Wireless Sensors for IOT s
|
|
- Jemimah Blair
- 5 years ago
- Views:
Transcription
1 Track 4 - Session 8 - Wireless Sensors Wireless Sensors for IOT s Jeff Johnson Naval District Washington CIO August [XX], 2017 Tampa Convention Center Tampa, Florida
2 Advantages of Wireless Communication Any data or information can be transmitted faster and with a high speed Maintenance and installation is less cost for these networks IOT devices are using wireless as a means of a more ubiquitous sensor environment Energy Exchange: Connect Collaborate Conserve 2
3 Disadvantages of Wireless Communication An unauthorized person can easily capture the wireless signals which spread through the air. It is important to secure the wireless devices so that the information cannot be misused by unauthorized users Accrediting authority must consider data and security risks as part of the overall design, as wireless may open backdoors to other network devices Energy Exchange: Connect Collaborate Conserve 3
4 Astrolavos Lab What is the problem with IOT? Credit: Manos Antonakakis, PhD Assistant Professor, ECE, Georgia Tech 4
5 DISA STIG Requirements If Wireless devices transmit unclassified DoD data, then they must use FIPS validated cryptographic modules for data in transit. FIPS validation provides assurance that the cryptographic modules are implemented correctly and resistant to compromise. Failure to use FIPS validated cryptographic modules makes it more likely that sensitive DoD data will be exposed to unauthorized people. NOTE: This does not apply to Wireless telemetry sensor data where the accrediting authority has determined the data is not sensitive. Navy Authority: Avoid non-compliant solutions and utilize the approved NAVY architecture ; we have to manage risk and this is an area where we have to wisely prevent the introduction of unnecessary risk. Energy Exchange: Connect Collaborate Conserve 5
6 Bluetooth A Bluetooth technology is a high speed low powered wireless technology link that is designed to connect devises. It uses a low power radio devices that transmits over short distance ( around 30 feet). It is achieved by embedded low cost transceivers into the devices. It utilizes frequency band of 2.45GHz. Bluetooth can connect up to eight devices simultaneously and each device offers a unique 48 bit address with the connections being made point to point or multipoint. History Of Bluetooth: Bluetooth wireless technology was named after a Danish Viking and King, Harald Blatand; his last name means Bluetooth in English. He united Denmark and Norway, just as Bluetooth wireless technology unites disparate devices. Energy Exchange: Connect Collaborate Conserve 6
7 Zigbee A high-level communication protocols used to create networks with small, low-power radios such as for home automation, medical device data collection, and other low-power low-bandwidth needs, designed for projects which need wireless connection. The technology is intended to be simpler and less expensive than bluetooth or WiFi. Applications include wireless light switches, electrical meters with in-home-displays, traffic management systems, and other consumer and industrial equipment that requires short-range low-rate wireless data transfer. It transmits up to 300ft. Zigbee devices can transmit data over long distances by passing data through a mesh of devices to reach more distant ones. Zigbee name refers to the waggle dance of honey bees after their return to the beehive. Energy Exchange: Connect Collaborate Conserve 7
8 ISA 100 Wireless Systems for Industrial Automation Key technical features of ISA100 Wireless include the following: Distributed control in the field (object technology in smart devices) Multiple protocols, including wired HART, supported in a single network (object technology) Functionality beyond traditional wireless sensor network (WSN) applications Time-enhanced, two-layer AES-128 based security, and support for all AES security levels (one manufacturer has FIPS certification) Provision over the air (OTA) capabilities or directly using out of band (OOB) Scalable and reliable network tested to 500 devices (so far) Proven reliability in congested wireless environments IPv6-based technology (6LoWPAN) for industrial applications, supports the Internet of Things More expensive than Bluetooth or Zigbee but developed for the Industrial Marketplace and can meet DISA STIG requirements Energy Exchange: Connect Collaborate Conserve 8
9 Astrolavos Lab IoT Network Indicators IoT devices are extremely chatty. They tend to connect to tens of different locations in the Internet. 9
10 Astrolavos Lab What is the attack surface for IoTs? Credit: Manos Antonakakis, PhD Assistant Professor, ECE, Georgia Tech 10
