This document discusses the Internet of Things (IoT) and provides context around why IoT is receiving attention now. The key points are:
1) IoT is now possible because of improvements in low-power silicon, radio technologies, protocols, and other factors that enable seamless connectivity between devices.
2) The computer industry is seeking new markets as traditional markets like PCs are saturating, and IoT provides a way to utilize existing production capacity.
3) While IoT covers a wide variety of applications, some common underlying technologies could include using small, ubiquitous operating systems like Unix and network protocols like IP. However, each IoT application may have highly divergent requirements.
4)
What is the Internet of Things (IoT)? What are the technologies that make it happen? Where do we see it today? Where will we see it tomorrow? What capabilities will it provide, and what do we need to know to take part in it? Jim McKeeth considers where IoT is taking us and discusses the hurdles we face today and in the future. With a focus on applications, Jim offers examples of IoT technology from the perspective of developers. Join Jim to learn about cross-platform development, cloud synchronization, app-to-app communication, Bluetooth, WiFi, security concerns, privacy issues, and more. Look at specific IoT devices now available that are changing the landscape for businesses and the consumer. Is the Internet of Things the dawn of a new age or just another way for “Big Brother” to watch our every move? Come find the answers to this and other thought-provoking questions.
CIR’s Events upcoming are always listed at http://www.hvm-uk.com Go there to plan your excellent networking and tech learning schedule!
CIR is proud to present the takeaways from the Smart Systems Summit 2014 at the prestigious Institute of Directors in Pall Mall, West London 1-2 October. This year's programme was truly excellent, with over 30 speakers.
smart, energy, grids, power, homes. transport, living, sensors, IOT, M2M, Industrial internet, technology, industry, markets, value, innovation, marketing, products, services, monetisation, growth, better
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
This deck presents some basic concepts of IoT and some more advanced concepts, reviews the current market players and future of IoT as well as the key ingredients and architecture for success.
oT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.
In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).
Learning objectives:
- Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
- Gain insights into practical use cases for Amazon AI services
- Understand the possibilities of using AI from an IoT device
What is the Internet of Things (IoT)? What are the technologies that make it happen? Where do we see it today? Where will we see it tomorrow? What capabilities will it provide, and what do we need to know to take part in it? Jim McKeeth considers where IoT is taking us and discusses the hurdles we face today and in the future. With a focus on applications, Jim offers examples of IoT technology from the perspective of developers. Join Jim to learn about cross-platform development, cloud synchronization, app-to-app communication, Bluetooth, WiFi, security concerns, privacy issues, and more. Look at specific IoT devices now available that are changing the landscape for businesses and the consumer. Is the Internet of Things the dawn of a new age or just another way for “Big Brother” to watch our every move? Come find the answers to this and other thought-provoking questions.
CIR’s Events upcoming are always listed at http://www.hvm-uk.com Go there to plan your excellent networking and tech learning schedule!
CIR is proud to present the takeaways from the Smart Systems Summit 2014 at the prestigious Institute of Directors in Pall Mall, West London 1-2 October. This year's programme was truly excellent, with over 30 speakers.
smart, energy, grids, power, homes. transport, living, sensors, IOT, M2M, Industrial internet, technology, industry, markets, value, innovation, marketing, products, services, monetisation, growth, better
ISSA-UK - Securing the Internet of Things - CIO Seminar 13 May 2014Adrian Wright
Embracing & Securing the Internet of Things
A briefing for CIOs at the CIO Dialogue 9 Oxford. May 2014
Presenter: Adrian Wright
VP of Research - Information Systems Security Association
CEO of Secoda Risk Management
This deck presents some basic concepts of IoT and some more advanced concepts, reviews the current market players and future of IoT as well as the key ingredients and architecture for success.
oT can give you great insight into consumer behaviour and demand, helping to you create the innovative, revenue-generating services of the future. However, there are still lots of challenges around collecting data from devices, which often have significant limitations in terms of processing power, memory and interfaces.
In this presentation, Danilo talks about how Amazon AI services can be used to augment device capabilities to make data collection, storage and analytics easier. He also considers how people can start interacting with machines in a more natural way, for example using natural language understanding (NLU), automatic speech recognition (ASR), visual search and image recognition, text-to-speech (TTS).
