Using the tpm with iot
|
|
- Alaina Pope
- 5 years ago
- Views:
Transcription
1 Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer
2 Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2
3 History Worked on the from 1999 through 2007 as Workgroup Chair and Technical Committee Vice-Chair These pictures are from a workgroup meeting in England, 2003 I was the TCG liaison to ISO SC27 to get the specification as an ISO standard (we were successful) IoT Security 3
4 Basic Functionality Root of Trust for Reporting (RTR) Enabling attestation Root of Trust for Storage (RTS) Enabling protected storage Platform adds Root of Trust for Measurement (RTM) Enabling attestation and protected storage Isolated execution environment Mitigate attempts to manipulate keys and operations IoT Security 4
5 What Does IoT Need IoT Security 5
6 Ecosystem Sensor Gateway Network Simple goal, get data from sensor, send it up to analytics and then do something based on that analysis Management Analytics Does the ecosystem enable end to end security? IoT Security 6
7 IT/ Business Systems Vertical IoT Apps Ecosystem Details Illustration only, not for deep discussion On-Premise or Off-Premise Data Center or Cloud Sensor I/O WiFi + LP WiFi Bluetooth + BTLE 3G/4G/LTE (GPRS) ZigBee, Zwave 6LoWPAN WiHART Ethernet RFID 3 rd Party Cloud Data Transport Broker Data Ingestion & Processing Persistence & Concurrency Query Business Logic & Rules Sensor Sensor Actuator Sensor Actuator I/O MCU MCU U I/O P A L Gateway U P A L Gateway Device Attestation Network Infrastructure Device Attestation Security, Configuration & Management Asset Info, Policies & Metadata Storage Compute Analytics Services Orchestration APIs, API Libraries, SDK Business Portal U P A L Universal Protocol Abstraction Layer Data Center Management & Security (Monitoring, Auto-scaling, Logging, Eventing) Data Flow: MQTT, HTTPS, WebSockets, XMPP, CoAP, REST, AMQP, DDS, et al. Security & Mgmt Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al. All compute devices have Identity Protection (EPID), Secure Boot, Smart Object ID, etc. IoT Security 7
8 Basic Questions for IoT What device are you Related is what are the device properties What is the software stack What is the execution environment Is there protected storage on the device Key material at a minimum Is there a Trusted Execution Environment Questions apply to any device in the ecosystem Mitigate software attacks, hopefully mitigate hardware attacks IoT Security 8
9 How Does the Fulfill the Needs IoT Security 9
10 What Device Are You Identifying the device enables analytics, operations, and management Can t rely on data or send commands to unknown device provides identity Can be fixed with Endorsement Key (EK), anonymous with Attestation Identity Key (AIK), or provisioned by application Identities can be controlled using authorizations Richer set of authorizations in 2.0 IoT Security 10
11 What is the Software Stack Identifying the software in use enables management, updates, and finer control Software identity comes from RTM provides ability to attest to the software and allow authorizations and decisions based on the software identity IoT Security 11
12 Is There Protected Storage on the Device Entities want to rely on device properties and one critical property is the ability to provide long-term storage with confidentiality and integrity guarantees provides storage that has both confidentiality and integrity Attestation proves the existence of the protected storage IoT Security 12
13 Is There a Trusted Execution Environment Need assurance that operations can occur without modification Especially true in keeping key material confidential has TEE mitigates both hardware and software attacks API only allows specific operations and key material never leaves without being encrypted IoT Security 13
14 Usage IoT Security 14
15 Properties s come in many shapes and sizes Discrete hardware devices Embedded hardware devices Firmware implementations Others are possible Different properties for each Need to match the properties to the platform in question Sensor, gateway, network, cloud Specific use models matter IoT Security 15
16 IT/ Business Systems Vertical IoT Apps Where Are the s? Illustration only, not for deep discussion On-Premise or Off-Premise Data Center or Cloud Sensor Sensor Sensor Actuator Sensor Actuator I/O I/O MCU MCU U I/O P A L Gateway WiFi + LP WiFi Bluetooth + BTLE 3G/4G/LTE (GPRS) ZigBee, Zwave 6LoWPAN WiHART Ethernet RFID U P A L Gateway Device Attestation 3 rd Party Cloud Network Infrastructure Data Transport Broker Device Attestation Data Ingestion & Processing Security, Configuration & Management Persistence & Concurrency Asset Info, Policies & Metadata Query Storage Compute Analytics Business Logic & Rules Services Orchestration APIs, API Libraries, SDK Business Portal U P A L Universal Protocol Abstraction Layer Data Center Management & Security (Monitoring, Auto-scaling, Logging, Eventing) Data Flow: MQTT, HTTPS, WebSockets, XMPP, CoAP, REST, AMQP, DDS, et al. Security & Mgmt Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al. All compute devices have Identity Protection (EPID), Secure Boot, Smart Object ID, etc. IoT Security 16