11 Recent Quotes Dams, the power grid and other such infrastructure were once closed network systems. Then they were added to the Internet. "We still thought of them as closed networks -- but they're not," said Lt. Gen. Edward Cardon, commander of U.S. Army Cyber Command and Second Army. "Other systems touch them and that starts to create some problems," such as vulnerabilities to being hacked, he said. Mark Bristow, chief of Incident Response, Department of Homeland Security, Industrial Control Systems-Cyber Emergency Response Team, said there are in the U.S. 84,000 devices running buildings, power plants and other infrastructure, all connected to and part of the "Internet of things," or IoT. Another example, Bristow said, are Nest Learning Thermostats, which are replacing traditional thermostats in ever-increasing numbers. If someone hacked into this system on a large scale, there would be lots of unintended consequences from the design perspective. Mark McLaughlin, chairman of the board, Palo Alto Networks, said there's been a big uptick in ransom attacks at hospitals, where hackers demand ransom money or else they threaten to shut down life-support equipment the hospitals use that's connected to the IoT. McLaughlin added that trust in the IoT "is bleeding out" and that there's a "razor-thin margin between chaos and order" in this IoT-driven society that touches everyone's lives. 1 Energy Exchange: Connect Collaborate Conserve 1
12 Questions 1 Energy Exchange: Connect Collaborate Conserve 2
NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6)
NAVAL DISTRICT WASHINGTON SMARTSHORE CASE STUDY Jeff Johnson NDW CIO (N6) 1 Creating Cyber Secure Enterprise Control Systems Networks Agenda US Navy, NDW Industrial Controls overview The new cyber threat
More informationCyberFence Protection for DNP3
CyberFence Protection for DNP3 August 2015 Ultra Electronics, 3eTI 2015 DNP3 Issues and Vulnerabilities DNP3 is one of the most widely used communications protocols within the utility space for the purpose
More informationISA100 Wireless Development and Certification Process
ISA100 Wireless Development and Certification Process Penny Chen Principal Systems Architect Yokogawa IA Global Strategic Marketing Center (USMK) Standards Certification Education & Training Publishing
More informationSystem Architecture Challenges in the Home M2M Network
System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes
More informationClouds and Things. Implications of the Cloud and Internet-of-Things for SCADA/ICS. April 25, 2018
Clouds and Things Implications of the Cloud and Internet-of-Things for SCADA/ICS April 25, 2018 Agenda for this presentation Overview of the Cloud, Fog & Internet-of-Things IoT device capabilities IoT
More informationRESOURCES. By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011
Moving Beyond Zigbee for Star Networks RESOURCES By: Chris Downey, Laird Technologies Product Manager, Telematics & Wireless M2M Date: May 25, 2011 Multi-hop mesh protocols, such as Zigbee, are getting
More informationOrientation and Guidance within Doors
Orientation and Guidance within Doors Marianna Sipos John von Neumann Faculty of Informatics, Budapest Tech sipos.marianna@nik.bmf.hu Abstract: There is a research in Budapest Tech, John von Neumann Faculty
More informationBluetooth. 3.3 Latest Technology in Wireless Network. What is BLUETOOTH: Bluetooth 2/17/2016
3.3 Latest Technology in Wireless Network Bluetooth Bluetooth Bluetooth is a high-speed, low-power microwave wireless link technology, designed to connect phones, laptops, PDAs and other portable equipment
More informationCybersmart Buildings: Securing Your Investments in Connectivity and Automation
Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning
More informationIEEE-SA Internet of Things - Security & Standards
IEEE-SA Internet of Things - Security & Standards Srikanth Chandrasekaran IEEE Standards Association MOBILE WORLD CONGRESS, SHANGHAI JUNE 2018 What does the IEEE Standards Association (IEEE-SA) do? Vision:
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationInternet of Things and M2M
Internet of Things and M2M Pedram Radmand, Ph.D. Wireless Sensor Network Research Newracom Inc Wireless Technology and IoT newracom.com Direct 949-390-7111 pedrad@gmail.com pedram.radmand@newracom.com
More informationSecuring the End Node in a Cloud World
Securing the End Node in a Cloud World Approved for Public Release: RY-11-0022, 88 ABW-11-0375 Lt Col Ken Edge, PhD Electronic & Net-Centric Warfare Division Air Force Research Laboratory Of Clouds and
More informationWireless Mesh Infrastructure Networks for Supporting Water Districts Data, SCADA and Video Requirements
Wireless Mesh Infrastructure Networks for Supporting Water Districts Data, SCADA and Video Requirements Standards Certification Education & Training Publishing Conferences & Exhibits Speaker: Matthew Selby
More informationExploring the ISA100.11a Standard. Exploring the ISA100.11a Standard. William (Bill) Ayers America s OneWireless Consultant.
