“Infinite possibilities with technology”
Nishant Singh Sushil Tripathi
SPEAKER PROFILE
2
4
Foundation
2009
Footprint
North America, Europe,
and Asia
Clients
Startups to Fortune 500
Core Strength
People and Technology
ISO 9001:2015 & CMMi Level 5
Ownership
Public Limited
BSE, NSE: KELLTOTEC
Team
1500+ Employees
3
KELLTON TECH, A PIONEER OF DIGITAL TRANSFORMATION
OUR SERVICES
4
KELLTON
TECH
AGENDA
Purpose of Webinar
5
Suggest innovative ways to mitigate IoT data security risks
Analyze ROI following IoT adoption
Simplify IoT adoption for SMEs & Enterprises
Integrate legacy systems with the modern IoT world
05
04
03
02
01
AGENDA
Highlight the practicality of IoT solution for various industries
6
Integrating Legacy Systems with IOT
Making IOT adoption a breeze
The Internet of Things, as the name suggests, is a combination of the
internet and things. The internet provides the capability to connect while
things (e.g. Edge Devices) capture the data and transfer it for further
analysis. So IoT is basically an ecosystem of connected physical devices
that are accessible through the internet and have the ability to collect and
transfer data over a network without manual assistance or intervention.
Each IoT solution is a
combination of some of
these “must have”
components.
SENSORS &
ACTUATORS
COMMUNICATION
CHANNEL
DATA COLLECTION OVER
CLOUD
INFORMATION DELIVERY
APPLICATION
8
InsuranceAutomotive BuildingsIndustrial
products
Travel &
Transport
Electronics Retail Energy and
Utilities
Aerospace &
Defense
Manufacturing
Connected
Car
Predictive
Maintenance
Connected
Fleet
Connected
Elevators
Wearables
for Worker
Safety
Digital Twin Manufacturing
Quality
Connected
Appliances
Store
Wellness
Smart Grid
Asset Health
CONNECTING THINGS TO DELIVER DIGITAL EXPERIENCES
USING THINGS
9
• Proactive monitoring
• OTA software updates
• Remote access
SERVICE
•Predictive maintenance
•Identify process issues
•Real-time stat reporting
ANALYZE
• Closed loop product
lifecycle management
• Configuration management
• Knowledge management
• Remote diagnostics
• Quality Assurance
• Risk management
INTEGRATE
• Differentiate products
• Enable customer self-service
• Personalization of products
• Introduce new business
models
• Value added services
INNOVATE
Leverage IOT to:
• Envision, Create and Commission new
digitally connected products
• Drive revenue & customer success
UNLOCKING THE VALUE OF IOT TO RETRIEVE NEW PRODUCT DATA
10
Use IoT to maximise product fit with
customer requirements and needs
Differentiate your product from the
competitors’ products
Identify Market Trends
Faster and Easier
Minimize Time to Market
SUCCESS FACTORS OF NEW PRODUCT DEVELOPMENT USING IOT
11
• An IoT enabled Event management solution provides information about the venue and
associated content.
• Beacon based proximity technology is used that allowed indoor navigation to locate
event and the respective speakers.
• IoT enabled tracking allows to collect data that provides key insights about all the
stakeholders (Guests / Attendees) of the event.
Event Management
• Can provides effective operations management , monitoring of assets , resources
enabling workflow, process automation and real-time decision-making capabilities by
leveraging IoT.
Oil & Gas Solution
• An IoT enabled Food Safety & Compliance solution can be developed that will enable
real time monitoring.
• The solution allows real-time on-field assessment of food item
• The solution provides the capability to Incident Report and Audit reports on device
• It features Continuous monitoring on multiple facilitiesFood Monitoring
NEW PRODUCT DEVELOPMENT USING IOT
12
Objective: Improve product utilization and enable value-added services
• Prevent production delays
• Reduce equipment and process breakdowns
• Gain visibility to improve process effectiveness
• Monitor process-resource availability
• Predict loss and recommend action
Improve overall process
effectiveness
• Predict process performance variations
• Analyze sources of waste and inefficiencies, using cloud-based machine learning
• Prescribe remedies to optimize quality and yield
Boost quality &
yield performance
• Make informed AI decisions that help reduce downtime & overtime
• Use preventive maintenance to prevent unplanned maintenance
Enhance productivity
• Use AI to analyze sources of scrap, waste and inefficiencies
• Prescribe remedies that optimize energy usage
Optimize energy usage
DRIVING PROCESS OPTIMIZATION THROUGH IOT
13
Customers demand the choice of how, when, and where they do their banking. To keep up,
banks need to improve the customer experience with faster service, reduced wait times, and
first-time problem resolution.
