SlideShare a Scribd company logo
Some thoughts on IoT
Geoff Huston
Chief Scientist, APNIC
Technology
Does technology change society, or do we develop
and adopt technology to address society’s changes?
Technology
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent
calligraphy. He responded to a need in ancient
Chinese society for more and higher quality
written documents that could be produced faster
Technology
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent
calligraphy. He responded to a need in ancient
Chinese society for more and higher quality
written documents that could be produced faster
The most profound technologies are those that
disappear. They weave themselves into the
fabric of everyday life until they are
indistinguishable from it...
- Mark Weiser 1991
Technology
Technology
The age of smartphones has left humans with
such short attention spans that even a
goldfish can hold a thought for longer” Leon
Watson
The age of smartphones has left humans with
such short attention spans that even a
goldfish can hold a thought for longer” Leon
Watson
Technology
So how should we look at the Internet of Things?
Is this merely a temporary consumer fad, destined to be
replaced by the next cool technology item?
Or is this an instance of a profound technology change that
redefines our role in our society, and will shape our
everyday life for many years to come?
To try and answer this, lets try and put this
question into some broader context of the
evolution the computer and communications
enterprise
Computers were esoteric high frontier research projects
1946 – Eniac – a numeric calculator
1964: IBM 360
Then they became a “must have” business tool
1964 IBM 360 – commercial computing
The Computing Evolutionary Path
Extravagant statements of techno power
1976 CRAY-1 – “super” computing
The Computing Evolutionary Path
1976: Apple I
But there was also the hobbyist market
1976 – Apple-1 “personal” computing
Consumer computers as a statement of design style
1984 – Mac
From Style to Mass Marketed Luxury Item
2007 – Apple’s iPhone
With desktop devices the Internet of computers was a dedicated activity
dedicated chair
lighting
wired bandwidth
large view screens
privacy
dedicated worktop
reliable power
The Internet is now anywhere and everywhere
Its trivial, commonplace and blends into all our activities
radio connectivity
battery power
hand sized
Thumb
operated
As dedicated “things” are replacing it
Maybe its about the demise of the “traditional” computer
Connecting “things” to the Internet is nothing new
Simon Hackett’s Internet Remote Radio of 1990
John Romkey’s Internet Toaster – Let them eat Toast!
Connecting “things” to the Internet is nothing new
The “old” IoT
The use of microprocessors to undertake simple tasks is about as old as
the Intel 4004 and the Zylogics Z80 processor chips
This new IoT is just the old IoT
with new chips!
The New IoT is just the Same Old IoT
And we are already living in a processing-dense world:
• A modern car has around 150 – 200 microprocessor-controlled systems, from
the windscreen wipers, to the entry system, to engine control and all things
in between
• Many / most consumer appliances have all turned to microprocessor control
• Industrial processes, logistics and inventory control, environmental
monitoring all use various forms of embedded processing
So if this has been going on for years, why is IoT a hot topic today?
The Hype
• Gartner Predictions
• CES shows
• Home Apps
• Car Apps
IoT is …?
• It is a generic term that encompasses a huge
variety of application that have little in common
other than a propensity to operate in an
unmanaged environment
• Its hard to talk about the IoT in anything other than
highly generic terms
Why now?
Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, Apple earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, wireless earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, Apple earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
Why now?
• Because we have saturated our traditional markets for technology
and the production capacity is being redirected to new opportunities
• PC sales volumes are plummeting
• Smartphone sales are now peaking
• The computer technology industry is seeking to use its existing capability to
provide new product to high volume markets
• Which means looking at low unit margin very high volume opportunities by
adding ”smart” network centric interfaces and controllers to existing devices
and functions
The opportunities
• “smart” lighting - e.g. Philips
• “smart” home appliances and networks - e.g. Miele
• “smart” power management
• ”smart” labels for retail
• “smart” traffic control
• “smart” image analysis
• “smart” video surveillance
Almost anything else that uses the word “smart”
The Variety of Life
It’s a set of discrete applications that have highly divergent requirements:
• Radius of connectivity varies from mm to kilometers
• Bandwidth varies from bits to gigabits per second
• Data volumes vary from bytes to petabytes
• Connectivity models may be push or pull
• Connectivity may be ad-hoc relays to dedicated wired
• Transactions may be unicast, multicast or anycast in nature
• Applications include sensing and reporting, command and control, adaptation and
interfacing
There is little that these environments have in common, except maybe a
common underlying gene pool!
The IoT Gene Pool
Unix Platform
• Its small, its ubiquitous, its well understood, its cheap, its open source
without onerous IPR constraints, it has a massive set of application libraries
• Customised micro kernels are risky, expensive and rarely necessary
The IoT Gene Pool
IP Comms
• Its small, its ubiquitous, it scales, its well understood, its cheap, its open
source without onerous IPR constraints, and everyone speaks it!
• But which version of IP?