17 Questions Again What device are you provides identity What is the software stack provides RTM and attestation Is there protected storage on the device provides storage Is there a Trusted Execution Environment provides the glue that can tie the stack together operations execute inside of IoT Security 17
18 Question s? IoT Security 18
19 Legal Information Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel, the Intel logo, are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others Intel Corporation IoT Security 19
20
The Intel IoT Platform Architecture and Product Overview
The Intel IoT Platform Architecture and Product Overview Ramesh Peri Senior Principal Engineer and IoT Devkit Architect, Intel Corporation 1 Agenda Introduction Intel IoT Platform Architecture Roadmap
More informationAWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect
AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure
More informationWhitepaper. IoT Protocols. PAASMER Support for Protocols. Website:
Whitepaper IoT Protocols PAASMER Support for Protocols Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. IoT Protocols 4 3. Connectivity Protocols 5 4. Application Layer
More information2013 Cisco and/or its affiliates. All rights reserved. 1
2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System
More informationSecuring Edge to Cloud IoT Solutions with Intel and
REFERENCE ARCHITECTURE Securing Edge to Cloud IoT Solutions with Intel and Amazon Web Services The Internet of Things (IoT) is at the heart of a powerful technology revolution. The act of connecting devices
More informationJonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017
Resource-constrained Industrial Things Proposal for the Adaptation of CoAP to EtherNet/IP Jonas Green, Björn Otterdahl HMS Industrial Networks AB February 22, 2017 Connect all devices in a factory to EtherNet/IP
More informationLesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet
Lesson 10 Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet 1 Connecting Arduino USB to Internet Arduino board IDE supports USB. USB port connects to a mobile or computer or
More informationOpen Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017
Open Source IoT Eclipse IoT Tim De Borger - tdeborge@redhat.com Senior Solution Architect 13/06/2017 Disclaimer The content set forth herein is Red Hat confidential information and does not constitute
More informationhttps://www.linkedin.com/in/affan-dar-69132aa1
https://www.linkedin.com/in/affan-dar-69132aa1 IoT it not a technology revolution.. ..it is a business revolution enabled by technology Creating value through real business impact $100M average increase
More informationIoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D
IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive
More informationB U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.
B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationTRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE
SESSION ID: TECH-F03 TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE Tom Dodson Supply Chain Security Architect Intel Corporation/Business Client Products Monty Wiseman Security
More informationHarvesting IOT data. (Using IP networks) Ericsson 2014
Harvesting IOT data (Using IP networks) Samita Chakrabarti ETSI M2M Workshop Ericsson 2014 overview The network society AGGREGATION AND CONVERGENCE IP BASED IOT AND M2M NETWORKS USECASES AND PROTOTYPE
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationBuild the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM
Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells
More information15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK
15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK Jeevarathinam Ravikumar (Ravi) Stanley Security Europe (Stanley Black & Decker) 1 Agenda 1 2 3 4 Defining IoT Creating
More informationARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX
ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC CEO @ MAINFLUX Outline Internet of Things (IoT) Common IoT Project challenges - Networking - Power Consumption - Computing Power - Scalability
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationWIND RIVER INTELLIGENT DEVICE PLATFORM XT
AN INTEL COMPANY WIND RIVER INTELLIGENT DEVICE PLATFORM XT By 2020, more than 200 billion devices will be connected to the cloud and to each other in what is commonly called the Internet of Things (IoT).