An AI-based virtual assistant built using an IoT platform is helping to change the game in call
center innovation.Banking
The smallest disruptions can cause significant downtime and delays in manufacturing, leading
to lost customers and big cuts in profit margins.
IOT enabled AI triggers alerts when weather patterns threaten delayed delivery of raw
materials, and IoT sensors and analytics predict equipment failures before they occur.Manufacturing
Oil and gas companies are using IOT platforms to build solutions to better understand the
complex systems and equipment used in exploration and production.
These AI solutions use data from collected via IoT sensors, decision logs, and evaluations from
around the world to help engineers make better operational decisions and avoid equipment
problems.Oil & Gas
INDUSTRY SPECIFIC PROCESS OPTIMIZATIONS USING IOT
14
Objective: Organizations that do not deploy IoT solutions on premise can still benefit from
the huge clusters of data that IoT applications generate by the use of Analytics Tools.
Volume
Driving Revenue
Competitive Edge
Streaming Analytics
• Non-IoT business organizations leverage large
volumes of 3rd party IoT data
• Analysis of 3rd party IoT data from external
sources for extracting relevant patterns.
• Gain an insight into customer preferences and
choices
• Offer better services to gain competitive edge
• Event stream processing analyzes huge in-
motion 3rd party IoT data sets
• Detect urgent situations & recommend immediate
actions
DRIVING BUSINESS PERFORMANCE THROUGH IOT DATA ANALYSIS
15
CUSTOMER CO-ORDINATION FOR TARGETED ADVERTISEMENT
IoT helps the retailer to make a different identity in front
of his consumer.
By obtaining 3rd party customer shopping data, a retailer
enables the consumer to present their views regarding
the product.
It helps them to improve their product quality which
ultimately makes them well-known among customers.
IoT targets your specific customers for personalized advertisement.
It recognizes the shopping pattern through online browsing which in turn helps the business retailer to sell their
product to the targeted customer.
IoT is used by a major e-commerce brand to track the popular product on social media.
16
IOT SOLUTION ARCHITECTURE
17
Colossal number of
connected devices in
concurrent data
exchange
Legacy systems built around
batched data refrain stream
messaging
Conventional system’s
design supports fixed
no. of endpoints
Legacy platform based
systems can’t adjust
with new IoT protocols
High latency and
low throughput of
legacy platforms
Most IT components
hosted on-premise
PROBLEMS AROUND IOT LEGACY SYSTEM IMPLEMENTATION
18
CONSIDERATION FOR IOT IMPLEMENTATION
In an IoT solution security needs to be extended
all the way to the node on the edge device.
Therefore, the threat landscape is vast and
enterprises have more vectors that need to be
taken into account.
SECURITY
Because IoT is a central system that connects all of the
edge devices, choosing the right connection protocols is
very important. Based on the solution requirement,
enterprises can choose from the following protocols:
• MQTT
• CoAP
• AMQP
• Zigbee
RIGHT
PROTOCOLS
As enterprises start adding more and more IoT
devices, the demand for greater data collection
and processing increases. Therefore, an IoT
system has to be scalable. It must also be able to
easily accommodate new devices and handle the
increasing data load without any glitches.
SCALABILITY
The legacy systems of any organization generate
critical data that needs to be consumed by the IoT
solution. Integrating the legacy system with the IoT
solution is very challenging for IoT implementation.
LEGACY INTEGRATION
19
SNEAK PEAK INTO IOT DEVELOPMENT PLATFORMS
Microsoft Azure IoT
Microsoft’s IoT solution works on Things, Data, Insights, and Action.
Its Azure IoT Hub is a fully hosted and Microsoft-managed
Software-as-a-Service (SaaS) solutions for distinct Platform-as-a-
Service (PaaS) offerings.
Rooting from bidirectional communications between millions of IoT
devices, Azure lays the intelligent edge by streamlining end-to-end
IoT applications with open-source SDKs and other protocols.
Amazon Web Services (AWS) IoT
AWS IoT provides functionality spanning the edge to the cloud, to
build IoT solutions that integrates with AI services, to make devices
smarter, even without Internet connectivity. Built on the AWS cloud,
AWS IoT can easily scale as your device fleet grows.
