SlideShare a Scribd company logo
1 of 30
IOT = (Proprietary Networks != Internet) Of Things
T.Rob Wyatt
»WebSphere MQ security guy
»Security blogger
»Autistic blogger
»Enthusiastic fan of Internet of Things

Moved to IBM in order to improve the state of
middleware security and to help build the
instrumented, networked, interactive world of
pervasive, embedded computing.
1.   Subscribe to service
2.   Possibly configure gateway
3.   Configure device to network
4.   Possibly configure device to gateway
5.   Device talks to vendor cloud
6.   User Interface talks to cloud
Device                Gateway                Local data intercept?
WiThings scale        Wi-Fi Router           No
Fitbit                PC, Phone              No
Garmin, Omron         PC                     File
Schlage LiNK          Z-Wave Bridge          No
iFit                  Wi-Fi Router           No
Summer Baby Monitor   Proprietary            No
Ford Sync             Cell data modem        No
Ninja Blocks          Ethernet Router        No (Open HW/SW FTW!)
Ceiva photo frame     Wi-Fi router           No
LIFX LED Bulb         Wi-Fi / Mesh network   No
» Security is hard. Solve the problem with an
  encrypted tunnel from the device to the vendor.
» No need to authenticate data so long as the secure
  connection provides identity context.

In a world where vendors claim ownership of your data,
   this model is expected. It is the status quo. Who
   would even think of doing it any other way?

WE would, that's who.
 Our data is OUR data. That's why we call it that.
» Network goes down? The house blue screens?
» You want to push a device's feed to a 3rd party?
» You want H/A or offsite redundancy?
» You want a different data granularity or
  availability than the vendor gives you?
» Your vendor goes out of business and you have
  10,000 hours left on your $100 LED bulb?
»   User needs to configure each device type
»   Doesn’t scale
»   Devices don’t talk to one another
»   Functionality degrades or fails without
    connectivity
»   Vendor-first data capture
»   User options severely limited by vendors
»   Lot$ of $ub$cription$
»   Limited sense-and-respond, esp. across vendors
»   Devices self-configure
»   Devices talk locally first, to vendor is optional
»   Local functionality does not require Internet
»   Full if-this-then-that capability in home
»   Data owners are free to use their own data
»   Interoperability across different device types
    and/or different vendors
1.    Consumer enters device GUID into their dashboard.
2.    Power up the device in the vicinity of the router. Press the sync
      button on the device, then the WPS* button on the router.
3.    Device joins the network and acquires an IP address from DHCP.
4.    Device issues MQTT Connect on DHCP server port 1883
5.    Device subscribes to an admin topic that publishes on-boarding
      info.
6.    Device now publishes the manufacturer's MQTT feed URL to the
      dashboard.
7.    User dashboard now displays device-specific options to publish to
      the vendor, subscribe from the vendor, etc.
8.    User has options to publish topic feeds at any level to 3 rd parties.


(* Note: Requires some rework to make WPS secure or to replace it.)
After install of the new device, all data is exchanged
locally unless specifically provisioned by the user.
Optionally, the user can authorize various interactions with device vendor:
1.Publish device data to vendor.
2.Subscribe to vendor administrative alerts (recall notices, offers, etc.)
3.Allow vendor to send inbound control messages.
IT’S MY DATA!
If I want to give it to someone
             OTHER
than the device manufacturer,
          Why can’t I?
What’s the point if…
»My device vendor controls all my device data…
»My ability to correlate across devices depends
on my vendors communicating with one another
and writing code…
»The protocols are all proprietary…
»I can’t inject my own events into the
ecosystem…
Optional interaction with 3rd party vendors:
1.User registers with 3rd party value-added service.
2.3rd party provides a URL for device notifications.
3.User subscribes external URL to topic using local dashboard,
4.3rd party now receives/sends data
and events from homeowner.
»   Community / Regional load control
»   Volunteer distributed sensor net for research
»   Aggregators/rules engines (Smart Things, IFTTT)
»   Special Interest communities
»   Activists (e.g. green-ness badges)
»   Notification providers (stocks, weather alerts)
»   Augmented reality
»   ___________________________ (You pick it)
»   WPS that actually works as intended
»   User dashboard
»   Local event capture, correlation and rules
»   Pub/Sub messaging architecture
»   Internet traversable protocols
»   Globally managed topic namespace
    (But can be prototyped with existing public servers.)
Questions? Comments? Rotten tomatoes?