Exploring the ISA100.11a Standard March 2012 William (Bill) Ayers America s OneWireless Consultant Exploring the ISA100.11a Standard WHY Standards World Leader SolutionsFocused Greatest Flexibility International
More informationInternet of Things: Latest Technology Development and Applications
Internet of Things: Latest Technology Development and Applications Mr UY Tat-Kong Assistant Vice President Network Evolution Planning & Development 22 August 2014 Agenda Communication Technologies Development
More informationFederal Information Processing Standard (FIPS) What is it? Why should you care?
Federal Information Processing Standard (FIPS) 140-2 What is it? Why should you care? SECURITY IS BECOMING A GROWING CONCERN The migration from TDM to IP communication networks has drastically increased
More informationComplying with RBI Guidelines for Wi-Fi Vulnerabilities
A Whitepaper by AirTight Networks, Inc. 339 N. Bernardo Avenue, Mountain View, CA 94043 www.airtightnetworks.com 2013 AirTight Networks, Inc. All rights reserved. Reserve Bank of India (RBI) guidelines
More informationComprehensive Networking Solutions
Comprehensive Networking Solutions End to End Networking Solutions in the Water and Wastewater Sectors Standards Certification Education & Training Publishing Conferences & Exhibits Aug 5-7, 2014 Orlando,
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationMadrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation
Madrid, 25 y 26 de mayo de 2015 ABB Automation Days Wireless Instrumentation Discovering the Unknown Rising demand for monitoring of process values by Increasing efficiency, reducing waste (raw materials,
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationData Loss Prevention Whitepaper. When Mobile Device Management Isn t Enough. Your Device Here. Good supports hundreds of devices.
Data Loss Prevention Whitepaper When Mobile Device Management Isn t Enough Your Device Here. Good supports hundreds of devices. Contents Shifting Security Landscapes 3 Security Challenges to Enterprise
More informationSecuring Medical Devices Using Adaptive Testing Methodologies
SESSION ID: ASD-R10 Securing Medical Devices Using Adaptive Testing Methodologies Daniel Miessler Director of Advisory Services IOActive, Inc. @danielmiessler SESSION ID: ASD-R10 Securing Medical Devices
More informationWireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies
Wireless (NFC, RFID, Bluetooth LE, ZigBee IP, RF) protocols for the Physical- Data Link layer communication technologies 1 Connected devices communication to the Local Network and Gateway 1 st to i th
More informationDoD Wireless Smartphone Security Requirements Matrix Version January 2011
DoD Wireless Smartphone Security s Matrix Version 3.5 21 January 2011 1 This matrix was developed by Defense Information Systems Agency Field Security Operations (DISA FSO) and is an unofficial compilation
More informationThe Internet of Light the key to the Internet of Things
The Internet of Light the key to the Internet of Things Tridonic s innovative net4more toolbox enables light to become the backbone of the Internet of Things. 13 March 2016 More connected devices than
More informationSecuring Your Data ATA Spec 42. Regan Brossard - The Boeing Company June 2017
Securing Your Data ATA Spec 42 Regan Brossard - The Boeing Company June 2017 Agenda PKI - Use in the Aviation Industry and why is it necessary Guidance for Transitioning to Connected Airplanes Choosing
More informationBite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs. January 27, 2016
Bite of Science Austin Alfredo Pérez Applications Engineer, Silicon Labs January 27, 2016 1 Agenda About Me Silicon Labs Who are we? What do we do? Applications Engineering Functions Skills needed IoT
More informationAddressing Unique Smart Grid Challenges with Converged Gateways
April 5, 2011 Addressing Unique Smart Grid Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI Smart Grid Workshop 5-6 April 2011, Sophia Antipolis, France Where
More informationOmar Alrawi. Security Evaluation of Home-based IoT Deployments
Omar Alrawi Security Evaluation of Home-based IoT Deployments About Us Astrolavos Research Lab at Georgia Tech We specialize in Network Security Measurements Work is presented on behalf of my team Omar
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationSDCI Student Project 6 Sensing Capabilites Go Wireless. Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri
