Using the tpm with iot

Size: px
Start display at page:

Download "Using the tpm with iot"

Transcription

1 Using the tpm with iot David Grawrock Security Architect, Senior Principle Engineer

2 Agenda History Lesson What Does IoT Need How Does The Fulfill Needs Usage IoT Security 2

3 History Worked on the from 1999 through 2007 as Workgroup Chair and Technical Committee Vice-Chair These pictures are from a workgroup meeting in England, 2003 I was the TCG liaison to ISO SC27 to get the specification as an ISO standard (we were successful) IoT Security 3

4 Basic Functionality Root of Trust for Reporting (RTR) Enabling attestation Root of Trust for Storage (RTS) Enabling protected storage Platform adds Root of Trust for Measurement (RTM) Enabling attestation and protected storage Isolated execution environment Mitigate attempts to manipulate keys and operations IoT Security 4

5 What Does IoT Need IoT Security 5

6 Ecosystem Sensor Gateway Network Simple goal, get data from sensor, send it up to analytics and then do something based on that analysis Management Analytics Does the ecosystem enable end to end security? IoT Security 6

7 IT/ Business Systems Vertical IoT Apps Ecosystem Details Illustration only, not for deep discussion On-Premise or Off-Premise Data Center or Cloud Sensor I/O WiFi + LP WiFi Bluetooth + BTLE 3G/4G/LTE (GPRS) ZigBee, Zwave 6LoWPAN WiHART Ethernet RFID 3 rd Party Cloud Data Transport Broker Data Ingestion & Processing Persistence & Concurrency Query Business Logic & Rules Sensor Sensor Actuator Sensor Actuator I/O MCU MCU U I/O P A L Gateway U P A L Gateway Device Attestation Network Infrastructure Device Attestation Security, Configuration & Management Asset Info, Policies & Metadata Storage Compute Analytics Services Orchestration APIs, API Libraries, SDK Business Portal U P A L Universal Protocol Abstraction Layer Data Center Management & Security (Monitoring, Auto-scaling, Logging, Eventing) Data Flow: MQTT, HTTPS, WebSockets, XMPP, CoAP, REST, AMQP, DDS, et al. Security & Mgmt Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al. All compute devices have Identity Protection (EPID), Secure Boot, Smart Object ID, etc. IoT Security 7

8 Basic Questions for IoT What device are you Related is what are the device properties What is the software stack What is the execution environment Is there protected storage on the device Key material at a minimum Is there a Trusted Execution Environment Questions apply to any device in the ecosystem Mitigate software attacks, hopefully mitigate hardware attacks IoT Security 8

9 How Does the Fulfill the Needs IoT Security 9

10 What Device Are You Identifying the device enables analytics, operations, and management Can t rely on data or send commands to unknown device provides identity Can be fixed with Endorsement Key (EK), anonymous with Attestation Identity Key (AIK), or provisioned by application Identities can be controlled using authorizations Richer set of authorizations in 2.0 IoT Security 10

11 What is the Software Stack Identifying the software in use enables management, updates, and finer control Software identity comes from RTM provides ability to attest to the software and allow authorizations and decisions based on the software identity IoT Security 11

12 Is There Protected Storage on the Device Entities want to rely on device properties and one critical property is the ability to provide long-term storage with confidentiality and integrity guarantees provides storage that has both confidentiality and integrity Attestation proves the existence of the protected storage IoT Security 12

13 Is There a Trusted Execution Environment Need assurance that operations can occur without modification Especially true in keeping key material confidential has TEE mitigates both hardware and software attacks API only allows specific operations and key material never leaves without being encrypted IoT Security 13

14 Usage IoT Security 14

15 Properties s come in many shapes and sizes Discrete hardware devices Embedded hardware devices Firmware implementations Others are possible Different properties for each Need to match the properties to the platform in question Sensor, gateway, network, cloud Specific use models matter IoT Security 15