Learning objectives:
- Learn how to design IoT solutions using services such as AWS Greengrass and AWS IoT
- Gain insights into practical use cases for Amazon AI services
- Understand the possibilities of using AI from an IoT device
Slides from my talk on IoT application development using the Windows Core IoT operating system and .NET. In this talk I introduce IoT, explain why it's important for developers and analyze briefly the moral and security implications. Finally, I run a demo using an applicaton running on Raspberry Pi talking to number of sensors to pull noise and temperature reading and post them on the cloud
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
Rise of a New Era: Advancing Towards 50B Connected DevicesMahbubul Alam
Rise of a New Era: Advancing Towards 50B Connected Devices
The promise of hyper-connected communities, industries and societies requires the connectivity of billions of devices about and around us; from smartphone to wearable, from home to work, from vehicle to machinery, from industry to healthcare, etc. This is the next wave digital transformation where smart connected everything will create huge economic benefits in every vital sectors of the economy and unleash new opportunities that can improve and save lives, boost human productivity, increase agricultural yield and enable a new industrial revolution with self-learning machines, robots, etc.
This extraordinary growth of connected everything will drive an explosive growth of mobile data, scarcity of wireless spectrum, exposure to unprotected data, risk of data privacy and will require governments to heavily investment in fundamental technologies like Internet, mobile, storage and artificial intelligence as well as in education for the workforce to utilize connected devices as tools to improve productivity. Also required are pragmatic policies both nationally and globally for enabling rapid innovation as we build a secure brighter future together.
The Infographic below illustrates the five key areas of attention to enable this transformation: 1) smarter spectrum usage, 2) smarter innovation funds, 3) smarter security & privacy, 4) smarter workforce creation and 5) smarter policies & laws. These are all required for the society to fully harness the benefits from massive scale deployment of connected devices.
Oplægget blev holdt ved InfinIT-arrangementet "Workshop: Smart Grid & Intelligente Bygninger" afholdt den 1. november 2011.
Læs mere på http://www.infinit.dk/dk/hvad_kan_vi_goere_for_dig/viden/reportager/danske_virksomheder_paa_rette_vej.htm
A presentation made at IoT Day 2015. It's an overview of the role ontologies could / should play in the internet of things. Calls for a general software engineering approach that integrates Big Data variety, velocity and veracity (i.e., provenance).
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartLiving
Slidedeck from a recent presentation for IoTGent, showcasing the great Intel Galileo & Edison, integrating with the http://smartliving.io end-to-end IoT solution.
An Internet of Things solution will always need to connect devices, collect data, assemble events and do so in a way that is managed. With this introduction to the IBM Internet of Things Foundation, learn how all of this is delivered in a cloud hosted service and make it the platform on which you build your next set of innovations.
Try it out in the IBM Bluemix IoT Zone:
http://bluemix.net/solutions/iot
Slides from my talk on IoT application development using the Windows Core IoT operating system and .NET. In this talk I introduce IoT, explain why it's important for developers and analyze briefly the moral and security implications. Finally, I run a demo using an applicaton running on Raspberry Pi talking to number of sensors to pull noise and temperature reading and post them on the cloud
Internet of Things, Various Names, One Concept, History of IoT, Applications of IoT, Challenges and Barriers in IoT, Internet Revolution, Future of IoT, Impact of the Internet, Internet Usage and Population Statistics
Rise of a New Era: Advancing Towards 50B Connected DevicesMahbubul Alam
Rise of a New Era: Advancing Towards 50B Connected Devices
The promise of hyper-connected communities, industries and societies requires the connectivity of billions of devices about and around us; from smartphone to wearable, from home to work, from vehicle to machinery, from industry to healthcare, etc. This is the next wave digital transformation where smart connected everything will create huge economic benefits in every vital sectors of the economy and unleash new opportunities that can improve and save lives, boost human productivity, increase agricultural yield and enable a new industrial revolution with self-learning machines, robots, etc.
This extraordinary growth of connected everything will drive an explosive growth of mobile data, scarcity of wireless spectrum, exposure to unprotected data, risk of data privacy and will require governments to heavily investment in fundamental technologies like Internet, mobile, storage and artificial intelligence as well as in education for the workforce to utilize connected devices as tools to improve productivity. Also required are pragmatic policies both nationally and globally for enabling rapid innovation as we build a secure brighter future together.
The Infographic below illustrates the five key areas of attention to enable this transformation: 1) smarter spectrum usage, 2) smarter innovation funds, 3) smarter security & privacy, 4) smarter workforce creation and 5) smarter policies & laws. These are all required for the society to fully harness the benefits from massive scale deployment of connected devices.
Oplægget blev holdt ved InfinIT-arrangementet "Workshop: Smart Grid & Intelligente Bygninger" afholdt den 1. november 2011.
Læs mere på http://www.infinit.dk/dk/hvad_kan_vi_goere_for_dig/viden/reportager/danske_virksomheder_paa_rette_vej.htm
A presentation made at IoT Day 2015. It's an overview of the role ontologies could / should play in the internet of things. Calls for a general software engineering approach that integrates Big Data variety, velocity and veracity (i.e., provenance).
