Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Brave New World of the Internet of Things
Bryn LewisdevMobile Software Consultant, Christchurch
Advancing Expertise in Software Testing
IntroductionHype, Challenges, Numbers, Trustworthiness, Privacy, Security
ThingsWhere, Constrained, Security
ConnectivityProtocols, Transports, Security, Architecture
Securing ThingsBroken, Hardware, Software, Connectivity, Services
Testing ThingsHardware, Firmware, Software, Connectivity, Security, Services, Scale
Questions
ScaleNumbers of devices and users
Volumes of data and network traffic
50%-70% of data is never used
Pace of InnovationsInnovation pressure: analysis, command and control
Skill pressure: data science, new platforms
EnvironmentalSecurity & privacy threats
Diversity of devices and composite devices
Emerging standards
New competitors
1 Million clientsDevice Identities management
Ingest dataX Gbyte/sec
Real-time Analytics1 million events /sec
Historic and Predictive AnalyticsX PByte, batch processing
PersonalSmartphones, watches, glasses, fitness bands, medical implants
DomesticSmart metering, burglar alarms, appliances, electric vehicle charging
TransportationCars, light trucks, big trucks, vehicle fleets
IndustryFactories, farms, ships, oil rigs
MunicipalStreet lighting, waste water , water supply, drainage
Energy ManagementTransmission, Generation: Hydro, Tidal, Fossil fuels, Wind power
CostBoM, supply chain, development tools, development hardware, library availability
Processor power Algorithms, cryptographic algorithms, tool support, IP stack
Electrical powerPower conservation, battery size, type & construction, solar powered, heat load
Memory RAM, non-volatile, algorithms, cryptographic algorithms
ConnectivityWired, wireless, protocols, bandwidth, payload size, power consumption
SupportProduct lifetime, certification, updates, field service , disposal
SpoofingCPU,RAM, Exchanging secrets
TamperingCPU,RAM, Storing secrets
RepudiationData validity, commands, and time
Information DisclosureReverse engineering, sensor data, customer data
Denial of serviceCommunications coprocessors, minimal attack surface
Elevation of privilegeRobust protocols, encryption HTTPS, API Keys
ProtocolsDIY, HTTP, AMQP, CoAP, MQTT, XMPP
Personal areaBLE, ISM, nRF24
Local AreaWifi, Xbee, nRF24, 6LowPAN, LoRA, Wired
Wide AreaWired, 2G,2.5G,3G,4G,?G, Inmarsat, Iridium
SecurityDIY, Secure Sockets, Network based, Authentication
Solution PortalProvisioning API
Identity & Registry Stores
Stream Event Processor
Analytics/
Machine
Learning
Data
Visualization &
Presentation
Device State Store
Field
Gateway Storage
IP capable
devices
Existing IoT
devices
Low power
devices
Presentation Device and Event ProcessingData Transport
Devices and
Data Sources
Cloud
Gate-
way
Agent
Libs
Agent
Libs
Control System Worker Role
Agent
Libs
•
•
•
•
•
•
•
•
Enabled by hardwareA microcontroller in every chicken in every pot
Enabled by manufacturingMass production and supply chain
Enabled by cloud computingGlobal scale with a credit card and a laptop
Enabled by Open StandardsMust play nice with others