SlideShare a Scribd company logo
1 of 16
Download to read offline
NEOS-IoTSP
IoT	Security	Platform	based	on	NEOS	RTOS	™
supporting	WiFi	and	TPM	(Trusted	Platform	Module)
2016.12
http://www.neosrtos.com/neosp1
email:	daeyeoun@mdstec.com
©	2016	MDS	Technology	Co.,	Ltd..
Features	of	NEOS	IoT	Security	Platform
● Full	Featured	Solution	Package	:	Secure	RTOS	Software,	Integrated	
Development	Environment	Software,	System-on-module,	and	
Development	Kit
● Crypto	Library
● Secure	Boot
● Secure	Firmware	Update
● TPM	Support
● Device	Management	Solution,	Integrated
● Key	Management	System	for	IoT,	Integrated
Configuration	of	NEOS	IoT	Security	Platform
Secure	RTOS	SW
Secure	Boot
Secure	Firmware	
Update
Crypto	API
NEOS™	RTOS
Key	
Manager
IoT	Agent
Crypto-
library
Neo-SP1
(System-On-
Module)
Cortex-M4	MCU
WiFi
Device	
Manager
TPM
DVMS
(Development	Kit	+	Sensors)
Serial		to		USB
(monitor)
SWD
(debug)
Accelerometer
Magnetic	Field
NEOSPACE™	
IDE
USB
(Serial,	SWD)
Internet	/
Intranet
Temperature
&	Humidity
Light	&	UV
Host	Computer
■ Softwares :	Secure	RTOS	Software,	IDE	(Integrated	Development	Environment)
■ Reference	Hardwares :	System-on-module,	and	DevKit
3
<NEOS-IoTSP>	http://www.neosrtos.com/neosp1
4
A.	Secure	RTOS	SW	Platform
■ Secure	Boot
■ Secure	Firmware	Update
■ Standard	Cryptographic	Library	for	end-to-end	Security
■ Secure	Key	Management	on	TPM	(Trusted	Platform	Module)
■ Standard	based	Device	Management	Solution	(NEO-IDM™)	Integrated
■ Standard	based	Key	Management	Solution	(iKMS)	Integrated
Secure	RTOS	SW
Secure	Boot
Secure	Firmware	
Update
Crypto	API
NEOS™	RTOS
Key	
Manager
IoT	Agent
Crypto-
library
Device	
Manager
5
B.	IDE	(NEOSPACE)
■ Complete	Integrated	Development	Environment	based	on	eclipse	development	platform
■ Project	Management
■ Building	target	software	:	compiler,	linker
■ Debugging	and	Flash	Programming	through	Serial	Wire	Debug	(SWD)
USB
(Serial,	SWD)
• Neo-SP1	Module
– Hardware	Root	of	Trust	by	TPM	(Trusted	Platform	Module)
– User	can	program	IoT	application	on	the	module
• DVMS	:	Full	Featured	Development	Kit
– Neo-SP1	Mounted
– SWD	ST	Link-v2	Debug	Interface	ready	for	Debugging	and	Flash	Programming
– Sensors	:	Accelerometer/Magnetometer,	Temperature/Humidity,	Light/UV
– Configurable	External	Ports	with	I2C,	ADC,	UART	interfaces
6
C.	Reference	Hardware
JTAG
Trace32
SWD	- USB
Serial	- USB
Temp./
Humidity
Accel.	/	
mageto.
Neo-SP1
Light/UV
External
Ports
DVMS	(DevKit)
Function Specification
MCU STM32F415
TPM Infineon	SLB9670VQ1.2
Connectivity WiFi	802.11b/g/n	:	ESP8266
Dimension 25mm	x	35mm
● Neo-SP1
Applications
● Edge	Device,	Connectivity	Module,	or	Secure	Media	Converter
● Ready	for	various	wireless	connection
■ Boot	only	OEM	provided	software	only
■ Download	firmware	from	Update	Server	and	verify	the	Signature
8
Secure	Boot,	Secure	Firmware	Update
Device	Power	On
Firmware	boot	loader
Boot	Manager
verifies	Signature
Boot	to	
Main	OS
Boot	to	
Update
boot	
configuration
database
Internet	/
Intranet
Update	Server Signing
(	OS	and
Hash	)
Public	key	of	
update	Server
Download	from	
update	server
Neo-IDM Service UI
• Standard	IoT	Device	Management	Platform	based	on	LwM2M	protocol
• Two	Operation	Models	:	IoT	Edge	Device	and	Connectivity	Module
9
Integration	with	Neo-IDM
NEOS IoT SP
Edge	Device
Neo-IDM CoAP	Server
IoT	Gateway
Neo-IDM	LwM2M	
Client
CoAP
Interworking	Proxy
LwM2M
IoT	Server
Azure,	ThingWorx,	...