Control services allow you to control, manage, and secure large
and diverse device fleets. Data services help you extract value
from IoT data.
Google Cloud IoT
Google Cloud IoT Platform is a complete set of tools that securely
connect, manage and ingest data from dispersed (on- and of- the
premise) devices and services.
Cloud IoT Core is a fully managed service that allows easy &
secure connection, management, and ingestion of data from
globally dispersed devices. Cloud IoT Core, in combination with
Cloud IoT platform, provides a complete solution for collecting,
processing, analyzing, and visualizing IoT data in real time.
Software AG Cumulocity IoT
Cumulocity is a device management, data visualization, and
application enablement platform for enterprises. Cumulocity as a
platform is an open source, independent solution to bring your
remote assets to the cloud.
Web-based device management, data visualization, and remote
control functionality. Enables small & large deployment scenarios
with auto-registration, asset management, and real-time alarms in
integrated workflows
20
STRATEGIES FOR INTEGRATING LEGACY
SYSTEMS WITH IOT
21
BUILD FROM SCRATCH
Building a custom solution from scratch allows endless customization to create a
competitive advantage. It provides the freedom to choose the suitable architecture and
technology stack to meet the expectations and feasibility.
BUY OFF THE SHELF
Off-the-shelf software are ready-to-use solutions that can be customized up to a certain
extent. An off-the-shelf product will typically be moderately priced when compared to a
custom developed product. Off the shelf solutions significantly reduce time-to-market,
as some parts of the module may only require minor modifications.
WRAP &EXTEND
This retrofit method involves using third-party, IoT ready connectivity solutions, IoT
platforms, IoT Gateways and sensors that extend the capabilities of legacy equipment.
This option enables communication to the legacy protocols.
IOT IMPLEMENTATION STRATEGIES
22
1 2 3
Build from
Scratch
Wrap-&-Extend
Buy Off The Shelf
Base Factors Build from Scratch Wrap and Extend Buy Off The Shelf
Compliance to Standards Most Restricted Compliance Restricted Compliance
Time To Market Most Medium Lowest
Inter-operability Most Restricted Medium
Scalability Most Scalable Intermediate Scalability Intermediate Scalability
Maintenance Required High Medium Low
Level of Customization Highest Medium Lowest
In-House Competencies Most Medium Restricted
Capax Required High Low Medium
On-Going Support Full Vendor Support Restricted Vendor Support Full Vendor Support
Customization Most Restricted Restricted
IOT IMPLEMENTATION STRATEGIES COMPARISON
23
Smart Fleet
Management
Fleet
Optimization
Route Planning & Fuel
Analytics
Driving Pattern
Tracking
IoT Enabled
Asset
Monitoring
Central Tracking,
Monitoring & Analytics
Solution for Warehouses
RFID based Real-time
Asset Monitoring
Live Asset Tracking
USE CASES: IOT ENABLED LOGISTICS SOLUTIONS
24
Data Security &
Privacy in IoT
ROLE OF DATA SECURITY & PRIVACY IN IOT
26
DATA PRIVACY
Data is a valuable
resource. We can't
always trust
companies to
handle our data
responsibly.
INSECURE COMMUNICATION CHANNEL
A lack of technical
knowledge, the running of
an insecure channel, and
insecure components in the
IoT network lead to internal
and external security
breaches
DATA SECURITY
IoT Device manufacturers can
exploit the data collected by
smart devices/appliances to get
insights about their consumer
behaviour and their usage
patterns and use it to influence
purchasing decisions.
NEED FOR DATA SECURITY & PRIVACY IN IOT
27
02
03
04
0105
VULNERABILITY
MANAGEMENT
• It is difficult to assess the
repercussions of the vulnerability
• Assessing the extent of a breach is
challenging
UPDATE MANAGEMENT
• Large numbers of devices need to
be updated
• Older devices might not support
data updates
CARELESSNESS
• Users ignore the security issues
• User do not perform basic steps to ensure the safety
of the data
DATA INTEGRITY
• All data collected should be
checked for compromise.
MULTIPLE POINTS OF
VULNERABILITY
• Each connected asset represents a
potential risk
• Poor encryption and backdoors allow
unauthorized access
• A single weak link could open up access
to numerous devices
KEY CHALLENGES FOR DATA SECURITY & PRIVACY IN IOT
28
WHY SHOULD YOU WORRY ?
