Brave New World of the Internet of Things

Preview:

Citation preview

Brave New World of the Internet of Things

Bryn LewisdevMobile Software Consultant, Christchurch

Advancing Expertise in Software Testing

IntroductionHype, Challenges, Numbers, Trustworthiness, Privacy, Security

ThingsWhere, Constrained, Security

ConnectivityProtocols, Transports, Security, Architecture

Securing ThingsBroken, Hardware, Software, Connectivity, Services

Testing ThingsHardware, Firmware, Software, Connectivity, Security, Services, Scale

Questions

ScaleNumbers of devices and users

Volumes of data and network traffic

50%-70% of data is never used

Pace of InnovationsInnovation pressure: analysis, command and control

Skill pressure: data science, new platforms

EnvironmentalSecurity & privacy threats

Diversity of devices and composite devices

Emerging standards

New competitors

1 Million clientsDevice Identities management

Ingest dataX Gbyte/sec

Real-time Analytics1 million events /sec

Historic and Predictive AnalyticsX PByte, batch processing

PersonalSmartphones, watches, glasses, fitness bands, medical implants

DomesticSmart metering, burglar alarms, appliances, electric vehicle charging

TransportationCars, light trucks, big trucks, vehicle fleets

IndustryFactories, farms, ships, oil rigs

MunicipalStreet lighting, waste water , water supply, drainage

Energy ManagementTransmission, Generation: Hydro, Tidal, Fossil fuels, Wind power

CostBoM, supply chain, development tools, development hardware, library availability

Processor power Algorithms, cryptographic algorithms, tool support, IP stack

Electrical powerPower conservation, battery size, type & construction, solar powered, heat load

Memory RAM, non-volatile, algorithms, cryptographic algorithms

ConnectivityWired, wireless, protocols, bandwidth, payload size, power consumption

SupportProduct lifetime, certification, updates, field service , disposal

SpoofingCPU,RAM, Exchanging secrets

TamperingCPU,RAM, Storing secrets

RepudiationData validity, commands, and time

Information DisclosureReverse engineering, sensor data, customer data

Denial of serviceCommunications coprocessors, minimal attack surface

Elevation of privilegeRobust protocols, encryption HTTPS, API Keys

ProtocolsDIY, HTTP, AMQP, CoAP, MQTT, XMPP

Personal areaBLE, ISM, nRF24

Local AreaWifi, Xbee, nRF24, 6LowPAN, LoRA, Wired

Wide AreaWired, 2G,2.5G,3G,4G,?G, Inmarsat, Iridium

SecurityDIY, Secure Sockets, Network based, Authentication

Solution PortalProvisioning API

Identity & Registry Stores

Stream Event Processor

Analytics/

Machine

Learning

Data

Visualization &

Presentation

Device State Store

Field

Gateway Storage

IP capable

devices

Existing IoT

devices

Low power

devices

Presentation Device and Event ProcessingData Transport

Devices and

Data Sources

Cloud

Gate-

way

Agent

Libs

Agent

Libs

Control System Worker Role

Agent

Libs

Enabled by hardwareA microcontroller in every chicken in every pot

Enabled by manufacturingMass production and supply chain

Enabled by cloud computingGlobal scale with a credit card and a laptop

Enabled by Open StandardsMust play nice with others

@KiwiBryn

blog.devmobile.co.nz

Bryn.lewis@devmobile.co.nz

Recommended