16 IT/ Business Systems Vertical IoT Apps Where Are the s? Illustration only, not for deep discussion On-Premise or Off-Premise Data Center or Cloud Sensor Sensor Sensor Actuator Sensor Actuator I/O I/O MCU MCU U I/O P A L Gateway WiFi + LP WiFi Bluetooth + BTLE 3G/4G/LTE (GPRS) ZigBee, Zwave 6LoWPAN WiHART Ethernet RFID U P A L Gateway Device Attestation 3 rd Party Cloud Network Infrastructure Data Transport Broker Device Attestation Data Ingestion & Processing Security, Configuration & Management Persistence & Concurrency Asset Info, Policies & Metadata Query Storage Compute Analytics Business Logic & Rules Services Orchestration APIs, API Libraries, SDK Business Portal U P A L Universal Protocol Abstraction Layer Data Center Management & Security (Monitoring, Auto-scaling, Logging, Eventing) Data Flow: MQTT, HTTPS, WebSockets, XMPP, CoAP, REST, AMQP, DDS, et al. Security & Mgmt Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al. All compute devices have Identity Protection (EPID), Secure Boot, Smart Object ID, etc. IoT Security 16

17 Questions Again What device are you provides identity What is the software stack provides RTM and attestation Is there protected storage on the device provides storage Is there a Trusted Execution Environment provides the glue that can tie the stack together operations execute inside of IoT Security 17

18 Question s? IoT Security 18

19 Legal Information Intel technologies features and benefits depend on system configuration and may require enabled hardware, software or service activation. Performance varies depending on system configuration. No computer system can be absolutely secure. Check with your system manufacturer or retailer or learn more at Intel, the Intel logo, are trademarks of Intel Corporation in the U.S. and/or other countries. *Other names and brands may be claimed as the property of others Intel Corporation IoT Security 19

20

The Intel IoT Platform Architecture and Product Overview

The Intel IoT Platform Architecture and Product Overview The Intel IoT Platform Architecture and Product Overview Ramesh Peri Senior Principal Engineer and IoT Devkit Architect, Intel Corporation 1 Agenda Introduction Intel IoT Platform Architecture Roadmap

More information

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure

More information

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website:

Whitepaper. IoT Protocols. PAASMER Support for Protocols. Website: Whitepaper IoT Protocols PAASMER Support for Protocols Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. IoT Protocols 4 3. Connectivity Protocols 5 4. Application Layer

More information

2013 Cisco and/or its affiliates. All rights reserved. 1

2013 Cisco and/or its affiliates. All rights reserved. 1 2013 Cisco and/or its affiliates. All rights reserved. 1 Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System

More information

Securing Edge to Cloud IoT Solutions with Intel and

Securing Edge to Cloud IoT Solutions with Intel and REFERENCE ARCHITECTURE Securing Edge to Cloud IoT Solutions with Intel and Amazon Web Services The Internet of Things (IoT) is at the heart of a powerful technology revolution. The act of connecting devices

More information

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017

Jonas Green, Björn Otterdahl HMS Industrial Networks AB. February 22, 2017 Resource-constrained Industrial Things Proposal for the Adaptation of CoAP to EtherNet/IP Jonas Green, Björn Otterdahl HMS Industrial Networks AB February 22, 2017 Connect all devices in a factory to EtherNet/IP

More information

Lesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet

Lesson 10. Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet Lesson 10 Circuit Boards and Devices Ethernet and Wi-Wi Connectivity with the Internet 1 Connecting Arduino USB to Internet Arduino board IDE supports USB. USB port connects to a mobile or computer or

More information

Open Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017

Open Source IoT. Eclipse IoT. Tim De Borger - Senior Solution Architect 13/06/2017 Open Source IoT Eclipse IoT Tim De Borger - tdeborge@redhat.com Senior Solution Architect 13/06/2017 Disclaimer The content set forth herein is Red Hat confidential information and does not constitute

More information

https://www.linkedin.com/in/affan-dar-69132aa1

https://www.linkedin.com/in/affan-dar-69132aa1 https://www.linkedin.com/in/affan-dar-69132aa1 IoT it not a technology revolution.. ..it is a business revolution enabled by technology Creating value through real business impact $100M average increase