SDCI 2012 Student Project 6 Sensing Capabilites Go Wireless Mario Caruso Francesco Leotta Leonardo Montecchi Marcello Pietri Overview Wireless Sensor Network Is a collection of nodes organized into a cooperative
More informationKeynote Speakers CyberC 2010
Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential
More informationSmart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities
Smart Cities Real Opportunity or Marketing Hype? Aaron Hesse, PE, RCDD Infrastructure Engineer Avista Utilities Driving Forces The Smart City Concept Components of a Smart City Smart City Infrastructure
More informationModulation. Propagation. Typical frequency bands
References Wireless Technology 2 AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. The physical layer provides mechanical, electrical, l functional,
More informationAT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE
Wireless Technology AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE UNDERLYING WIRELESS TECHNOLOGIES. References 2 The physical layer provides mechanical, electrical, l functional,
More informationBUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS
BUYING DECISION CRITERIA WHEN DEVELOPING IOT SENSORS PHILIP POULIDIS VIDEO TRANSCRIPT What is your name and what do you do? My name is Philip Poulidis and I m the VP and General Manager of Mobile and Internet
More informationPresentation by Ms. Salome Tshikomba(Colleen)
HOW WIRELESS ELECTRICITY THEFT DETECTION CAN ASSIST IN REDUCING THE THEFT OR STEALING OF ELECTRICITY 9 October 2018 Presentation by Ms. Salome Tshikomba(Colleen) 1 Introduction The presentation looks at
More informationWIRELESS DLM WATTSTOPPER. Intelligent Secure Scalable. Digital Lighting Management. designed to be better.
WIRELESS DLM Intelligent Secure Scalable WATTSTOPPER Digital Lighting Management designed to be better. DESIGNING IN AN ERA OF CHANGE 1986 Analog Control Devices World Wide Web Initial Energy Codes IoT
More informationOpenWay by Itron Security Overview
Itron White Paper OpenWay by Itron OpenWay by Itron Security Overview Kip Gering / R. Eric Robinson Itron Marketing / Itron Engineering 2009, Itron Inc. All rights reserved. 1 Executive Summary 3 Intent
More informationCyber Attacks & Breaches It s not if, it s When
` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,
More informationWireless communication standards: What makes them unattractive for WSN:
Wireless communication standards: IEEE 802.11 a/b/g Bluetooth GSM What makes them unattractive for WSN: Power hungry (need big batteries) Complexity (need lots of clock cycles and memory) New protocol
More informationThe Internet of Things
The Internet of Things George Debbo Presentation for SASGI Meeting on 22 nd June 2016 1 Agenda What is IoT? How big is it? What effect does it have on telecom networks? Use cases/applications: The connected
More informationBrian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos
Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos Cloud Security Alliance, 2015 Agenda 1. Defining the IoT 2. New Challenges introduced by the IoT 3. IoT Privacy Threats
More informationRadiocommunications in. ISA 100 solutions. Jean-Pierre Hauet. KB Intelligence ISA District 12 VP Président ISA-France. Standards.
Radiocommunications in industry : the key features of ISA 100 solutions Standards Certification Education & Training Publishing Conferences & Exhibits Jean-Pierre Hauet KB Intelligence ISA District 12
More informationVulnerabilities in Process Control Networks: What Are We Protecting Against?
Vulnerabilities in Process Control Networks: What Are We Protecting Against? Mark Benedict Ultra Electronics, 3eTI Standards Certification Education & Training Publishing Conferences & Exhibits 2014 ISA
More informationCurrent Threat Environment
Current Threat Environment Software Engineering Institute Carnegie Mellon University Pittsburgh, PA 15213, PhD Technical Director, CERT mssherman@sei.cmu.edu 29-Aug-2014 Report Documentation Page Form
More informationEDITORIAL: Wireless Networks and Their Applications in Building Automation Systems. Shengwei Wang, PhD Member ASHRAE
VOLUME 14, NUMBER 4 HVAC&R RESEARCH JULY 2008 EDITORIAL: Wireless Networks and Their Applications in Building Automation Systems INTRODUCTION Shengwei Wang, PhD Member ASHRAE In recent years, wireless
More information2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana!