IPv4 and IoT
• The “conservative” option for IP in this environment
• Ubiquitous support across the entire deployed Internet
• Well understood protocol behaviour
• Widely available APIs
Of course it should also be useful to factor in NATs in IPv4:
• Push model where the “thing” pushes data to a rendezvous point rather than a
constant pollable model of “pull” access
• Pull and Feeder models work behind NATs using relays and/or ALGs split the
primary feed from the propagation of the data
IPv6 and IoT
It’s the “killer app” for IPv6
But the numbers suggest otherwise:
• 7B connected “devices” on today’s IPv4 Internet, plus a further 7B – 20B (*)
conventional PC and smart devices
• 2.8B announced IPv4 addresses
• 1.5B “occupied” IPv4 addresses
• We can probably push this model harder!
* https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
“Thing” Behaviour
Pull:
• Device is always connected and interrogated by external agents
• A model of polling or feed subscription where the device maintains
information that can be polled by an external agent
• This requires an public IP address + Port
• It also requires a highly robust core implementation that is resistant to attack
• It also requires some considerable thought on the authorization model
• Device is configured to authorize users and/or
• Device uses a third party auth server
• Commonly seen in web cams and other continuous monitoring applications
(though it’s not necessarily required)
Pull vs Push
Push:
• Intermittedly connected and interrogated via external agents
• Device pushes data to some data collection agent
• Limited connection requirement
• This behaviour NAT ”friendly” as the device is the client and the collection point is
the server
• External access via the data collection agent, not the device
• Does not require dedicated addressing outside of the local context
• This limited access model facilitates defensive measures, including encrypted
communications to the device’s agents and preventing all third party connections
• And such devices probably should be behind a NAT in any case! (e.g. cameras)
Security
Seen at NANOG 69…
Security
Interesting quote ...
“At last count I have about 43 devices on my LAN, with less than a third
running an OS that I can actually interact with. The rest are embedded
systems that get updated (hah!) by the vendors at their whim. Easily two-
thirds would 'phone home' to somewhere at various times. About 7 have
external access without explicitly setting port-forwarding.
Of course, my router monitors and reports on all outbound traffic - but
do I actively look at it? I should. But I don’t. And of course everything
we value on our LAN we protect and encrypt end-to-end and at-rest as the
LAN is actually occupied by foreign devices with unknown network
capability... sure we encrypt absolutely everything...”
An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
The Internet of Stupid Things
• How do you perform field upgrades of otherwise neglected and
unmanaged devices
• What’s the economics of incenting field upgrades from the
manufacturer?
• Who is responsible for broken “things”?
The Internet of Stupid Things
Is this stupidity even avoidable?
• The bleak picture is maybe not!
• In a price sensitive market where system robustness and quality is largely
intangible where is the motive to maintain high quality code?
• How can a consumer tell the difference in the quality of the software, in term
of its robustness and security of operation?
high clock speed industry + commodity components + low margin
= market failure for IoT Security
Privacy
Privacy
Privacy
Privacy
Some things we can’t tell yet
• Will we standardize the IoT space or will it continue to be a diverse
set of mutually incompatible devices?
• Will the market consolidate to be dominated by a small number of
providers and their pseudo-open proprietary architectures?
• When will the IoT embrace IPv6, if ever?
• Will the IoT market ever discriminate on quality and robustness?
• How do we manage the risk of coercion of these devices?
But there are some things you can count on…
• The volumes are already huge, and they’re growing
• “Things” already outnumber everything else on the Internet
• Comprehensive security is unachievable
• Privacy is now an historical concept
• Digital pollution is pervasive
We now have an Internet that is a largely chaotic and definitely
hostile environment
And one more thing we can count on…
And one more thing we can count on…
It will definitely get a whole lot worse
than it is today!
It’s a tough problem…
A rather bleak prognosis from the
Economist in April this year – don’t
look for technology to improve this
rather disturbing situation!
They suggest looking at economics
and markets to try and address this
problem…
But markets may not help either…
"The market can't fix this because neither the buyer nor the seller cares.
The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their
devices were cheap to buy, they still work, and they don't know any of the victims of the
attacks.
The sellers of those devices don't care: They're now selling newer and better models, and the
original buyers only cared about price and features.
There is no market solution, because the insecurity is what economists call an externality: It's
an effect of the purchasing decision that affects other people. Think of it kind of like
invisible pollution."
https://www.schneier.com/blog/archives/2017/02/security_and_th.html
Is this another of those massive challenges of our
time?
We just don’t have the tools to figure out how to stop this
environment being fatally overrun by these devices:
• We can’t improve their quality
• We can’t keep building ever larger DOS barriers
• We can’t regulate behaviours of the equipment, their makers or distributors
Why will this get any better?
It wont.
Thanks!

