SlideShare a Scribd company logo
1 of 35
Download to read offline
iotsensorsandsecurity
2016Megatriscomp.View
Introduction
Slide 2
Instant connectivity has completely changed much of society. Now a
new revolution is upon us: The Internet of Things (IoT).
The depth and breadth of IoT connectivity will create new businesses,
provide new markets for existing businesses, and improve operational
efficiencies. Gartner predicts that the number of IoT devices will grow
to 26 billion units by 2020 in the US.
IoT and machine-to-machine (M2M) communications increase
operational efficiency by giving businesses visibility into the details of
their operations in ways that could not have been measured before.
In Cisco’s “Internet of Everything” 2013 report, the highest percentage
(27%) of value in future IoT revenue will be in manufacturing.
Accenture’s 2014 report, “Driving Unconventional Growth Through the
Industrial Internet of Things,” finds that manufacturers could boost
their efficiency by 30% using IoT.
Here we introduce our 2016 view about IoT sensors and security.
Whatwewilltalkabout
IoT sensors and security.
Slide 3
In the context of IoT/M2M, privacy is
concerned with ensuring that data access is
limited to the appropriate and authorized
parties only.
Security Objectives
There is no single security solution for all
possible security requirements for all
applications.
Security Issues for IoT/M2M
Sensors are the specific mechanism
used to measure physical parameters.
IoT/M2M Sensors
Conversions can create error, calibration
and specialized sensors are
fundamental.
Conversion to Digital Data
IoT/M2MSensors
Slide 4
• When deploying Internet of Things and machine-to-machine
application devices, the connected device generally needs to report
more than just its physical location. We will talk about a few of the
more common sensors and what they do.
• For example, an IoT/M2M device may measure a particular physical
parameter at that location these physical parameter measurements
require sensors that are capable of recording the specific value of
that parameter for the device application to fulfill its functions.
• Sensors are often integrated circuits that are designed for these
kinds of IoT/M2M applications, since the small size and low cost of
these chips make them appropriate choices.
• For example, many of the sensors described in this webinar are
available in high-end smartphones. These include accelerometers,
thermometers, gyroscopes, magnetometers, and heart-rate monitors.
SensorsTYPES
Slide 5
Accelero
meters
Temperat
ure
LIGHT MEMS Switch
Accelerometers Sensors
Slide 6
Acceleration is a measure of a change in velocity (change of speed or direction).
Accelerometers are devices that measure acceleration.
The parameter being measured may be a static force, such as gravity exerted on a
device. Other sensors make dynamic force measurements to measure motion
changes and vibration.
 An example of an acceleration sensor is a chip in a moving vehicle that
measures changes of speed and uses high acceleration readings (such as
during an accident) to trigger an airbag to protect the passengers.
 In some industrial applications, the vibrations detected by an acceleration
sensor could be an excellent indicator of a potential problem with a moving
part—such as a motor with bearings that are worn. Timely transmission of the
data from vibration sensors enables early detection of problems where
preventative maintenance could avoid catastrophic failures.
Temperature Sensors
Slide 7
Depending on the desired measurement range, there are various types of available sensors:
• Silicon chip (semiconductor) sensors are easily used in the range from -50 to +150 degrees
Celsius. These are quite accurate and linear—to within 1 degree—without the need for
extensive calibration. They are relatively inexpensive.
• Thermistor sensors can cover a wider range—from -100 to +450 degrees C for more
applications.
A thermistor is often more accurate than a silicon chip, but it has a slightly higher cost per
sensor. It requires a complex correction to achieve good linearity and accuracy over the
desired temperature range.
• Resistance-Temperature Detectors (RTD) provide yet more range, from -250 to +900 C, but
are quite difficult to use since they are more fragile than other types of temperature
sensors. They are the most accurate—often a hundred times more accurate than a silicon
chip sensor, although this carries the same complex solutions for linearization as
thermistors, and some models can be quite expensive.
• Thermocouple is the correct choice for high range from -250 to +2000 C. It is used for many
industrial applications, such as chemical process monitors and high-temperature furnaces
used in the semiconductor industry.
The response time for the
sensor data can be quite
slow, since temperature
changes are not as “rapid”
as other measured
physical parameters.
LIGHTSensors
Slide 8
Light sensors cover a broad range of potential applications—from automated
brightness control in cellphones to medical diagnostic equipment.
 A very early example of ambient light sensors used in local consumer
applications are photocells within lamps that automatically turn the lamps on at
dusk and turn them off at sunrise.
 Simple light sensors can also be for proximity detection. Counters in
manufacturing systems use the presence or absence of light on photocells to
measure products being moved past the counter on conveyors.
 Garage door systems can reverse direction to avoid hurting children or pets who
cross under a closing garage door and temporarily cut the light from a source
sending a beam of light across the door opening onto a photocell.
As with other types of sensors, the mechanism used to measure ambient light
varies depending on the application. Simple Cadmium Sulphide (CdS) or Cadmium
Selenide (CdSe) photo-resistors change their resistance as a function of the ambient
light.
Photo-diodes and photo-
transistors, with active
semiconductor junctions, are
used when greater accuracy
is required, since the ambient
light is converted into a
measurable current that can
be amplified or converted for
a measurement
MEMS Sensors
Slide 9
In 2015, half of all wearable sensors are based on MEMS technologies. Inertial
measurement units (IMUs) are found in every smart watch and fitness tracker, making
the most of mature MEMS components that are reliable, familiar and cheap.
In modern, high-end smartphones, integrated chip sensors to measure motion, direction,
pressure, magnetic fields, etc., are becoming quite common. These can be used to
augment the location information and human motion in the cellphone.
In chip form, these are usually Micro-Electro-Mechanical Systems (MEMS) sensors for
many different parameter measurements. The implementation of MEMS uses ultra-
miniaturized physical structures—beams, arms, and associated electronics—to measure
the motion of the structures when the chips moved. The device essentially converts a
mechanical (physical) motion into an electrical signal.
A gyro sensor, for example, senses rotational motion and changes in orientation. These
can be used in a variety of applications, such as correcting for hand-held shake in video
and still-image cameras and human motion sensing for video games.
MEMS sensors are generally manufactured in the same large-scale facilities as
semiconductors or chips. This means that the mechanical precision of the devices can
be very high and allow for excellent, reliable performance at low cost.
SWITCH
Slide 10
Switches are the simple state or position sensors that provide an “open” or “closed” state.
A door or window sensor used in security systems is often a simple magnetic reed relay
switch that opens or closes an electrical circuit depending on the position of a small
magnet relative to the switch.
These simple magnetic reed relay switches can also be used for sensing when a cabinet—
