210 likes | 342 Views
M2M: Why all the Buzz?. ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director. Association of Information Technology Professionals February 19, 2014. TuWay Story. Capabilities
E N D
M2M: Why all the Buzz? ~Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director Association of Information Technology Professionals February 19, 2014
TuWay Story • Capabilities • Sixty year history of providing and servicing advanced wireless solutions. • Proven record with mission critical applications in both Public Safety and Enterprise markets. • Local, highly trained and certificated technicians, installers and designers. • Design Engineering, Project Management, Installation, Service & Maintenance. • Select Client List • 911 Centers • Lehigh County Authority • Bethlehem Water Authority • Air Products • SanofiPastuer • SLUHN, LVHN
What is M2M? M2M technology automates processes and streamlinesworkflow by enabling machines to communicate with each other. Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans • A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.
Why Now? Vendors Need to Find Ways to Make $$
Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing
Market Drivers • Improvements in Cellular • Coverage • Reliability • Capacity • Cost • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing
Market Drivers • Improvements in Cellular • Sensor Advancements • Size • Battery Life • Cost • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing
Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Size • Speed • Cost • Advent of Big Data • Resurgence of Cloud Computing
Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Better Software • Mobility • Resurgence of Cloud Computing
Market Drivers • Improvements in Cellular • Sensor Advancements • More Powerful Servers and Storage • Advent of Big Data • Resurgence of Cloud Computing • Fast, Low Cost Implementation • Shift from CapEx to OpEx
Security Issues What is the #1 Security Risk?? COMPLACENCY
Security Issues What Can Be Done? • Pay Attention • Perceived Threat/ Loss Quantification Determines Response ($$) • There is no “Silver Bullet” or “One Size Fits All” • Effective Security Uses Layers
Security Strategies COBIT 5 Now Included in Framework Core: www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf NEW Cyber Security Framework Executive Order 13636
Security Strategies • What is the same? • The Need for a Strategy • IP Network and Devices • Need to Protect Hardware, Data, Processes • What is different? • Scale • Remoteness • No Human Oversight • Minimal Processing Power • Reliance on Battery Power • Intermittent or Limited Connectivity/ Bandwidth • Ability to Create Critical, Widespread Problems
Security Strategies • VPN, VLAN, Encryption (requires processing and power) • Physical Security (including use of analytic video, access control) • GPS Overlay • Physical Network Separation • Industry Specific Firewall or IPS • Device Level • Secure Booting • Device Based Authentication & Access Control • Locking/ Wiping • Updates and Patches Specific to Environment • Third Party Services: Verizon Universal Identity Services
Case Studies Water/ Sewer Authority Water Supply
What Does the Future Hold? • IPv6/ MIPv6 (HMIPv6) • ZigBee(2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks. • ZigBee IP (March 2013) • adds network and security layers and an application framework • incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways • based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP • security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite
What Does the Future Hold? • 6LoWPAN(2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings. • 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of: • limited power, memory and processing resources • hard upper bounds on state, code space and processing cycles • optimization of energy and network bandwidth usage • lack of some layer 2 services like complete device connectivity andbroadcast/multicast
What Does the Future Hold? Open Source Platforms and Programming • Arduino(www.arduino.cc): an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software. • Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software. • The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications. • Kura (www.eclipse.org/proposals/technology.kura): OSGi-based Application Framework for M2M Service Gateways
What Does the Future Hold? Arduino • Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators. • The microcontroller on the board is programmed using the Arduino programming language (based on Wiring) • Utilizes the Arduino development environment (based on Processing) • Flutter(www.flutterwireless.com): an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption.
Thank You Derek Storm, Business Development Director TuWay Communications 2115 City Line Road Bethlehem, PA 18017 610-814-6923 storm@tuway.com