More Related Content

What's hot

IoT fun with Raspberry Pi and .NET
IoT fun with Raspberry Pi and .NETIoT fun with Raspberry Pi and .NET
IoT fun with Raspberry Pi and .NET
Christos Matskas
 
MobileTech 2017
MobileTech 2017MobileTech 2017
MobileTech 2017
Vikram Kumar
 
Bluetooth of bikash
Bluetooth of bikashBluetooth of bikash
Bluetooth of bikash
linumanu
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Jennifer Christy
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Things
kotahinet
 
2016 Autonomous Systems Lab
2016 Autonomous Systems Lab2016 Autonomous Systems Lab
2016 Autonomous Systems Lab
Elliot Duff
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBM
Arrow ECS UK
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
10 internet-of-things-iot-applications
10 internet-of-things-iot-applications10 internet-of-things-iot-applications
10 internet-of-things-iot-applications
John Soldatos
 
Rise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected DevicesRise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected Devices
Mahbubul Alam
 
The future in high resolution af Preben Mejer
The future in high resolution af Preben MejerThe future in high resolution af Preben Mejer
The future in high resolution af Preben Mejer
InfinIT - Innovationsnetværket for it
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoT
Mark Underwood
 
Internet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliInternet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin Ramli
iTrain
 
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
The Internet of Things Methodology
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
Sarwan Singh
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
petecrocker
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Abdul Qadir Pattal
 
Internet of things
Internet of thingsInternet of things
Internet of things
Akshith rao Potlapally
 

What's hot (18)

IoT fun with Raspberry Pi and .NET
IoT fun with Raspberry Pi and .NETIoT fun with Raspberry Pi and .NET
IoT fun with Raspberry Pi and .NET
 
MobileTech 2017
MobileTech 2017MobileTech 2017
MobileTech 2017
 
Bluetooth of bikash
Bluetooth of bikashBluetooth of bikash
Bluetooth of bikash
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
The time is now for the Internet of Things
The time is now for the Internet of ThingsThe time is now for the Internet of Things
The time is now for the Internet of Things
 