29
Hackable Connected Cardiac Device
In early 2017, the FDA confirmed that the St. Jude
Medical implantable cardiac devices (pacemakers
and defibrillators) were hackable. The FDA said
that hackers could break into the device and
deplete the battery, causing incorrect pacing.
Hackable IoT Enabled Cars
Two researchers demonstrated how the
digital system of a vehicle could be
hacked by sending a false software
update. After taking control of the
vehicle, the attacker could cut the
brakes and shut down the car.
Hackable WiFi Baby Heart Monitor
Baby heart monitors which alert parents
when their babies experience heart
troubles can be easily hacked by exploiting
the connectivity element of the hardware
layers.
WHY SHOULD YOU WORRY?
30
STRATEGIES TO ENSURE DATA PRIVACY & SECURITY
31
Security Architecture Design
Firmware & App Security
Selecting Robust Protocols
Secure Infra Selection
Solution Security Designing and Assessment1.
At the solution security and designing
stage, we should:
• Provide security recommendations
• Perform deep security analysis and
evaluations
• Perform activities like –
o Source Code Edit
o Cryptography implementation
audit
• Assess Wireless Protocols
STRATEGIES TO ENSURE DATA PRIVACY & SECURITY
32
Device Security
Software Security
Key Management
Security Infrastructural Enhancements2.
At the given stage we should:
• Check data obfuscation against
tampering and reverse engineering
• Run application security tests for
penetration
• Secure device management and
vulnerability patching
• Multilevel Key Management
(Authentication, Authorization & Right
Management )
STRATEGIES TO ENSURE DATA PRIVACY & SECURITY
33
Security Provisions for Hardware
Mitigate Vulnerabilities
Breach Countermeasures
Attack Countermeasures3.
At the given stage we should:
• Develop the capability to create
technical counter measures in case of
any security breach
• Form strategies to mitigate risk and
remove solution vulnerabilities that
have been uncovered by the breach
• Develop a damage control strategy to
minimize the loss
STRATEGIES TO ENSURE DATA PRIVACY & SECURITY
34
Facility
Management
Asset
Temperature
Monitoring
Asset Location & State
Monitoring
Facility Reporting &
Analytics
Quality
Assurance
Solutions
Product Composition Ratio
Monitoring & Alerts
Product Lifecycle
Management
Transportation
Impact Monitoring
USE CASES: IOT ENABLED MANUFACTURING SOLUTIONS
35
PRACTICALITY OF IoT SOLUTIONS
36
IoT Implementation &
Feasibility Workshop
Strategy Planning
Develop the
Business Case
Implementation
Roadmap
Pilot Project
Implementation
Solution Scaling
AN IDEAL IOT IMPLEMENTATION ROADMAP
37
ABOUT
THE
CLIENT
Our client who is one of the top three access control and security solutions
companies on the global market. We developed a Cumulocity based IoT Devices &
Workflow management SAAS Platform.
PROBLEM
STATEMENT
Although the client already had a versatile and promising product there was still a
gap that needed to be filled using IoT. They envisioned an IoT based solution to
improve their current product and give them a competitive edge.
OUR SUCCESSFUL IMPLEMENTATION PROCESS
IoT Implementation &
Feasibility Workshop
We conducted various on premise workshops
to gain a deep understanding of the project
requirements and gain insights on:
• Current Process
• Data flow, Security, Authentication
• Platform Selection (i.e. Cumulocity)
• Solution Architecture
• High Level Use Cases
1.
OUR EXPERIENCE
38
OUR SUCCESSFUL IMPLEMENTATION PROCESS
At this stage we:
• Defined the transformation impact
on the business and its
stakeholders
• Finalized the business
requirements
• Defined an ROI model
Strategy
Planning
Our Strategic Plan included:
• Scenario Planning
• Overall IoT implementation strategy
• Legacy integration strategy
• Change Management Planning
• Impact to current business strategy
Develop the
Business Case
At this stage we:
• Developed the POCs
• Validated the results
• Updated the implementation
roadmap based on the POC results
At this stage we:
• Defined the development &
deployment strategy
• Defined the phases and timelines for
implementation
• Defined the platform to be used for
development
• Defined the Protocols to be used
• Created the Solution Architecture
Implementation
Roadmap Pilot Project
2. 3.
4. 5.
OUR EXPERIENCE
39
40
After the successful deployment of
the solution, the client pitched the
solution to new industry verticals and
began adding more devices to the
solution. Therefore, we scaled the
solution to enable the adoption of
more devices while scaling up our
cloud infrastructure as well.
