Interoperability, Security and Device
Management solutions for IoT
MAIN IOT ROADBLOCKS
Security Interoperability Device
Management
Source: US Department of Homeland
IOT SECURITY FAULTS: BIG
CONSEQUENCES !
Traffic signals
HACKED
Smart Meters
HACKED
Smart
Buildings
HACKED
Public
transportation
HACKED
HACKED
Smart Grid
HACKED
Traffic
controls
The vision
Water and electricity distribution
Optimize efficiency, detect loss,
reduce waste
Transportation
Analyze et optimize traffic flows,
alert drivers and passengers
Environmental Quality
Air and water analysis, enhance
citizens’ health
Security and prevention
Assist weakest people, prevent
risks and alert citizens
FRAGMENTATION : REAL PAINS !
The market reality
Fragmented solutions
Services incompatibilities,
useless and costly redundancy
Complexity
Management and deployment
over costs, no possible extension
Incompatibilities
Sensors and infrastructures
incompatible, complex
deployment and over costs
Inefficiency
Costly maintenance, Services
creation limited, limited
innovation
FRAGMENTATION : REAL PAINS !
Tesla: embeds an OMA DM technology GM: no OMA DM technology
29 000 cars remotely updated with a
software patch
380 000 cars to return to service for a
manual update
Source: Frost & Sullivan 2015
IOT DEVICE MANAGEMENT : AN EXAMPLE
STANDARDS ARE THE KEYS
Security
Discovery
Device Management
CRUDN
Resource Model
Data Model
Authentication
Messaging
Registration
UDP
DTLS
CoAP
LWM2M
Objects
IP
Transport
RD
Onboarding
TCP
TLS
SMS
Non-IP
(e.g.
LORAWA
N)
Application
Spot on the OMA Lightweight M2M technology
STANDARDS ARE THE KEYS
Compared to COAP only
MISSING !
Security
Discovery
Device Management
CRUDN
Resource Model
Data Model
Authentication
Messaging
Registration
UDP
DTLS
CoAP
IP
Transport
Onboarding
TCP
TLS
Application
RD
STANDARDS ARE THE KEYS
Compared to MQTT
MISSING !
Security
DiscoveryDevice Management
Resource Model
Data Model
Authentication
Messaging
Registration
IP
Transport
Onboarding
TCP
TLS
Application
MQTT N
CRUD
Today
Tomorrow
WHAT LWM2M CAN CHANGE
No direct
interactio
ns
Big
integration
costs
direct
interactions
Unique and
standardize
d
exchanges
Interoperability and device management of sensors.
Making sensors intelligent: dynamic policy changes,
increased data relevance…
Increased data flow security using light but powerful
cryptography. Secure device authentication and
registration.
WHAT LWM2M CAN CHANGE
3 Founders from Palm and Intel with 17
years of embedded systems experience
Creators of the Eclipse’s Wakaama
project and principal maintainers
Members of OMA and actively
participating to the standards
Provide a commercial LWM2M software
stack for the industry
IOTEROP: WHO ARE WE ?
Thank you !

IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP

  • 1.
    Interoperability, Security andDevice Management solutions for IoT
  • 2.
    MAIN IOT ROADBLOCKS SecurityInteroperability Device Management
  • 3.
    Source: US Departmentof Homeland IOT SECURITY FAULTS: BIG CONSEQUENCES ! Traffic signals HACKED Smart Meters HACKED Smart Buildings HACKED Public transportation HACKED HACKED Smart Grid HACKED Traffic controls
  • 4.
    The vision Water andelectricity distribution Optimize efficiency, detect loss, reduce waste Transportation Analyze et optimize traffic flows, alert drivers and passengers Environmental Quality Air and water analysis, enhance citizens’ health Security and prevention Assist weakest people, prevent risks and alert citizens FRAGMENTATION : REAL PAINS !
  • 5.
    The market reality Fragmentedsolutions Services incompatibilities, useless and costly redundancy Complexity Management and deployment over costs, no possible extension Incompatibilities Sensors and infrastructures incompatible, complex deployment and over costs Inefficiency Costly maintenance, Services creation limited, limited innovation FRAGMENTATION : REAL PAINS !
  • 6.
    Tesla: embeds anOMA DM technology GM: no OMA DM technology 29 000 cars remotely updated with a software patch 380 000 cars to return to service for a manual update Source: Frost & Sullivan 2015 IOT DEVICE MANAGEMENT : AN EXAMPLE
  • 7.
    STANDARDS ARE THEKEYS Security Discovery Device Management CRUDN Resource Model Data Model Authentication Messaging Registration UDP DTLS CoAP LWM2M Objects IP Transport RD Onboarding TCP TLS SMS Non-IP (e.g. LORAWA N) Application Spot on the OMA Lightweight M2M technology
  • 8.
    STANDARDS ARE THEKEYS Compared to COAP only MISSING ! Security Discovery Device Management CRUDN Resource Model Data Model Authentication Messaging Registration UDP DTLS CoAP IP Transport Onboarding TCP TLS Application RD
  • 9.
    STANDARDS ARE THEKEYS Compared to MQTT MISSING ! Security DiscoveryDevice Management Resource Model Data Model Authentication Messaging Registration IP Transport Onboarding TCP TLS Application MQTT N CRUD
  • 10.
    Today Tomorrow WHAT LWM2M CANCHANGE No direct interactio ns Big integration costs direct interactions Unique and standardize d exchanges Interoperability and device management of sensors. Making sensors intelligent: dynamic policy changes, increased data relevance…
  • 11.
    Increased data flowsecurity using light but powerful cryptography. Secure device authentication and registration. WHAT LWM2M CAN CHANGE
  • 12.
    3 Founders fromPalm and Intel with 17 years of embedded systems experience Creators of the Eclipse’s Wakaama project and principal maintainers Members of OMA and actively participating to the standards Provide a commercial LWM2M software stack for the industry IOTEROP: WHO ARE WE ?
  • 13.