Security of the Internet of Things

Size: px
Start display at page:

Download "Security of the Internet of Things"

Transcription

1 Danish Internet Day Security of the Internet of Things Mitigating infections spread through immunisation techniques Farell FOLLY, Ph.D Researcher Copenhague, October 1st.!1

2 Agenda 1. Introduction to the IoT 2. Security Challenges in IoT 3. State of the Art of the IoT Security 4. Immunisation Techniques and our Approach!2

3 Introduction The Internet of Things (IoT) is a network of dedicated physical objects (things) that contain embedded technology to communicate and sense or interact with their internal states or the external environment. - Gartner!3

4 Introduction 1. Physical World People, Devices 2. Virtual World Applications, Digital Artefacts 3. Processes Actuation, sensing, etc.!4

5 Introduction UML representation of IoT Domain Model Source: «Enable Things to talk», Designing IoT solutions with the IoT Architectural Reference Model, Alexandro Bassi et al, Springer Edition, ISBN : !5

6 Security Challenges Number of devices High diversity of things Variety and number of Applications Speed of change Hard to plan for a systematic Approach for Security!6

7 Security Challenges Unpredictable attacks Cybercriminals keep improving their techniques Zero-Day attacks Propagation of vulnerabilities towards billions of devices!7

8 Security Challenges Tradit ionally Packet Inspection Blocking Traffic based on flags, Signatures Security built around static schemes IoT Context Almost infeasible in this context (Big Data) Not adaptive / too much human intervention IoT networks are highly dynamic!8

9 Security Challenges 1. 70% of the most commonly used IoT devices contain vulnerabilities % of respondents say that it is unlikely or highly unlikely that their organisation would be able to detect a sophisticated attack billions of free Apps (2017). Malicious apps (malware): the increase in the number of apps on the device increases the likelihood that some may contain malicious code or security holes Source: EY insights!9

10 State-of-the-Art!10

11 State-of-the-Art No universal framework or common approach for IoT security Most devices are not primarily designed with security and interoperability in mind Many manufacturers mostly rely on existing traditional security measures!11

12 State-of-the-Art So far, no security approach tackles all security aspects associated with the IoT Many projects do exist, however; that address some specific concerns: 1. NEBULA: 2. utrustit: 3. IoT-A: Many authors considered the use of the Graph Theory to cope with the size of IoT networks and their dynamics!12

13 State-of-the-Art Auto-immunity Security and Identification. Trust deterministic, policy-based, reputation-based, social net work-based!13

14 State-of-the-Art Cognitive approach (Context-Awareness) 1. Enable devices and network with the intelligence to perceive things 2. Adaptive actions based on continuous learning in a hostile environment Tetrahedron model in the IoT context Source: A roadmap for the Security in the Internet of Things, Arbia et al (2018).!14

15 Our Approach!15

16 Our Approach Since we can never produce a 100% secure general system or network, we need methods to mitigate the spread of damage. - Mathematical underpinnings for Science-based Cybersecurity. United States Department of Energy.!16

17 Our Approach 1. Minimise exposure factor 2. Control how threats spread 3. Design an efficient patch or vaccines distribution mechanism Immunisation!17

18 Our Approach NoN model with three layers Source : Towards a Networks-of-Networks Framework for Cyber Security, Mahantesh Halappanavar et al.!18

19 Our Approach Is the system in danger? Risk increases Vulnerability reaches a threshold An infection is spreading This node is having too many links!!! This cluster is having too many members, is it possible to disconnect some or move them to another cluster? What action to take? Minimise Risk Maximise Entropy Reduce exposure factor Trigger updates / recovery processes towards specific targets The most exposed (boundary nodes, important links, giant clusters, inside dominant set, etc.) Use graph theory analysis to find the most suitable metrics and influence them accurately : Immunisation algorithms!19

20 Our Approach Graph Theory IoT Security Immunization!20

21 Our Approach Type of graph Graph Structure Graph-based Security metrics Clustering Centrality Betweenness Reachability Percolation etc. Graph-based IoT Representation Graph Theory IoT Security Immunization!21