At this stage we:
• Started developing the production
level product
• QA & Feedback Incorporation
• End-to-End solution deployment
• Change Management
Implementation
Solution Scaling
6. 7.
OUR EXPERIENCE
40
Any Questions?
41
Sushil.tripathi@kelltontech.com
Further Questions?
Contact:
Nishant.singh@kelltontech.com
42

IoT Implementation and Security Best Practices

  • 1.
  • 2.
    Nishant Singh SushilTripathi SPEAKER PROFILE 2
  • 3.
    4 Foundation 2009 Footprint North America, Europe, andAsia Clients Startups to Fortune 500 Core Strength People and Technology ISO 9001:2015 & CMMi Level 5 Ownership Public Limited BSE, NSE: KELLTOTEC Team 1500+ Employees 3 KELLTON TECH, A PIONEER OF DIGITAL TRANSFORMATION
  • 4.
  • 5.
  • 6.
    Suggest innovative waysto mitigate IoT data security risks Analyze ROI following IoT adoption Simplify IoT adoption for SMEs & Enterprises Integrate legacy systems with the modern IoT world 05 04 03 02 01 AGENDA Highlight the practicality of IoT solution for various industries 6
  • 7.
    Integrating Legacy Systemswith IOT Making IOT adoption a breeze
  • 8.
    The Internet ofThings, as the name suggests, is a combination of the internet and things. The internet provides the capability to connect while things (e.g. Edge Devices) capture the data and transfer it for further analysis. So IoT is basically an ecosystem of connected physical devices that are accessible through the internet and have the ability to collect and transfer data over a network without manual assistance or intervention. Each IoT solution is a combination of some of these “must have” components. SENSORS & ACTUATORS COMMUNICATION CHANNEL DATA COLLECTION OVER CLOUD INFORMATION DELIVERY APPLICATION 8
  • 9.
    InsuranceAutomotive BuildingsIndustrial products Travel & Transport ElectronicsRetail Energy and Utilities Aerospace & Defense Manufacturing Connected Car Predictive Maintenance Connected Fleet Connected Elevators Wearables for Worker Safety Digital Twin Manufacturing Quality Connected Appliances Store Wellness Smart Grid Asset Health CONNECTING THINGS TO DELIVER DIGITAL EXPERIENCES USING THINGS 9
  • 10.
    • Proactive monitoring •OTA software updates • Remote access SERVICE •Predictive maintenance •Identify process issues •Real-time stat reporting ANALYZE • Closed loop product lifecycle management • Configuration management • Knowledge management • Remote diagnostics • Quality Assurance • Risk management INTEGRATE • Differentiate products • Enable customer self-service • Personalization of products • Introduce new business models • Value added services INNOVATE Leverage IOT to: • Envision, Create and Commission new digitally connected products • Drive revenue & customer success UNLOCKING THE VALUE OF IOT TO RETRIEVE NEW PRODUCT DATA 10
  • 11.
    Use IoT tomaximise product fit with customer requirements and needs Differentiate your product from the competitors’ products Identify Market Trends Faster and Easier Minimize Time to Market SUCCESS FACTORS OF NEW PRODUCT DEVELOPMENT USING IOT 11
  • 12.
    • An IoTenabled Event management solution provides information about the venue and associated content. • Beacon based proximity technology is used that allowed indoor navigation to locate event and the respective speakers. • IoT enabled tracking allows to collect data that provides key insights about all the stakeholders (Guests / Attendees) of the event. Event Management • Can provides effective operations management , monitoring of assets , resources enabling workflow, process automation and real-time decision-making capabilities by leveraging IoT. Oil & Gas Solution • An IoT enabled Food Safety & Compliance solution can be developed that will enable real time monitoring. • The solution allows real-time on-field assessment of food item • The solution provides the capability to Incident Report and Audit reports on device • It features Continuous monitoring on multiple facilitiesFood Monitoring NEW PRODUCT DEVELOPMENT USING IOT 12
  • 13.
    Objective: Improve productutilization and enable value-added services • Prevent production delays • Reduce equipment and process breakdowns • Gain visibility to improve process effectiveness • Monitor process-resource availability • Predict loss and recommend action Improve overall process effectiveness • Predict process performance variations • Analyze sources of waste and inefficiencies, using cloud-based machine learning • Prescribe remedies to optimize quality and yield Boost quality & yield performance • Make informed AI decisions that help reduce downtime & overtime • Use preventive maintenance to prevent unplanned maintenance Enhance productivity • Use AI to analyze sources of scrap, waste and inefficiencies • Prescribe remedies that optimize energy usage Optimize energy usage DRIVING PROCESS OPTIMIZATION THROUGH IOT 13
  • 14.
