Security of the Internet of Things
|
|
- Tracey Hensley
- 5 years ago
- Views:
Transcription
1 Danish Internet Day Security of the Internet of Things Mitigating infections spread through immunisation techniques Farell FOLLY, Ph.D Researcher Copenhague, October 1st.!1
2 Agenda 1. Introduction to the IoT 2. Security Challenges in IoT 3. State of the Art of the IoT Security 4. Immunisation Techniques and our Approach!2
3 Introduction The Internet of Things (IoT) is a network of dedicated physical objects (things) that contain embedded technology to communicate and sense or interact with their internal states or the external environment. - Gartner!3
4 Introduction 1. Physical World People, Devices 2. Virtual World Applications, Digital Artefacts 3. Processes Actuation, sensing, etc.!4
5 Introduction UML representation of IoT Domain Model Source: «Enable Things to talk», Designing IoT solutions with the IoT Architectural Reference Model, Alexandro Bassi et al, Springer Edition, ISBN : !5
6 Security Challenges Number of devices High diversity of things Variety and number of Applications Speed of change Hard to plan for a systematic Approach for Security!6
7 Security Challenges Unpredictable attacks Cybercriminals keep improving their techniques Zero-Day attacks Propagation of vulnerabilities towards billions of devices!7
8 Security Challenges Tradit ionally Packet Inspection Blocking Traffic based on flags, Signatures Security built around static schemes IoT Context Almost infeasible in this context (Big Data) Not adaptive / too much human intervention IoT networks are highly dynamic!8
9 Security Challenges 1. 70% of the most commonly used IoT devices contain vulnerabilities % of respondents say that it is unlikely or highly unlikely that their organisation would be able to detect a sophisticated attack billions of free Apps (2017). Malicious apps (malware): the increase in the number of apps on the device increases the likelihood that some may contain malicious code or security holes Source: EY insights!9
10 State-of-the-Art!10
11 State-of-the-Art No universal framework or common approach for IoT security Most devices are not primarily designed with security and interoperability in mind Many manufacturers mostly rely on existing traditional security measures!11
12 State-of-the-Art So far, no security approach tackles all security aspects associated with the IoT Many projects do exist, however; that address some specific concerns: 1. NEBULA: 2. utrustit: 3. IoT-A: Many authors considered the use of the Graph Theory to cope with the size of IoT networks and their dynamics!12
13 State-of-the-Art Auto-immunity Security and Identification. Trust deterministic, policy-based, reputation-based, social net work-based!13
14 State-of-the-Art Cognitive approach (Context-Awareness) 1. Enable devices and network with the intelligence to perceive things 2. Adaptive actions based on continuous learning in a hostile environment Tetrahedron model in the IoT context Source: A roadmap for the Security in the Internet of Things, Arbia et al (2018).!14
15 Our Approach!15
16 Our Approach Since we can never produce a 100% secure general system or network, we need methods to mitigate the spread of damage. - Mathematical underpinnings for Science-based Cybersecurity. United States Department of Energy.!16
17 Our Approach 1. Minimise exposure factor 2. Control how threats spread 3. Design an efficient patch or vaccines distribution mechanism Immunisation!17
18 Our Approach NoN model with three layers Source : Towards a Networks-of-Networks Framework for Cyber Security, Mahantesh Halappanavar et al.!18
19 Our Approach Is the system in danger? Risk increases Vulnerability reaches a threshold An infection is spreading This node is having too many links!!! This cluster is having too many members, is it possible to disconnect some or move them to another cluster? What action to take? Minimise Risk Maximise Entropy Reduce exposure factor Trigger updates / recovery processes towards specific targets The most exposed (boundary nodes, important links, giant clusters, inside dominant set, etc.) Use graph theory analysis to find the most suitable metrics and influence them accurately : Immunisation algorithms!19