The IoT Methodology & An Introduction to the Intel Galileo, Edison and SmartLiving
Slidedeck from a recent presentation for IoTGent, showcasing the great Intel Galileo & Edison, integrating with the http://smartliving.io end-to-end IoT solution.
An Internet of Things solution will always need to connect devices, collect data, assemble events and do so in a way that is managed. With this introduction to the IBM Internet of Things Foundation, learn how all of this is delivered in a cloud hosted service and make it the platform on which you build your next set of innovations.
Try it out in the IBM Bluemix IoT Zone:
http://bluemix.net/solutions/iot
This presentation was given at the Manufacturing Industry Trade Show hosted by the Idaho Manufacturing Alliance on Dec 2nd 2021. Please feel to reach out if you are interested in having a similar presentation delivered to your company or community.
This presentation gives an idea of how IOT is shaping Telco vendors network architecture and business models. The space of IOT and its opportunities and challenges
Speaking at John Carrol University on the Internet of ThingsJustin Grammens
I was honored to have been invited to speak at John Carroll University on “The Internet of Things - Making the Physical World Smarter.” It was an extremely fun and engaging audience and I enjoyed every minute of the presentation. I hope you enjoy it as well and please don't hesitate to reach out with any questions.
Arduino, Open Source and The Internet of Things LandscapeJustin Grammens
What's this "Internet of Things (IoT)" I keep hearing all about? We will cover where IoT came from, where it is today, where it's going in the future and how the Arduino open source platform is being used to bring new ideas and products to life.
Building the Internet of Things with Thingsquare and Contiki - day 1, part 1Adam Dunkels
How to build the Internet of Things - what is an Internet of things device and how do we connect it? This is the first Thingsquare IoT workshop slide deck.
In this presentation, Shail introduces IoT and associated trends. Shail has a lot of experience in Gesture Based Robot, Wireless Applications, Line follower Robot, Obstacle Avoider, Edge avoider etc. and his interest areas are also the same.
The "Internet of Things" (IoT) has been around a long time and is becoming an increasingly growing topic. It has already impacted on our everyday lives at the workplace and at home.
Come and dive in for a night of exploration as we speak about some amazing products, IoT trends, current landscape and what the future will hold
There will be short IoT presentations as well as a panel of IoT panel speakers for you to engage and ask questions.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
Chimi Dorji, Internet Resource Analyst at APNIC, presented on Registry Data Accuracy Improvements at SANOG 41 jointly held with INNOG 7 in Mumbai, India from 25 to 30 April 2024.
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC
Sunny Chendi, Senior Advisor, Membership and Policy at APNIC, presents 'APNIC Policy Roundup' at the 5th ICANN APAC-TWNIC Engagement Forum and 41st TWNIC OPM in Taipei, Taiwan from 23 to 24 April.
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
Dave Phelan, Senior Network Analyst/Technical Trainer at APNIC, presents 'DDoS In Oceania and the Pacific' at NZNOG 2024 held in Nelson, New Zealand from 8 to 12 April 2024.
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
Geoff Huston, Chief Scientist at APNIC deliver keynote presentation on the 'Future Evolution of the Internet' at the Everything Open 2024 conference in Gladstone, Australia from 16 to 18 April 2024.
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
Paul Wilson, Director General of APNIC delivers a presentation on IP addressing and IPv6 to the Policymakers Program during IETF 119 in Brisbane Australia from 16 to 22 March 2024.
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
Tom Harrison, Product and Delivery Manager at APNIC presents at the Registration Protocols Extensions working group during IETF 119 in Brisbane, Australia from 16-22 March 2024
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
Che-Hoo Cheng, Senior Director, Development at APNIC presents on the "Benefits of doing Internet peering and running an Internet Exchange (IX)" at the Communications Regulatory Commission of Mongolia's IPv6, IXP, Datacenter - Policy and Regulation International Trends Forum in Ulaanbaatar, Mongolia on 7 March 2024
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
APNIC Senior Advisor, Membership and Policy, Sunny Chendi presented on APNIC updates and RIR Policies for ccTLDs at APTLD 85 in Goa, India from 19-22 February 2024.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
ER(Entity Relationship) Diagram for online shopping - TAEHimani415946
https://bit.ly/3KACoyV
The ER diagram for the project is the foundation for the building of the database of the project. The properties, datatypes, and attributes are defined by the ER diagram.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
3. Technology
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent
calligraphy. He responded to a need in ancient
Chinese society for more and higher quality
written documents that could be produced faster
Technology
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent
calligraphy. He responded to a need in ancient
Chinese society for more and higher quality
written documents that could be produced faster
4. The most profound technologies are those that
disappear. They weave themselves into the
fabric of everyday life until they are
indistinguishable from it...
