog Control Devices World Wide Web Initial Energy Codes IoT

More information

OpenWay by Itron Security Overview

OpenWay by Itron Security Overview Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

Wireless communication standards: What makes them unattractive for WSN:

Wireless communication standards: What makes them unattractive for WSN: Wireless communication standards: IEEE 802.11 a/b/g Bluetooth GSM What makes them unattractive for WSN: Power hungry (need big batteries) Complexity (need lots of clock cycles and memory) New protocol

More information

The Internet of Things

The Internet of Things The Internet of Things George Debbo Presentation for SASGI Meeting on 22 nd June 2016 1 Agenda What is IoT? How big is it? What effect does it have on telecom networks? Use cases/applications: The connected

More information

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Cloud Security Alliance, 2015 Agenda 1. Defining the IoT 2. New Challenges introduced by the IoT 3. IoT Privacy Threats

More information

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.

Radiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards. Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12

More information

Vulnerabilities in Process Control Networks: What Are We Protecting Against?

Vulnerabilities in Process Control Networks: What Are We Protecting Against? Vulnerabilities in Process Control Networks: What Are We Protecting Against? Mark Benedict Ultra Electronics, 3eTI Standards Certification Education & Training Publishing Conferences & Exhibits 2014 ISA

More information

Current Threat Environment

Current Threat Environment Current Threat Environment Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT mssherman@sei.cmu.edu 29-Aug-2014 Report Documentation Page Form

More information

EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems. Shengwei Wang, PhD Member ASHRAE

EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems. Shengwei Wang, PhD Member ASHRAE VOLUME 14, NUMBER 4 HVAC&R RESEARCH JULY 2008 EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems INTRODUCTION Shengwei Wang, PhD Member ASHRAE In recent years, wireless

More information

2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana!

2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana! 2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana! Mission Rapidly develop, test, and help commercialize next generation energy systems that are safe, reliable, and

More information

Trusted Platform Module explained

Trusted Platform Module explained Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of

More information

Attackers Process. Compromise the Root of the Domain Network: Active Directory

Attackers Process. Compromise the Root of the Domain Network: Active Directory Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH

More information

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1

Presented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1 Presented by Viraj Anagal Kaushik Mada Presented to Dr. Mohamed Mahmoud ECE 6900 Fall 2014 Date: 09/29/2014 1 Outline Motivation Overview Wireless Sensor Network Components Characteristics of Wireless

More information

ISA100 Technology A Network Communication Protocol

ISA100 Technology A Network Communication Protocol A Network Communication Protocol Open Consensus Industrial Standard for Process Control September 2013 1 Open Global Standard Over 400 automation professionals from many global companies around the world

More information

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation

CYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation CYBERSMART BUILDINGS Securing Your Investments in Connectivity and Automation JANUARY 2018 WELCOME STEVE BRUKBACHER Application Security Manager Global Product Security Johnson Controls 1 WHY ARE WE HERE

More information

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to

More information

The Internet of Things. Steven M. Bellovin November 24,

The Internet of Things. Steven M. Bellovin November 24, The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)

More information

Connected smart lighting. Led event 2014 Pepijn Herman

Connected smart lighting. Led event 2014 Pepijn Herman Connected smart lighting Led event 2014 Pepijn Herman 2-12-2014 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Branch in Düsseldorf, Germany Team of 21 engineers

More information

Endpoint Protection : Last line of defense?

Endpoint Protection : Last line of defense? Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development

More information

The Honest Advantage

The Honest Advantage The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents

More information

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems

More information

SecureTrack. Supporting SANS 20 Critical Security Controls. March

SecureTrack. Supporting SANS 20 Critical Security Controls. March SecureTrack Supporting SANS 20 Critical Security Controls March 2012 www.tufin.com Table of Contents Introduction... 3 Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers,

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Wednesday, May 16, 2018

Wednesday, May 16, 2018 Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available

More information

HEALTHCARE IT NETWORK SURVEY REPORT

HEALTHCARE IT NETWORK SURVEY REPORT HEALTHCARE IT NETWORK SURVEY REPORT FEBRUARY 2019 PAGE 2 Healthcare IT Network Survey Report INTRODUCTION Harnessing digital technologies for patient engagement is essential for healthcare organizations