20 Our Approach Graph Theory IoT Security Immunization!20
21 Our Approach Type of graph Graph Structure Graph-based Security metrics Clustering Centrality Betweenness Reachability Percolation etc. Graph-based IoT Representation Graph Theory IoT Security Immunization!21
22 Our Approach Type of graph Graph Structure Graph-based Security metrics Clustering Centrality Betweenness Reachability Percolation etc. Graph-based IoT Representation Graph Theory IoT Security Infection propagation and containment Immunization Infection propagation Infection containment Analogy of Human Immune system Immune system learning : Detect (trust rating, classify as fraudulent or legal, semantic analysis) Activate virtual Antibodies to heal the rest or to efficiently stop the propagation.!22
23 Our Approach Epidemic process : Susceptible-Infected-Recovered 1. How fast does an infection spread 2. What is the threat strategy? 3. What is the IoT network topology? 4. How resistant are the nodes/clusters? Infectiousness Resistance Topology Strategy!23
24 Our Approach Graph challenges : clustering, groupings, and simplification Apps Devices interconnection Devices Original graph topology Forming cliques Final compressed graph!24
25 Summary In parallel with the increasing autonomy of things to perceive and act on the environment, IoT security should move towards a greater autonomy in perceiving threats and reacting to attacks, based on a cognitive and systemic approach - Arbia et al.!25
26 Use cases discussions 1. A trusted device connects to a car and has been granted permission to launch a service, What are the requirements of such an equipment? 2. How does a human decide to collaborate with a random person? Picture credit
27 Akpé kaka! ff
F5 Network Security for IoT
OVERVIEW F5 Network Security for IoT Introduction As networked communications continue to expand and grow in complexity, the network has increasingly moved to include more forms of communication. This
More informationInternet of Things (IoT)
Internet of Things (IoT) Aims of this session Define IoT Understanding the technology behind IoT Analysis of Operational aspects of IoT Understanding IoT business models Explore the policy and regulatory
More informationITU-T Y.4552/Y.2078 (02/2016) Application support models of the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Y.4552/Y.2078 (02/2016) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET
More informationArchitecture of Industrial IoT
Architecture of Industrial IoT December 2, 2016 Marc Nader @mourcous Branches of IoT IoT Consumer IoT (Wearables, Cars, Smart homes, etc.) Industrial IoT (IIoT) Smart Gateways Wireless Sensor Networks
More informationIERC Standardization Challenges. Standards for an Internet of Things. 3 and 4 July 2014, ETSI HQ (Sophia Antipolis)
www.internet-of-things-research.eu Standardization Challenges Standards for an Internet of Things 3 and 4 July 2014, ETSI HQ (Sophia Antipolis) Workshop co-organized by EC DG Connect and ETSI Dr. Ovidiu
More informationSecurity Challenges in the Internet of Things. Dr. Sigrid Schefer-Wenzl
Security Challenges in the Internet of Things Dr. Sigrid Schefer-Wenzl Agenda Introduction Problem statement Open Internet of Things (IoT) Architecture Use Cases for Smart Cities Security Challenges Conclusions
More informationInternet of things (IoT) Regulatory aspects. Trilok Dabeesing, ICT Authority 28 June 2017
Internet of things (IoT) Regulatory aspects 1 Trilok Dabeesing, ICT Authority 28 June 2017 2 IoT Regulatory aspects IoT - the interconnection via the Internet of computing devices embedded in everyday
More informationHow to Categorize Risk in IoT
How to Categorize Risk in IoT Defining use cases for IoT deployments lays the foundation for an end-to-end cybersecurity strategy that cuts across a broad and ever-changing threat landscape 2 Overview
More informationA Vision of IoT: Applications, Challenges, and Opportunities With China Perspective
A Vision of IoT: Applications, Challenges, and Opportunities With China Perspective SHANZHI CHEN, HUI XU, DAKE LIU, BO HU, AND HUCHENG WANG Definitions of IoT from Different Organizations: Organizations