such as a medicine cabinet, oven door, or food storage compartment—has been opened in
a senior citizen’s home-monitoring IoT application. A detection of the change of state of
such a switch—from open or closed or vice-versa—can be interpreted as evidence that the
monitored parent has performed their expected regular daily routine.
OURONFIELD applications
Slide 11
Our company has developed a lot of solutions using the sensors described before:
Monitor
performance of
solar panels using
temperature
thresholds.
Use a switch
(Denkovi Relay) to
turn off a power
inverter in case of
alert.
Use MEMS sensors
of a smartphone to
monitor the fitness
activity of the user.
Measure the daily
light in order to
monitor the output
of a solar plant.
WHATWE LIKEtODO:Sensorfusion
Slide 12
Our daily challenge here is in turning raw data into useful,
or 'actionable' data. Sensor fusion is the process of
combining sensor outputs from multiple sensors to gain
greater total insight.
The most common example is using individual xyz
acceleration and rotation data (e.g. from a 6-axis IMU) into
motion data. This in turn can be used to count steps,
differentiate between activity types, and so on. Another
example with MEMS IMUs is to use them alongside
optical sensors to manage motion artifacts experienced in
optical heart rate monitoring.
SensorFUTURE: Conventional vs Printed Electronics
Slide 13
Conventional
Electronics
“Printed
Electronics”
Materials High temperature:
Silicon, Ceramics, Glass
Low Temperature:
Organic polymers,
Specialty inks
Manufacturing
technique
Photolithography,
micromachining,
ablation, etc.
Printed on plastic,
textile, paper, foil
Product feature Rigid, brittle,
miniaturized
Flexible, robust,
large area
SensorTHATCANBEFULLYPRINTED
Slide 14
 Biosensors
 Capacitive sensors
 Piezoresistive sensors
 Piezoelectric sensors
 Photodetectors
 Temperature sensors
 Humidity sensors
 Gas sensors
ConversiontoDigitalData
Slide 15
Analog-to-digital conversion is an electronic process in which a
continuously variable (analog) signal is changed, without altering its
essential content, into a multi-level (digital) signal.
Sensors are often used in local applications, where their signal is
processed using circuitry designed for that local application. However, in a
sensor that is used for remote data transmission of the measurement, the
electrical signal must be converted into a digital value, or number, for the
transmission.
The specific electrical signal from different sensors may vary over a wide
range of current or voltage or other electrical parameters (such as
resistance or capacitance) and often must be converted and amplified
into a voltage that can be measured.
If necessary, the signal must be filtered to eliminate noise or to reduce the
frequency of the measurement for the requirements of the application.
For example, a temperature sensor generally changes its value relatively
slowly as the sensor matches its environment. Therefore, a rapid change
in reported temperature may be an inaccurate reading, which should be
filtered to reduce potential errors.
Simple Off and On Switches
Slide 16
In simple switch applications, where the state is “open” or
“closed,” using a digital pin to measure this state and report
its value (“0” or “1”) is an easy choice.
For more complex needs with simple switches, the device may
also report when the transition from one state (such as
“open”) to the other state (such as “closed”) occurs. That is, it
may be equally, or more, important to report a change of state
rather than the present state of the simple switch.
Security Objectives
Slide 17
• Traditional financial and consumer markets have
been targets for misuse of information stored on
their systems—including personal credit
information, identify theft, misuse of credit cards by
unauthorized persons, personal privacy violations,
and loss of corporate intellectual property.
The financial losses sustained by these security
breaches are in the billions of dollars.
• While attempts have been made to criminalize such
nefarious activities, they continue to occur with
increasing frequency and are a serious problem for
governments, businesses, and individuals.
• Business deploying IoT/M2M solutions will be held
responsible for protecting data and devices, as well
as corporate proprietary information.
“any device that is connected to the Internet is at
risk of being hijacked.”
Chairperson Edith Ramirez - US Federal Trade Commission
SecurityObjectives
Slide 18
Authenticated Sender
and Receiver
Sender and Receiver
Accessible
Trust in the Data Content
Confidentiality of
Information
Authenticated Sender and Receiver
Slide 19
In any data connection, it is important for the sender and receiver of information to be
authenticated to each other—regardless of whether the device is the sender or the receiver.
 As a security principle when transmitting data, the device must ensure that it is sending its
information to the correct server, and when receiving data and control messages, it must ensure
that the information is coming from the correct server.
Senderand ReceiverAccessible
In any network, the sender and receiver must always be accessible when needed. If the
network is not functional, or the server is not executing the correct programs to receive the
data, the purpose of the application may be lost. Mission-critical applications, such as
automatic crash notification or medical alerts, may fail to work properly if the connection is
not reliable. The lack of communication itself means a lack of security.
Confidentiality of Information
Slide 20
The confidentiality of the information must be maintained. Only the correct recipient should have
access to the transmitted data, since it may contain proprietary or confidential information. Indeed,
privacy laws in many countries require extra care with information regarding individual citizens—for
example, in the US, the Health Insurance Portability and Accountability Act (HIPAA) provides specific
rules for individually identifiable medical information.
Trust in the Data Content
The accuracy in the content of the transmitted data is essential—if a device does not encode and
transmit data correctly, or the connection is not error-free, the quality and accuracy of the data
becomes suspect. Even good data becomes unreliable, and business actions that are taken on the
content of the data may not be appropriate.
Mission-critical information is particularly important to keep as error-free as possible. The
cost of business actions taken on receipt of incorrect data may be high.
Security Issues for IoT/M2M
Slide 21
Security risks can be recognized and understood, and the
implementation of security methods should be incorporated
in the IoT/M2M device and software associated with that
application.
Most obvious holes in security can be resolved quickly and
efficiently. It is vital to recognize that risks cannot be
completely eliminated, and there is no single security
solution for all possible security requirements for all
applications.
Thus, it is critical to assess the level of security
implementations that are appropriate for different kinds of
data.
This assessment must be done early—during the
design of the application.
Slide 22
We believe that the most important security layer for the IoT are the cloud
services, where there is the bigger value for the customer.
Security can’t be 100% guaranteed on physical devices, but it can be on a
centralized cloud system thanks to many tools like encryption, statistics
and deep learning algorithms.
issues to be considered
Slide 23
Applications and devices may be using multiple
services, where the required authorizations for
allowing a device to access a particular service may
differ from one application to another. The
authentication mechanisms may also differ.
Multiple Types of Services