2016 Autonomous Systems Lab
2016 Autonomous Systems Lab2016 Autonomous Systems Lab
2016 Autonomous Systems Lab
 
Internet of Things and IBM
Internet of Things and IBMInternet of Things and IBM
Internet of Things and IBM
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 
10 internet-of-things-iot-applications
10 internet-of-things-iot-applications10 internet-of-things-iot-applications
10 internet-of-things-iot-applications
 
Rise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected DevicesRise of a New Era: Advancing Towards 50B Connected Devices
Rise of a New Era: Advancing Towards 50B Connected Devices
 
The future in high resolution af Preben Mejer
The future in high resolution af Preben MejerThe future in high resolution af Preben Mejer
The future in high resolution af Preben Mejer
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoT
 
Internet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliInternet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin Ramli
 
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartL...
 
Android Applications
Android ApplicationsAndroid Applications
Android Applications
 
Introduction To The IBM IoT Foundation
Introduction To The IBM IoT FoundationIntroduction To The IBM IoT Foundation
Introduction To The IBM IoT Foundation
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similar to SGNOG 5: Some thoughts on IoT

AusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoTAusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoT
APNIC
 
Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0
APNIC
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
Asim Rais Siddiqui
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Pantech ProLabs India Pvt Ltd
 
Industry 4.0 made easy
Industry 4.0 made easyIndustry 4.0 made easy
Industry 4.0 made easy
Rich Rogers
 
Iot from telco perspective
Iot from telco perspectiveIot from telco perspective
Iot from telco perspective
anandbajaj
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)Abhishek kr. Singh
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
Justin Grammens
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Wafaa Rizin Ameer
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
Mirko Presser
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things Landscape
Justin Grammens
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
Rustomjee Business School
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
Qian JIN
 
Autonomous Systems Lab
Autonomous Systems LabAutonomous Systems Lab
Autonomous Systems Lab
Elliot Duff
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdf
DanishMahmood23
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Adam Dunkels
 
IoT
IoTIoT
IoT
Mphasis
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
nabati
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
Andrew Blades
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
jaspreetkaur908049
 

Similar to SGNOG 5: Some thoughts on IoT (20)

AusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoTAusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoT
 
Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0Some thoughts on IoT, HKNOG 4.0
Some thoughts on IoT, HKNOG 4.0
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Industry 4.0 made easy
Industry 4.0 made easyIndustry 4.0 made easy
Industry 4.0 made easy
 
Iot from telco perspective
Iot from telco perspectiveIot from telco perspective
Iot from telco perspective
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
 
Speaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of ThingsSpeaking at John Carrol University on the Internet of Things
Speaking at John Carrol University on the Internet of Things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things Landscape
 
The Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of ThingsThe Dawn of a new era: Internet of Things
The Dawn of a new era: Internet of Things
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
Autonomous Systems Lab
Autonomous Systems LabAutonomous Systems Lab
Autonomous Systems Lab
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdf
 
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1
 
IoT
IoTIoT
IoT
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
informationtech1-180930175759.pptx
informationtech1-180930175759.pptxinformationtech1-180930175759.pptx
informationtech1-180930175759.pptx
 

More from APNIC

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
APNIC
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
APNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
APNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
APNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APNIC
 

More from APNIC (20)

APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
APNIC Updates presented by Paul Wilson at CaribNOG 27
APNIC Updates presented by Paul Wilson at  CaribNOG 27APNIC Updates presented by Paul Wilson at  CaribNOG 27
APNIC Updates presented by Paul Wilson at CaribNOG 27
 
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
APNIC Policy Roundup presented by Sunny Chendi at TWNOG 5.0
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 

Recently uploaded

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 

Recently uploaded (16)