More information

WATER UTILITIES CHOOSE Fixed Wireless Broadband Communications

WATER UTILITIES CHOOSE Fixed Wireless Broadband Communications WATER UTILITIES CHOOSE Fixed Wireless Broadband Communications What these water utilities discovered is that there is a vast difference between low-end commercial-grade equipment and purpose-built technology

More information

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM

UNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee

More information

What is Wi-SUN? Open-standards based secure, interoperable communications for large scale IoTfor Smart Utility and Smart City networks.

What is Wi-SUN? Open-standards based secure, interoperable communications for large scale IoTfor Smart Utility and Smart City networks. What is Wi-SUN? Open-standards based secure, interoperable communications for large scale IoTfor Smart Utility and Smart City networks. 2 Wi-SUN Alliance was established in April 2012 Incorporated as Not

More information

BYOD: The Solution for Districts That Don t Need the Lexus Model of 1:1 Computing

BYOD: The Solution for Districts That Don t Need the Lexus Model of 1:1 Computing BLEgroup Thought Leadership Consortium: Industry and Schools Collaborating to Develop Leading-Edge Digital Teaching and Learning BYOD: The Solution for Districts That Don t Need the Lexus Model of 1:1

More information

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY] 2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

12. Mobile Devices and the Internet of Things. Blase Ur, May 3 rd, 2017 CMSC / 33210

12. Mobile Devices and the Internet of Things. Blase Ur, May 3 rd, 2017 CMSC / 33210 12. Mobile Devices and the Internet of Things Blase Ur, May 3 rd, 2017 CMSC 23210 / 33210 1 Today s class Security and privacy for: mobile devices the IoT safety-critical devices Discuss midterm 2 Mobile

More information

Connected Car Solutions Based on IoT

Connected Car Solutions Based on IoT FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the

More information

USE OF COGNITIVE RADIO TO IMPROVE SPECTRUM USAGE EFFICIENCY AND DATA CAPACITY

USE OF COGNITIVE RADIO TO IMPROVE SPECTRUM USAGE EFFICIENCY AND DATA CAPACITY USE OF COGNITIVE RADIO TO IMPROVE SPECTRUM USAGE EFFICIENCY AND DATA CAPACITY Keith Nolan CTVR / The Telecommunications Research Centre keith.nolan@tcd.ie ctvr.ie reconfigr.com @keithnolan Overview CR

More information

Research on Technology Used in Wireless Sensor Networks

Research on Technology Used in Wireless Sensor Networks Research on Technology Used in Wireless Sensor Networks Ratnesh Yadav 1, Namit Gupta 2 1 MCA, Teerthanker Mahaveer University, Moradabad 2 Assistant Professor, Teerthanker Mahaveer University, Moradabad

More information

Clinical and ICT Cybersecurity Overview and Cases A242-3

Clinical and ICT Cybersecurity Overview and Cases A242-3 Clinical and ICT Cybersecurity Overview and Cases A242-3 Elliot B. Sloane, PhD, CCE - Elected Fellow of ACCE, AIMBE, and HIMSS President and Founder Center for Healthcare Information Research and Policy,

More information

Cyber Security: What s the Big Deal?

Cyber Security: What s the Big Deal? Cyber Security: What s the Big Deal? (and why it matters to you!) Debasis Bhattacharya, UHMC Jodi Ito, CISO, UH ITS maui.hawaii.edu/cybersecurity What is Cybersecurity? cy ber: adjective of, relating to,

More information

Power Management Techniques for Low- Energy IoT Devices

Power Management Techniques for Low- Energy IoT Devices Power Management Techniques for Low- Energy IoT Devices Matt Saunders Director of Field Marketing, Microcontroller and Wireless Products, Silicon Labs With the rise of the Internet of Things (IoT), embedded

More information

Interagency Advisory Board Meeting Agenda, December 7, 2009

Interagency Advisory Board Meeting Agenda, December 7, 2009 Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO

More information

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs

Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least

More information

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

WHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis

WHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis WHY ARMIS Top 10 Reasons To Consider Armis 1. Comprehensive Asset Discovery and Inventory A complete inventory of hardware and software is critically important. This is why so many security frameworks,

More information

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR

Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process

More information

HANDS FREE MOBILE HAM RADIO AND BLUETOOTH

HANDS FREE MOBILE HAM RADIO AND BLUETOOTH HANDS FREE MOBILE HAM RADIO AND BLUETOOTH Presented to the West Carleton ARC November 3rd, 2009 By: Norm Rashleigh, VE3LC Ontario Bill 118 Prohibition on use of Hand-Held Devices while Driving ONTARIO

More information

UESCs and VA s Performance Contracting Program Lara Spader Department of Veterans Affairs August 17, 2017

UESCs and VA s Performance Contracting Program Lara Spader Department of Veterans Affairs August 17, 2017 What the Government Needs from the Utility UESCs and VA s Performance Contracting Program Lara Spader Department of Veterans Affairs August 17, 2017 Tampa Convention Center Tampa, Florida Agenda Resiliency

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

Honeywell Users Group Dynamic Solutions. Endless Possibilities. Herman Storey ISA100 Wireless Standards Update

Honeywell Users Group Dynamic Solutions. Endless Possibilities. Herman Storey ISA100 Wireless Standards Update Honeywell Users Group 2010 Dynamic Solutions. Endless Possibilities. Herman Storey ISA100 Wireless Standards Update Wireless Standards Update This Presentation Discusses Activities of Several Organizations

More information

Assets Condition Monitoring Using ISA100.11A Wireless System. Standards Certification Education & Training Publishing Conferences & Exhibits

Assets Condition Monitoring Using ISA100.11A Wireless System. Standards Certification Education & Training Publishing Conferences & Exhibits Assets Condition Monitoring Using ISA100.11A Wireless System Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Michael Thevanh Senior Field Application Engineer GE

More information

The role of ZigBee in Energy Management

The role of ZigBee in Energy Management The role of ZigBee in Energy Management Ollie Smith Business Development Director Telegesis (UK) Ltd. Agenda Telegesis who are we? Energy crisis what energy crisis? Can ZigBee help? Who is using ZigBee?

More information

Addressing Unique M2M Challenges with Converged Gateways

Addressing Unique M2M Challenges with Converged Gateways October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are

More information

Smart Homes and Cities

Smart Homes and Cities Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector

More information

GSAW Information Assurance in Government Space Systems: From Art to Engineering

GSAW Information Assurance in Government Space Systems: From Art to Engineering GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the

More information

The ZigBee Architecture An Introduction

The ZigBee Architecture An Introduction The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4

More information

Web-Based Home Appliances Controlling System

Web-Based Home Appliances Controlling System Web-Based Home Appliances Controlling System B.E. EXTC, TSEC Aman Chadha Mahesh Dubey Siddhesh Shirodker 1 Agenda House monitoring using a live feed Advanced security system based on userauthentication

More information

Looking Forward: USACE MILCON Cybersecurity Integration

Looking Forward: USACE MILCON Cybersecurity Integration Energy Exchange 2017 - Track 4 - Cyber and Control System Technologies, Session 2 - Understanding and implementing the RMF Process Looking Forward: USACE MILCON Cybersecurity Integration Mr. Daniel Shepard

More information

Mobile Hands Free Operation. Ontario Regulation 366/09

Mobile Hands Free Operation. Ontario Regulation 366/09 Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer

More information

Secure Government Computing Initiatives & SecureZIP

Secure Government Computing Initiatives & SecureZIP Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS

More information

Traffic Modeling of Wireless Body Area Network

Traffic Modeling of Wireless Body Area Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 102-109 www.iosrjournals.org Traffic Modeling of Wireless Body Area

More information

Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved.

Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved. Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July 2009 2009 Elster. All rights reserved. What is the Smart Grid? 2009 Elster. All rights reserved. 2 Smart Grid Two Way Communications..Sensors...Distributed

More information