- Mark Weiser 1991
Technology
5. Technology
The age of smartphones has left humans with
such short attention spans that even a
goldfish can hold a thought for longer” Leon
Watson
The age of smartphones has left humans with
such short attention spans that even a
goldfish can hold a thought for longer” Leon
Watson
Technology
6. So how should we look at the Internet of Things?
Is this merely a temporary consumer fad, destined to be
replaced by the next cool technology item?
Or is this an instance of a profound technology change that
redefines our role in our society, and will shape our
everyday life for many years to come?
7. To try and answer this, lets try and put this
question into some broader context of the
evolution the computer and communications
enterprise
13. From Style to Mass Marketed Luxury Item
2007 – Apple’s iPhone
14.
15. With desktop devices the Internet of computers was a dedicated activity
dedicated chair
lighting
wired bandwidth
large view screens
privacy
dedicated worktop
reliable power
16. The Internet is now anywhere and everywhere
Its trivial, commonplace and blends into all our activities
radio connectivity
battery power
hand sized
Thumb
operated
17. As dedicated “things” are replacing it
Maybe its about the demise of the “traditional” computer
18. Connecting “things” to the Internet is nothing new
Simon Hackett’s Internet Remote Radio of 1990
19. John Romkey’s Internet Toaster – Let them eat Toast!
Connecting “things” to the Internet is nothing new
20. The “old” IoT
The use of microprocessors to undertake simple tasks is about as old as
the Intel 4004 and the Zylogics Z80 processor chips
21. This new IoT is just the old IoT
with new chips!
22. The New IoT is just the Same Old IoT
And we are already living in a processing-dense world:
• A modern car has around 150 – 200 microprocessor-controlled systems, from
the windscreen wipers, to the entry system, to engine control and all things
in between
• Many / most consumer appliances have all turned to microprocessor control
• Industrial processes, logistics and inventory control, environmental
monitoring all use various forms of embedded processing
So if this has been going on for years, why is IoT a hot topic today?
24. IoT is …?
• It is a generic term that encompasses a huge
variety of application that have little in common
other than a propensity to operate in an
unmanaged environment
• Its hard to talk about the IoT in anything other than
highly generic terms
26. Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, Apple earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
27. Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, wireless earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
28. Why now?
• Low power, high capability silicon now dominates
chip fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some
form of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range
and bandwidth to radio systems
• Protocol development provides ”seamless”
connectivity
• i.e. Passports and Clothing Tags, Apple earbuds,
Home controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
29. Why now?
• Because we have saturated our traditional markets for technology
and the production capacity is being redirected to new opportunities
• PC sales volumes are plummeting
• Smartphone sales are now peaking
• The computer technology industry is seeking to use its existing capability to
provide new product to high volume markets
• Which means looking at low unit margin very high volume opportunities by
adding ”smart” network centric interfaces and controllers to existing devices
and functions
30. The opportunities
• “smart” lighting - e.g. Philips
• “smart” home appliances and networks - e.g. Miele
• “smart” power management
• ”smart” labels for retail
• “smart” traffic control
• “smart” image analysis
• “smart” video surveillance
Almost anything else that uses the word “smart”
31. The Variety of Life
It’s a set of discrete applications that have highly divergent requirements:
• Radius of connectivity varies from mm to kilometers
• Bandwidth varies from bits to gigabits per second
• Data volumes vary from bytes to petabytes
• Connectivity models may be push or pull
• Connectivity may be ad-hoc relays to dedicated wired
• Transactions may be unicast, multicast or anycast in nature
• Applications include sensing and reporting, command and control, adaptation and
interfacing
There is little that these environments have in common, except maybe a
common underlying gene pool!
32. The IoT Gene Pool
Unix Platform
• Its small, its ubiquitous, its well understood, its cheap, its open source
without onerous IPR constraints, it has a massive set of application libraries
• Customised micro kernels are risky, expensive and rarely necessary
33. The IoT Gene Pool
IP Comms
• Its small, its ubiquitous, it scales, its well understood, its cheap, its open
source without onerous IPR constraints, and everyone speaks it!
• But which version of IP?