How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 

SGNOG 5: Some thoughts on IoT

  • 1. Some thoughts on IoT Geoff Huston Chief Scientist, APNIC
  • 2. Technology Does technology change society, or do we develop and adopt technology to address society’s changes?
  • 3. Technology When Meng Tian invented the camel hair paintbrush in 250 BCE he did not invent calligraphy. He responded to a need in ancient Chinese society for more and higher quality written documents that could be produced faster Technology When Meng Tian invented the camel hair paintbrush in 250 BCE he did not invent calligraphy. He responded to a need in ancient Chinese society for more and higher quality written documents that could be produced faster
  • 4. The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it... - Mark Weiser 1991 Technology
  • 5. Technology The age of smartphones has left humans with such short attention spans that even a goldfish can hold a thought for longer” Leon Watson The age of smartphones has left humans with such short attention spans that even a goldfish can hold a thought for longer” Leon Watson Technology
  • 6. So how should we look at the Internet of Things? Is this merely a temporary consumer fad, destined to be replaced by the next cool technology item? Or is this an instance of a profound technology change that redefines our role in our society, and will shape our everyday life for many years to come?
  • 7. To try and answer this, lets try and put this question into some broader context of the evolution the computer and communications enterprise
  • 8. Computers were esoteric high frontier research projects 1946 – Eniac – a numeric calculator
  • 9. 1964: IBM 360 Then they became a “must have” business tool 1964 IBM 360 – commercial computing
  • 10. The Computing Evolutionary Path Extravagant statements of techno power 1976 CRAY-1 – “super” computing
  • 11. The Computing Evolutionary Path 1976: Apple I But there was also the hobbyist market 1976 – Apple-1 “personal” computing
  • 12. Consumer computers as a statement of design style 1984 – Mac
  • 13. From Style to Mass Marketed Luxury Item 2007 – Apple’s iPhone
  • 14.
  • 15. With desktop devices the Internet of computers was a dedicated activity dedicated chair lighting wired bandwidth large view screens privacy dedicated worktop reliable power
  • 16. The Internet is now anywhere and everywhere Its trivial, commonplace and blends into all our activities radio connectivity battery power hand sized Thumb operated
  • 17. As dedicated “things” are replacing it Maybe its about the demise of the “traditional” computer
  • 18. Connecting “things” to the Internet is nothing new Simon Hackett’s Internet Remote Radio of 1990
  • 19. John Romkey’s Internet Toaster – Let them eat Toast! Connecting “things” to the Internet is nothing new
  • 20. The “old” IoT The use of microprocessors to undertake simple tasks is about as old as the Intel 4004 and the Zylogics Z80 processor chips
  • 21. This new IoT is just the old IoT with new chips!
  • 22. The New IoT is just the Same Old IoT And we are already living in a processing-dense world: • A modern car has around 150 – 200 microprocessor-controlled systems, from the windscreen wipers, to the entry system, to engine control and all things in between • Many / most consumer appliances have all turned to microprocessor control • Industrial processes, logistics and inventory control, environmental monitoring all use various forms of embedded processing So if this has been going on for years, why is IoT a hot topic today?
  • 23. The Hype • Gartner Predictions • CES shows • Home Apps • Car Apps
  • 24. IoT is …? • It is a generic term that encompasses a huge variety of application that have little in common other than a propensity to operate in an unmanaged environment • Its hard to talk about the IoT in anything other than highly generic terms
  • 26. Why now? • Low power, high capability silicon now dominates chip fabrication plants Saturation of the smart device market Full stream silicon production volumes requires some form of consumption model • Radio Technology: RFID, Bluetooth, WiFi, LTE • Improvements in AD convertors is providing range and bandwidth to radio systems • Protocol development provides ”seamless” connectivity • i.e. Passports and Clothing Tags, Apple earbuds, Home controllers and similar • Actors seeking new markets • 5G for SIMs and wide area mobility • Smart phone platform providers seeking to enter the car, home and work environments • Industrial and process automation seeking to expand market reach
  • 27. Why now? • Low power, high capability silicon now dominates chip fabrication plants Saturation of the smart device market Full stream silicon production volumes requires some form of consumption model • Radio Technology: RFID, Bluetooth, WiFi, LTE • Improvements in AD convertors is providing range and bandwidth to radio systems • Protocol development provides ”seamless” connectivity • i.e. Passports and Clothing Tags, wireless earbuds, Home controllers and similar • Actors seeking new markets • 5G for SIMs and wide area mobility • Smart phone platform providers seeking to enter the car, home and work environments • Industrial and process automation seeking to expand market reach