In IoT/M2M deployments, there are
predictions of explosive growth in the near
future—billions of potential devices within
the next 5 to 10 years. Thus, in any
application where a security problem exists,
the overall problem could be greatly
magnified by the large numbers of devices
that may be affected.
Scaling Growth
Some IoT/M2M devices operate in more
than one transport network or technology
for redundancy or hybrid solutions.
For example, a short-range wireless
technology such as Wi-Fi can have quite
a different security threat vector and
potential for breaches compared to a
long-range cellular service.
Multiple Networks
issues to be considered
Slide 24
Unlike handsets used by people who change them
every few years on average, IoT/M2M devices—
particularly in industrial applications—may be
deployed for many years and operate relatively
continuously over that time. Devices with
compromised security could stay operational for
lengthy periods.
Long Lifecycles
It is essential to plan and design for device
updates over-the-air (OTA). When a device
security breach is sufficiently critical that the
device programming must be updated, the
ability to re-program the functionality remotely
is vital.
Remote Updates
Automated programs process the
received data and take business actions
based on the content.
If the transmitted data is compromised,
any simplistic responses or automated
functions to that compromised data
could cascade into difficulty.
Automated Functionality
Security breach CHECKLIST
Slide 25
Assess the potential for damage caused by a security breach, and
implement security solutions accordingly. Here the checklist:
 If a single device is compromised, can it be used to compromise other
devices?
 If an application is compromised and misused, what impact does that
security event have? Is it life-threatening?
 Can a data content breach cause financial harm to an individual or
more?
 How quickly can the specific breach or intrusion be detected? Is it
using a well-known target mechanism (such as might exist in a widely
used cellular device operating system)?
 Can a compromised device or set of devices be isolated from the
application rapidly?
A compromised sensor could
be used to inject false data
into the application, where an
incorrect action could be
taken by a server or human at
the remote end of the chain.
A possible solution consists
in the usage of statistical
patterns.
Encryption as an IoT Tool
Slide 26
A way to secure data is to encode it so that only the authorized
recipient can decode the data.
The basic goals of encryption are to provide:
• Proof that the sender is valid— Proof of who sent data is crucial
so that a hacker doesn’t steal a session and then pretend to be
that user (spoofing).
• Proof that data was not altered—Encryption functions can be
used to ensure that a change to the data renders the content
unusable.
• Proof that data cannot be read by a third party—Encryption
protects data from being read in transit or upon receipt, except by
someone with the correct decryption method.
A compromised sensor could be
used to inject false data into the
application, where an incorrect
action could be taken by a server
or human at the remote end of the
chain.
Weaknesses in Encryption
Slide 27
No encryption method is perfect—depending on the computing power
available at a particular location or the time used by the encryption
method, the algorithm may be weak or strong.
Strong algorithms may seem impossible to break, but applying
enough computing resources to the task could reveal weaknesses
that allow the data to be decrypted by unauthorized systems or
people.
Bugs may be discovered in the method itself, or in the particular
software implementation. A recent example is the Heartbleed
security bug in OpenSSL discovered in 2014. This potentially allowed
encrypted data to be read. Patches were made to OpenSSL, and a
majority of web servers have since been updated.
The heartbleed security bug in
openssl, discovered in
2014, affected about 17% of
the world’s web servers.
IoESECURITYISNOTAN HEADACHE
Slide 28
IoE security is not an headache for us, we strongly think that
with efficient and robust cloud services it’s possible to
guarantee an high level of security.
This is accomplished thanks to specific services that use:
 Machine Learning
 Statistical approaches
 Simulations
 Recommendations
Our companion monitors
the user activities and
sends recommendations
about health, fitness but
also if there are errors or
risks.
QUEstions
Slide 29
Question#1
Slide 30
What is the most important software layer for IoT
security?
We believe that the most important security layers for the IoT
are the cloud services, where there is the bigger value for the
customer. Security can’t be 100% guaranteed on physical
devices, but it can be on a centralized cloud system thanks to
many tools like encryption, statistics and deep learning
algorithms.
Question#2
Slide 31
Can you give more details about your temperature
sensor application?
We have used temperature sensors to monitor performance of
solar panels using temperature thresholds. At first we had some
issues because of the properties of thermistors: they were slow
and the conversion from analogic to digital had a notable error.
We decided to change the type of sensor and we used a silicon
chip. It was faster and more precise. Moreover the conversion
was automatically made by the chip because it has already a
digital output.
Question#3
Slide 32
What is the most common data analytics platform for
IoT?
There are many platforms that can be used to analyze data. One
of them is Hadoop, using Hadoop to analyze the data collected
through machines and sensors connected to the IoT enables
organizations to experience benefits in a variety of areas.
Weather patterns and other natural phenomena can be
monitored and tracked with a Hadoop system, for example.
Additionally, predictive analysis allows businesses to better
anticipate when repairs will be needed for equipment and
infrastructure. The health care industry has experienced
multiple benefits from Hadoop too, specifically the ability to
record and monitor patients’ vital statistics and other health
indicators.
Question#4
Slide 33
What kind of sensor should I use to measure temp. of
the soil and humidity?
One interesting way to measure soil data is using the SparkFun
Soil Moisture Sensor with an Arduino board. Here there are
more info: https://www.sparkfun.com/products/13322
There is another interesting Temperature sensor for soil: the
SHT-10. It includes both humidity and temperature modules.
Humidity readings have 4.5% precision and temperature 0.5%.
It’s used with Arduino or similar boards. Here more info:
https://www.adafruit.com/products/1298
Tutorial: https://learn.adafruit.com/wireless-gardening-arduino-
cc3000-wifi-modules
Question#5
Slide 34
Is hadoop Platform popular among IoT?
Your ability to process IoT data at scale requires an integrated
software, hardware, and networking approach that includes
Hadoop in order to prevent project delays and increased costs.
Pairing IoT with Hadoop allows organizations to take full
advantage of everything the IoT has to offer. As more devices
connect to the IoT, an increasing amount of data is created that
can offer valuable insights into a number of areas. Hadoop
platforms provide a powerful source of data analysis for the
information gathered by the IoT. A Hadoop platform can
accommodate 1 trillion files through the use of an enterprise-
class storage processing layer, and data snapshots allow users
to access device information from a specific timeframe after the
fact.
Slide 35
Megatris Comp. LLC
We create cloud services and mobile apps to make people life easier.
Our mobile apps are integrated with Megatris Cloud to sell services and
goods.
www.megatris.com
1250 Oakmead Pkwy, Sunnyvale, CA 94085, USA