More information

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D

IoT and the Role of PLATFORMS. Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D IoT and the Role of PLATFORMS Balajee Sowrirajan SVP and Managing Director Samsung Semiconductors India R&D 1 The Future is IoT IoT will touch every market Key Manufacturer Driving Factors Competitive

More information

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved. B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE

TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE SESSION ID: TECH-F03 TRUSTED SUPPLY CHAIN & REMOTE PROVISIONING WITH THE TRUSTED PLATFORM MODULE Tom Dodson Supply Chain Security Architect Intel Corporation/Business Client Products Monty Wiseman Security

More information

Harvesting IOT data. (Using IP networks) Ericsson 2014

Harvesting IOT data. (Using IP networks) Ericsson 2014 Harvesting IOT data (Using IP networks) Samita Chakrabarti ETSI M2M Workshop Ericsson 2014 overview The network society AGGREGATION AND CONVERGENCE IP BASED IOT AND M2M NETWORKS USECASES AND PROTOTYPE

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM

Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Build the unified end to end IoT solution on ARM LEADING COLLABORATION IN THE ARM ECOSYSTEM Agenda Linaro Linaro s IoT efforts Demo Business Models Design and sell x86 chips 2016 $59.5Bn Revenue Sells

More information

15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK

15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK 15 th November 2016 IoT Build Conference, Double Tree Hilton, Tower of London London, UK Jeevarathinam Ravikumar (Ravi) Stanley Security Europe (Stanley Black & Decker) 1 Agenda 1 2 3 4 Defining IoT Creating

More information

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX

ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC MAINFLUX ARCHITECTURING AND SECURING IOT PLATFORMS JANKO ISIDOROVIC CEO @ MAINFLUX Outline Internet of Things (IoT) Common IoT Project challenges - Networking - Power Consumption - Computing Power - Scalability

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

WIND RIVER INTELLIGENT DEVICE PLATFORM XT

WIND RIVER INTELLIGENT DEVICE PLATFORM XT AN INTEL COMPANY WIND RIVER INTELLIGENT DEVICE PLATFORM XT By 2020, more than 200 billion devices will be connected to the cloud and to each other in what is commonly called the Internet of Things (IoT).

More information

Orchestrating an OpenStack* based IoT Smart Home

Orchestrating an OpenStack* based IoT Smart Home Orchestrating an OpenStack* based IoT Smart Home Michael Kadera, John Geier, Dr. Yih Leong Sun Intel Open Source Technology Center 26th October, Wednesday, 17:55-18:35 *Other names and brands may be claimed

More information

Khartoum, Sudan Dec 2017

Khartoum, Sudan Dec 2017 ITU-SUDACAD Regional Forum on Internet of Things for Development of Smart and Sustainable Cities Khartoum, Sudan 13-14 Dec 2017 Standardized architectures and important standards defining organizations

More information

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse

3 Software Stacks for IoT Solutions. Ian Skerrett Eclipse 3 Software Stacks for IoT Solutions Ian Skerrett Eclipse Foundation @ianskerrett Copyright 2016 The Eclipse Foundation. All Rights Reserved Eclipse Foundation Not-for-profit open source foundation responsible

More information

Intel Security Dev API 1.0 Production Release

Intel Security Dev API 1.0 Production Release 1.0 Production Release Release Notes 24 August 2017 Version History/Revision History Date Revision Description August 2017 1.0 Limited Production Release March 2017 0.61 Limited External Distribution Intended

More information

Cloud has become the New Normal

Cloud has become the New Normal Yip In Tsoi Cloud Cloud has become the New Normal By 2020 the distinction between public and private cloud disappears as self-built private clouds become extinct #idcgrac @craw Crawford Del Prete EVP,

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Data and AI LATAM 2018

Data and AI LATAM 2018 El Internet de las Cosas para Desarrolladores Joaquin Guerrero Sr. Technical Evangelist Microsoft LATAM The Internet of Things isn t a technology revolution IoT is a business revolution, enabled by technology

More information

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

How to Route Internet Traffic between A Mobile Application and IoT Device?