HTTP/MQTT
LwM2M	Server
NEOS IoT SP
Connectivity	Module
Neo-IDM LwM2M	
Client	&	CoAP	Server
LwM2M
LwM2M	Server
Secure	RTOS	SW
Secure	Boot Secure	Firmware	Update Crypto	API
NEOS™	RTOS
Key	Manager
IoT	Agent
Crypto-
library
Device	
Manager
• Key	distribution	function	and	management	scheme
• Key	Injection	for	IoT	Device
• Thus	providing	End-to-End	Security
10
Integration	with	iKMS	(Key	Management	System)
NEOS IoT SP
iKMS	Agent
Secure Key
Distribution
iKMS	Server
(Hancom	Secure	Co.)
Secure	RTOS	SW
Secure	Boot Secure	Firmware	Update Crypto	API
NEOS™	RTOS
Key	
Manager
IoT	Agent
Crypto-
library
Device	Manager
IoT	Server
LwM2M,	Azure,	...
Secure Key
Distribution
Cryptographic	Library
11
Function Algorithm Description
Block	Cipher
ARIA 128,	192,	256	bits
SEED 128,	256	bits
LEA 128,	192,	256	bits
HIGHT 64	bits
Block	Cipher
Operating	Mode
Confidentiality ECB,	CBC,	CFB,	OFB,	CTR Block	Cipher	:	ARIA,	SEED,	LEA,	HIGHT
Confidentiality/Authentication CCM,	GCM Block	Cipher	:	ARIA,	SEED,	LEA,	HIGHT
Random	Number	Generator
HASH_DRBG Hash	:	SHA-224/256/384/512
CTR_DRBG Block	Cipher	:	ARIA,	SEED,	LEA,	HIGHT
HMAC_DRBG Hash	:	SHA-224/256/384/512
Public	Key	Cryptography RSAES Public	Key	:	2048,	3072 bits
Key	Management
DH Public	/	Private	Key	:	(2048,	256)
ECDH
B-233,	K-233,	P-224
B-283,	K-283,	P-256
Hash	Function SHA-2 Output	Length	:	224,	256,	384,	512	bits
Message	Authentication	
Code
Hash	Based HMAC Key	Length	:	128,	256	bits
Block
CMAC Block	Cipher		:	ARIA,	SEED,	LEA,	HIGHT
GMAC Block	Cipher		:	ARIA,	SEED,	LEA,	HIGHT
Digital	Signature
RSA-PSS Public	Key	:	2048,	3072	bits
KCDSA Public	Key	:	1024,	2048,	3072	bits
ECDSA
B-233,	K-233,	P-224
B-283,	K-283,	P-256
ECKCDSA
B-233,	K-233,	P-224
B-283,	K-283,	P-256
■ cryptographic	algorithms
■ light-weighted,	and	optimized	for	embedded	system
12
Connection	Types	
Neo-SP1
IoT	GateWay
IoT	Server
As	a	Connectivity	Module
Connect	to	Server	without	IoT		Gateway
Neo-SP1
Wireless	
Access	Point
As	an	Edge	Device	
Connect	to	Server	through	IoT	Gateway
Internet	/
Intranet
Internet	/
Intranet
IoT	Server
Neo-SP1
Device-to-device	Security
Connect	to	other	devices
Internet	/
Intranet
■ To	provide	Secure	Channel	for	systems	with	Legacy	Devices
■ Minimal	or	no	modification	to	Legacy	System	for	easy	deployment
13
Secure	Media	Converter
Legacy	Devices Legacy	Devices
Trans-
ceiver
Trans-
ceiver
Unsecure
Media	:
ethernet,	
RS485,	RS422,	
...
Secure	Channels
Wired	or	Wireless
Unsecure
Media	:
ethernet,	
RS485,	RS422,	
...
■ Ready	for	Connectivity	Modules	:	Bluetooth,	Zigbee,	LoRa,	WISUN,	LTE,	etc
14
Ready	for	Various	Wireless	Connections	Extension
RF
Module
Zigbee
Bluetooth
WISUN
LoRa
Sensors
Internet	/
Intranet
15
Applicable
■ To	protect	public	safety	data,	environment	data,	smart	grid	data,	etc,	where	Security	is	
mandatory	by	law
■ To	protect	data	for	Military	IoT
■ To	protect	Private	Sensitive	data,	such	as	Wellness	information	or	Medical	(Health)	data
■ To	protect	Device	Configuration	Data,	Manufacturing	Technology
About	NEOS	RTOS
16
■ NEOS™	RTOS	is	a	real-time	operating	system	for	embedded	system	developed	by	MDS	
Technology
■ DO-178B	Level	A	Certifiable	Kernel
■ Multi-thread	Kernel	with	fast	and	deterministic	performance
■ Preemptive	realtime	scheduling
■ POSIX	standard	API	add-on	(POSIX	1003.13	PSE52)
■ Field	proven	in	aerospace	and	military	for	safety	critical	and	mission	critical	system
■ http://www.neosrtos.com