22 Our Approach Type of graph Graph Structure Graph-based Security metrics Clustering Centrality Betweenness Reachability Percolation etc. Graph-based IoT Representation Graph Theory IoT Security Infection propagation and containment Immunization Infection propagation Infection containment Analogy of Human Immune system Immune system learning : Detect (trust rating, classify as fraudulent or legal, semantic analysis) Activate virtual Antibodies to heal the rest or to efficiently stop the propagation.!22

23 Our Approach Epidemic process : Susceptible-Infected-Recovered 1. How fast does an infection spread 2. What is the threat strategy? 3. What is the IoT network topology? 4. How resistant are the nodes/clusters? Infectiousness Resistance Topology Strategy!23

24 Our Approach Graph challenges : clustering, groupings, and simplification Apps Devices interconnection Devices Original graph topology Forming cliques Final compressed graph!24

25 Summary In parallel with the increasing autonomy of things to perceive and act on the environment, IoT security should move towards a greater autonomy in perceiving threats and reacting to attacks, based on a cognitive and systemic approach - Arbia et al.!25

26 Use cases discussions 1. A trusted device connects to a car and has been granted permission to launch a service, What are the requirements of such an equipment? 2. How does a human decide to collaborate with a random person? Picture credit

27 Akpé kaka! ff

F5 Network Security for IoT

F5 Network Security for IoT OVERVIEW F5 Network Security for IoT Introduction As networked communications continue to expand and grow in complexity, the network has increasingly moved to include more forms of communication. This

More information

Internet of Things (IoT)

Internet of Things (IoT) Internet of Things (IoT) Aims of this session Define IoT Understanding the technology behind IoT Analysis of Operational aspects of IoT Understanding IoT business models Explore the policy and regulatory

More information

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things

ITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

Architecture of Industrial IoT

Architecture of Industrial IoT Architecture of Industrial IoT December 2, 2016 Marc Nader @mourcous Branches of IoT IoT Consumer IoT (Wearables, Cars, Smart homes, etc.) Industrial IoT (IIoT) Smart Gateways Wireless Sensor Networks

More information

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)

IERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) www.internet-of-things-research.eu Standardization Challenges Standards for an Internet of Things 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) Workshop co-organized by EC DG Connect and ETSI Dr. Ovidiu

More information

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl

Security Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl Security Challenges in the Internet of Things Dr. Sigrid Schefer-Wenzl Agenda Introduction Problem statement Open Internet of Things (IoT) Architecture Use Cases for Smart Cities Security Challenges Conclusions

More information

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017

Internet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017 Internet of things (IoT) Regulatory aspects 1 Trilok Dabeesing, ICT Authority 28 June 2017 2 IoT Regulatory aspects IoT - the interconnection via the Internet of computing devices embedded in everyday

More information

How to Categorize Risk in IoT

How to Categorize Risk in IoT How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview

More information

A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective

A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective SHANZHI CHEN, HUI XU, DAKE LIU, BO HU, AND HUCHENG WANG Definitions of IoT from Different Organizations: Organizations

More information

Introduction to the Internet of Things

Introduction to the Internet of Things Introduction to the Internet of Things Marco Zennaro, PhD Telecommunications/ICT4D Lab The Abdus Salam International Centre for Theoretical Physics Trieste, Italy Introduction to IoT Vision History of

More information

IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security

IoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security IoT and the Implications for Security Inside and Outside the Enterprise Richard Boyer CISO & Chief Architect, Security 1999 2020 INTERNET OF THINGS THAT S GREAT BUT 4 ALL THINGS ARE NOT ALL EQUAL PERVASIVE

More information

Internet of Things (IoT) Vikram Raval GSMA

Internet of Things (IoT) Vikram Raval GSMA Internet of Things (IoT) Vikram Raval GSMA Introductions 2 Your objectives What do you expect to learn from this course? How is it relevant to you? 3 Themes Understanding the benefits IoT can bring Key

More information

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012

Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Outline 1. Principles of IOT : What and how? 2. Realization of IOT : Framework and design 2 Principles

More information

ITU-T Y Functional framework and capabilities of the Internet of things

ITU-T Y Functional framework and capabilities of the Internet of things I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

Building Your DLP Strategy & Process. Whitepaper

Building Your DLP Strategy & Process. Whitepaper Building Your DLP Strategy & Process Whitepaper Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful

More information

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography

Internet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography (Billions) International Journal of Current Engineering and Technology 2016 INPRESSCO, All Rights Reserved Research Article Internet of Things: A Comprehensive Analysis and Security Implementation through

More information

Synchronization Issues During Encoder / Decoder Tests

Synchronization Issues During Encoder / Decoder Tests OmniTek PQA Application Note: Synchronization Issues During Encoder / Decoder Tests Revision 1.0 www.omnitek.tv OmniTek Advanced Measurement Technology 1 INTRODUCTION The OmniTek PQA system is very well

More information

New Technologies: 4G/LTE, IOTs & OTTS WORKSHOP

New Technologies: 4G/LTE, IOTs & OTTS WORKSHOP New Technologies: 4G/LTE, IOTs & OTTS WORKSHOP EACO Title: LTE, IOTs & OTTS Date: 13 th -17 th May 2019 Duration: 5 days Location: Kampala, Uganda Course Description: This Course is designed to: Give an

More information

Internet of Things: Cross-cutting Integration Platforms Across Sectors

Internet of Things: Cross-cutting Integration Platforms Across Sectors Internet of Things: Cross-cutting Integration Platforms Across Sectors Dr. Ovidiu Vermesan, Chief Scientist, SINTEF DIGITAL EU-Stakeholder Forum, 31 January-01 February, 2017, Essen, Germany IoT - Hyper-connected

More information

A Bird s Eye View on Internet of Things

A Bird s Eye View on Internet of Things A Bird s Eye View on Internet of Things K. Chandra Sekhara Rao Research Scholar, PG Dept. of Legal Studies and Research, ANU As the IOT advances, the very notion of a clear dividing line between reality

More information

Emerging IoT Technologies for Smart Cities

Emerging IoT Technologies for Smart Cities 07.11.2017 U4IoT Contact Dr sziegler@mandint.org IoT-related International Engagement ITU-T Member Rapporteur on Research and Emerging Technologies for the Internet of Things and Smart Cities (SG20) Cybersecurity

More information

IoT Strategy Roadmap

IoT Strategy Roadmap IoT Strategy Roadmap Ovidiu Vermesan, SINTEF ROAD2CPS Strategy Roadmap Workshop, 15 November, 2016 Brussels, Belgium IoT-EPI Program The IoT Platforms Initiative (IoT-EPI) program includes the research

More information

T : Internet Technologies for Mobile Computing

T : Internet Technologies for Mobile Computing T-110.7111: Internet Technologies for Mobile Computing Overview of IoT Platforms Julien Mineraud Post-doctoral researcher University of Helsinki, Finland Wednesday, the 9th of March 2016 Julien Mineraud

More information

PROTOTYPE OF IOT ENABLED SMART FACTORY. HaeKyung Lee and Taioun Kim. Received September 2015; accepted November 2015

PROTOTYPE OF IOT ENABLED SMART FACTORY. HaeKyung Lee and Taioun Kim. Received September 2015; accepted November 2015 ICIC Express Letters Part B: Applications ICIC International c 2016 ISSN 2185-2766 Volume 7, Number 4(tentative), April 2016 pp. 1 ICICIC2015-SS21-06 PROTOTYPE OF IOT ENABLED SMART FACTORY HaeKyung Lee

More information

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission

Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE MSB Conference Oct 11, 2016 Frankfurt International Electrotechnical Commission Approach The IEC MSB decided to write a paper on Smart and Secure IoT

More information

Securing IoT in the Enterprise

Securing IoT in the Enterprise Securing IoT in the Enterprise Daniel Miessler May 2017 Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017 About - Infosec for around 18 years - Mostly technical testing and enterprise consulting

More information

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk

Enduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the

More information

IoT Evidence Acquisition Issues and Challenges

IoT Evidence Acquisition Issues and Challenges Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1285-1293 Research India Publications http://www.ripublication.com IoT Evidence Acquisition Issues and Challenges

More information

Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel

Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel fabiano.hessel@pucrs.br Smart City: Which one? Why? Source: CISCO New Ecosystem The IoT chip market size, in

More information

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize

IoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize IoT Challenges & Testing aspects Alon Linetzki, Founder & CEO QualityWize alonl@quality-wize.com 1 Alon Linetzki CEO and Founder of QualityWize 3 decades in sw engineering, testing, quality assurance and