    Customers demand thechoice of how, when, and where they do their banking. To keep up, banks need to improve the customer experience with faster service, reduced wait times, and first-time problem resolution. An AI-based virtual assistant built using an IoT platform is helping to change the game in call center innovation.Banking The smallest disruptions can cause significant downtime and delays in manufacturing, leading to lost customers and big cuts in profit margins. IOT enabled AI triggers alerts when weather patterns threaten delayed delivery of raw materials, and IoT sensors and analytics predict equipment failures before they occur.Manufacturing Oil and gas companies are using IOT platforms to build solutions to better understand the complex systems and equipment used in exploration and production. These AI solutions use data from collected via IoT sensors, decision logs, and evaluations from around the world to help engineers make better operational decisions and avoid equipment problems.Oil & Gas INDUSTRY SPECIFIC PROCESS OPTIMIZATIONS USING IOT 14
  • 15.
    Objective: Organizations thatdo not deploy IoT solutions on premise can still benefit from the huge clusters of data that IoT applications generate by the use of Analytics Tools. Volume Driving Revenue Competitive Edge Streaming Analytics • Non-IoT business organizations leverage large volumes of 3rd party IoT data • Analysis of 3rd party IoT data from external sources for extracting relevant patterns. • Gain an insight into customer preferences and choices • Offer better services to gain competitive edge • Event stream processing analyzes huge in- motion 3rd party IoT data sets • Detect urgent situations & recommend immediate actions DRIVING BUSINESS PERFORMANCE THROUGH IOT DATA ANALYSIS 15
  • 16.
    CUSTOMER CO-ORDINATION FORTARGETED ADVERTISEMENT IoT helps the retailer to make a different identity in front of his consumer. By obtaining 3rd party customer shopping data, a retailer enables the consumer to present their views regarding the product. It helps them to improve their product quality which ultimately makes them well-known among customers. IoT targets your specific customers for personalized advertisement. It recognizes the shopping pattern through online browsing which in turn helps the business retailer to sell their product to the targeted customer. IoT is used by a major e-commerce brand to track the popular product on social media. 16
  • 17.
  • 18.
    Colossal number of connecteddevices in concurrent data exchange Legacy systems built around batched data refrain stream messaging Conventional system’s design supports fixed no. of endpoints Legacy platform based systems can’t adjust with new IoT protocols High latency and low throughput of legacy platforms Most IT components hosted on-premise PROBLEMS AROUND IOT LEGACY SYSTEM IMPLEMENTATION 18
  • 19.
    CONSIDERATION FOR IOTIMPLEMENTATION In an IoT solution security needs to be extended all the way to the node on the edge device. Therefore, the threat landscape is vast and enterprises have more vectors that need to be taken into account. SECURITY Because IoT is a central system that connects all of the edge devices, choosing the right connection protocols is very important. Based on the solution requirement, enterprises can choose from the following protocols: • MQTT • CoAP • AMQP • Zigbee RIGHT PROTOCOLS As enterprises start adding more and more IoT devices, the demand for greater data collection and processing increases. Therefore, an IoT system has to be scalable. It must also be able to easily accommodate new devices and handle the increasing data load without any glitches. SCALABILITY The legacy systems of any organization generate critical data that needs to be consumed by the IoT solution. Integrating the legacy system with the IoT solution is very challenging for IoT implementation. LEGACY INTEGRATION 19
  • 20.