How to Route Internet Traffic between A Mobile Application and IoT Device? Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup

More information

ARM mbed mbed OS mbed Cloud

ARM mbed mbed OS mbed Cloud ARM mbed mbed OS mbed Cloud MWC Shanghai 2017 Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud applications Analytics

More information

ARM mbed Technical Overview

ARM mbed Technical Overview ARM mbed Technical Overview Jerry Wang, FAE, ISG ARM Tech Forum Taipei July 4 th 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application

More information

The Three Software Stacks Required for IoT. Benjamin Cabé Eclipse

The Three Software Stacks Required for IoT. Benjamin Cabé Eclipse The Three Software Stacks Required for IoT Benjamin Cabé Eclipse Foundation @kartben IoT? Applications Collect, exchange & analyze data IoT? Applications Collect, exchange & analyze data Sensing / Actuating

More information

DESIGN AND DEPLOY INTELLIGENT, LOW-POWER AND LOW-COST WIRELESS NETWORKS

DESIGN AND DEPLOY INTELLIGENT, LOW-POWER AND LOW-COST WIRELESS NETWORKS DESIGN AND DEPLOY INTELLIGENT, LOW-POWER AND LOW-COST WIRELESS NETWORKS NXP SEMICONDUCTORS & THINGSTREAM GORDON PADKIN, NXP BRUCE JACKSON, THINGSTREAM NEIL HAMILTON, THINGSTREAM MAY 2018 Learn how to develop

More information

IoT Security Fundamentals That Must Be Solved. Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016

IoT Security Fundamentals That Must Be Solved. Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016 1 IoT Security Fundamentals That Must Be Solved Fredrik Beckman CEO Apptimate AB Engagement Manager Combitech AB September 2016 2 1. IoT products must die 2. Rosetta stone 3. Thanks' for letting me in!

More information

IoT Market: Three Classes of Devices

IoT Market: Three Classes of Devices IoT Market: Three Classes of Devices Typical Silicon BOM PC-Like Embedded Devices ~100 million units ATM, Retail Point of Service Intel Core $100+ Smart Things ~800 million units PLC, Edge Gateway, Thermostat

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

A Guided Tour of Eclipse IoT: 3 Software Stacks for IoT. Benjamin Cabé, Eclipse

A Guided Tour of Eclipse IoT: 3 Software Stacks for IoT. Benjamin Cabé, Eclipse A Guided Tour of Eclipse IoT: 3 Software Stacks for IoT Benjamin Cabé, Eclipse Foundation @kartben Asset Tracking The solution The 3 IoT Software Stacks SECURITY ONTOLOGIES Hardware Abstraction Layer (HAL)

More information

Part I: Building intelligent, low power, connected things at a low cost

Part I: Building intelligent, low power, connected things at a low cost Part I: Building intelligent, low power, connected things at a low cost Introductions Market trends - edge/fog Global connectivity connectivity challenges & options Connecting the edge & the options Device

More information

Hands-On with IoT Standards & Protocols

Hands-On with IoT Standards & Protocols DEVNET-3623 Hands-On with IoT Standards & Protocols Casey Bleeker, Developer Evangelist @geekbleek Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this

More information

IoT Security: Hardening Services Over Connected Devices. Brian

IoT Security: Hardening Services Over Connected Devices. Brian IoT Security: Hardening Services Over Connected Devices Brian Knopf @DoYouQA WHO AM I Sr Director of Security Research & IoT Architect @Neustar @DoYouQA 20+ Home Previously years in IT, QA, Dev & Security

More information

Project Zygote. Rapid prototyping for the Internet of Things

Project Zygote. Rapid prototyping for the Internet of Things Project Zygote Rapid prototyping for the Internet of Things The Problem we set out to solve How to make interconnecting things easier? What IoT means to us Seamless interconnection between any IoT enabled

More information

Agile IoT. Diana Chirila, SAP Cloud Platform Presales Specialist

Agile IoT. Diana Chirila, SAP Cloud Platform Presales Specialist Agile IoT Diana Chirila, SAP Cloud Platform Presales Specialist SAP Cloud Platform Internet of Things 4.0 Develop, customize and operate IoT applications in cloud Applications on SAP Cloud Platform Key

More information

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013.