More information

SPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS

SPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS SPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS IoT Landscape Status and Results Final STF 505 Presentation Workshop Jumoke Ogunbekun February 7, 2017 - Brussels ETSI TR 103

More information

Introduction to the platforms of services for the Internet of Things Revision : 536

Introduction to the platforms of services for the Internet of Things Revision : 536 Introduction to the platforms of services for the Internet of Things Revision : 536 Chantal Taconet SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay April 2018 Outline 1. Internet of Things (IoT)

More information

THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW

THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW SENSOR Owlet is the range of smart control solutions offered by the Schréder Group. Owlet helps cities worldwide to reduce

More information

Home Monitoring System Using RP Device

Home Monitoring System Using RP Device International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 05, Volume 4 (May 2017) SPECIAL ISSUE www.irjcs.com Home Monitoring System Using RP Device Mrs. Sudha D 1, Mr. Sharveshwaran

More information

Colour Reproduction Performance of JPEG and JPEG2000 Codecs

Colour Reproduction Performance of JPEG and JPEG2000 Codecs Colour Reproduction Performance of JPEG and JPEG000 Codecs A. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences & Technology, Massey University, Palmerston North, New Zealand

More information

Social Network Structure Influences Disease Transmission

Social Network Structure Influences Disease Transmission Social Network Structure Influences Disease Transmission presented by Bryan Lewis MPH Network Dynamics and Simulation Science Laboratory, Virginia Bioinformatics Institute, Virginia Tech Kofi Adasi, Chris

More information

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO

THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO APRIL 2017 No manufacturer, regardless of size or ingenuity, is immune to technology disruption. The question companies need to ask themselves isn t whether

More information

The comparison of actual system with expected system is done with the help of control mechanism. False True

The comparison of actual system with expected system is done with the help of control mechanism. False True Question No: 1 ( Marks: 1 ) - Please choose one ERP s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.

More information

Amon: Advanced Mesh-Like Optical NoC

Amon: Advanced Mesh-Like Optical NoC Amon: Advanced Mesh-Like Optical NoC Sebastian Werner, Javier Navaridas and Mikel Luján Advanced Processor Technologies Group School of Computer Science The University of Manchester Bottleneck: On-chip

More information

Distortion Analysis Of Tamil Language Characters Recognition

Distortion Analysis Of Tamil Language Characters Recognition www.ijcsi.org 390 Distortion Analysis Of Tamil Language Characters Recognition Gowri.N 1, R. Bhaskaran 2, 1. T.B.A.K. College for Women, Kilakarai, 2. School Of Mathematics, Madurai Kamaraj University,

More information

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT

Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT AIIA feedback October 2017 Ground Suite B 7-11 Barry Drive Turner ACT 2612 GPO Box 573 Canberra ACT 2601 61 2 6281 9400

More information

The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs

The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs 2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October 2005. The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs

More information

Internet of Things (IoT): The Big Picture

Internet of Things (IoT): The Big Picture Internet of Things (IoT): The Big Picture Tampere University of Technology, Tampere, Finland Vitaly Petrov: vitaly.petrov@tut.fi IoT at a glance q Internet of Things is: o A concept o A trend o The network

More information

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1

Chapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1 Chapter 2 Analysis of ICT Industrial Trends in the IoT Era This chapter organizes the overall structure of the ICT industry, given IoT progress, and provides quantitative verifications of each market s

More information

Spectrum Management Aspects Enabling IoT Implementation

Spectrum Management Aspects Enabling IoT Implementation Regional Seminar for Europe and CIS Management and Broadcasting 29-31 May 2017 Hotel Roma Aurelia Antica, Convention Centre Rome, Italy Management Aspects Enabling IoT Implementation Pavel Mamchenkov,

More information

INTERNET OF THINGS THE GSMA GUIDE TO THE R A G E C A P A B I L C O V E I T Y T Y U R I E C R S B E C Y. gsma.com/iot

INTERNET OF THINGS THE GSMA GUIDE TO THE R A G E C A P A B I L C O V E I T Y T Y U R I E C R S B E C Y. gsma.com/iot C O V E R A G E C A P A B I L I T Y THE GSMA GUIDE TO THE INTERNET OF THINGS T Y C Y B E R S E C U R I SCALING THE IoT Enabling a world in which consumers and businesses enjoy rich new services, connected

