Presentation is loading. Please wait.

Presentation is loading. Please wait.

M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals.

Similar presentations


Presentation on theme: "M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals."— Presentation transcript:

1 M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals February 19, 2014

2 TuWay Story Capabilities Sixty year history of providing and servicing advanced wireless solutions. Proven record with mission critical applications in both Public Safety and Enterprise markets. Local, highly trained and certificated technicians, installers and designers. Design Engineering, Project Management, Installation, Service & Maintenance. Select Client List 911 Centers Lehigh County Authority Bethlehem Water Authority Air Products Sanofi Pastuer SLUHN, LVHN

3 What is M2M? M2M technology automates processes and streamlines workflow by enabling machines to communicate with each other. Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.

4 Why Now? Vendors Need to Find Ways to Make $$

5 Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

6 Market Drivers Improvements in Cellular  Coverage  Reliability  Capacity  Cost Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

7 Market Drivers Improvements in Cellular Sensor Advancements  Size  Battery Life  Cost More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing

8 Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage  Size  Speed  Cost Advent of Big Data Resurgence of Cloud Computing

9 Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data  Better Software  Mobility Resurgence of Cloud Computing

10 Market Drivers Improvements in Cellular Sensor Advancements More Powerful Servers and Storage Advent of Big Data Resurgence of Cloud Computing  Fast, Low Cost Implementation  Shift from CapEx to OpEx

11 Security Issues What is the #1 Security Risk?? COMPLACENCY

12 Security Issues What Can Be Done? Pay Attention Perceived Threat/ Loss Quantification Determines Response ($$) There is no “Silver Bullet” or “One Size Fits All” Effective Security Uses Layers

13 Security Strategies COBIT 5 Now Included in Framework Core: www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf Executive Order 13636 NEW Cyber Security Framework

14 Security Strategies What is the same?  The Need for a Strategy  IP Network and Devices  Need to Protect Hardware, Data, Processes What is different?  Scale  Remoteness  No Human Oversight  Minimal Processing Power  Reliance on Battery Power  Intermittent or Limited Connectivity/ Bandwidth  Ability to Create Critical, Widespread Problems

15 Security Strategies VPN, VLAN, Encryption (requires processing and power) Physical Security (including use of analytic video, access control) GPS Overlay Physical Network Separation Industry Specific Firewall or IPS Device Level  Secure Booting  Device Based Authentication & Access Control  Locking/ Wiping Updates and Patches Specific to Environment Third Party Services: Verizon Universal Identity Services

16 Case Studies Water/ Sewer Authority Water Supply

17 What Does the Future Hold? IPv6/ MIPv6 (HMIPv6)  Nearly unlimited addressing  Better Header Compression  No NAT  DHCPv6 vs. Stateless Address Autoconfiguration (SLAAC) But…  No private addressing

18 What Does the Future Hold? IPv6/ MIPv6 (HMIPv6) ZigBee (2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks. ZigBee IP (March 2013)  adds network and security layers and an application framework  incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways  based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP  security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite

19 What Does the Future Hold? 6LoWPAN (2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of:  limited power, memory and processing resources  hard upper bounds on state, code space and processing cycles  optimization of energy and network bandwidth usage  lack of some layer 2 services like complete device connectivity and broadcast/multicast

20 What Does the Future Hold? Open Source Platforms and Programming  Arduino (www.arduino.cc) : an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.www.arduino.cc  Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.www.eclipse.org/org  The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.www.eclipse.org/mihini  Kura (www.eclipse.org/proposals/technology.kura): OSGi- based Application Framework for M2M Service Gatewayswww.eclipse.org/proposals/technology.kura

21 What Does the Future Hold? Arduino  Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators.  The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) Arduino programming languageWiring  Utilizes the Arduino development environment (based on Processing) Processing  Flutter (www.flutterwireless.com) : an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption. Flutterwww.flutterwireless.com

22 Thank You Derek Storm, Business Development Director TuWay Communications 2115 City Line Road Bethlehem, PA 18017 610-814-6923 storm@tuway.com


Download ppt "M2M: Why all the Buzz? ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals."

Similar presentations


Ads by Google