Publishing Enterprise Web Applications to BYOD using a Granular. Trust Model. Shachaf Levi IT Client Security & Connectivity May 2013. Publishing Enterprise Web Applications to BYOD using a Granular Trust Model Shachaf Levi IT Client Security & Connectivity May 2013 Public Legal Notices This presentation is for informational purposes

More information

Keys for Success: Today s Landscape of IoT Technologies and Security Standards

Keys for Success: Today s Landscape of IoT Technologies and Security Standards Keys for Success: Today s Landscape of IoT Technologies and Security Standards Pratul Sharma, Technical Marketing Manager, ARM Amit Shah, VP R&D, Alcatel-Lucent mbed Sponsored session/ ARM Tech Con 2015

More information

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE

SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE SOLUTION OVERVIEW THE ARUBA MOBILE FIRST ARCHITECTURE March 2018 Table of Contents Introduction...1 Design...2 Use Cases...2 Underlay...3 Overlay...3 Dynamic Segmentation...3 Non-Stop Networking...4 Summary...5

More information

DEEP ARMOR. Hands-on Exploitation & Hardening of Wearable and IoT Platforms. Sumanth Naropanth & Sunil Kumar

DEEP ARMOR. Hands-on Exploitation & Hardening of Wearable and IoT Platforms. Sumanth Naropanth & Sunil Kumar DEEP ARMOR Hands-on Exploitation & Hardening of Wearable and IoT Platforms Sumanth Naropanth & Sunil Kumar Agenda Technical overview of an IoT/wearable ecosystem Building blocks Communication Protocols

More information

IoT on Fedora Using Fedora as a base for the IoT Revolution

IoT on Fedora Using Fedora as a base for the IoT Revolution IoT on Fedora Using Fedora as a base for the IoT Revolution Presented by Peter Robinson Fedora contriibutor, Red Hatter CC-BY-SA Overview Am I just going to talk ARM? HELL NO!! IoT is a LOT bigger than

More information

Lecture 04 Introduction: IoT Networking - Part I

Lecture 04 Introduction: IoT Networking - Part I Introduction to Industry 4.0 and Industrial Internet of Things Prof. Sudip Misra Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture 04 Introduction: IoT Networking

More information

IOTIVITY INTRODUCTION

IOTIVITY INTRODUCTION IOTIVITY INTRODUCTION Martin Hsu Intel Open Source Technology Center 1 Content may contain references, logos, trade or service marks that are the property of their respective owners. Agenda Overview Architecture

More information

temp heat I/O A/C flow valve pump

temp heat I/O A/C flow valve pump temp flow I/O heat A/C valve pump temp flow I/O heat A/C valve pump temp temp time flow I/O heat A/C valve pump temp temp time flow I/O heat A/C valve pump 0110100101101110101101 temp temp time flow I/O

More information

Anjay LwM2M SDK. Enabling lightweight device management in the Internet of Things ecosystems

Anjay LwM2M SDK. Enabling lightweight device management in the Internet of Things ecosystems Anjay LwM2M SDK Enabling lightweight device management in the Internet of Things ecosystems Introduction In the era of the Internet of Things, the challenge that device manufacturers truly need to face

More information

IoT protocols for the Things

IoT protocols for the Things IoT protocols for the Things Who am I? Christian E. Legare Executive Vice President & Chief Technology Officer I joined Micrium in 2002, a leading provider of embedded software, including the uc/os real

More information

IoT Intro. Fernando Solano Warsaw University of Technology

IoT Intro. Fernando Solano Warsaw University of Technology IoT Intro Fernando Solano Warsaw University of Technology fs@tele.pw.edu.pl Embedded Systems Wireless Sensor and Actuator Networks Enabling technologies Communication Protocols Cloud Computing Big Data

More information

Are Device Response Times a Neglected Risk of IoT?

