1 / 21

M2M: Why all the Buzz?

M2M: Why all the Buzz?. ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director. Association of Information Technology Professionals February 19, 2014. TuWay Story. Capabilities

xenos
Download Presentation

M2M: Why all the Buzz?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. M2M: Why all the Buzz? ~Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals February 19, 2014

  2. TuWay Story • Capabilities • Sixty year history of providing and servicing advanced wireless solutions. • Proven record with mission critical applications in both Public Safety and Enterprise markets. • Local, highly trained and certificated technicians, installers and designers. • Design Engineering, Project Management, Installation, Service & Maintenance. • Select Client List • 911 Centers • Lehigh County Authority • Bethlehem Water Authority • Air Products • SanofiPastuer • SLUHN, LVHN

  3. What is M2M? M2M technology automates processes and streamlinesworkflow by enabling machines to communicate with each other. Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans • A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.

  4. Why Now? Vendors Need to Find Ways to Make $$

  5. Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing

  6. Market Drivers • Improvements in Cellular • Coverage • Reliability • Capacity • Cost • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing

  7. Market Drivers • Improvements in Cellular • Sensor Advancements • Size • Battery Life • Cost • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing

  8. Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Size • Speed • Cost • Advent of Big Data • Resurgence of Cloud Computing

  9. Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Better Software • Mobility • Resurgence of Cloud Computing

  10. Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing • Fast, Low Cost Implementation • Shift from CapEx to OpEx

  11. Security Issues What is the #1 Security Risk?? COMPLACENCY

  12. Security Issues What Can Be Done? • Pay Attention • Perceived Threat/ Loss Quantification Determines Response ($$) • There is no “Silver Bullet” or “One Size Fits All” • Effective Security Uses Layers

  13. Security Strategies COBIT 5 Now Included in Framework Core: www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf NEW Cyber Security Framework Executive Order 13636

  14. Security Strategies • What is the same? • The Need for a Strategy • IP Network and Devices • Need to Protect Hardware, Data, Processes • What is different? • Scale • Remoteness • No Human Oversight • Minimal Processing Power • Reliance on Battery Power • Intermittent or Limited Connectivity/ Bandwidth • Ability to Create Critical, Widespread Problems

  15. Security Strategies • VPN, VLAN, Encryption (requires processing and power) • Physical Security (including use of analytic video, access control) • GPS Overlay • Physical Network Separation • Industry Specific Firewall or IPS • Device Level • Secure Booting • Device Based Authentication & Access Control • Locking/ Wiping • Updates and Patches Specific to Environment • Third Party Services: Verizon Universal Identity Services

  16. Case Studies Water/ Sewer Authority Water Supply

  17. What Does the Future Hold? • IPv6/ MIPv6 (HMIPv6) • ZigBee(2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks. • ZigBee IP (March 2013) • adds network and security layers and an application framework • incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways • based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP • security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite

  18. What Does the Future Hold? • 6LoWPAN(2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. • 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of: • limited power, memory and processing resources • hard upper bounds on state, code space and processing cycles • optimization of energy and network bandwidth usage • lack of some layer 2 services like complete device connectivity andbroadcast/multicast

  19. What Does the Future Hold? Open Source Platforms and Programming • Arduino(www.arduino.cc): an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. • Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software. • The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications. • Kura (www.eclipse.org/proposals/technology.kura): OSGi-based Application Framework for M2M Service Gateways

  20. What Does the Future Hold? Arduino • Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. • The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) • Utilizes the Arduino development environment (based on Processing) • Flutter(www.flutterwireless.com): an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption.

  21. Thank You Derek Storm, Business Development Director TuWay Communications 2115 City Line Road Bethlehem, PA 18017 610-814-6923 storm@tuway.com

More Related