2017 DCMME The Future Of Manufacturing for Energy and IoT Is Happening Today in Indiana! Mission Rapidly develop, test, and help commercialize next generation energy systems that are safe, reliable, and
More informationTrusted Platform Module explained
Bosch Security Systems Video Systems Trusted Platform Module explained What it is, what it does and what its benefits are 3 August 2016 2 Bosch Security Systems Video Systems Table of contents Table of
More informationAttackers Process. Compromise the Root of the Domain Network: Active Directory
Attackers Process Compromise the Root of the Domain Network: Active Directory BACKDOORS STEAL CREDENTIALS MOVE LATERALLY MAINTAIN PRESENCE PREVENTION SOLUTIONS INITIAL RECON INITIAL COMPROMISE ESTABLISH
More informationPresented by Viraj Anagal Kaushik Mada. Presented to Dr. Mohamed Mahmoud. ECE 6900 Fall 2014 Date: 09/29/2014 1
Presented by Viraj Anagal Kaushik Mada Presented to Dr. Mohamed Mahmoud ECE 6900 Fall 2014 Date: 09/29/2014 1 Outline Motivation Overview Wireless Sensor Network Components Characteristics of Wireless
More informationISA100 Technology A Network Communication Protocol
A Network Communication Protocol Open Consensus Industrial Standard for Process Control September 2013 1 Open Global Standard Over 400 automation professionals from many global companies around the world
More informationCYBERSMART BUILDINGS. Securing Your Investments in Connectivity and Automation
CYBERSMART BUILDINGS Securing Your Investments in Connectivity and Automation JANUARY 2018 WELCOME STEVE BRUKBACHER Application Security Manager Global Product Security Johnson Controls 1 WHY ARE WE HERE
More informationSecurity. Protect your business from security threats with Pearl Technology. The Connection That Matters Most
Security Protect your business from security threats with Pearl Technology The Connection That Matters Most Committed to Your Future When it comes to your business, security can mean many things. But to
More informationThe Internet of Things. Steven M. Bellovin November 24,
The Internet of Things Steven M. Bellovin November 24, 2014 1 What is the Internet of Things? Non-computing devices...... with CPUs... and connectivity (Without connectivity, it s a simple embedded system)
More informationConnected smart lighting. Led event 2014 Pepijn Herman
Connected smart lighting Led event 2014 Pepijn Herman 2-12-2014 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Branch in Düsseldorf, Germany Team of 21 engineers
More informationEndpoint Protection : Last line of defense?
Endpoint Protection : Last line of defense? First TC Noumea, New Caledonia 10 Sept 2018 Independent Information Security Advisor OVERVIEW UNDERSTANDING ENDPOINT SECURITY AND THE BIG PICTURE Rapid development
More informationThe Honest Advantage
The Honest Advantage READY TO CHALLENGE THE STATUS QUO GSA Security Policy and PCI Guidelines The GreenStar Alliance 2017 2017 GreenStar Alliance All Rights Reserved Table of Contents Table of Contents
More informationSecuring connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity
Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems
More informationSecureTrack. Supporting SANS 20 Critical Security Controls. March
SecureTrack Supporting SANS 20 Critical Security Controls March 2012 www.tufin.com Table of Contents Introduction... 3 Critical Control 4: Secure Configurations for Network Devices such as Firewalls, Routers,
More informationTHE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS
THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly
More informationWednesday, May 16, 2018
Wednesday, May 16, 2018 8:00 AM - 5:00 PM Wi Fi/WLAN Fundamentals Training by Tessco; Day Two of a Two Day Training. (Attendees must bring laptop computers for this training. Attendees should bring available
More informationHEALTHCARE IT NETWORK SURVEY REPORT
HEALTHCARE IT NETWORK SURVEY REPORT FEBRUARY 2019 PAGE 2 Healthcare IT Network Survey Report INTRODUCTION Harnessing digital technologies for patient engagement is essential for healthcare organizations
More informationWATER UTILITIES CHOOSE Fixed Wireless Broadband Communications
WATER UTILITIES CHOOSE Fixed Wireless Broadband Communications What these water utilities discovered is that there is a vast difference between low-end commercial-grade equipment and purpose-built technology
More informationUNCLASSIFIED//FOR OFFICIAL USE ONLY INDUSTRIAL CONTROL SYSTEMS CYBER EMERGENCY RESPONSE TEAM
ADVISORY ICSA-10-019-01 ZIGBEE PSEUDORANDOM NUMBER GENERATOR VULNERABILITY January 19, 2010 OVERVIEW On January 09, 2010, a security researcher published an attack on a ChipCon (CC) implementation of ZigBee
More informationWhat is Wi-SUN? Open-standards based secure, interoperable communications for large scale IoTfor Smart Utility and Smart City networks.