Are Device Response Times a Neglected Risk of IoT? Are Device Response Times a Neglected Risk of IoT? Balwinder Kaur Principal Software Engineer, Emerging Technologies Open IoT Summit, Portland. February 22, 2017 Notice The information and materials included

More information

The Zentri Secure IoT Platform

The Zentri Secure IoT Platform The Zentri Secure IoT Platform Zentri s Secure IoT Platform empowers industrial, commercial, and consumer product companies to securely build, launch, manage, and scale cloud-connected products. With Zentri,

More information

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader

More information

OVAL + The Trusted Platform Module

OVAL + The Trusted Platform Module OVAL + The Trusted Platform Module Charles Schmidt June 14, 2010 Overview OVAL Can assess a vast diversity of system state Usually software based software attacks can compromise Trusted Platform Module

More information

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited

Arm Mbed Edge. Shiv Ramamurthi Arm. Arm Tech Symposia Arm Limited Arm Mbed Edge Shiv Ramamurthi Arm Arm Tech Symposia 2017 IoT increasing efficiency, yield, and convenience Commercial buildings Better energy & space utilization Precision farming and connected sites Increased

More information

Public Material. NEO-IDM (New IoT Device Management) Platform Based on LwM2M. Jong-Young Lee. ( MDS Technology

Public Material. NEO-IDM (New IoT Device Management) Platform Based on LwM2M. Jong-Young Lee. ( MDS Technology Public Material TM NEO-IDM (New IoT Device Management) Platform Based on Jong-Young Lee ( jongyoung@mdstec.com) MDS Technology Neo-IDM Overview NEO-IDM Platform NEO-IDM Platform is IOT Platform for monitoring,

More information

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC

EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE PUBLIC EDGE COMPUTING & IOT MAKING IT SECURE AND MANAGEABLE FRANCK ROUX MARKETING MANAGER, NXP JUNE 6 2018 PUBLIC PUBLIC 2 Key concerns with IoT.. PUBLIC 3 Why Edge Computing? CLOUD Too far away Expensive connectivity

More information

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications

More information

Data and Intelligence in Storage Carol Wilder Intel Corporation

Data and Intelligence in Storage Carol Wilder Intel Corporation Data and Intelligence in Storage Carol Wilder carol.a.wilder@intel.com Intel Corporation 1 Legal Notices/Disclaimer Intel technologies features and benefits depend on system configuration and may require

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi

UNIK Building Mobile and Wireless Networks Maghsoud Morshedi UNIK4700 - Building Mobile and Wireless Networks Maghsoud Morshedi IoT Market https://iot-analytics.com/iot-market-forecasts-overview/ 21/11/2017 2 IoT Management Advantages Remote provisioning Register

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Breaking out of the cloud: Local trust management and rendezvous in Named Data Networking of Things

Breaking out of the cloud: Local trust management and rendezvous in Named Data Networking of Things Breaking out of the cloud: Local trust management and rendezvous in Named Data Networking of Things Wentao Shang, Zhehao Wang, Alexander Afanasyev, Jeff Burke, Lixia Zhang UCLA 2017 ACM/IEEE Int. Conf.

More information

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS

Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Ido Sarig, General Manager, IOT Solutions Group DELIVERING END-TO-END INTELLIGENCE FOR THE INTERNET OF THINGS Why is the internet of things inevitable? More than two billion gallons of fuel are wasted

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Energy market: Opportunities and Technologies

Energy market: Opportunities and Technologies Energy market: Opportunities and Technologies Dominique Vincent Business Development Manager, Digi Singapore Market opportunities Agenda Energy Management: X-Grid, SmartLee, Smart metering: market, technology

More information

Hypervisor Security First Published On: Last Updated On:

Hypervisor Security First Published On: Last Updated On: First Published On: 02-22-2017 Last Updated On: 05-03-2018 1 Table of Contents 1. Secure Design 1.1.Secure Design 1.2.Security Development Lifecycle 1.3.ESXi and Trusted Platform Module 2.0 (TPM) FAQ 2.