More informationIntroduction to the Internet of Things
Introduction to the Internet of Things Marco Zennaro, PhD Telecommunications/ICT4D Lab The Abdus Salam International Centre for Theoretical Physics Trieste, Italy Introduction to IoT Vision History of
More informationIoT and the Implications for Security Inside and Outside the Enterprise. Richard Boyer CISO & Chief Architect, Security
IoT and the Implications for Security Inside and Outside the Enterprise Richard Boyer CISO & Chief Architect, Security 1999 2020 INTERNET OF THINGS THAT S GREAT BUT 4 ALL THINGS ARE NOT ALL EQUAL PERVASIVE
More informationInternet of Things (IoT) Vikram Raval GSMA
Internet of Things (IoT) Vikram Raval GSMA Introductions 2 Your objectives What do you expect to learn from this course? How is it relevant to you? 3 Themes Understanding the benefits IoT can bring Key
More informationInternet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012
Internet of Things: Networking Infrastructure for C.P.S. Wei Zhao University of Macau December 2012 Outline 1. Principles of IOT : What and how? 2. Realization of IOT : Framework and design 2 Principles
More informationITU-T Y Functional framework and capabilities of the Internet of things
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.2068 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (03/2015) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationBuilding Your DLP Strategy & Process. Whitepaper
Building Your DLP Strategy & Process Whitepaper Contents Introduction 3 DLP Planning: Organize Your Project for Success 3 DLP Planning: Clarify User Profiles 4 DLP Implementation: Phases of a Successful
More informationInternet of Things: A Comprehensive Analysis and Security Implementation through Elliptic Curve Cryptography
(Billions) International Journal of Current Engineering and Technology 2016 INPRESSCO, All Rights Reserved Research Article Internet of Things: A Comprehensive Analysis and Security Implementation through
More informationSynchronization Issues During Encoder / Decoder Tests
OmniTek PQA Application Note: Synchronization Issues During Encoder / Decoder Tests Revision 1.0 www.omnitek.tv OmniTek Advanced Measurement Technology 1 INTRODUCTION The OmniTek PQA system is very well
More informationNew Technologies: 4G/LTE, IOTs & OTTS WORKSHOP
New Technologies: 4G/LTE, IOTs & OTTS WORKSHOP EACO Title: LTE, IOTs & OTTS Date: 13 th -17 th May 2019 Duration: 5 days Location: Kampala, Uganda Course Description: This Course is designed to: Give an
More informationInternet of Things: Cross-cutting Integration Platforms Across Sectors
Internet of Things: Cross-cutting Integration Platforms Across Sectors Dr. Ovidiu Vermesan, Chief Scientist, SINTEF DIGITAL EU-Stakeholder Forum, 31 January-01 February, 2017, Essen, Germany IoT - Hyper-connected
More informationA Bird s Eye View on Internet of Things
A Bird s Eye View on Internet of Things K. Chandra Sekhara Rao Research Scholar, PG Dept. of Legal Studies and Research, ANU As the IOT advances, the very notion of a clear dividing line between reality
More informationEmerging IoT Technologies for Smart Cities
07.11.2017 U4IoT Contact Dr sziegler@mandint.org IoT-related International Engagement ITU-T Member Rapporteur on Research and Emerging Technologies for the Internet of Things and Smart Cities (SG20) Cybersecurity
More informationIoT Strategy Roadmap
IoT Strategy Roadmap Ovidiu Vermesan, SINTEF ROAD2CPS Strategy Roadmap Workshop, 15 November, 2016 Brussels, Belgium IoT-EPI Program The IoT Platforms Initiative (IoT-EPI) program includes the research
More informationT : Internet Technologies for Mobile Computing
T-110.7111: Internet Technologies for Mobile Computing Overview of IoT Platforms Julien Mineraud Post-doctoral researcher University of Helsinki, Finland Wednesday, the 9th of March 2016 Julien Mineraud
More informationPROTOTYPE OF IOT ENABLED SMART FACTORY. HaeKyung Lee and Taioun Kim. Received September 2015; accepted November 2015