More informationOrchestrating an OpenStack* based IoT Smart Home
Orchestrating an OpenStack* based IoT Smart Home Michael Kadera, John Geier, Dr. Yih Leong Sun Intel Open Source Technology Center 26th October, Wednesday, 17:55-18:35 *Other names and brands may be claimed
More informationKhartoum, Sudan Dec 2017
ITU-SUDACAD Regional Forum on Internet of Things for Development of Smart and Sustainable Cities Khartoum, Sudan 13-14 Dec 2017 Standardized architectures and important standards defining organizations
More information3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse
3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible
More informationIntel Security Dev API 1.0 Production Release
1.0 Production Release Release Notes 24 August 2017 Version History/Revision History Date Revision Description August 2017 1.0 Limited Production Release March 2017 0.61 Limited External Distribution Intended
More informationCloud has become the New Normal
Yip In Tsoi Cloud Cloud has become the New Normal By 2020 the distinction between public and private cloud disappears as self-built private clouds become extinct #idcgrac @craw Crawford Del Prete EVP,
More informationStrong Security Elements for IoT Manufacturing
Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing
More informationData and AI LATAM 2018
El Internet de las Cosas para Desarrolladores Joaquin Guerrero Sr. Technical Evangelist Microsoft LATAM The Internet of Things isn t a technology revolution IoT is a business revolution, enabled by technology
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationARM mbed mbed OS mbed Cloud
ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics
More informationARM mbed Technical Overview
ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application
More informationThe Three Software Stacks Required for IoT. Benjamin Cabé Eclipse
The Three Software Stacks Required for IoT Benjamin Cabé Eclipse Foundation @kartben IoT? Applications Collect, exchange & analyze data IoT? Applications Collect, exchange & analyze data Sensing / Actuating
More informationDESIGN AND DEPLOY INTELLIGENT, LOW-POWER AND LOW-COST WIRELESS NETWORKS
DESIGN AND DEPLOY INTELLIGENT, LOW-POWER AND LOW-COST WIRELESS NETWORKS NXP SEMICONDUCTORS & THINGSTREAM GORDON PADKIN, NXP BRUCE JACKSON, THINGSTREAM NEIL HAMILTON, THINGSTREAM MAY 2018 Learn how to develop
More informationIoT Security Fundamentals That Must Be Solved. Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016
1 IoT Security Fundamentals That Must Be Solved Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016 2 1. IoT products must die 2. Rosetta stone 3. Thanks' for letting me in!
More informationIoT Market: Three Classes of Devices
IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationA Guided Tour of Eclipse IoT: 3 Software Stacks for IoT. Benjamin Cabé, Eclipse
A Guided Tour of Eclipse IoT: 3 Software Stacks for IoT Benjamin Cabé, Eclipse Foundation @kartben Asset Tracking The solution The 3 IoT Software Stacks SECURITY ONTOLOGIES Hardware Abstraction Layer (HAL)
More informationPart I: Building intelligent, low power, connected things at a low cost
Part I: Building intelligent, low power, connected things at a low cost Introductions Market trends - edge/fog Global connectivity connectivity challenges & options Connecting the edge & the options Device
More informationHands-On with IoT Standards & Protocols
DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this
More informationIoT Security: Hardening Services Over Connected Devices. Brian
IoT Security: Hardening Services Over Connected Devices Brian Knopf @DoYouQA WHO AM I Sr Director of Security Research & IoT Architect @Neustar @DoYouQA 20+ Home Previously years in IT, QA, Dev & Security
More informationProject Zygote. Rapid prototyping for the Internet of Things
Project Zygote Rapid prototyping for the Internet of Things The Problem we set out to solve How to make interconnecting things easier? What IoT means to us Seamless interconnection between any IoT enabled
More informationAgile IoT. Diana Chirila, SAP Cloud Platform Presales Specialist
Agile IoT Diana Chirila, SAP Cloud Platform Presales Specialist SAP Cloud Platform Internet of Things 4.0 Develop, customize and operate IoT applications in cloud Applications on SAP Cloud Platform Key
More informationPublishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.