More Related Content

What's hot

Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
AkshetPatel
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
Mhae Lyn
 

What's hot (20)

Sensors, IoT and Aged Care: A Practical Guide
Sensors, IoT and Aged Care: A Practical GuideSensors, IoT and Aged Care: A Practical Guide
Sensors, IoT and Aged Care: A Practical Guide
 
Iot
IotIot
Iot
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days Intelligent IoT Projects In 7 Days
Intelligent IoT Projects In 7 Days
 
internet of things
internet of thingsinternet of things
internet of things
 
What is IoT?
What is IoT?What is IoT?
What is IoT?
 
Iot energy 97-09-18
Iot energy 97-09-18Iot energy 97-09-18
Iot energy 97-09-18
 
IOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics EngineeringIOT in Electrical & Electronics Engineering
IOT in Electrical & Electronics Engineering
 
Internet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliInternet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin Ramli
 
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
Getting Started with the NodeMCU- Getting started with Internet of Things (Io...
 
Trend of 4th induatrial revolution linked application service technology base...
Trend of 4th induatrial revolution linked application service technology base...Trend of 4th induatrial revolution linked application service technology base...
Trend of 4th induatrial revolution linked application service technology base...
 
Applications of IoT
Applications of IoTApplications of IoT
Applications of IoT
 
THE INTERNET OF THINGS
THE INTERNET OF THINGSTHE INTERNET OF THINGS
THE INTERNET OF THINGS
 
IoT - IT 423 ppt
IoT - IT 423 pptIoT - IT 423 ppt
IoT - IT 423 ppt
 
Internet of Things
Internet of  ThingsInternet of  Things
Internet of Things
 
Internet of things presentation
Internet of things presentationInternet of things presentation
Internet of things presentation
 
The Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the OpportunitiesThe Current and Future State of Internet of Things: Unveiling the Opportunities
The Current and Future State of Internet of Things: Unveiling the Opportunities
 
Internet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chipInternet of Things (IoT) - workshop with wifi chip
Internet of Things (IoT) - workshop with wifi chip
 
Smart home Environment using iot
Smart home Environment using iotSmart home Environment using iot
Smart home Environment using iot
 
10 internet-of-things-iot-applications
10 internet-of-things-iot-applications10 internet-of-things-iot-applications
10 internet-of-things-iot-applications
 

Viewers also liked

Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad Kayton
WithTheBest
 
Trends of IoT Technology for industrial prototyping and educational markets
Trends of IoT Technology for industrial prototyping and educational marketsTrends of IoT Technology for industrial prototyping and educational markets
Trends of IoT Technology for industrial prototyping and educational markets
WithTheBest
 

Viewers also liked (20)

Internet of things for Smart Home
Internet of things for Smart Home Internet of things for Smart Home
Internet of things for Smart Home
 
Home automation using IoT
Home automation using IoTHome automation using IoT
Home automation using IoT
 
Home automation using android mobiles
Home automation using android mobilesHome automation using android mobiles
Home automation using android mobiles
 
Internet of Things and its applications
Internet of Things and its applicationsInternet of Things and its applications
Internet of Things and its applications
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
#1 Online IoT meetup
#1 Online IoT meetup#1 Online IoT meetup
#1 Online IoT meetup
 
Connectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad KaytonConnectivity for Smart Home IoT - Brad Kayton
Connectivity for Smart Home IoT - Brad Kayton
 
Resume 9-7
Resume 9-7Resume 9-7
Resume 9-7
 
ROBOTIC SHELF STOCK MONITORING SYSTEM
ROBOTIC SHELF STOCK MONITORING SYSTEMROBOTIC SHELF STOCK MONITORING SYSTEM
ROBOTIC SHELF STOCK MONITORING SYSTEM
 
Rain Drop Sensor using Arduino!
Rain Drop Sensor using Arduino!Rain Drop Sensor using Arduino!
Rain Drop Sensor using Arduino!
 
Athens IoT Meetup #3 - Introduction to ESP8266 (Pavlos Isaris)
Athens IoT Meetup #3 - Introduction to ESP8266 (Pavlos Isaris)Athens IoT Meetup #3 - Introduction to ESP8266 (Pavlos Isaris)
Athens IoT Meetup #3 - Introduction to ESP8266 (Pavlos Isaris)
 
FEM Optimization Project
FEM Optimization ProjectFEM Optimization Project
FEM Optimization Project
 
A versatile wireless sensor device for security alerts and home automation
A versatile wireless sensor device for security alerts and home automationA versatile wireless sensor device for security alerts and home automation
A versatile wireless sensor device for security alerts and home automation
 
CoolCATS project: eShoe
CoolCATS project: eShoeCoolCATS project: eShoe
CoolCATS project: eShoe
 
Home automation
Home automationHome automation
Home automation
 
IoTlondon - mbed based IoT Gateway talk
IoTlondon - mbed based IoT Gateway talkIoTlondon - mbed based IoT Gateway talk
IoTlondon - mbed based IoT Gateway talk
 
final_report
final_reportfinal_report
final_report
 
S home
S homeS home
S home
 
Trends of IoT Technology for industrial prototyping and educational markets
Trends of IoT Technology for industrial prototyping and educational marketsTrends of IoT Technology for industrial prototyping and educational markets
Trends of IoT Technology for industrial prototyping and educational markets
 