ICIC Express Letters Part B: Applications ICIC International c 2016 ISSN 2185-2766 Volume 7, Number 4(tentative), April 2016 pp. 1 ICICIC2015-SS21-06 PROTOTYPE OF IOT ENABLED SMART FACTORY HaeKyung Lee
More informationDr. Tanja Rückert EVP Digital Assets and IoT, SAP SE. MSB Conference Oct 11, 2016 Frankfurt. International Electrotechnical Commission
Dr. Tanja Rückert EVP Digital Assets and IoT, SAP SE MSB Conference Oct 11, 2016 Frankfurt International Electrotechnical Commission Approach The IEC MSB decided to write a paper on Smart and Secure IoT
More informationSecuring IoT in the Enterprise
Securing IoT in the Enterprise Daniel Miessler May 2017 Securing IoT in the Enterprise Daniel Miessler, IOActive May 2017 About - Infosec for around 18 years - Mostly technical testing and enterprise consulting
More informationEnduring the IoT storm to unlock new paths to value. How a governance model protects you from a blizzard of IoT risk
Enduring the IoT storm to unlock new paths to value How a governance model protects you from a blizzard of IoT risk Contents In the eye of the IoT storm 2 IoT governance basics 5 Navigating through the
More informationIoT Evidence Acquisition Issues and Challenges
Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 5 (2017) pp. 1285-1293 Research India Publications http://www.ripublication.com IoT Evidence Acquisition Issues and Challenges
More informationSmart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel
Smart Cities A sua cidade está preparada para um ataque cibernético? Prof. Dr. Fabiano Hessel fabiano.hessel@pucrs.br Smart City: Which one? Why? Source: CISCO New Ecosystem The IoT chip market size, in
More informationIoT Challenges & Testing aspects. Alon Linetzki, Founder & CEO QualityWize
IoT Challenges & Testing aspects Alon Linetzki, Founder & CEO QualityWize alonl@quality-wize.com 1 Alon Linetzki CEO and Founder of QualityWize 3 decades in sw engineering, testing, quality assurance and
More informationSPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS
SPECIALIST TASK FORCE 505 IOT STANDARDS LANDSCAPING & IOT LSP GAP ANALYSIS IoT Landscape Status and Results Final STF 505 Presentation Workshop Jumoke Ogunbekun February 7, 2017 - Brussels ETSI TR 103
More informationIntroduction to the platforms of services for the Internet of Things Revision : 536
Introduction to the platforms of services for the Internet of Things Revision : 536 Chantal Taconet SAMOVAR, Télécom SudParis, CNRS, Université Paris-Saclay April 2018 Outline 1. Internet of Things (IoT)
More informationTHE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW
THE NEXT GENERATION OF CITY MANAGEMENT INNOVATE TODAY TO MEET THE NEEDS OF TOMORROW SENSOR Owlet is the range of smart control solutions offered by the Schréder Group. Owlet helps cities worldwide to reduce
More informationHome Monitoring System Using RP Device
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Issue 05, Volume 4 (May 2017) SPECIAL ISSUE www.irjcs.com Home Monitoring System Using RP Device Mrs. Sudha D 1, Mr. Sharveshwaran
More informationColour Reproduction Performance of JPEG and JPEG2000 Codecs
Colour Reproduction Performance of JPEG and JPEG000 Codecs A. Punchihewa, D. G. Bailey, and R. M. Hodgson Institute of Information Sciences & Technology, Massey University, Palmerston North, New Zealand
More informationSocial Network Structure Influences Disease Transmission
Social Network Structure Influences Disease Transmission presented by Bryan Lewis MPH Network Dynamics and Simulation Science Laboratory, Virginia Bioinformatics Institute, Virginia Tech Kofi Adasi, Chris
More informationTHE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO
THE MPI INTERNET OF THINGS STUDY SPONSORED BY BDO APRIL 2017 No manufacturer, regardless of size or ingenuity, is immune to technology disruption. The question companies need to ask themselves isn t whether
More informationThe comparison of actual system with expected system is done with the help of control mechanism. False True
Question No: 1 ( Marks: 1 ) - Please choose one ERP s major objective is to tightly integrate the functional areas of the organization and to enable seamless information flows across the functional areas.