T.Rob Wyatt
t.rob.wyatt@us.ibm.com
iot@t-rob.net
http://t-rob.net
http://linkedin.com/in/tdotrob
http://facebook.com/tdotrob
You really need these next slides but there was no
way to fit them in the 5 minutes I had to talk so I
cheated and sort of stuck them in the end where
you'll find them if you download this deck and
accidentally scroll past the Thank You! Page
because your finger twitched, your curiosity got
the better of you or perhaps you are one of those
people who sits through the movie credits thinking
there will be an Easter Egg scene at the very end
that makes it all worthwhile. There is.
» An open, royalty-free protocol invented in 1999.
» Optimized for constrained devices, unreliable
  networks and high bandwidth costs.
» Proposed to OASIS for standards acceptance.
» Implemented samples in dozens of languages.
» Scales to millions of connected devices.
» Backed by Eclipse Foundation Paho project.
» http://mqtt.org
» http://bit.ly/oasismqtttc
» Stephen Nicholas performed some power
  profiling on Android to measure battery drain.
» Mutually authenticated connections.
» Comet polling for HTTPS.
» MQTT wins by large margin.
» Effects multiplied when polling on more than
  one subscription.
» http://stephendnicholas.com/archives/1217
» Open-source (BSD licensed) MQTT broker
» Binaries for the usual Linuxes, but also iPhone,
  Open WRT, Raspberry PI, and others.
» I easily got it running on a Synology NAS drive.
» Free test broker
   ˃ Unencrypted @ test. mosquitto.org:1883
   ˃ Server-auth SSL @ test. mosquitto.org:8883
   ˃ Mutual-auth SSL @ test. mosquitto.org:8883

» http://mosquitto.org
»   Open Messaging for M2M and IoT
»   Focused on protocol standardization, tools.
»   C & Java clients delivered.
»   Clients developed under EPL 1.0
» http://projects.eclipse.org/projects/technology.paho
» Provide M2M development, simulation, testing,
  debugging and deployment tools.
» Initial focus on the Lua language
» Delivered development, modeling and
  simulator tools so far.
» http://projects.eclipse.org/projects/technology.koneki
» Embedded runtime exposing high-level Lua API
  that can be used to develop portable M2M
  applications easily.
» Project and samples on Eclipse git
» http://projects.eclipse.org/projects/technology.mihini
» Eclipse-based visual development and server
  platform for mobile apps.
» Build, test, deploy, and manage your
  smartphone and tablet apps for iOS, Android,
  Blackberry, and Windows Phone devices.

» http://ibm.co/dWworklight
» Gelernter, David, Mirror Worlds (Oxford University Press, 1991).
» Kelley, Kevin, Out of Control: The New Biology of Machines, Social
  Systems, & the Economic World (Addison, Wesley, 1994).
» Mitchell, William J., City of Bits (MIT Press, 1995).
» Dyson, George B., Darwin Among the Machines
  (Perseus Books, 1997).
» Dodsworth, Clark Jr., Contributing Editor, Digital Illusion:
  Entertaining the Future with High Technology (ACM Press, 1998).
» Holland, John H., Emergence: From Chaos to Order
  (Perseus Books 1998).
» Gershenfeld, Neil, When Things Start to Think
  (Harry Holt and Company, 1999).
20130226 How Personal Is Your Cloud?

More Related Content

Viewers also liked

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)T.Rob Wyatt
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...Kim Clark
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015matthew1001
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQStuart Feasey
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneMorag Hughson
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMarkTaylorIBM
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
 

Viewers also liked (12)

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQ
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 level
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
 

Similar to 20130226 How Personal Is Your Cloud?