Rain Light Sensor
Rain Light SensorRain Light Sensor
Rain Light Sensor
 

Similar to Meetup9 iot sensors and security

74485052-SMART-SENSOR-Seminar-Report.pdf
74485052-SMART-SENSOR-Seminar-Report.pdf74485052-SMART-SENSOR-Seminar-Report.pdf
74485052-SMART-SENSOR-Seminar-Report.pdf
sunadstar
 
smartsensorsandapplication-141127040002-conversion-gate02.pdf
smartsensorsandapplication-141127040002-conversion-gate02.pdfsmartsensorsandapplication-141127040002-conversion-gate02.pdf
smartsensorsandapplication-141127040002-conversion-gate02.pdf
MANIMEGALAIMECE
 
IoT elements of Iot
IoT elements of IotIoT elements of Iot
IoT elements of Iot
SumitMali22
 

Similar to Meetup9 iot sensors and security (20)

Smart Sensor Configuration for Security System Automation Using FPGA
Smart Sensor Configuration for Security System Automation Using FPGASmart Sensor Configuration for Security System Automation Using FPGA
Smart Sensor Configuration for Security System Automation Using FPGA
 
IRJET- IoT Based Home Automation And Health Monitoring System for Physically ...
IRJET- IoT Based Home Automation And Health Monitoring System for Physically ...IRJET- IoT Based Home Automation And Health Monitoring System for Physically ...
IRJET- IoT Based Home Automation And Health Monitoring System for Physically ...
 
74485052-SMART-SENSOR-Seminar-Report.pdf
74485052-SMART-SENSOR-Seminar-Report.pdf74485052-SMART-SENSOR-Seminar-Report.pdf
74485052-SMART-SENSOR-Seminar-Report.pdf
 
Smartdust
SmartdustSmartdust
Smartdust
 
smartsensorsandapplication-141127040002-conversion-gate02.pdf
smartsensorsandapplication-141127040002-conversion-gate02.pdfsmartsensorsandapplication-141127040002-conversion-gate02.pdf
smartsensorsandapplication-141127040002-conversion-gate02.pdf
 
IRJET- A Remotely Controlled Home Automation System for Energy Saving
IRJET-  	  A Remotely Controlled Home Automation System for Energy SavingIRJET-  	  A Remotely Controlled Home Automation System for Energy Saving
IRJET- A Remotely Controlled Home Automation System for Energy Saving
 
IRJET- Automatic License Issuing System
IRJET-  	  Automatic License Issuing SystemIRJET-  	  Automatic License Issuing System
IRJET- Automatic License Issuing System
 
IoT Sensors Work-All That You Need - UbiBot.pdf
IoT Sensors Work-All That You Need - UbiBot.pdfIoT Sensors Work-All That You Need - UbiBot.pdf
IoT Sensors Work-All That You Need - UbiBot.pdf
 
Digital TWIN.pdf
Digital TWIN.pdfDigital TWIN.pdf
Digital TWIN.pdf
 
IRJET - Smart Street Light System using IoT
IRJET - Smart Street Light System using IoTIRJET - Smart Street Light System using IoT
IRJET - Smart Street Light System using IoT
 
shubham seminar report.pptx
shubham seminar report.pptxshubham seminar report.pptx
shubham seminar report.pptx
 
Smart sensors and their Application
Smart sensors and their ApplicationSmart sensors and their Application
Smart sensors and their Application
 
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORMDATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
DATA ACQUISITION AND ALERT SYSTEM USING BLYNK PLATFORM
 
IRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted ButtonsIRJET- A Amenably Projected VR System of Wall Mounted Buttons
IRJET- A Amenably Projected VR System of Wall Mounted Buttons
 
IRJET- Development of Data Transmission using Smart Sensing Technology for St...
IRJET- Development of Data Transmission using Smart Sensing Technology for St...IRJET- Development of Data Transmission using Smart Sensing Technology for St...
IRJET- Development of Data Transmission using Smart Sensing Technology for St...
 
IoT elements of Iot
IoT elements of IotIoT elements of Iot
IoT elements of Iot
 
IRJET- IoT based LPG Gas Booking and Monitoring System
IRJET-  	  IoT based LPG Gas Booking and Monitoring SystemIRJET-  	  IoT based LPG Gas Booking and Monitoring System
IRJET- IoT based LPG Gas Booking and Monitoring System
 
iot_module2.pdf
iot_module2.pdfiot_module2.pdf
iot_module2.pdf
 
Sensors, MEMS, Internet of Things
Sensors, MEMS, Internet of ThingsSensors, MEMS, Internet of Things
Sensors, MEMS, Internet of Things
 
Industrial Safety Measurement using Sensors and Voice Announcement
Industrial Safety Measurement using Sensors and Voice AnnouncementIndustrial Safety Measurement using Sensors and Voice Announcement
Industrial Safety Measurement using Sensors and Voice Announcement
 

More from Francesco Rago

More from Francesco Rago (8)

Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2Meetup 11 here&now_megatriscomp design methodpartii_v0.2
Meetup 11 here&now_megatriscomp design methodpartii_v0.2
 
Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1Meetup 10 here&now_megatriscomp_design_methodparti_v1
Meetup 10 here&now_megatriscomp_design_methodparti_v1
 
Meetup8 IoT trends 2016
Meetup8 IoT trends 2016Meetup8 IoT trends 2016
Meetup8 IoT trends 2016
 
Meetup6 microservices for the IoT
Meetup6 microservices for the IoTMeetup6 microservices for the IoT
Meetup6 microservices for the IoT
 
Meetup #4 - IoE - 2nd cybernetics approach
Meetup #4 - IoE - 2nd cybernetics approachMeetup #4 - IoE - 2nd cybernetics approach
Meetup #4 - IoE - 2nd cybernetics approach
 
Meetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of EverythingMeetup #3 - Cyber-physical view of the Internet of Everything
Meetup #3 - Cyber-physical view of the Internet of Everything
 
Meet up#2v0.2
Meet up#2v0.2Meet up#2v0.2
Meet up#2v0.2
 
1 minutepres
1 minutepres1 minutepres
1 minutepres
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