More informationAmon: Advanced Mesh-Like Optical NoC
Amon: Advanced Mesh-Like Optical NoC Sebastian Werner, Javier Navaridas and Mikel Luján Advanced Processor Technologies Group School of Computer Science The University of Manchester Bottleneck: On-chip
More informationDistortion Analysis Of Tamil Language Characters Recognition
www.ijcsi.org 390 Distortion Analysis Of Tamil Language Characters Recognition Gowri.N 1, R. Bhaskaran 2, 1. T.B.A.K. College for Women, Kilakarai, 2. School Of Mathematics, Madurai Kamaraj University,
More informationPrime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT
Prime Minister's Advisory Council on Cyber Security - Industry Working Group on IoT AIIA feedback October 2017 Ground Suite B 7-11 Barry Drive Turner ACT 2612 GPO Box 573 Canberra ACT 2601 61 2 6281 9400
More informationThe Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
2005 Asia-Pacific Conference on Communications, Perth, Western Australia, 3-5 October 2005. The Development of a Synthetic Colour Test Image for Subjective and Objective Quality Assessment of Digital Codecs
More informationInternet of Things (IoT): The Big Picture
Internet of Things (IoT): The Big Picture Tampere University of Technology, Tampere, Finland Vitaly Petrov: vitaly.petrov@tut.fi IoT at a glance q Internet of Things is: o A concept o A trend o The network
More informationChapter 2. Analysis of ICT Industrial Trends in the IoT Era. Part 1
Chapter 2 Analysis of ICT Industrial Trends in the IoT Era This chapter organizes the overall structure of the ICT industry, given IoT progress, and provides quantitative verifications of each market s
More informationSpectrum Management Aspects Enabling IoT Implementation
Regional Seminar for Europe and CIS Management and Broadcasting 29-31 May 2017 Hotel Roma Aurelia Antica, Convention Centre Rome, Italy Management Aspects Enabling IoT Implementation Pavel Mamchenkov,
More informationINTERNET OF THINGS THE GSMA GUIDE TO THE R A G E C A P A B I L C O V E I T Y T Y U R I E C R S B E C Y. gsma.com/iot
C O V E R A G E C A P A B I L I T Y THE GSMA GUIDE TO THE INTERNET OF THINGS T Y C Y B E R S E C U R I SCALING THE IoT Enabling a world in which consumers and businesses enjoy rich new services, connected
More informationENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE
ENGINEERING COMMITTEE Energy Management Subcommittee SCTE STANDARD SCTE 237 2017 Implementation Steps for Adaptive Power Systems Interface Specification (APSIS ) NOTICE The Society of Cable Telecommunications
More informationFORMAL METHODS INTRODUCTION
(PGL@IHA.DK) PROFESSOR (MANY YEARS COLLABORATION IN PARTICULAR WITH JOHN FITZGERALD) UNI VERSITET WHO AM I? Professor Peter Gorm Larsen; MSc, PhD 20+ years of professional experience ½ year with Technical
More informationUsing Scan Side Channel to Detect IP Theft
Using Scan Side Channel to Detect IP Theft Leonid Azriel, Ran Ginosar, Avi Mendelson Technion Israel Institute of Technology Shay Gueron, University of Haifa and Intel Israel 1 Outline IP theft issue in
More informationdata and is used in digital networks and storage devices. CRC s are easy to implement in binary
Introduction Cyclic redundancy check (CRC) is an error detecting code designed to detect changes in transmitted data and is used in digital networks and storage devices. CRC s are easy to implement in
More informationBuilding a Semantic Ontology for Internet of Things (IoT) Systems
Building a Semantic Ontology for Internet of Things (IoT) Systems Ronald DeSerranno, Matthew Mullarkey, and Alan Hevner Muma College of Business - University of South Florida 4202 E Fowler Ave, Tampa,
More informationData flow architecture for high-speed optical processors
Data flow architecture for high-speed optical processors Kipp A. Bauchert and Steven A. Serati Boulder Nonlinear Systems, Inc., Boulder CO 80301 1. Abstract For optical processor applications outside of
More informationITU-T Y Reference architecture for Internet of things network capability exposure
I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4455 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL
More informationThe Internet-of-Things For Biodiversity
The Internet-of-Things For Biodiversity Adam T. Drobot Wayne, PA 19087 Outline What: About IoT Aspects of IoT Key ingredients Dealing with Complexity The basic ingredients for IoT Examples of IoT that
More informationThe Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices. Beverly Kracher, Ph.D. Business Ethics Alliance