More Related Content

What's hot

RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiKuniyasu Suzaki
 
A3Sec Advanced Deployment System
A3Sec Advanced Deployment SystemA3Sec Advanced Deployment System
A3Sec Advanced Deployment Systema3sec
 
HWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware walletHWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware walletNemanja Nikodijević
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270BAKOTECH
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesVi Tính Hoàng Nam
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solutionlaonap166
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network securityqosnetworking
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Byres Security Inc.
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for MainframesCheryl Biswas
 
HKG18-219 - Threat Modeling for IoT
HKG18-219 - Threat Modeling for IoTHKG18-219 - Threat Modeling for IoT
HKG18-219 - Threat Modeling for IoTLinaro
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetSean Xie
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionmalvvv
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Akash Thakur
 

What's hot (20)

RISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzakiRISC-V-Day-Tokyo2018-suzaki
RISC-V-Day-Tokyo2018-suzaki
 
A3Sec Advanced Deployment System
A3Sec Advanced Deployment SystemA3Sec Advanced Deployment System
A3Sec Advanced Deployment System
 
HWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware walletHWallet: The simplest Bitcoin hardware wallet
HWallet: The simplest Bitcoin hardware wallet
 
Pa or die
Pa or diePa or die
Pa or die
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270Miercom Unified Threat Management Report - WatchGuard M270
Miercom Unified Threat Management Report - WatchGuard M270
 
ESET SMART SECURITY 8
ESET SMART SECURITY 8ESET SMART SECURITY 8
ESET SMART SECURITY 8
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
Ce hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologiesCe hv6 module 60 firewall technologies
Ce hv6 module 60 firewall technologies
 
Malware cryptomining uploadv3
Malware cryptomining uploadv3Malware cryptomining uploadv3
Malware cryptomining uploadv3
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 
Watch guard solution
Watch guard solutionWatch guard solution
Watch guard solution
 
Implementing cisco network security
Implementing cisco network securityImplementing cisco network security
Implementing cisco network security
 
Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1Mission Critical Security in a Post-Stuxnet World Part 1
Mission Critical Security in a Post-Stuxnet World Part 1
 
1500024 en
1500024 en1500024 en
1500024 en
 
A Stuxnet for Mainframes
A Stuxnet for MainframesA Stuxnet for Mainframes
A Stuxnet for Mainframes
 
HKG18-219 - Threat Modeling for IoT
HKG18-219 - Threat Modeling for IoTHKG18-219 - Threat Modeling for IoT
HKG18-219 - Threat Modeling for IoT
 
The World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - StuxnetThe World's First Cyber Weapon - Stuxnet
The World's First Cyber Weapon - Stuxnet
 
Offline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encriptionOffline attacks-and-hard-disk-encription
Offline attacks-and-hard-disk-encription
 
Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266Deauthentication Attack with Node MCU & Esp8266
Deauthentication Attack with Node MCU & Esp8266
 

Viewers also liked

Neos Bloopers [Inspiring 2016]
Neos Bloopers [Inspiring 2016]Neos Bloopers [Inspiring 2016]
Neos Bloopers [Inspiring 2016]Christian Müller
 
Tasty Recipes for Every Day 2016 (Neos)
Tasty Recipes for Every Day 2016 (Neos)Tasty Recipes for Every Day 2016 (Neos)
Tasty Recipes for Every Day 2016 (Neos)Sebastian Helzle
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)k33a
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM VirtualizationMarcel Winandy
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?Alan Tatourian
 

Viewers also liked (6)

Neos Bloopers [Inspiring 2016]
Neos Bloopers [Inspiring 2016]Neos Bloopers [Inspiring 2016]
Neos Bloopers [Inspiring 2016]
 
Tasty Recipes for Every Day 2016 (Neos)
Tasty Recipes for Every Day 2016 (Neos)Tasty Recipes for Every Day 2016 (Neos)
Tasty Recipes for Every Day 2016 (Neos)
 