Meetup9 iot sensors and security

  • 2. Introduction Slide 2 Instant connectivity has completely changed much of society. Now a new revolution is upon us: The Internet of Things (IoT). The depth and breadth of IoT connectivity will create new businesses, provide new markets for existing businesses, and improve operational efficiencies. Gartner predicts that the number of IoT devices will grow to 26 billion units by 2020 in the US. IoT and machine-to-machine (M2M) communications increase operational efficiency by giving businesses visibility into the details of their operations in ways that could not have been measured before. In Cisco’s “Internet of Everything” 2013 report, the highest percentage (27%) of value in future IoT revenue will be in manufacturing. Accenture’s 2014 report, “Driving Unconventional Growth Through the Industrial Internet of Things,” finds that manufacturers could boost their efficiency by 30% using IoT. Here we introduce our 2016 view about IoT sensors and security.
  • 3. Whatwewilltalkabout IoT sensors and security. Slide 3 In the context of IoT/M2M, privacy is concerned with ensuring that data access is limited to the appropriate and authorized parties only. Security Objectives There is no single security solution for all possible security requirements for all applications. Security Issues for IoT/M2M Sensors are the specific mechanism used to measure physical parameters. IoT/M2M Sensors Conversions can create error, calibration and specialized sensors are fundamental. Conversion to Digital Data
  • 4. IoT/M2MSensors Slide 4 • When deploying Internet of Things and machine-to-machine application devices, the connected device generally needs to report more than just its physical location. We will talk about a few of the more common sensors and what they do. • For example, an IoT/M2M device may measure a particular physical parameter at that location these physical parameter measurements require sensors that are capable of recording the specific value of that parameter for the device application to fulfill its functions. • Sensors are often integrated circuits that are designed for these kinds of IoT/M2M applications, since the small size and low cost of these chips make them appropriate choices. • For example, many of the sensors described in this webinar are available in high-end smartphones. These include accelerometers, thermometers, gyroscopes, magnetometers, and heart-rate monitors.
  • 6. Accelerometers Sensors Slide 6 Acceleration is a measure of a change in velocity (change of speed or direction). Accelerometers are devices that measure acceleration. The parameter being measured may be a static force, such as gravity exerted on a device. Other sensors make dynamic force measurements to measure motion changes and vibration.  An example of an acceleration sensor is a chip in a moving vehicle that measures changes of speed and uses high acceleration readings (such as during an accident) to trigger an airbag to protect the passengers.  In some industrial applications, the vibrations detected by an acceleration sensor could be an excellent indicator of a potential problem with a moving part—such as a motor with bearings that are worn. Timely transmission of the data from vibration sensors enables early detection of problems where preventative maintenance could avoid catastrophic failures.
  • 7. Temperature Sensors Slide 7 Depending on the desired measurement range, there are various types of available sensors: • Silicon chip (semiconductor) sensors are easily used in the range from -50 to +150 degrees Celsius. These are quite accurate and linear—to within 1 degree—without the need for extensive calibration. They are relatively inexpensive. • Thermistor sensors can cover a wider range—from -100 to +450 degrees C for more applications. A thermistor is often more accurate than a silicon chip, but it has a slightly higher cost per sensor. It requires a complex correction to achieve good linearity and accuracy over the desired temperature range. • Resistance-Temperature Detectors (RTD) provide yet more range, from -250 to +900 C, but are quite difficult to use since they are more fragile than other types of temperature sensors. They are the most accurate—often a hundred times more accurate than a silicon chip sensor, although this carries the same complex solutions for linearization as thermistors, and some models can be quite expensive. • Thermocouple is the correct choice for high range from -250 to +2000 C. It is used for many industrial applications, such as chemical process monitors and high-temperature furnaces used in the semiconductor industry. The response time for the sensor data can be quite slow, since temperature changes are not as “rapid” as other measured physical parameters.
  • 8. LIGHTSensors Slide 8 Light sensors cover a broad range of potential applications—from automated brightness control in cellphones to medical diagnostic equipment.  A very early example of ambient light sensors used in local consumer applications are photocells within lamps that automatically turn the lamps on at dusk and turn them off at sunrise.  Simple light sensors can also be for proximity detection. Counters in manufacturing systems use the presence or absence of light on photocells to measure products being moved past the counter on conveyors.  Garage door systems can reverse direction to avoid hurting children or pets who cross under a closing garage door and temporarily cut the light from a source sending a beam of light across the door opening onto a photocell. As with other types of sensors, the mechanism used to measure ambient light varies depending on the application. Simple Cadmium Sulphide (CdS) or Cadmium Selenide (CdSe) photo-resistors change their resistance as a function of the ambient light. Photo-diodes and photo- transistors, with active semiconductor junctions, are used when greater accuracy is required, since the ambient light is converted into a measurable current that can be amplified or converted for a measurement
  • 9. MEMS Sensors Slide 9 In 2015, half of all wearable sensors are based on MEMS technologies. Inertial measurement units (IMUs) are found in every smart watch and fitness tracker, making the most of mature MEMS components that are reliable, familiar and cheap. In modern, high-end smartphones, integrated chip sensors to measure motion, direction, pressure, magnetic fields, etc., are becoming quite common. These can be used to augment the location information and human motion in the cellphone. In chip form, these are usually Micro-Electro-Mechanical Systems (MEMS) sensors for many different parameter measurements. The implementation of MEMS uses ultra- miniaturized physical structures—beams, arms, and associated electronics—to measure the motion of the structures when the chips moved. The device essentially converts a mechanical (physical) motion into an electrical signal. A gyro sensor, for example, senses rotational motion and changes in orientation. These can be used in a variety of applications, such as correcting for hand-held shake in video and still-image cameras and human motion sensing for video games. MEMS sensors are generally manufactured in the same large-scale facilities as semiconductors or chips. This means that the mechanical precision of the devices can be very high and allow for excellent, reliable performance at low cost.
  • 10. SWITCH Slide 10 Switches are the simple state or position sensors that provide an “open” or “closed” state. A door or window sensor used in security systems is often a simple magnetic reed relay switch that opens or closes an electrical circuit depending on the position of a small magnet relative to the switch. These simple magnetic reed relay switches can also be used for sensing when a cabinet— such as a medicine cabinet, oven door, or food storage compartment—has been opened in a senior citizen’s home-monitoring IoT application. A detection of the change of state of such a switch—from open or closed or vice-versa—can be interpreted as evidence that the monitored parent has performed their expected regular daily routine.