More information

ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE

ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE 237 2017 Implementation Steps for Adaptive Power Systems Interface Specification (APSIS ) NOTICE The Society of Cable Telecommunications

More information

FORMAL METHODS INTRODUCTION

FORMAL METHODS INTRODUCTION (PGL@IHA.DK) PROFESSOR (MANY YEARS COLLABORATION IN PARTICULAR WITH JOHN FITZGERALD) UNI VERSITET WHO AM I? Professor Peter Gorm Larsen; MSc, PhD 20+ years of professional experience ½ year with Technical

More information

Using Scan Side Channel to Detect IP Theft

Using Scan Side Channel to Detect IP Theft Using Scan Side Channel to Detect IP Theft Leonid Azriel, Ran Ginosar, Avi Mendelson Technion Israel Institute of Technology Shay Gueron, University of Haifa and Intel Israel 1 Outline IP theft issue in

More information

data and is used in digital networks and storage devices. CRC s are easy to implement in binary

data and is used in digital networks and storage devices. CRC s are easy to implement in binary Introduction Cyclic redundancy check (CRC) is an error detecting code designed to detect changes in transmitted data and is used in digital networks and storage devices. CRC s are easy to implement in

More information

Building a Semantic Ontology for Internet of Things (IoT) Systems

Building a Semantic Ontology for Internet of Things (IoT) Systems Building a Semantic Ontology for Internet of Things (IoT) Systems Ronald DeSerranno, Matthew Mullarkey, and Alan Hevner Muma College of Business - University of South Florida 4202 E Fowler Ave, Tampa,

More information

Data flow architecture for high-speed optical processors

Data flow architecture for high-speed optical processors Data flow architecture for high-speed optical processors Kipp A. Bauchert and Steven A. Serati Boulder Nonlinear Systems, Inc., Boulder CO 80301 1. Abstract For optical processor applications outside of

More information

ITU-T Y Reference architecture for Internet of things network capability exposure

ITU-T Y Reference architecture for Internet of things network capability exposure I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4455 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL

More information

The Internet-of-Things For Biodiversity

The Internet-of-Things For Biodiversity The Internet-of-Things For Biodiversity Adam T. Drobot Wayne, PA 19087 Outline What: About IoT Aspects of IoT Key ingredients Dealing with Complexity The basic ingredients for IoT Examples of IoT that

More information

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance

The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices Beverly Kracher, Ph.D. Business Ethics Alliance Creighton University Omaha, Nebraska 68178 402-280-2235 beverlykracher@gmail.com

More information

JTC 1/SC 41. François Coallier, PhD, Eng. Chair, ISO/IEC JTC 1/SC41 ITU-T RFG, ITU-T RFG

JTC 1/SC 41. François Coallier, PhD, Eng. Chair, ISO/IEC JTC 1/SC41 ITU-T RFG, ITU-T RFG JTC 1/SC 41 ITU-T RFG, 2017-11-19 François Coallier, PhD, Eng. Chair, ISO/IEC JTC 1/SC41 francois.coallier @etsmtl.ca http://www.elmofoto.com/northerncalifornia-3/northern-california/i-wcm58rn/a 1 http://cladirect.com/wp-content/uploads/2015/06/theinternetofthings.jpg

More information

Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n

Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4115 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET

More information

Bezirk. Things plus Cloud does not equal IoT. Saturn 2016, San Diego. IoT that tastes better. IoT by default

Bezirk. Things plus Cloud does not equal IoT. Saturn 2016, San Diego. IoT that tastes better. IoT by default Things plus Cloud does not equal IoT IoT by default IoT that tastes better Saturn 2016, San Diego problem Architecting the IoT (experienced by people) 2 Web search Q&A Q&A Things personalized experience

More information

Introduction. Packet Loss Recovery for Streaming Video. Introduction (2) Outline. Problem Description. Model (Outline)

Introduction. Packet Loss Recovery for Streaming Video. Introduction (2) Outline. Problem Description. Model (Outline) Packet Loss Recovery for Streaming Video N. Feamster and H. Balakrishnan MIT In Workshop on Packet Video (PV) Pittsburg, April 2002 Introduction (1) Streaming is growing Commercial streaming successful