Trusted Platform Module (TPM)
Trusted Platform Module (TPM)Trusted Platform Module (TPM)
Trusted Platform Module (TPM)
 
Property-Based TPM Virtualization
Property-Based TPM VirtualizationProperty-Based TPM Virtualization
Property-Based TPM Virtualization
 
Why TPM in Automotive?
Why TPM in Automotive?Why TPM in Automotive?
Why TPM in Automotive?
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 

Similar to NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Platform Module) for IoST, Internet of Secure Things (EN)

MicroEJ, the OS for IoT
MicroEJ, the OS for IoTMicroEJ, the OS for IoT
MicroEJ, the OS for IoTMicroEJ
 
MicroEJ OS for IoT devices
MicroEJ OS for IoT devicesMicroEJ OS for IoT devices
MicroEJ OS for IoT devicescharlotte75009
 
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSIntroduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSMediaTek Labs
 
Software virtualization lessons for extreme IoT portability and scale
Software virtualization lessons for extreme IoT portability and scaleSoftware virtualization lessons for extreme IoT portability and scale
Software virtualization lessons for extreme IoT portability and scaleMicroEJ
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfibramax
 
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfZephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfAswathRangaraj1
 
NGINX DevSecOps Workshop
NGINX DevSecOps WorkshopNGINX DevSecOps Workshop
NGINX DevSecOps WorkshopNGINX, Inc.
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Mirco Vanini
 
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebula Project
 
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...Dmytro Korzhevin
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuArm
 
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...“Building Large-scale Distributed Computer Vision Solutions Without Starting ...
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...Edge AI and Vision Alliance
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryLinaro
 
Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?MicroEJ
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemMarco Dal Pino
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsLinaro
 

Similar to NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Platform Module) for IoST, Internet of Secure Things (EN) (20)

MicroEJ, the OS for IoT
MicroEJ, the OS for IoTMicroEJ, the OS for IoT
MicroEJ, the OS for IoT
 
MicroEJ OS for IoT devices
MicroEJ OS for IoT devicesMicroEJ OS for IoT devices
MicroEJ OS for IoT devices
 
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOSIntroduction to the new MediaTek LinkIt™ Development Platform for RTOS
Introduction to the new MediaTek LinkIt™ Development Platform for RTOS
 
Software virtualization lessons for extreme IoT portability and scale
Software virtualization lessons for extreme IoT portability and scaleSoftware virtualization lessons for extreme IoT portability and scale
Software virtualization lessons for extreme IoT portability and scale
 
Zephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdfZephyr-Overview-20230124.pdf
Zephyr-Overview-20230124.pdf
 
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdfZephyr Introduction - Nordic Webinar - Sept. 24.pdf
Zephyr Introduction - Nordic Webinar - Sept. 24.pdf
 
NGINX DevSecOps Workshop
NGINX DevSecOps WorkshopNGINX DevSecOps Workshop
NGINX DevSecOps Workshop
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
 
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
OpenNebulaConf2019 - Crytek: A Video gaming Edge Implementation "on the shoul...
 
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
OpenNebulaConf 2019 - Crytek: A Video gaming Edge Implementation "on the shou...
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
tizen-rt-javascript-20181011
tizen-rt-javascript-20181011tizen-rt-javascript-20181011
tizen-rt-javascript-20181011
 
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...“Building Large-scale Distributed Computer Vision Solutions Without Starting ...
“Building Large-scale Distributed Computer Vision Solutions Without Starting ...
 
BKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End StoryBKK16-500K2 CTO talk - The End to End Story
BKK16-500K2 CTO talk - The End to End Story
 
IOT Ecosystem
IOT EcosystemIOT Ecosystem
IOT Ecosystem
 
Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?Why the Need for Special Operating Systems for IoT and Wearable Devices?
Why the Need for Special Operating Systems for IoT and Wearable Devices?
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
 
BKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T SystemsBKK16-200 Designing Security into low cost IO T Systems
BKK16-200 Designing Security into low cost IO T Systems
 
End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.End to end IoT Solution using Mongoose OS.
End to end IoT Solution using Mongoose OS.
 

Recently uploaded

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....ShaimaaMohamedGalal
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 

Recently uploaded (20)

Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Clustering techniques data mining book ....
Clustering techniques data mining book ....Clustering techniques data mining book ....
Clustering techniques data mining book ....
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 

NEOS IoT Security Platform : System-on-module with WiFi and TPM (Trusted Platform Module) for IoST, Internet of Secure Things (EN)