Publishing Enterprise Web Applications to BYOD using a Granular Trust Model Shachaf Levi IT Client Security & Connectivity May 2013 Public Legal Notices This presentation is for informational purposes
More informationKeys for Success: Today s Landscape of IoT Technologies and Security Standards
Keys for Success: Today s Landscape of IoT Technologies and Security Standards Pratul Sharma, Technical Marketing Manager, ARM Amit Shah, VP R&D, Alcatel-Lucent mbed Sponsored session/ ARM Tech Con 2015
More informationSOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE
SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5
More informationDEEP ARMOR. Hands-on Exploitation & Hardening of Wearable and IoT Platforms. Sumanth Naropanth & Sunil Kumar
DEEP ARMOR Hands-on Exploitation & Hardening of Wearable and IoT Platforms Sumanth Naropanth & Sunil Kumar Agenda Technical overview of an IoT/wearable ecosystem Building blocks Communication Protocols
More informationIoT on Fedora Using Fedora as a base for the IoT Revolution
IoT on Fedora Using Fedora as a base for the IoT Revolution Presented by Peter Robinson Fedora contriibutor, Red Hatter CC-BY-SA Overview Am I just going to talk ARM? HELL NO!! IoT is a LOT bigger than
More informationLecture 04 Introduction: IoT Networking - Part I
Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking
More informationIOTIVITY INTRODUCTION
IOTIVITY INTRODUCTION Martin Hsu Intel Open Source Technology Center 1 Content may contain references, logos, trade or service marks that are the property of their respective owners. Agenda Overview Architecture
More informationtemp heat I/O A/C flow valve pump
temp flow I/O heat A/C valve pump temp flow I/O heat A/C valve pump temp temp time flow I/O heat A/C valve pump temp temp time flow I/O heat A/C valve pump 0110100101101110101101 temp temp time flow I/O
More informationAnjay LwM2M SDK. Enabling lightweight device management in the Internet of Things ecosystems
Anjay LwM2M SDK Enabling lightweight device management in the Internet of Things ecosystems Introduction In the era of the Internet of Things, the challenge that device manufacturers truly need to face
More informationIoT protocols for the Things
IoT protocols for the Things Who am I? Christian E. Legare Executive Vice President & Chief Technology Officer I joined Micrium in 2002, a leading provider of embedded software, including the uc/os real
More informationIoT Intro. Fernando Solano Warsaw University of Technology
IoT Intro Fernando Solano Warsaw University of Technology fs@tele.pw.edu.pl Embedded Systems Wireless Sensor and Actuator Networks Enabling technologies Communication Protocols Cloud Computing Big Data
More informationAre Device Response Times a Neglected Risk of IoT?
Are Device Response Times a Neglected Risk of IoT? Balwinder Kaur Principal Software Engineer, Emerging Technologies Open IoT Summit, Portland. February 22, 2017 Notice The information and materials included
More informationThe Zentri Secure IoT Platform
The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,
More informationSecurity for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics
Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader
More informationOVAL + The Trusted Platform Module
OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module
More informationArm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited
Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased
More informationPublic Material. NEO-IDM (New IoT Device Management) Platform Based on LwM2M. Jong-Young Lee. ( MDS Technology
Public Material TM NEO-IDM (New IoT Device Management) Platform Based on Jong-Young Lee ( jongyoung@mdstec.com) MDS Technology Neo-IDM Overview NEO-IDM Platform NEO-IDM Platform is IOT Platform for monitoring,
More informationEDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC
EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity
More informationM2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres
M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications
More informationData and Intelligence in Storage Carol Wilder Intel Corporation
Data and Intelligence in Storage Carol Wilder carol.a.wilder@intel.com Intel Corporation 1 Legal Notices/Disclaimer Intel technologies features and benefits depend on system configuration and may require
More informationmbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017
mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud
More informationUNIK Building Mobile and Wireless Networks Maghsoud Morshedi
UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register
More informationMcAfee Boot Attestation Service 3.5.0
Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS
More informationBreaking out of the cloud: Local trust management and rendezvous in Named Data Networking of Things
Breaking out of the cloud: Local trust management and rendezvous in Named Data Networking of Things Wentao Shang, Zhehao Wang, Alexander Afanasyev, Jeff Burke, Lixia Zhang UCLA 2017 ACM/IEEE Int. Conf.
More informationIdo Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS
Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Why is the internet of things inevitable? More than two billion gallons of fuel are wasted
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationEnergy market: Opportunities and Technologies
Energy market: Opportunities and Technologies Dominique Vincent Business Development Manager, Digi Singapore Market opportunities Agenda Energy Management: X-Grid, SmartLee, Smart metering: market, technology
More informationHypervisor Security First Published On: Last Updated On:
First Published On: 02-22-2017 Last Updated On: 05-03-2018 1 Table of Contents 1. Secure Design 1.1.Secure Design 1.2.Security Development Lifecycle 1.3.ESXi and Trusted Platform Module 2.0 (TPM) FAQ 2.