  • 28. Why now? • Low power, high capability silicon now dominates chip fabrication plants Saturation of the smart device market Full stream silicon production volumes requires some form of consumption model • Radio Technology: RFID, Bluetooth, WiFi, LTE • Improvements in AD convertors is providing range and bandwidth to radio systems • Protocol development provides ”seamless” connectivity • i.e. Passports and Clothing Tags, Apple earbuds, Home controllers and similar • Actors seeking new markets • 5G for SIMs and wide area mobility • Smart phone platform providers seeking to enter the car, home and work environments • Industrial and process automation seeking to expand market reach
  • 29. Why now? • Because we have saturated our traditional markets for technology and the production capacity is being redirected to new opportunities • PC sales volumes are plummeting • Smartphone sales are now peaking • The computer technology industry is seeking to use its existing capability to provide new product to high volume markets • Which means looking at low unit margin very high volume opportunities by adding ”smart” network centric interfaces and controllers to existing devices and functions
  • 30. The opportunities • “smart” lighting - e.g. Philips • “smart” home appliances and networks - e.g. Miele • “smart” power management • ”smart” labels for retail • “smart” traffic control • “smart” image analysis • “smart” video surveillance Almost anything else that uses the word “smart”
  • 31. The Variety of Life It’s a set of discrete applications that have highly divergent requirements: • Radius of connectivity varies from mm to kilometers • Bandwidth varies from bits to gigabits per second • Data volumes vary from bytes to petabytes • Connectivity models may be push or pull • Connectivity may be ad-hoc relays to dedicated wired • Transactions may be unicast, multicast or anycast in nature • Applications include sensing and reporting, command and control, adaptation and interfacing There is little that these environments have in common, except maybe a common underlying gene pool!
  • 32. The IoT Gene Pool Unix Platform • Its small, its ubiquitous, its well understood, its cheap, its open source without onerous IPR constraints, it has a massive set of application libraries • Customised micro kernels are risky, expensive and rarely necessary
  • 33. The IoT Gene Pool IP Comms • Its small, its ubiquitous, it scales, its well understood, its cheap, its open source without onerous IPR constraints, and everyone speaks it! • But which version of IP?
  • 34. IPv4 and IoT • The “conservative” option for IP in this environment • Ubiquitous support across the entire deployed Internet • Well understood protocol behaviour • Widely available APIs Of course it should also be useful to factor in NATs in IPv4: • Push model where the “thing” pushes data to a rendezvous point rather than a constant pollable model of “pull” access • Pull and Feeder models work behind NATs using relays and/or ALGs split the primary feed from the propagation of the data
  • 35. IPv6 and IoT It’s the “killer app” for IPv6 But the numbers suggest otherwise: • 7B connected “devices” on today’s IPv4 Internet, plus a further 7B – 20B (*) conventional PC and smart devices • 2.8B announced IPv4 addresses • 1.5B “occupied” IPv4 addresses • We can probably push this model harder! * https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
  • 36. “Thing” Behaviour Pull: • Device is always connected and interrogated by external agents • A model of polling or feed subscription where the device maintains information that can be polled by an external agent • This requires an public IP address + Port • It also requires a highly robust core implementation that is resistant to attack • It also requires some considerable thought on the authorization model • Device is configured to authorize users and/or • Device uses a third party auth server • Commonly seen in web cams and other continuous monitoring applications (though it’s not necessarily required)
  • 37. Pull vs Push Push: • Intermittedly connected and interrogated via external agents • Device pushes data to some data collection agent • Limited connection requirement • This behaviour NAT ”friendly” as the device is the client and the collection point is the server • External access via the data collection agent, not the device • Does not require dedicated addressing outside of the local context • This limited access model facilitates defensive measures, including encrypted communications to the device’s agents and preventing all third party connections • And such devices probably should be behind a NAT in any case! (e.g. cameras)