More information

IoT trends in the Americas and considerations on the importance of National IoT plans

IoT trends in the Americas and considerations on the importance of National IoT plans IoT trends in the Americas and considerations on the importance of National IoT plans An overview of the activity in the APAC region Lucas Gallitto Technology and Policy Manager GSMA Lima, Peru August

More information

Connected Industry and Enterprise Role of AI, IoT and Geospatial Technology. Vijay Kumar, CTO ESRI India

Connected Industry and Enterprise Role of AI, IoT and Geospatial Technology. Vijay Kumar, CTO ESRI India Connected Industry and Enterprise Role of AI, IoT and Geospatial Technology Vijay Kumar, CTO ESRI India Agenda: 1 2 3 4 Understanding IoT IoT component and deployment patterns ArcGIS Geospatial Platform

More information

UPDATE ON IOT LANDSCAPING

UPDATE ON IOT LANDSCAPING UPDATE ON IOT LANDSCAPING ETSI STF 505 Jumoke Ogunbekun IoT in the Smart Home Workshop, 21 st to 22 nd March 2015, Sophia Antipolis, France Outline Starting point for TR 103 375 The AIOTI initiative AIOTI

More information

IEEE Santa Clara ComSoc/CAS Weekend Workshop Event-based analog sensing

IEEE Santa Clara ComSoc/CAS Weekend Workshop Event-based analog sensing IEEE Santa Clara ComSoc/CAS Weekend Workshop Event-based analog sensing Theodore Yu theodore.yu@ti.com Texas Instruments Kilby Labs, Silicon Valley Labs September 29, 2012 1 Living in an analog world The

More information

Knowledge Representation

Knowledge Representation ! Knowledge Representation " Concise representation of knowledge that is manipulatable in software.! Types of Knowledge " Declarative knowledge (facts) " Procedural knowledge (how to do something) " Analogous

More information

IoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance

IoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance IoT Technical foundation and use cases Anders P. Mynster, apm@force.dk Senior Consultant High Tech summit DTU 2017 FORCE Technology at a glance Internet of Things devices everywhere! Gartners Hype cycle

More information

Is Architecture Beautiful? Nikos A. Salingaros University of Texas at San Antonio May 2016

Is Architecture Beautiful? Nikos A. Salingaros University of Texas at San Antonio May 2016 Is Architecture Beautiful? Nikos A. Salingaros University of Texas at San Antonio May 2016 Is this building beautiful? That s a nasty question! Architecture students are taught that minimalist, brutalist

More information

BIG SYNTHETIC DATA WITH MUSKETEER

BIG SYNTHETIC DATA WITH MUSKETEER BIG SYNTHETIC DATA WITH MUSKETEER CHICAGO BIG DATA ANALYTICS MEETUP A. Sasha Gutfraind Lauren A. Meyers and Ilya Safro University of Illinois at Chicago 2014 THE WHOLE STORY Claim 1: Big Data is often

More information

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology

Networks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology Networks of Things J. Voas Computer Scientist National Institute of Standards and Technology 1 2 Years Ago We Asked What is IoT? 2 The Reality No universally-accepted and actionable definition exists to

More information

The Art of Low-Cost IoT Solutions

The Art of Low-Cost IoT Solutions The Art of Low-Cost IoT Solutions 13 June 2017 By Igor Ilunin, DataArt www.dataart.com 2017 DataArt Contents Executive Summary... 3 Introduction... 3 The Experiment... 3 The Setup... 4 Analysis / Calculations...