  • 11. OURONFIELD applications Slide 11 Our company has developed a lot of solutions using the sensors described before: Monitor performance of solar panels using temperature thresholds. Use a switch (Denkovi Relay) to turn off a power inverter in case of alert. Use MEMS sensors of a smartphone to monitor the fitness activity of the user. Measure the daily light in order to monitor the output of a solar plant.
  • 12. WHATWE LIKEtODO:Sensorfusion Slide 12 Our daily challenge here is in turning raw data into useful, or 'actionable' data. Sensor fusion is the process of combining sensor outputs from multiple sensors to gain greater total insight. The most common example is using individual xyz acceleration and rotation data (e.g. from a 6-axis IMU) into motion data. This in turn can be used to count steps, differentiate between activity types, and so on. Another example with MEMS IMUs is to use them alongside optical sensors to manage motion artifacts experienced in optical heart rate monitoring.
  • 13. SensorFUTURE: Conventional vs Printed Electronics Slide 13 Conventional Electronics “Printed Electronics” Materials High temperature: Silicon, Ceramics, Glass Low Temperature: Organic polymers, Specialty inks Manufacturing technique Photolithography, micromachining, ablation, etc. Printed on plastic, textile, paper, foil Product feature Rigid, brittle, miniaturized Flexible, robust, large area
  • 14. SensorTHATCANBEFULLYPRINTED Slide 14  Biosensors  Capacitive sensors  Piezoresistive sensors  Piezoelectric sensors  Photodetectors  Temperature sensors  Humidity sensors  Gas sensors
  • 15. ConversiontoDigitalData Slide 15 Analog-to-digital conversion is an electronic process in which a continuously variable (analog) signal is changed, without altering its essential content, into a multi-level (digital) signal. Sensors are often used in local applications, where their signal is processed using circuitry designed for that local application. However, in a sensor that is used for remote data transmission of the measurement, the electrical signal must be converted into a digital value, or number, for the transmission. The specific electrical signal from different sensors may vary over a wide range of current or voltage or other electrical parameters (such as resistance or capacitance) and often must be converted and amplified into a voltage that can be measured. If necessary, the signal must be filtered to eliminate noise or to reduce the frequency of the measurement for the requirements of the application. For example, a temperature sensor generally changes its value relatively slowly as the sensor matches its environment. Therefore, a rapid change in reported temperature may be an inaccurate reading, which should be filtered to reduce potential errors.
  • 16. Simple Off and On Switches Slide 16 In simple switch applications, where the state is “open” or “closed,” using a digital pin to measure this state and report its value (“0” or “1”) is an easy choice. For more complex needs with simple switches, the device may also report when the transition from one state (such as “open”) to the other state (such as “closed”) occurs. That is, it may be equally, or more, important to report a change of state rather than the present state of the simple switch.
  • 17. Security Objectives Slide 17 • Traditional financial and consumer markets have been targets for misuse of information stored on their systems—including personal credit information, identify theft, misuse of credit cards by unauthorized persons, personal privacy violations, and loss of corporate intellectual property. The financial losses sustained by these security breaches are in the billions of dollars. • While attempts have been made to criminalize such nefarious activities, they continue to occur with increasing frequency and are a serious problem for governments, businesses, and individuals. • Business deploying IoT/M2M solutions will be held responsible for protecting data and devices, as well as corporate proprietary information. “any device that is connected to the Internet is at risk of being hijacked.” Chairperson Edith Ramirez - US Federal Trade Commission
  • 18. SecurityObjectives Slide 18 Authenticated Sender and Receiver Sender and Receiver Accessible Trust in the Data Content Confidentiality of Information
  • 19. Authenticated Sender and Receiver Slide 19 In any data connection, it is important for the sender and receiver of information to be authenticated to each other—regardless of whether the device is the sender or the receiver.  As a security principle when transmitting data, the device must ensure that it is sending its information to the correct server, and when receiving data and control messages, it must ensure that the information is coming from the correct server. Senderand ReceiverAccessible In any network, the sender and receiver must always be accessible when needed. If the network is not functional, or the server is not executing the correct programs to receive the data, the purpose of the application may be lost. Mission-critical applications, such as automatic crash notification or medical alerts, may fail to work properly if the connection is not reliable. The lack of communication itself means a lack of security.
  • 20. Confidentiality of Information Slide 20 The confidentiality of the information must be maintained. Only the correct recipient should have access to the transmitted data, since it may contain proprietary or confidential information. Indeed, privacy laws in many countries require extra care with information regarding individual citizens—for example, in the US, the Health Insurance Portability and Accountability Act (HIPAA) provides specific rules for individually identifiable medical information. Trust in the Data Content The accuracy in the content of the transmitted data is essential—if a device does not encode and transmit data correctly, or the connection is not error-free, the quality and accuracy of the data becomes suspect. Even good data becomes unreliable, and business actions that are taken on the content of the data may not be appropriate. Mission-critical information is particularly important to keep as error-free as possible. The cost of business actions taken on receipt of incorrect data may be high.
  • 21. Security Issues for IoT/M2M Slide 21 Security risks can be recognized and understood, and the implementation of security methods should be incorporated in the IoT/M2M device and software associated with that application. Most obvious holes in security can be resolved quickly and efficiently. It is vital to recognize that risks cannot be completely eliminated, and there is no single security solution for all possible security requirements for all applications. Thus, it is critical to assess the level of security implementations that are appropriate for different kinds of data. This assessment must be done early—during the design of the application.
  • 22. Slide 22 We believe that the most important security layer for the IoT are the cloud services, where there is the bigger value for the customer. Security can’t be 100% guaranteed on physical devices, but it can be on a centralized cloud system thanks to many tools like encryption, statistics and deep learning algorithms.
