Download presentation
Presentation is loading. Please wait.
Published byGaven Womack Modified over 9 years ago
1
M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals February 19, 2014
2
TuWay Story Capabilities Sixty year history of providing and servicing advanced wireless solutions. Proven record with mission critical applications in both Public Safety and Enterprise markets. Local, highly trained and certificated technicians, installers and designers. Design Engineering, Project Management, Installation, Service & Maintenance. Select Client List 911 Centers Lehigh County Authority Bethlehem Water Authority Air Products Sanofi Pastuer SLUHN, LVHN
3
What is M2M? M2M technology automates processes and streamlines workflow by enabling machines to communicate with each other. Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.
4
Why Now? Vendors Need to Find Ways to Make $$
5
Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing
6
Market Drivers Improvements in Cellular Coverage Reliability Capacity Cost Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing
7
Market Drivers Improvements in Cellular Sensor Advancements Size Battery Life Cost More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing
8
Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Size Speed Cost Advent of Big Data Resurgence of Cloud Computing
9
Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Better Software Mobility Resurgence of Cloud Computing
10
Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing Fast, Low Cost Implementation Shift from CapEx to OpEx
11
Security Issues What is the #1 Security Risk?? COMPLACENCY
12
Security Issues What Can Be Done? Pay Attention Perceived Threat/ Loss Quantification Determines Response ($$) There is no “Silver Bullet” or “One Size Fits All” Effective Security Uses Layers
13
Security Strategies COBIT 5 Now Included in Framework Core: www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf Executive Order 13636 NEW Cyber Security Framework
14
Security Strategies What is the same? The Need for a Strategy IP Network and Devices Need to Protect Hardware, Data, Processes What is different? Scale Remoteness No Human Oversight Minimal Processing Power Reliance on Battery Power Intermittent or Limited Connectivity/ Bandwidth Ability to Create Critical, Widespread Problems
15
Security Strategies VPN, VLAN, Encryption (requires processing and power) Physical Security (including use of analytic video, access control) GPS Overlay Physical Network Separation Industry Specific Firewall or IPS Device Level Secure Booting Device Based Authentication & Access Control Locking/ Wiping Updates and Patches Specific to Environment Third Party Services: Verizon Universal Identity Services
16
Case Studies Water/ Sewer Authority Water Supply
17
What Does the Future Hold? IPv6/ MIPv6 (HMIPv6) Nearly unlimited addressing Better Header Compression No NAT DHCPv6 vs. Stateless Address Autoconfiguration (SLAAC) But… No private addressing
18
What Does the Future Hold? IPv6/ MIPv6 (HMIPv6) ZigBee (2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks. ZigBee IP (March 2013) adds network and security layers and an application framework incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite
19
What Does the Future Hold? 6LoWPAN (2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of: limited power, memory and processing resources hard upper bounds on state, code space and processing cycles optimization of energy and network bandwidth usage lack of some layer 2 services like complete device connectivity and broadcast/multicast
20
What Does the Future Hold? Open Source Platforms and Programming Arduino (www.arduino.cc) : an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.www.arduino.cc Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.www.eclipse.org/org The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.www.eclipse.org/mihini Kura (www.eclipse.org/proposals/technology.kura): OSGi- based Application Framework for M2M Service Gatewayswww.eclipse.org/proposals/technology.kura
21
What Does the Future Hold? Arduino Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) Arduino programming languageWiring Utilizes the Arduino development environment (based on Processing) Processing Flutter (www.flutterwireless.com) : an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption. Flutterwww.flutterwireless.com
22
Thank You Derek Storm, Business Development Director TuWay Communications 2115 City Line Road Bethlehem, PA 18017 610-814-6923 storm@tuway.com
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.