The Internet of You: The Ethical, Privacy, and Legal Implications of Connected Devices Beverly Kracher, Ph.D. Business Ethics Alliance Creighton University Omaha, Nebraska 68178 402-280-2235 beverlykracher@gmail.com
More informationJTC 1/SC 41. François Coallier, PhD, Eng. Chair, ISO/IEC JTC 1/SC41 ITU-T RFG, ITU-T RFG
JTC 1/SC 41 ITU-T RFG, 2017-11-19 François Coallier, PhD, Eng. Chair, ISO/IEC JTC 1/SC41 francois.coallier @etsmtl.ca http://www.elmofoto.com/northerncalifornia-3/northern-california/i-wcm58rn/a 1 http://cladirect.com/wp-content/uploads/2015/06/theinternetofthings.jpg
More informationRecomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n
Recomm I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T Y.4115 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (04/2017) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET
More informationBezirk. Things plus Cloud does not equal IoT. Saturn 2016, San Diego. IoT that tastes better. IoT by default
Things plus Cloud does not equal IoT IoT by default IoT that tastes better Saturn 2016, San Diego problem Architecting the IoT (experienced by people) 2 Web search Q&A Q&A Things personalized experience
More informationIntroduction. Packet Loss Recovery for Streaming Video. Introduction (2) Outline. Problem Description. Model (Outline)
Packet Loss Recovery for Streaming Video N. Feamster and H. Balakrishnan MIT In Workshop on Packet Video (PV) Pittsburg, April 2002 Introduction (1) Streaming is growing Commercial streaming successful
More informationIoT trends in the Americas and considerations on the importance of National IoT plans
IoT trends in the Americas and considerations on the importance of National IoT plans An overview of the activity in the APAC region Lucas Gallitto Technology and Policy Manager GSMA Lima, Peru August
More informationConnected Industry and Enterprise Role of AI, IoT and Geospatial Technology. Vijay Kumar, CTO ESRI India
Connected Industry and Enterprise Role of AI, IoT and Geospatial Technology Vijay Kumar, CTO ESRI India Agenda: 1 2 3 4 Understanding IoT IoT component and deployment patterns ArcGIS Geospatial Platform
More informationUPDATE ON IOT LANDSCAPING
UPDATE ON IOT LANDSCAPING ETSI STF 505 Jumoke Ogunbekun IoT in the Smart Home Workshop, 21 st to 22 nd March 2015, Sophia Antipolis, France Outline Starting point for TR 103 375 The AIOTI initiative AIOTI
More informationIEEE Santa Clara ComSoc/CAS Weekend Workshop Event-based analog sensing
IEEE Santa Clara ComSoc/CAS Weekend Workshop Event-based analog sensing Theodore Yu theodore.yu@ti.com Texas Instruments Kilby Labs, Silicon Valley Labs September 29, 2012 1 Living in an analog world The
More informationKnowledge Representation
! Knowledge Representation " Concise representation of knowledge that is manipulatable in software.! Types of Knowledge " Declarative knowledge (facts) " Procedural knowledge (how to do something) " Analogous
More informationIoT Technical foundation and use cases Anders P. Mynster, Senior Consultant High Tech summit DTU FORCE Technology at a glance
IoT Technical foundation and use cases Anders P. Mynster, apm@force.dk Senior Consultant High Tech summit DTU 2017 FORCE Technology at a glance Internet of Things devices everywhere! Gartners Hype cycle
More informationIs Architecture Beautiful? Nikos A. Salingaros University of Texas at San Antonio May 2016
Is Architecture Beautiful? Nikos A. Salingaros University of Texas at San Antonio May 2016 Is this building beautiful? That s a nasty question! Architecture students are taught that minimalist, brutalist
More informationBIG SYNTHETIC DATA WITH MUSKETEER
BIG SYNTHETIC DATA WITH MUSKETEER CHICAGO BIG DATA ANALYTICS MEETUP A. Sasha Gutfraind Lauren A. Meyers and Ilya Safro University of Illinois at Chicago 2014 THE WHOLE STORY Claim 1: Big Data is often
More informationNetworks of Things. J. Voas Computer Scientist. National Institute of Standards and Technology
Networks of Things J. Voas Computer Scientist National Institute of Standards and Technology 1 2 Years Ago We Asked What is IoT? 2 The Reality No universally-accepted and actionable definition exists to
More informationThe Art of Low-Cost IoT Solutions
The Art of Low-Cost IoT Solutions 13 June 2017 By Igor Ilunin, DataArt www.dataart.com 2017 DataArt Contents Executive Summary... 3 Introduction... 3 The Experiment... 3 The Setup... 4 Analysis / Calculations...