    SNEAK PEAK INTOIOT DEVELOPMENT PLATFORMS Microsoft Azure IoT Microsoft’s IoT solution works on Things, Data, Insights, and Action. Its Azure IoT Hub is a fully hosted and Microsoft-managed Software-as-a-Service (SaaS) solutions for distinct Platform-as-a- Service (PaaS) offerings. Rooting from bidirectional communications between millions of IoT devices, Azure lays the intelligent edge by streamlining end-to-end IoT applications with open-source SDKs and other protocols. Amazon Web Services (AWS) IoT AWS IoT provides functionality spanning the edge to the cloud, to build IoT solutions that integrates with AI services, to make devices smarter, even without Internet connectivity. Built on the AWS cloud, AWS IoT can easily scale as your device fleet grows. Control services allow you to control, manage, and secure large and diverse device fleets. Data services help you extract value from IoT data. Google Cloud IoT Google Cloud IoT Platform is a complete set of tools that securely connect, manage and ingest data from dispersed (on- and of- the premise) devices and services. Cloud IoT Core is a fully managed service that allows easy & secure connection, management, and ingestion of data from globally dispersed devices. Cloud IoT Core, in combination with Cloud IoT platform, provides a complete solution for collecting, processing, analyzing, and visualizing IoT data in real time. Software AG Cumulocity IoT Cumulocity is a device management, data visualization, and application enablement platform for enterprises. Cumulocity as a platform is an open source, independent solution to bring your remote assets to the cloud. Web-based device management, data visualization, and remote control functionality. Enables small & large deployment scenarios with auto-registration, asset management, and real-time alarms in integrated workflows 20
  • 21.
    STRATEGIES FOR INTEGRATINGLEGACY SYSTEMS WITH IOT 21
  • 22.
    BUILD FROM SCRATCH Buildinga custom solution from scratch allows endless customization to create a competitive advantage. It provides the freedom to choose the suitable architecture and technology stack to meet the expectations and feasibility. BUY OFF THE SHELF Off-the-shelf software are ready-to-use solutions that can be customized up to a certain extent. An off-the-shelf product will typically be moderately priced when compared to a custom developed product. Off the shelf solutions significantly reduce time-to-market, as some parts of the module may only require minor modifications. WRAP &EXTEND This retrofit method involves using third-party, IoT ready connectivity solutions, IoT platforms, IoT Gateways and sensors that extend the capabilities of legacy equipment. This option enables communication to the legacy protocols. IOT IMPLEMENTATION STRATEGIES 22
  • 23.
    1 2 3 Buildfrom Scratch Wrap-&-Extend Buy Off The Shelf Base Factors Build from Scratch Wrap and Extend Buy Off The Shelf Compliance to Standards Most Restricted Compliance Restricted Compliance Time To Market Most Medium Lowest Inter-operability Most Restricted Medium Scalability Most Scalable Intermediate Scalability Intermediate Scalability Maintenance Required High Medium Low Level of Customization Highest Medium Lowest In-House Competencies Most Medium Restricted Capax Required High Low Medium On-Going Support Full Vendor Support Restricted Vendor Support Full Vendor Support Customization Most Restricted Restricted IOT IMPLEMENTATION STRATEGIES COMPARISON 23
  • 24.
    Smart Fleet Management Fleet Optimization Route Planning& Fuel Analytics Driving Pattern Tracking IoT Enabled Asset Monitoring Central Tracking, Monitoring & Analytics Solution for Warehouses RFID based Real-time Asset Monitoring Live Asset Tracking USE CASES: IOT ENABLED LOGISTICS SOLUTIONS 24
  • 25.
  • 26.
    ROLE OF DATASECURITY & PRIVACY IN IOT 26
  • 27.
    DATA PRIVACY Data isa valuable resource. We can't always trust companies to handle our data responsibly. INSECURE COMMUNICATION CHANNEL A lack of technical knowledge, the running of an insecure channel, and insecure components in the IoT network lead to internal and external security breaches DATA SECURITY IoT Device manufacturers can exploit the data collected by smart devices/appliances to get insights about their consumer behaviour and their usage patterns and use it to influence purchasing decisions. NEED FOR DATA SECURITY & PRIVACY IN IOT 27
  • 28.
    02 03 04 0105 VULNERABILITY MANAGEMENT • It isdifficult to assess the repercussions of the vulnerability • Assessing the extent of a breach is challenging UPDATE MANAGEMENT • Large numbers of devices need to be updated • Older devices might not support data updates CARELESSNESS • Users ignore the security issues • User do not perform basic steps to ensure the safety of the data DATA INTEGRITY • All data collected should be checked for compromise. MULTIPLE POINTS OF VULNERABILITY • Each connected asset represents a potential risk • Poor encryption and backdoors allow unauthorized access • A single weak link could open up access to numerous devices KEY CHALLENGES FOR DATA SECURITY & PRIVACY IN IOT 28
  • 29.
    WHY SHOULD YOUWORRY ? 29
  • 30.