More information

THE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager

THE NEED FOR SMART SENSORS IN IOT. Internet. Uwe Hirsch Senior Business Development Manager THE NEED FOR SMART SENSORS IN IOT Internet Uwe Hirsch Senior Business Development Manager Uwe.Hirsch@Avnet-Memec.eu IOT APPLICATIONS ENABLED BY DIFFERENT SENSORS Traffic Management Up to 40% of traffic

More information

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received

More information

Windows IoT Security. Jackie Chang Sr. Program Manager

Windows IoT Security. Jackie Chang Sr. Program Manager Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport

More information

IP Based Architecture for the Internet of Things. IPV6 and Related Standards for IoT Interoperability November 20, 2014

IP Based Architecture for the Internet of Things. IPV6 and Related Standards for IoT Interoperability November 20, 2014 IP Based Architecture for the Internet of Things IPV6 and Related Standards for IoT Interoperability November 20, 2014 1 IoT Architecture Problems to Solve Interoperability In the way in which software

More information

SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions

SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions SSG Platform Security Division & IOTG Jan Krueger Product Manager IoT Security Solutions THIS SLIDE MUST BE USED WITH ANY SLIDES REMOVED FROM THIS PRESENTATION Legal Disclaimers Intel technologies features

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group

More information

The onem2m standard Horizontal Service Layer

The onem2m standard Horizontal Service Layer The onem2m standard Horizontal Service Layer June 8 th 2017, Bordeaux Nicolas Damour, Chairman of the onem2m WG2-Architecture group ndamour@sierrawireless.com Sierra Wireless is building the Internet of

More information

Brewing beer with Python. Chesco

Brewing beer with Python. Chesco Brewing beer with Python Chesco Igual @chescales What shalt thou learn? - Building an IoT backend - Technologies, Protocols and Tools - Backend considerations - Meet a full running architecture - Learn

More information

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur

Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 05 Basics of IoT Networking-Part-I In this lecture and

More information

Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017

Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Building a chain of trust from the device to the cloud Christian Kuhn, Senior Director, Business Development DNAC - 16 November 2017 Trust is vital and it s what we provide enabling our clients to deliver

More information

Accelerating IoT with ARM mbed

Accelerating IoT with ARM mbed Accelerating IoT with ARM mbed Zach Shelby VP Marketing Internet of Things Business Unit mbed Connect / Shenzhen, China 15 th Dec 2015 Productivity Security Connectivity Management Efficiency 2 Since TechCon

More information

Stanislav Harvan Internet of Things

Stanislav Harvan Internet of Things Stanislav Harvan v-sharva@microsoft.com Internet of Things IoT v číslach Gartner: V roku 2020 bude na Internet pripojených viac ako 25mld zariadení: 1,5mld smart TV 2,5mld pc 5mld smart phone 16mld dedicated

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex Whitepaper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex Whitepaper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems www.adlinktech.com 2017 Table of Contents 1. Introduction........ P 3 2. Iot and

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Making Things Smart. ISN Conference Long Range Connectivity Networks for Sensors

Making Things Smart. ISN Conference Long Range Connectivity Networks for Sensors Making Things Smart ISN Conference Long Range Connectivity Networks for Sensors November 4 th 2014 1 Low-power RF : A new option for M2M M2M Conquers new domains! Mobile Broadband (Mobile, SIM Card) Low

More information

Modern BIOS Management from the Cloud

Modern BIOS Management from the Cloud Modern BIOS Management from the Cloud Josué Negrón Sr. Solutions Architect VMware Brooks Peppin EUS Systems Engineer VMware Agenda Modern Management Challenges Cloud Architecture Microsoft BIOS & Firmware

More information

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing

DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing DELIVERING TRUSTED CLOUDS How Intel and Red Hat integrated solutions for secure cloud computing Steve Orrin - Federal Chief Technologist, Intel Steve Forage - Senior Director, Cloud Solutions, Red Hat

