Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP

582 views

Published on

OMA Seminar/Webinar, October 27, 2016, "How Developers Can Get the Most Out of IoT Standards and Tools" - Presentation #4 from Hatem Oueslati, CEO and Co-Founder, IOTEROP

"Security, Interoperability and Remote Device Management in IoT: How LWM2M can meet the Challenge of Tomorrow’s Industries and Smart Cities"

Published in: Technology
  • Be the first to comment

  • Be the first to like this

IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP

  1. 1. Interoperability, Security and Device Management solutions for IoT
  2. 2. MAIN IOT ROADBLOCKS Security Interoperability Device Management
  3. 3. Source: US Department of Homeland IOT SECURITY FAULTS: BIG CONSEQUENCES ! Traffic signals HACKED Smart Meters HACKED Smart Buildings HACKED Public transportation HACKED HACKED Smart Grid HACKED Traffic controls
  4. 4. The vision Water and electricity distribution Optimize efficiency, detect loss, reduce waste Transportation Analyze et optimize traffic flows, alert drivers and passengers Environmental Quality Air and water analysis, enhance citizens’ health Security and prevention Assist weakest people, prevent risks and alert citizens FRAGMENTATION : REAL PAINS !
  5. 5. The market reality Fragmented solutions Services incompatibilities, useless and costly redundancy Complexity Management and deployment over costs, no possible extension Incompatibilities Sensors and infrastructures incompatible, complex deployment and over costs Inefficiency Costly maintenance, Services creation limited, limited innovation FRAGMENTATION : REAL PAINS !
  6. 6. Tesla: embeds an OMA DM technology GM: no OMA DM technology 29 000 cars remotely updated with a software patch 380 000 cars to return to service for a manual update Source: Frost & Sullivan 2015 IOT DEVICE MANAGEMENT : AN EXAMPLE
  7. 7. STANDARDS ARE THE KEYS Security Discovery Device Management CRUDN Resource Model Data Model Authentication Messaging Registration UDP DTLS CoAP LWM2M Objects IP Transport RD Onboarding TCP TLS SMS Non-IP (e.g. LORAWA N) Application Spot on the OMA Lightweight M2M technology
  8. 8. STANDARDS ARE THE KEYS Compared to COAP only MISSING ! Security Discovery Device Management CRUDN Resource Model Data Model Authentication Messaging Registration UDP DTLS CoAP IP Transport Onboarding TCP TLS Application RD
  9. 9. STANDARDS ARE THE KEYS Compared to MQTT MISSING ! Security DiscoveryDevice Management Resource Model Data Model Authentication Messaging Registration IP Transport Onboarding TCP TLS Application MQTT N CRUD
  10. 10. Today Tomorrow WHAT LWM2M CAN CHANGE No direct interactio ns Big integration costs direct interactions Unique and standardize d exchanges Interoperability and device management of sensors. Making sensors intelligent: dynamic policy changes, increased data relevance…
  11. 11. Increased data flow security using light but powerful cryptography. Secure device authentication and registration. WHAT LWM2M CAN CHANGE
  12. 12. 3 Founders from Palm and Intel with 17 years of embedded systems experience Creators of the Eclipse’s Wakaama project and principal maintainers Members of OMA and actively participating to the standards Provide a commercial LWM2M software stack for the industry IOTEROP: WHO ARE WE ?
  13. 13. Thank you !

×