    Hackable Connected CardiacDevice In early 2017, the FDA confirmed that the St. Jude Medical implantable cardiac devices (pacemakers and defibrillators) were hackable. The FDA said that hackers could break into the device and deplete the battery, causing incorrect pacing. Hackable IoT Enabled Cars Two researchers demonstrated how the digital system of a vehicle could be hacked by sending a false software update. After taking control of the vehicle, the attacker could cut the brakes and shut down the car. Hackable WiFi Baby Heart Monitor Baby heart monitors which alert parents when their babies experience heart troubles can be easily hacked by exploiting the connectivity element of the hardware layers. WHY SHOULD YOU WORRY? 30
  • 31.
    STRATEGIES TO ENSUREDATA PRIVACY & SECURITY 31
  • 32.
    Security Architecture Design Firmware& App Security Selecting Robust Protocols Secure Infra Selection Solution Security Designing and Assessment1. At the solution security and designing stage, we should: • Provide security recommendations • Perform deep security analysis and evaluations • Perform activities like – o Source Code Edit o Cryptography implementation audit • Assess Wireless Protocols STRATEGIES TO ENSURE DATA PRIVACY & SECURITY 32
  • 33.
    Device Security Software Security KeyManagement Security Infrastructural Enhancements2. At the given stage we should: • Check data obfuscation against tampering and reverse engineering • Run application security tests for penetration • Secure device management and vulnerability patching • Multilevel Key Management (Authentication, Authorization & Right Management ) STRATEGIES TO ENSURE DATA PRIVACY & SECURITY 33
  • 34.
    Security Provisions forHardware Mitigate Vulnerabilities Breach Countermeasures Attack Countermeasures3. At the given stage we should: • Develop the capability to create technical counter measures in case of any security breach • Form strategies to mitigate risk and remove solution vulnerabilities that have been uncovered by the breach • Develop a damage control strategy to minimize the loss STRATEGIES TO ENSURE DATA PRIVACY & SECURITY 34
  • 35.
    Facility Management Asset Temperature Monitoring Asset Location &State Monitoring Facility Reporting & Analytics Quality Assurance Solutions Product Composition Ratio Monitoring & Alerts Product Lifecycle Management Transportation Impact Monitoring USE CASES: IOT ENABLED MANUFACTURING SOLUTIONS 35
  • 36.
    PRACTICALITY OF IoTSOLUTIONS 36
  • 37.
    IoT Implementation & FeasibilityWorkshop Strategy Planning Develop the Business Case Implementation Roadmap Pilot Project Implementation Solution Scaling AN IDEAL IOT IMPLEMENTATION ROADMAP 37
  • 38.
    ABOUT THE CLIENT Our client whois one of the top three access control and security solutions companies on the global market. We developed a Cumulocity based IoT Devices & Workflow management SAAS Platform. PROBLEM STATEMENT Although the client already had a versatile and promising product there was still a gap that needed to be filled using IoT. They envisioned an IoT based solution to improve their current product and give them a competitive edge. OUR SUCCESSFUL IMPLEMENTATION PROCESS IoT Implementation & Feasibility Workshop We conducted various on premise workshops to gain a deep understanding of the project requirements and gain insights on: • Current Process • Data flow, Security, Authentication • Platform Selection (i.e. Cumulocity) • Solution Architecture • High Level Use Cases 1. OUR EXPERIENCE 38
  • 39.
    OUR SUCCESSFUL IMPLEMENTATIONPROCESS At this stage we: • Defined the transformation impact on the business and its stakeholders • Finalized the business requirements • Defined an ROI model Strategy Planning Our Strategic Plan included: • Scenario Planning • Overall IoT implementation strategy • Legacy integration strategy • Change Management Planning • Impact to current business strategy Develop the Business Case At this stage we: • Developed the POCs • Validated the results • Updated the implementation roadmap based on the POC results At this stage we: • Defined the development & deployment strategy • Defined the phases and timelines for implementation • Defined the platform to be used for development • Defined the Protocols to be used • Created the Solution Architecture Implementation Roadmap Pilot Project 2. 3. 4. 5. OUR EXPERIENCE 39
  • 40.
    40 After the successfuldeployment of the solution, the client pitched the solution to new industry verticals and began adding more devices to the solution. Therefore, we scaled the solution to enable the adoption of more devices while scaling up our cloud infrastructure as well. At this stage we: • Started developing the production level product • QA & Feedback Incorporation • End-to-End solution deployment • Change Management Implementation Solution Scaling 6. 7. OUR EXPERIENCE 40
  • 41.
  • 42.