What is Wi-SUN? Open-standards based secure, interoperable communications for large scale IoTfor Smart Utility and Smart City networks. 2 Wi-SUN Alliance was established in April 2012 Incorporated as Not
More informationBYOD: The Solution for Districts That Don t Need the Lexus Model of 1:1 Computing
BLEgroup Thought Leadership Consortium: Industry and Schools Collaborating to Develop Leading-Edge Digital Teaching and Learning BYOD: The Solution for Districts That Don t Need the Lexus Model of 1:1
More information[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]
2011 [A SHORT REPORT ON BLUETOOTH TECHNOLOGY] By Ram Kumar Bhandari 1. Introduction Bluetooth Technology A Technical Report Bluetooth is a short-ranged wire-less communication technology implementing the
More informationNational Institute of Standards and Technology
National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through
More information12. Mobile Devices and the Internet of Things. Blase Ur, May 3 rd, 2017 CMSC / 33210
12. Mobile Devices and the Internet of Things Blase Ur, May 3 rd, 2017 CMSC 23210 / 33210 1 Today s class Security and privacy for: mobile devices the IoT safety-critical devices Discuss midterm 2 Mobile
More informationConnected Car Solutions Based on IoT
FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the
More informationUSE OF COGNITIVE RADIO TO IMPROVE SPECTRUM USAGE EFFICIENCY AND DATA CAPACITY
USE OF COGNITIVE RADIO TO IMPROVE SPECTRUM USAGE EFFICIENCY AND DATA CAPACITY Keith Nolan CTVR / The Telecommunications Research Centre keith.nolan@tcd.ie ctvr.ie reconfigr.com @keithnolan Overview CR
More informationResearch on Technology Used in Wireless Sensor Networks
Research on Technology Used in Wireless Sensor Networks Ratnesh Yadav 1, Namit Gupta 2 1 MCA, Teerthanker Mahaveer University, Moradabad 2 Assistant Professor, Teerthanker Mahaveer University, Moradabad
More informationClinical and ICT Cybersecurity Overview and Cases A242-3
Clinical and ICT Cybersecurity Overview and Cases A242-3 Elliot B. Sloane, PhD, CCE - Elected Fellow of ACCE, AIMBE, and HIMSS President and Founder Center for Healthcare Information Research and Policy,
More informationCyber Security: What s the Big Deal?
Cyber Security: What s the Big Deal? (and why it matters to you!) Debasis Bhattacharya, UHMC Jodi Ito, CISO, UH ITS maui.hawaii.edu/cybersecurity What is Cybersecurity? cy ber: adjective of, relating to,
More informationPower Management Techniques for Low- Energy IoT Devices
Power Management Techniques for Low- Energy IoT Devices Matt Saunders Director of Field Marketing, Microcontroller and Wireless Products, Silicon Labs With the rise of the Internet of Things (IoT), embedded
More informationInteragency Advisory Board Meeting Agenda, December 7, 2009
Interagency Advisory Board Meeting Agenda, December 7, 2009 1. Opening Remarks 2. FICAM Segment Architecture & PIV Issuance (Carol Bales, OMB) 3. ABA Working Group on Identity (Tom Smedinghoff) 4. F/ERO
More informationFederal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs
Federal Virtual Training Environment (FedVTE) Pre-Approved for CompTIA CEUs You can earn 1 CEU for each hour of training. Follow these requirements to earn and receive CEUs. All training must be at least
More informationWPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network
WPAN-like Systems WPAN Wireless Personal Area Network PAN: Personal Area Network. Small, within a few meters. WPAN: Wireless PAN. Mostly short-range, low-power, lowrate networks. More or less self-organizing.