More informationTHE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager
THE NEED FOR SMART SENSORS IN IOT Internet Uwe Hirsch Senior Business Development Manager Uwe.Hirsch@Avnet-Memec.eu IOT APPLICATIONS ENABLED BY DIFFERENT SENSORS Traffic Management Up to 40% of traffic
More informationWhite Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web
White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationIP Based Architecture for the Internet of Things. IPV6 and Related Standards for IoT Interoperability November 20, 2014
IP Based Architecture for the Internet of Things IPV6 and Related Standards for IoT Interoperability November 20, 2014 1 IoT Architecture Problems to Solve Interoperability In the way in which software
More informationSSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions
SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions THIS SLIDE MUST BE USED WITH ANY SLIDES REMOVED FROM THIS PRESENTATION Legal Disclaimers Intel technologies features
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group
More informationThe onem2m standard Horizontal Service Layer
The onem2m standard Horizontal Service Layer June 8 th 2017, Bordeaux Nicolas Damour, Chairman of the onem2m WG2-Architecture group ndamour@sierrawireless.com Sierra Wireless is building the Internet of
More informationBrewing beer with Python. Chesco
Brewing beer with Python Chesco Igual @chescales What shalt thou learn? - Building an IoT backend - Technologies, Protocols and Tools - Backend considerations - Meet a full running architecture - Learn
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and
More informationBuilding a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017
Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver
More informationAccelerating IoT with ARM mbed
Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon
More informationStanislav Harvan Internet of Things
Stanislav Harvan v-sharva@microsoft.com Internet of Things IoT v číslach Gartner: V roku 2020 bude na Internet pripojených viac ako 25mld zariadení: 1,5mld smart TV 2,5mld pc 5mld smart phone 16mld dedicated
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationVortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems
Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationMaking Things Smart. ISN Conference Long Range Connectivity Networks for Sensors
Making Things Smart ISN Conference Long Range Connectivity Networks for Sensors November 4 th 2014 1 Low-power RF : A new option for M2M M2M Conquers new domains! Mobile Broadband (Mobile, SIM Card) Low
More informationModern BIOS Management from the Cloud
Modern BIOS Management from the Cloud Josué Negrón Sr. Solutions Architect VMware Brooks Peppin EUS Systems Engineer VMware Agenda Modern Management Challenges Cloud Architecture Microsoft BIOS & Firmware
More informationDELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing
DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat
More informationEclipse IoT State of the Union. Benjamin Cabé, Eclipse
Eclipse IoT State of the Union Benjamin Cabé, Eclipse Foundation @kartben Typical IoT Architecture telemetry telemetry commands commands Gateways Devices (sensors & actuators) IoT Cloud Platform Applications
More informationINTEROPERABILITY ISSUES IN IOT
INTEROPERABILITY ISSUES IN IOT 4/8/2016 WHITEPAPER Interoperability is the key issue ailing the mass adoption of IoT devices. Standardization is the remedy. This paper talks about the inherent Interoperability
More informationGetting Started with AWS IoT
Getting Started with AWS IoT Denis V. Batalov, PhD @dbatalov Sr. Solutions Architect, AWS EMEA 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Things are becoming connected Source:
More informationHOP Ubiquitous Overview
HOP Ubiquitous Overview HOP Ubiquitous Overview Commercial in confidence Commercial HOP Ubiquitous in confidence S.L. 2015 HOP www.hopu.eu Ubiquitous S.L. Page 20141 Dr. Antonio J. Jara HOP Ubiquitous
More informationPlanning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.
Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile
More informationInternet of Things: An Introduction
Internet of Things: An Introduction IoT Overview and Architecture IoT Communication Protocols Acknowledgements 1.1 What is IoT? Internet of Things (IoT) comprises things that have unique identities and
More informationONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017
ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve
More informationRAISE YOUR PERFORMANCE TO NEW HEIGHTS
Product Brief Intel B360 Chipset Upgrade your PC Experience The Intel B360 Chipset and 8 th Generation Intel Core Desktop Processors Experience great performance with 8th Generation Intel Core desktop
More informationIntel. Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community. Mohan J. Kumar Intel Fellow
Intel Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community Mohan J. Kumar Intel Fellow Agenda Rack Scale Design (RSD) Overview Manageability for RSD
More information2 - onem2m Common Architecture for IoT
2 - onem2m Common Architecture for IoT Dr. Mahdi Ben Alaya Founder & CEO, Sensinov benalaya@sensinov.com www.sensinov.com November 14, 2016 M2M world of connected services 2 Introduction Communication
More informationSecuring your in-ear fitness coach: Challenges in hardening next generation wearables
DEEP ARMOR Securing your in-ear fitness coach: Challenges in hardening next generation wearables Sumanth Naropanth & Sunil Kumar Who are we? Sunil Kumar Security Analyst Deep Armor Ola Security, Aricent
More informationTrusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1
Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept 2005 TCG Track: SEC 502 1 The Need for Trusted Computing 2 The Real World Innovation is needed: Client software
More informationHow onem2m fits into the landscape of IoT technologies
How onem2m fits into the landscape of IoT technologies 3 rd onem2m Industry Day Bangalore, September 20 th 2017 Dr. Josef J. Blanz 20-Sep-2017 3rd onem2m Industry Day hosted by TSDSI 1 M2M/IoT: Surge of
More information