More informationInternet of Things Conceptual Frameworks and Architecture
Internet of Things Conceptual s and Architecture 1 An IoT Conceptual Physical Object + Controller, Sensor and Actuators + Internet = Internet of Things (1.1) Source: An equation given by Adrian McEwen
More informationInternet of Things. Decoding the IoT Ecosystem. Jad El Cham October 2017 RIPE75 Tutorial
Internet of Things Decoding the IoT Ecosystem Jad El Cham October 2017 RIPE75 Tutorial Who s joining the game Jad El Cham RIPE75 October 2017 2 The outlook for 2020 Predictions for number of connected
More informationLED driver architectures determine SSL Flicker,
LED driver architectures determine SSL Flicker, By: MELUX CONTROL GEARS P.LTD. Replacing traditional incandescent and fluorescent lights with more efficient, and longerlasting LED-based solid-state lighting
More informationAvoiding False Pass or False Fail
Avoiding False Pass or False Fail By Michael Smith, Teradyne, October 2012 There is an expectation from consumers that today s electronic products will just work and that electronic manufacturers have
More informationTechnology & Security Officers Collide: The Future of Security in an Internet of Things
Technology & Security Officers Collide: The Future of Security in an Internet of Things Executive Summary The private security industry is a low margin, high churn business, often perceived by its customers
More informationIntroduction to the ITU-T Global Standards Initiative on IoT with focus on SG13 activities
ITU Workshop on the Internet of Things - Trend and Challenges in Standardization (Geneva, Switzerland, 18 February 2014) Introduction to the ITU-T Global Standards Initiative on IoT with focus on SG13
More informationGuidance For Scrambling Data Signals For EMC Compliance
Guidance For Scrambling Data Signals For EMC Compliance David Norte, PhD. Abstract s can be used to help mitigate the radiated emissions from inherently periodic data signals. A previous paper [1] described
More informationWinrar for windows 7 32 bit with crack
Winrar for windows 7 32 bit with crack. What we can say is that it looks an awful lot like a Nintendo DS snapped in two-one screen set back at some distance (your TV), the other held in your hand (the
More informationHow to overcome/avoid High Frequency Effects on Debug Interfaces Trace Port Design Guidelines
How to overcome/avoid High Frequency Effects on Debug Interfaces Trace Port Design Guidelines An On-Chip Debugger/Analyzer (OCD) like isystem s ic5000 (Figure 1) acts as a link to the target hardware by
More informationCryptagram. Photo Privacy for Online Social Media Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian
Cryptagram Photo Privacy for Online Social Media http://cryptagr.am Matt Tierney, Ian Spiro Christoph Bregler, Lakshmi Subramanian Courant Institute, NYU Photo Privacy Problem Photo Privacy Problem Photo
More informationInformatique Fondamentale IMA S8
Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille
More informationEx Libris Rosetta Privacy Impact Assessment
Ex Libris Rosetta Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents... 2 2 - Disclaimer... 3 3 - Purpose of this document... 4 4 - Main Findings and Conclusions... 4 5 -
More informationCollection management policy
Collection management policy Version 1: October 2013 2013 The Law Society. All rights reserved. Monitor and review This policy is scheduled for review by November 2014. This review will be conducted by
More informationBNCE TV07: Power Impacts of Quick Start Standby Functionality in Televisions
BNCE TV07: Power Impacts of Quick Start Standby Functionality in Televisions Version 1.0 This Briefing Note and referenced information is a public consultation document and will be used to inform Government
More informationPredicting the immediate future with Recurrent Neural Networks: Pre-training and Applications
Predicting the immediate future with Recurrent Neural Networks: Pre-training and Applications Introduction Brandon Richardson December 16, 2011 Research preformed from the last 5 years has shown that the
More informationCompressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract:
Compressed-Sensing-Enabled Video Streaming for Wireless Multimedia Sensor Networks Abstract: This article1 presents the design of a networked system for joint compression, rate control and error correction
More informationDo you have a mature IoT solution? Join us with the Open Call. Alicia Cano - Medtronic.