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationWHY ARMIS. 1. Comprehensive Asset Discovery and Inventory. 2. Agentless. Top 10 Reasons To Consider Armis
WHY ARMIS Top 10 Reasons To Consider Armis 1. Comprehensive Asset Discovery and Inventory A complete inventory of hardware and software is critically important. This is why so many security frameworks,
More informationWireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR
Wireless Sensor Networks for Spacecraft DAMON PARSY, CEO OF BEANAIR R ETHINKING SENSING TECHNOLOGY About Beanair (1/2) Designer and manufacturer of Wireless Sensor Networks Embedded measurement Process
More informationHANDS FREE MOBILE HAM RADIO AND BLUETOOTH
HANDS FREE MOBILE HAM RADIO AND BLUETOOTH Presented to the West Carleton ARC November 3rd, 2009 By: Norm Rashleigh, VE3LC Ontario Bill 118 Prohibition on use of Hand-Held Devices while Driving ONTARIO
More informationUESCs and VA s Performance Contracting Program Lara Spader Department of Veterans Affairs August 17, 2017
What the Government Needs from the Utility UESCs and VA s Performance Contracting Program Lara Spader Department of Veterans Affairs August 17, 2017 Tampa Convention Center Tampa, Florida Agenda Resiliency
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationHoneywell Users Group Dynamic Solutions. Endless Possibilities. Herman Storey ISA100 Wireless Standards Update
Honeywell Users Group 2010 Dynamic Solutions. Endless Possibilities. Herman Storey ISA100 Wireless Standards Update Wireless Standards Update This Presentation Discusses Activities of Several Organizations
More informationAssets Condition Monitoring Using ISA100.11A Wireless System. Standards Certification Education & Training Publishing Conferences & Exhibits
Assets Condition Monitoring Using ISA100.11A Wireless System Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Michael Thevanh Senior Field Application Engineer GE
More informationThe role of ZigBee in Energy Management
The role of ZigBee in Energy Management Ollie Smith Business Development Director Telegesis (UK) Ltd. Agenda Telegesis who are we? Energy crisis what energy crisis? Can ZigBee help? Who is using ZigBee?
More informationAddressing Unique M2M Challenges with Converged Gateways
October 19-20, 2010 Addressing Unique M2M Challenges with Converged Gateways Paul L. Russell, Jr. Paul.Russell@InterDigital.com ETSI TC M2M Workshop 19-20 October 2010, Sophia Antipolis, France Where are
More informationSmart Homes and Cities
Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector
More informationGSAW Information Assurance in Government Space Systems: From Art to Engineering
GSAW 2006 Information Assurance in Government Space Systems: From Art to Engineering Charles Lavine The Aerospace Corporation 310-336-1595 lavine@aero.org 1 Toward the Global Information Grid Toward the
More informationThe ZigBee Architecture An Introduction
The ZigBee Architecture An Introduction May 18 th, 2011 Session I Introduction & Architecture I, 1 Contents Outline 1. Architectural Overview 2. Market Positioning 3. Convergence 4. Summary 2 ch.1: IEEE802.15.4
More informationWeb-Based Home Appliances Controlling System
Web-Based Home Appliances Controlling System B.E. EXTC, TSEC Aman Chadha Mahesh Dubey Siddhesh Shirodker 1 Agenda House monitoring using a live feed Advanced security system based on userauthentication
More informationLooking Forward: USACE MILCON Cybersecurity Integration
Energy Exchange 2017 - Track 4 - Cyber and Control System Technologies, Session 2 - Understanding and implementing the RMF Process Looking Forward: USACE MILCON Cybersecurity Integration Mr. Daniel Shepard
More informationMobile Hands Free Operation. Ontario Regulation 366/09
Mobile Hands Free Operation Ontario Regulation 366/09 Display screen visible to driver prohibited 78. (1) No person shall drive a motor vehicle on a highway if the display screen of a television, computer
More informationSecure Government Computing Initiatives & SecureZIP
Secure Government Computing Initiatives & SecureZIP T E C H N I C A L W H I T E P A P E R WP 700.xxxx Table of Contents Introduction FIPS 140 and SecureZIP Ensuring Software is FIPS 140 Compliant FIPS
More informationTraffic Modeling of Wireless Body Area Network
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 5, Ver. IV (Sep. - Oct. 2016), PP 102-109 www.iosrjournals.org Traffic Modeling of Wireless Body Area
More informationRealizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July Elster. All rights reserved.
Realizing the Smart Grid - A Solutions Provider's Perspective David G. Hart July 2009 2009 Elster. All rights reserved. What is the Smart Grid? 2009 Elster. All rights reserved. 2 Smart Grid Two Way Communications..Sensors...Distributed
More information