More information

Internet of Things Conceptual Frameworks and Architecture

Internet of Things Conceptual Frameworks and Architecture Internet of Things Conceptual s and Architecture 1 An IoT Conceptual Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things (1.1) Source: An equation given by Adrian McEwen

More information

Internet of Things. Decoding the IoT Ecosystem. Jad El Cham October 2017 RIPE75 Tutorial

Internet of Things. Decoding the IoT Ecosystem. Jad El Cham October 2017 RIPE75 Tutorial Internet of Things Decoding the IoT Ecosystem Jad El Cham October 2017 RIPE75 Tutorial Who s joining the game Jad El Cham RIPE75 October 2017 2 The outlook for 2020 Predictions for number of connected

More information

LED driver architectures determine SSL Flicker,

LED driver architectures determine SSL Flicker, LED driver architectures determine SSL Flicker, By: MELUX CONTROL GEARS P.LTD. Replacing traditional incandescent and fluorescent lights with more efficient, and longerlasting LED-based solid-state lighting

More information

Avoiding False Pass or False Fail

Avoiding False Pass or False Fail Avoiding False Pass or False Fail By Michael Smith, Teradyne, October 2012 There is an expectation from consumers that today s electronic products will just work and that electronic manufacturers have

More information

Technology & Security Officers Collide: The Future of Security in an Internet of Things

Technology & Security Officers Collide: The Future of Security in an Internet of Things Technology & Security Officers Collide: The Future of Security in an Internet of Things Executive Summary The private security industry is a low margin, high churn business, often perceived by its customers

More information

Introduction to the ITU-T Global Standards Initiative on IoT with focus on SG13 activities

Introduction to the ITU-T Global Standards Initiative on IoT with focus on SG13 activities ITU Workshop on the Internet of Things - Trend and Challenges in Standardization (Geneva, Switzerland, 18 February 2014) Introduction to the ITU-T Global Standards Initiative on IoT with focus on SG13

More information

Guidance For Scrambling Data Signals For EMC Compliance

Guidance For Scrambling Data Signals For EMC Compliance Guidance For Scrambling Data Signals For EMC Compliance David Norte, PhD. Abstract s can be used to help mitigate the radiated emissions from inherently periodic data signals. A previous paper [1] described

More information

Winrar for windows 7 32 bit with crack

Winrar for windows 7 32 bit with crack Winrar for windows 7 32 bit with crack. What we can say is that it looks an awful lot like a Nintendo DS snapped in two-one screen set back at some distance (your TV), the other held in your hand (the

More information

How to overcome/avoid High Frequency Effects on Debug Interfaces Trace Port Design Guidelines

How to overcome/avoid High Frequency Effects on Debug Interfaces Trace Port Design Guidelines How to overcome/avoid High Frequency Effects on Debug Interfaces Trace Port Design Guidelines An On-Chip Debugger/Analyzer (OCD) like isystem s ic5000 (Figure 1) acts as a link to the target hardware by

More information

Cryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian

Cryptagram. Photo Privacy for Online Social Media  Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Cryptagram Photo Privacy for Online Social Media http://cryptagr.am Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Courant Institute, NYU Photo Privacy Problem Photo Privacy Problem Photo

More information

Informatique Fondamentale IMA S8

Informatique Fondamentale IMA S8 Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille

More information

Ex Libris Rosetta Privacy Impact Assessment

Ex Libris Rosetta Privacy Impact Assessment Ex Libris Rosetta Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents... 2 2 - Disclaimer... 3 3 - Purpose of this document... 4 4 - Main Findings and Conclusions... 4 5 -

More information

Collection management policy

Collection management policy Collection management policy Version 1: October 2013 2013 The Law Society. All rights reserved. Monitor and review This policy is scheduled for review by November 2014. This review will be conducted by

More information

BNCE TV07: Power Impacts of Quick Start Standby Functionality in Televisions

BNCE TV07: Power Impacts of Quick Start Standby Functionality in Televisions BNCE TV07: Power Impacts of Quick Start Standby Functionality in Televisions Version 1.0 This Briefing Note and referenced information is a public consultation document and will be used to inform Government

More information

Predicting the immediate future with Recurrent Neural Networks: Pre-training and Applications

Predicting the immediate future with Recurrent Neural Networks: Pre-training and Applications Predicting the immediate future with Recurrent Neural Networks: Pre-training and Applications Introduction Brandon Richardson December 16, 2011 Research preformed from the last 5 years has shown that the

More information

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:

Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract: Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract: This article1 presents the design of a networked system for joint compression, rate control and error correction

More information

Do you have a mature IoT solution? Join us with the Open Call. Alicia Cano - Medtronic.