Do you have a mature IoT solution? Join us with the Open Call Alicia Cano - Medtronic www.activageproject.eu ACTIVAGE MISSION Contribute to the older people well-being to prolong an active and healthy
More informationIOT The internet of things by Christopher LaForge
IOT The internet of things 2017 by Christopher LaForge Christopher LaForge IREC Certified Master Trainer NABCEP Certified Photovoltaic Installation Professional 30 years Operating Great Northern Solar
More informationCHAPTER 8 CONCLUSION AND FUTURE SCOPE
124 CHAPTER 8 CONCLUSION AND FUTURE SCOPE Data hiding is becoming one of the most rapidly advancing techniques the field of research especially with increase in technological advancements in internet and
More informationADVANCED MICRO DEVICES, 2 CADENCE DESIGN SYSTEMS
METHODOLOGY FOR ANALYZING AND QUANTIFYING DESIGN STYLE CHANGES AND COMPLEXITY USING TOPOLOGICAL PATTERNS JASON CAIN 1, YA-CHIEH LAI 2, FRANK GENNARI 2, JASON SWEIS 2 1 ADVANCED MICRO DEVICES, 2 CADENCE
More informationArc Detector for Remote Detection of Dangerous Arcs on the DC Side of PV Plants
1 Arc Detector for Remote Detection of Dangerous Arcs on the DC Side of PV Plants Heinrich Haeberlin Berne University of Applied Sciences (BFH-TI), Division of Electrical- and Communication Engineering,
More informationBodily Cartographies. Pathologising the body and the city. By Blanca Pujals
Bodily Cartographies Pathologising the body and the city By Blanca Pujals Archifutures This research looks at the relationship between the architectural anthropometric archetypes embedded into the process
More informationPLTW Engineering Digital Electronics Course Outline
Open doors to understanding electronics and foundations in circuit design. Digital electronics is the foundation of all modern electronic devices such as cellular phones, MP3 players, laptop computers,
More informationConceptions and Context as a Fundament for the Representation of Knowledge Artifacts
Conceptions and Context as a Fundament for the Representation of Knowledge Artifacts Thomas KARBE FLP, Technische Universität Berlin Berlin, 10587, Germany ABSTRACT It is a well-known fact that knowledge
More informationINTEGRATED CIRCUITS. AN219 A metastability primer Nov 15
INTEGRATED CIRCUITS 1989 Nov 15 INTRODUCTION When using a latch or flip-flop in normal circumstances (i.e., when the device s setup and hold times are not being violated), the outputs will respond to a
More informationDigital Electronics Course Outline
Digital Electronics Course Outline PLTW Engineering Digital Electronics Open doors to understanding electronics and foundations in circuit design. Digital electronics is the foundation of all modern electronic
More informationMachina Research. INDUSTRY DAY - Welcome. Emil Berthelsen, Principal Analyst Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016
Machina Research INDUSTRY DAY - Welcome Emil Berthelsen, Crowne Plaza Hotel, Belgrade, Serbia June 1, 2016 Some of our clients Machina Research 2 Four IoT technology vectors which are transforming markets
More informationDesign of Fault Coverage Test Pattern Generator Using LFSR
Design of Fault Coverage Test Pattern Generator Using LFSR B.Saritha M.Tech Student, Department of ECE, Dhruva Institue of Engineering & Technology. Abstract: A new fault coverage test pattern generator
More informationJin-Fu Li Advanced Reliable Systems (ARES) Laboratory. National Central University
Chapter 3 Basics of VLSI Testing (2) Jin-Fu Li Advanced Reliable Systems (ARES) Laboratory Department of Electrical Engineering National Central University Jhongli, Taiwan Outline Testing Process Fault
More informationDesigning for the Internet of Things with Cadence PSpice A/D Technology
Designing for the Internet of Things with Cadence PSpice A/D Technology By Alok Tripathi, Software Architect, Cadence The Cadence PSpice A/D release 17.2-2016 offers a comprehensive feature set to address
More informationEx Libris. Aleph Privacy Impact Assessment
Ex Libris Aleph Privacy Impact Assessment March 2018 1 - Table of Contents 1 - Table of Contents...2 2 - Disclaimer...3 3 - Purpose of this document...4 4 - Main Findings and Conclusions...4 5 - Scope
More information