34. IPv4 and IoT
• The “conservative” option for IP in this environment
• Ubiquitous support across the entire deployed Internet
• Well understood protocol behaviour
• Widely available APIs
Of course it should also be useful to factor in NATs in IPv4:
• Push model where the “thing” pushes data to a rendezvous point rather than a
constant pollable model of “pull” access
• Pull and Feeder models work behind NATs using relays and/or ALGs split the
primary feed from the propagation of the data
35. IPv6 and IoT
It’s the “killer app” for IPv6
But the numbers suggest otherwise:
• 7B connected “devices” on today’s IPv4 Internet, plus a further 7B – 20B (*)
conventional PC and smart devices
• 2.8B announced IPv4 addresses
• 1.5B “occupied” IPv4 addresses
• We can probably push this model harder!
* https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/
36. “Thing” Behaviour
Pull:
• Device is always connected and interrogated by external agents
• A model of polling or feed subscription where the device maintains
information that can be polled by an external agent
• This requires an public IP address + Port
• It also requires a highly robust core implementation that is resistant to attack
• It also requires some considerable thought on the authorization model
• Device is configured to authorize users and/or
• Device uses a third party auth server
• Commonly seen in web cams and other continuous monitoring applications
(though it’s not necessarily required)
37. Pull vs Push
Push:
• Intermittedly connected and interrogated via external agents
• Device pushes data to some data collection agent
• Limited connection requirement
• This behaviour NAT ”friendly” as the device is the client and the collection point is
the server
• External access via the data collection agent, not the device
• Does not require dedicated addressing outside of the local context
• This limited access model facilitates defensive measures, including encrypted
communications to the device’s agents and preventing all third party connections
• And such devices probably should be behind a NAT in any case! (e.g. cameras)
40. Security
Interesting quote ...
“At last count I have about 43 devices on my LAN, with less than a third
running an OS that I can actually interact with. The rest are embedded
systems that get updated (hah!) by the vendors at their whim. Easily two-
thirds would 'phone home' to somewhere at various times. About 7 have
external access without explicitly setting port-forwarding.
Of course, my router monitors and reports on all outbound traffic - but
do I actively look at it? I should. But I don’t. And of course everything
we value on our LAN we protect and encrypt end-to-end and at-rest as the
LAN is actually occupied by foreign devices with unknown network
capability... sure we encrypt absolutely everything...”
41. An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
42. An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
43. An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to root kit exploitation
Insanely
https://www.malwaretech.com/2016/10/mapping-mirai-a-botnet-case-study.html
44. The Internet of Stupid Things
• How do you perform field upgrades of otherwise neglected and
unmanaged devices
• What’s the economics of incenting field upgrades from the
manufacturer?
• Who is responsible for broken “things”?
45. The Internet of Stupid Things
Is this stupidity even avoidable?
• The bleak picture is maybe not!
• In a price sensitive market where system robustness and quality is largely
intangible where is the motive to maintain high quality code?
• How can a consumer tell the difference in the quality of the software, in term
of its robustness and security of operation?
high clock speed industry + commodity components + low margin
= market failure for IoT Security
50. Some things we can’t tell yet
• Will we standardize the IoT space or will it continue to be a diverse
set of mutually incompatible devices?
• Will the market consolidate to be dominated by a small number of
providers and their pseudo-open proprietary architectures?
• When will the IoT embrace IPv6, if ever?
• Will the IoT market ever discriminate on quality and robustness?
• How do we manage the risk of coercion of these devices?
51. But there are some things you can count on…
• The volumes are already huge, and they’re growing
• “Things” already outnumber everything else on the Internet
• Comprehensive security is unachievable
• Privacy is now an historical concept
• Digital pollution is pervasive
We now have an Internet that is a largely chaotic and definitely
hostile environment
53. And one more thing we can count on…
It will definitely get a whole lot worse
than it is today!
54. It’s a tough problem…
A rather bleak prognosis from the
Economist in April this year – don’t
look for technology to improve this
rather disturbing situation!
They suggest looking at economics
and markets to try and address this
problem…
55. But markets may not help either…
"The market can't fix this because neither the buyer nor the seller cares.
The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their
devices were cheap to buy, they still work, and they don't know any of the victims of the
attacks.
The sellers of those devices don't care: They're now selling newer and better models, and the
original buyers only cared about price and features.
There is no market solution, because the insecurity is what economists call an externality: It's
an effect of the purchasing decision that affects other people. Think of it kind of like
invisible pollution."
https://www.schneier.com/blog/archives/2017/02/security_and_th.html
56. Is this another of those massive challenges of our
time?
We just don’t have the tools to figure out how to stop this
environment being fatally overrun by these devices:
• We can’t improve their quality
• We can’t keep building ever larger DOS barriers
• We can’t regulate behaviours of the equipment, their makers or distributors