  • 23. issues to be considered Slide 23 Applications and devices may be using multiple services, where the required authorizations for allowing a device to access a particular service may differ from one application to another. The authentication mechanisms may also differ. Multiple Types of Services In IoT/M2M deployments, there are predictions of explosive growth in the near future—billions of potential devices within the next 5 to 10 years. Thus, in any application where a security problem exists, the overall problem could be greatly magnified by the large numbers of devices that may be affected. Scaling Growth Some IoT/M2M devices operate in more than one transport network or technology for redundancy or hybrid solutions. For example, a short-range wireless technology such as Wi-Fi can have quite a different security threat vector and potential for breaches compared to a long-range cellular service. Multiple Networks
  • 24. issues to be considered Slide 24 Unlike handsets used by people who change them every few years on average, IoT/M2M devices— particularly in industrial applications—may be deployed for many years and operate relatively continuously over that time. Devices with compromised security could stay operational for lengthy periods. Long Lifecycles It is essential to plan and design for device updates over-the-air (OTA). When a device security breach is sufficiently critical that the device programming must be updated, the ability to re-program the functionality remotely is vital. Remote Updates Automated programs process the received data and take business actions based on the content. If the transmitted data is compromised, any simplistic responses or automated functions to that compromised data could cascade into difficulty. Automated Functionality
  • 25. Security breach CHECKLIST Slide 25 Assess the potential for damage caused by a security breach, and implement security solutions accordingly. Here the checklist:  If a single device is compromised, can it be used to compromise other devices?  If an application is compromised and misused, what impact does that security event have? Is it life-threatening?  Can a data content breach cause financial harm to an individual or more?  How quickly can the specific breach or intrusion be detected? Is it using a well-known target mechanism (such as might exist in a widely used cellular device operating system)?  Can a compromised device or set of devices be isolated from the application rapidly? A compromised sensor could be used to inject false data into the application, where an incorrect action could be taken by a server or human at the remote end of the chain. A possible solution consists in the usage of statistical patterns.
  • 26. Encryption as an IoT Tool Slide 26 A way to secure data is to encode it so that only the authorized recipient can decode the data. The basic goals of encryption are to provide: • Proof that the sender is valid— Proof of who sent data is crucial so that a hacker doesn’t steal a session and then pretend to be that user (spoofing). • Proof that data was not altered—Encryption functions can be used to ensure that a change to the data renders the content unusable. • Proof that data cannot be read by a third party—Encryption protects data from being read in transit or upon receipt, except by someone with the correct decryption method. A compromised sensor could be used to inject false data into the application, where an incorrect action could be taken by a server or human at the remote end of the chain.
  • 27. Weaknesses in Encryption Slide 27 No encryption method is perfect—depending on the computing power available at a particular location or the time used by the encryption method, the algorithm may be weak or strong. Strong algorithms may seem impossible to break, but applying enough computing resources to the task could reveal weaknesses that allow the data to be decrypted by unauthorized systems or people. Bugs may be discovered in the method itself, or in the particular software implementation. A recent example is the Heartbleed security bug in OpenSSL discovered in 2014. This potentially allowed encrypted data to be read. Patches were made to OpenSSL, and a majority of web servers have since been updated. The heartbleed security bug in openssl, discovered in 2014, affected about 17% of the world’s web servers.
  • 28. IoESECURITYISNOTAN HEADACHE Slide 28 IoE security is not an headache for us, we strongly think that with efficient and robust cloud services it’s possible to guarantee an high level of security. This is accomplished thanks to specific services that use:  Machine Learning  Statistical approaches  Simulations  Recommendations Our companion monitors the user activities and sends recommendations about health, fitness but also if there are errors or risks.
  • 30. Question#1 Slide 30 What is the most important software layer for IoT security? We believe that the most important security layers for the IoT are the cloud services, where there is the bigger value for the customer. Security can’t be 100% guaranteed on physical devices, but it can be on a centralized cloud system thanks to many tools like encryption, statistics and deep learning algorithms.
  • 31. Question#2 Slide 31 Can you give more details about your temperature sensor application? We have used temperature sensors to monitor performance of solar panels using temperature thresholds. At first we had some issues because of the properties of thermistors: they were slow and the conversion from analogic to digital had a notable error. We decided to change the type of sensor and we used a silicon chip. It was faster and more precise. Moreover the conversion was automatically made by the chip because it has already a digital output.
  • 32. Question#3 Slide 32 What is the most common data analytics platform for IoT? There are many platforms that can be used to analyze data. One of them is Hadoop, using Hadoop to analyze the data collected through machines and sensors connected to the IoT enables organizations to experience benefits in a variety of areas. Weather patterns and other natural phenomena can be monitored and tracked with a Hadoop system, for example. Additionally, predictive analysis allows businesses to better anticipate when repairs will be needed for equipment and infrastructure. The health care industry has experienced multiple benefits from Hadoop too, specifically the ability to record and monitor patients’ vital statistics and other health indicators.
  • 33. Question#4 Slide 33 What kind of sensor should I use to measure temp. of the soil and humidity? One interesting way to measure soil data is using the SparkFun Soil Moisture Sensor with an Arduino board. Here there are more info: https://www.sparkfun.com/products/13322 There is another interesting Temperature sensor for soil: the SHT-10. It includes both humidity and temperature modules. Humidity readings have 4.5% precision and temperature 0.5%. It’s used with Arduino or similar boards. Here more info: https://www.adafruit.com/products/1298 Tutorial: https://learn.adafruit.com/wireless-gardening-arduino- cc3000-wifi-modules
  • 34. Question#5 Slide 34 Is hadoop Platform popular among IoT? Your ability to process IoT data at scale requires an integrated software, hardware, and networking approach that includes Hadoop in order to prevent project delays and increased costs. Pairing IoT with Hadoop allows organizations to take full advantage of everything the IoT has to offer. As more devices connect to the IoT, an increasing amount of data is created that can offer valuable insights into a number of areas. Hadoop platforms provide a powerful source of data analysis for the information gathered by the IoT. A Hadoop platform can accommodate 1 trillion files through the use of an enterprise- class storage processing layer, and data snapshots allow users to access device information from a specific timeframe after the fact.
  • 35. Slide 35 Megatris Comp. LLC We create cloud services and mobile apps to make people life easier. Our mobile apps are integrated with Megatris Cloud to sell services and goods. www.megatris.com 1250 Oakmead Pkwy, Sunnyvale, CA 94085, USA