m2m: why all the buzz? ~ presented by tuway communications ~ speaker derek storm, business...
TRANSCRIPT
M2M: Why all the Buzz?
~ Presented by TuWay Communications ~
Speaker
Derek Storm, Business Development Director
Association of Information Technology Professionals
February 19, 2014
TuWay Story
CapabilitiesSixty year history of providing and servicing advanced wireless solutions.Proven record with mission critical applications in both Public Safety and Enterprise markets.Local, highly trained and certificated technicians, installers and designers.Design Engineering, Project Management, Installation, Service & Maintenance.
Select Client List911 CentersLehigh County AuthorityBethlehem Water AuthorityAir ProductsSanofi PastuerSLUHN, LVHN
What is M2M?
M2M technology automates processes and streamlinesworkflow by enabling machines to communicate with each other.
Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans
A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.
Why Now?
Vendors Need to Find Ways to Make $$
Market Drivers
Improvements in Cellular
Sensor Advancements
More Powerful Servers and Storage
Advent of Big Data
Resurgence of Cloud Computing
Market Drivers
Improvements in Cellular Coverage
Reliability
Capacity
CostSensor Advancements
More Powerful Servers and Storage
Advent of Big Data
Resurgence of Cloud Computing
Market Drivers
Improvements in Cellular
Sensor Advancements Size Battery Life Cost
More Powerful Servers and Storage
Advent of Big Data
Resurgence of Cloud Computing
Market Drivers
Improvements in Cellular
Sensor Advancements
More Powerful Servers and Storage Size Speed Cost
Advent of Big Data
Resurgence of Cloud Computing
Market Drivers
Improvements in Cellular
Sensor Advancements
More Powerful Servers and Storage
Advent of Big Data Better Software Mobility
Resurgence of Cloud Computing
Market Drivers
Improvements in Cellular
Sensor Advancements
More Powerful Servers and Storage
Advent of Big Data
Resurgence of Cloud Computing Fast, Low Cost Implementation Shift from CapEx to OpEx
Security Issues
What is the #1 Security Risk??
COMPLACENCY
Security Issues
What Can Be Done?
Pay Attention
Perceived Threat/ Loss Quantification Determines Response ($$)
There is no “Silver Bullet” or “One Size Fits All”
Effective Security Uses Layers
Security Strategies
COBIT 5 Now Included in Framework Core:www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf
Executive Order 13636 NEW Cyber Security Framework
Security Strategies
What is the same? The Need for a Strategy IP Network and Devices Need to Protect Hardware, Data, Processes
What is different? Scale Remoteness No Human Oversight Minimal Processing Power Reliance on Battery Power Intermittent or Limited Connectivity/ Bandwidth Ability to Create Critical, Widespread Problems
Security Strategies
VPN, VLAN, Encryption (requires processing and power)
Physical Security (including use of analytic video, access control)
GPS Overlay
Physical Network Separation
Industry Specific Firewall or IPS
Device Level Secure Booting Device Based Authentication & Access Control Locking/ Wiping
Updates and Patches Specific to Environment
Third Party Services: Verizon Universal Identity Services
Case Studies
Water/ Sewer Authority
Water Supply
What Does the Future Hold?
IPv6/ MIPv6 (HMIPv6)
ZigBee (2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks.
ZigBee IP (March 2013)adds network and security layers and an application framework
incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways
based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP
security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite
What Does the Future Hold?
6LoWPAN (2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings.
6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of:
limited power, memory and processing resources hard upper bounds on state, code space and processing cycles optimization of energy and network bandwidth usage lack of some layer 2 services like complete device connectivity
andbroadcast/multicast
What Does the Future Hold?
Open Source Platforms and ProgrammingArduino (www.arduino.cc): an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.
Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.
The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.
Kura (www.eclipse.org/proposals/technology.kura): OSGi-based Application Framework for M2M Service Gateways
What Does the Future Hold?
ArduinoArduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators.
The microcontroller on the board is programmed using the Arduino programming language (based on Wiring)
Utilizes the Arduino development environment (based on Processing)
Flutter (www.flutterwireless.com): an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption.
Thank You
Derek Storm, Business Development Director TuWay Communications
2115 City Line RoadBethlehem, PA 18017