More information

Eclipse IoT State of the Union. Benjamin Cabé, Eclipse

Eclipse IoT State of the Union. Benjamin Cabé, Eclipse Eclipse IoT State of the Union Benjamin Cabé, Eclipse Foundation @kartben Typical IoT Architecture telemetry telemetry commands commands Gateways Devices (sensors & actuators) IoT Cloud Platform Applications

More information

INTEROPERABILITY ISSUES IN IOT

INTEROPERABILITY ISSUES IN IOT INTEROPERABILITY ISSUES IN IOT 4/8/2016 WHITEPAPER Interoperability is the key issue ailing the mass adoption of IoT devices. Standardization is the remedy. This paper talks about the inherent Interoperability

More information

Getting Started with AWS IoT

Getting Started with AWS IoT Getting Started with AWS IoT Denis V. Batalov, PhD @dbatalov Sr. Solutions Architect, AWS EMEA 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Things are becoming connected Source:

More information

HOP Ubiquitous Overview

HOP Ubiquitous Overview HOP Ubiquitous Overview HOP Ubiquitous Overview Commercial in confidence Commercial HOP Ubiquitous in confidence S.L. 2015 HOP www.hopu.eu Ubiquitous S.L. Page 20141 Dr. Antonio J. Jara HOP Ubiquitous

More information

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions.

Planning an architecture for the. Internet of Things. IoT Expo, Nov 5, Sumit Sharma Director, API Solutions. Planning an architecture for the Internet of Things IoT Expo, Nov 5, 2014 Sumit Sharma Director, API Solutions sumit.sharma@mulesoft.com Leading connectivity platform for enterprise applications, mobile

More information

Internet of Things: An Introduction

Internet of Things: An Introduction Internet of Things: An Introduction IoT Overview and Architecture IoT Communication Protocols Acknowledgements 1.1 What is IoT? Internet of Things (IoT) comprises things that have unique identities and

More information

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017

ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM. 12 July 2017 ONEM2M INDUSTRY DAY ALAN SOLOWAY, QUALCOMM 12 July 2017 Time Isolated Aggregated Massively Connected Cloud / Data Centres Rich Devices / Gateways Constrained Devices The architecture will need to achieve

More information

RAISE YOUR PERFORMANCE TO NEW HEIGHTS

RAISE YOUR PERFORMANCE TO NEW HEIGHTS Product Brief Intel B360 Chipset Upgrade your PC Experience The Intel B360 Chipset and 8 th Generation Intel Core Desktop Processors Experience great performance with 8th Generation Intel Core desktop

More information

Intel. Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community. Mohan J. Kumar Intel Fellow

Intel. Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community. Mohan J. Kumar Intel Fellow Intel Rack Scale Design: A Deeper Perspective on Software Manageability for the Open Compute Project Community Mohan J. Kumar Intel Fellow Agenda Rack Scale Design (RSD) Overview Manageability for RSD

More information

2 - onem2m Common Architecture for IoT

2 - onem2m Common Architecture for IoT 2 - onem2m Common Architecture for IoT Dr. Mahdi Ben Alaya Founder & CEO, Sensinov benalaya@sensinov.com www.sensinov.com November 14, 2016 M2M world of connected services 2 Introduction Communication

More information

Securing your in-ear fitness coach: Challenges in hardening next generation wearables

Securing your in-ear fitness coach: Challenges in hardening next generation wearables DEEP ARMOR Securing your in-ear fitness coach: Challenges in hardening next generation wearables Sumanth Naropanth & Sunil Kumar Who are we? Sunil Kumar Security Analyst Deep Armor Ola Security, Aricent

More information

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1 Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept 2005 TCG Track: SEC 502 1 The Need for Trusted Computing 2 The Real World Innovation is needed: Client software

More information

How onem2m fits into the landscape of IoT technologies

How onem2m fits into the landscape of IoT technologies How onem2m fits into the landscape of IoT technologies 3 rd onem2m Industry Day Bangalore, September 20 th 2017 Dr. Josef J. Blanz 20-Sep-2017 3rd onem2m Industry Day hosted by TSDSI 1 M2M/IoT: Surge of

More information