  • 39. Seen at NANOG 69…
  • 40. Security Interesting quote ... “At last count I have about 43 devices on my LAN, with less than a third running an OS that I can actually interact with. The rest are embedded systems that get updated (hah!) by the vendors at their whim. Easily two- thirds would 'phone home' to somewhere at various times. About 7 have external access without explicitly setting port-forwarding. Of course, my router monitors and reports on all outbound traffic - but do I actively look at it? I should. But I don’t. And of course everything we value on our LAN we protect and encrypt end-to-end and at-rest as the LAN is actually occupied by foreign devices with unknown network capability... sure we encrypt absolutely everything...”
  • 41. An Internet of Stupid Things We keep on seeing the same stupidity again and again: • Devices with the telnet port open • Devices with open DNS resolvers on the WAN side • Devices with open NTP / SNMP / chargen etc • Devices with the same preset root password • Devices using vulnerable libraries that are susceptible to root kit exploitation Insanely
  • 42. An Internet of Stupid Things We keep on seeing the same stupidity again and again: • Devices with the telnet port open • Devices with open DNS resolvers on the WAN side • Devices with open NTP / SNMP / chargen etc • Devices with the same preset root password • Devices using vulnerable libraries that are susceptible to root kit exploitation Insanely https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
  • 43. An Internet of Stupid Things We keep on seeing the same stupidity again and again: • Devices with the telnet port open • Devices with open DNS resolvers on the WAN side • Devices with open NTP / SNMP / chargen etc • Devices with the same preset root password • Devices using vulnerable libraries that are susceptible to root kit exploitation Insanely https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
  • 44. The Internet of Stupid Things • How do you perform field upgrades of otherwise neglected and unmanaged devices • What’s the economics of incenting field upgrades from the manufacturer? • Who is responsible for broken “things”?
  • 45. The Internet of Stupid Things Is this stupidity even avoidable? • The bleak picture is maybe not! • In a price sensitive market where system robustness and quality is largely intangible where is the motive to maintain high quality code? • How can a consumer tell the difference in the quality of the software, in term of its robustness and security of operation? high clock speed industry + commodity components + low margin = market failure for IoT Security
  • 50. Some things we can’t tell yet • Will we standardize the IoT space or will it continue to be a diverse set of mutually incompatible devices? • Will the market consolidate to be dominated by a small number of providers and their pseudo-open proprietary architectures? • When will the IoT embrace IPv6, if ever? • Will the IoT market ever discriminate on quality and robustness? • How do we manage the risk of coercion of these devices?
  • 51. But there are some things you can count on… • The volumes are already huge, and they’re growing • “Things” already outnumber everything else on the Internet • Comprehensive security is unachievable • Privacy is now an historical concept • Digital pollution is pervasive We now have an Internet that is a largely chaotic and definitely hostile environment
  • 52. And one more thing we can count on…
  • 53. And one more thing we can count on… It will definitely get a whole lot worse than it is today!
  • 54. It’s a tough problem… A rather bleak prognosis from the Economist in April this year – don’t look for technology to improve this rather disturbing situation! They suggest looking at economics and markets to try and address this problem…
  • 55. But markets may not help either… "The market can't fix this because neither the buyer nor the seller cares. The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their devices were cheap to buy, they still work, and they don't know any of the victims of the attacks. The sellers of those devices don't care: They're now selling newer and better models, and the original buyers only cared about price and features. There is no market solution, because the insecurity is what economists call an externality: It's an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution." https://www.schneier.com/blog/archives/2017/02/security_and_th.html
  • 56. Is this another of those massive challenges of our time? We just don’t have the tools to figure out how to stop this environment being fatally overrun by these devices: • We can’t improve their quality • We can’t keep building ever larger DOS barriers • We can’t regulate behaviours of the equipment, their makers or distributors
  • 57. Why will this get any better?
  • 59.