Do you have a mature IoT solution? Join us with the Open Call. Alicia Cano - Medtronic. Do you have a mature IoT solution? Join us with the Open Call Alicia Cano - Medtronic www.activageproject.eu ACTIVAGE MISSION Contribute to the older people well-being to prolong an active and healthy

More information

IOT The internet of things by Christopher LaForge

IOT The internet of things by Christopher LaForge IOT The internet of things 2017 by Christopher LaForge Christopher LaForge IREC Certified Master Trainer NABCEP Certified Photovoltaic Installation Professional 30 years Operating Great Northern Solar

More information

CHAPTER 8 CONCLUSION AND FUTURE SCOPE

CHAPTER 8 CONCLUSION AND FUTURE SCOPE 124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and

More information

ADVANCED MICRO DEVICES, 2 CADENCE DESIGN SYSTEMS

ADVANCED MICRO DEVICES, 2 CADENCE DESIGN SYSTEMS METHODOLOGY FOR ANALYZING AND QUANTIFYING DESIGN STYLE CHANGES AND COMPLEXITY USING TOPOLOGICAL PATTERNS JASON CAIN 1, YA-CHIEH LAI 2, FRANK GENNARI 2, JASON SWEIS 2 1 ADVANCED MICRO DEVICES, 2 CADENCE

More information

Arc Detector for Remote Detection of Dangerous Arcs on the DC Side of PV Plants

Arc Detector for Remote Detection of Dangerous Arcs on the DC Side of PV Plants 1 Arc Detector for Remote Detection of Dangerous Arcs on the DC Side of PV Plants Heinrich Haeberlin Berne University of Applied Sciences (BFH-TI), Division of Electrical- and Communication Engineering,

More information

Bodily Cartographies. Pathologising the body and the city. By Blanca Pujals

Bodily Cartographies. Pathologising the body and the city. By Blanca Pujals Bodily Cartographies Pathologising the body and the city By Blanca Pujals Archifutures This research looks at the relationship between the architectural anthropometric archetypes embedded into the process

More information

PLTW Engineering Digital Electronics Course Outline

PLTW Engineering Digital Electronics Course Outline Open doors to understanding electronics and foundations in circuit design. Digital electronics is the foundation of all modern electronic devices such as cellular phones, MP3 players, laptop computers,

More information

Conceptions and Context as a Fundament for the Representation of Knowledge Artifacts

Conceptions and Context as a Fundament for the Representation of Knowledge Artifacts Conceptions and Context as a Fundament for the Representation of Knowledge Artifacts Thomas KARBE FLP, Technische Universität Berlin Berlin, 10587, Germany ABSTRACT It is a well-known fact that knowledge

More information

INTEGRATED CIRCUITS. AN219 A metastability primer Nov 15

INTEGRATED CIRCUITS. AN219 A metastability primer Nov 15 INTEGRATED CIRCUITS 1989 Nov 15 INTRODUCTION When using a latch or flip-flop in normal circumstances (i.e., when the device s setup and hold times are not being violated), the outputs will respond to a

More information

Digital Electronics Course Outline

Digital Electronics Course Outline Digital Electronics Course Outline PLTW Engineering Digital Electronics Open doors to understanding electronics and foundations in circuit design. Digital electronics is the foundation of all modern electronic

More information

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016

Machina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Machina Research INDUSTRY DAY - Welcome Emil Berthelsen, Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Some of our clients Machina Research 2 Four IoT technology vectors which are transforming markets

More information

Design of Fault Coverage Test Pattern Generator Using LFSR

Design of Fault Coverage Test Pattern Generator Using LFSR Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator

More information

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University

Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University Chapter 3 Basics of VLSI Testing (2) Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National Central University Jhongli, Taiwan Outline Testing Process Fault

More information

Designing for the Internet of Things with Cadence PSpice A/D Technology

Designing for the Internet of Things with Cadence PSpice A/D Technology Designing for the Internet of Things with Cadence PSpice A/D Technology By Alok Tripathi, Software Architect, Cadence The Cadence PSpice A/D release 17.2-2016 offers a comprehensive feature set to address

More information

Ex Libris. Aleph Privacy Impact Assessment

Ex Libris. Aleph Privacy Impact Assessment Ex Libris Aleph Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents...2 2 - Disclaimer...3 3 - Purpose of this document...4 4 - Main Findings and Conclusions...4 5 - Scope

More information