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainValerie Lampkin
 
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...WithTheBest
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of thingsBernard Kufluk
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data CommonskingsBSD
 

Similar to 20130226 How Personal Is Your Cloud? (20)

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and Blockchain
 
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
 

Recently uploaded

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

20130226 How Personal Is Your Cloud?

  • 1. IOT = (Proprietary Networks != Internet) Of Things
  • 2. T.Rob Wyatt »WebSphere MQ security guy »Security blogger »Autistic blogger »Enthusiastic fan of Internet of Things Moved to IBM in order to improve the state of middleware security and to help build the instrumented, networked, interactive world of pervasive, embedded computing.
  • 3.
  • 4. 1. Subscribe to service 2. Possibly configure gateway 3. Configure device to network 4. Possibly configure device to gateway 5. Device talks to vendor cloud 6. User Interface talks to cloud
  • 5. Device Gateway Local data intercept? WiThings scale Wi-Fi Router No Fitbit PC, Phone No Garmin, Omron PC File Schlage LiNK Z-Wave Bridge No iFit Wi-Fi Router No Summer Baby Monitor Proprietary No Ford Sync Cell data modem No Ninja Blocks Ethernet Router No (Open HW/SW FTW!) Ceiva photo frame Wi-Fi router No LIFX LED Bulb Wi-Fi / Mesh network No
  • 6. » Security is hard. Solve the problem with an encrypted tunnel from the device to the vendor. » No need to authenticate data so long as the secure connection provides identity context. In a world where vendors claim ownership of your data, this model is expected. It is the status quo. Who would even think of doing it any other way? WE would, that's who. Our data is OUR data. That's why we call it that.
  • 7. » Network goes down? The house blue screens? » You want to push a device's feed to a 3rd party? » You want H/A or offsite redundancy? » You want a different data granularity or availability than the vendor gives you? » Your vendor goes out of business and you have 10,000 hours left on your $100 LED bulb?
  • 8.
  • 9. » User needs to configure each device type » Doesn’t scale » Devices don’t talk to one another » Functionality degrades or fails without connectivity » Vendor-first data capture » User options severely limited by vendors » Lot$ of $ub$cription$ » Limited sense-and-respond, esp. across vendors
  • 10. » Devices self-configure » Devices talk locally first, to vendor is optional » Local functionality does not require Internet » Full if-this-then-that capability in home » Data owners are free to use their own data » Interoperability across different device types and/or different vendors
  • 11. 1. Consumer enters device GUID into their dashboard. 2. Power up the device in the vicinity of the router. Press the sync button on the device, then the WPS* button on the router. 3. Device joins the network and acquires an IP address from DHCP. 4. Device issues MQTT Connect on DHCP server port 1883 5. Device subscribes to an admin topic that publishes on-boarding info. 6. Device now publishes the manufacturer's MQTT feed URL to the dashboard. 7. User dashboard now displays device-specific options to publish to the vendor, subscribe from the vendor, etc. 8. User has options to publish topic feeds at any level to 3 rd parties. (* Note: Requires some rework to make WPS secure or to replace it.)
  • 12. After install of the new device, all data is exchanged locally unless specifically provisioned by the user.
  • 13. Optionally, the user can authorize various interactions with device vendor: 1.Publish device data to vendor. 2.Subscribe to vendor administrative alerts (recall notices, offers, etc.) 3.Allow vendor to send inbound control messages.
  • 14.
  • 15. IT’S MY DATA! If I want to give it to someone OTHER than the device manufacturer, Why can’t I?
  • 16. What’s the point if… »My device vendor controls all my device data… »My ability to correlate across devices depends on my vendors communicating with one another and writing code… »The protocols are all proprietary… »I can’t inject my own events into the ecosystem…
  • 17. Optional interaction with 3rd party vendors: 1.User registers with 3rd party value-added service. 2.3rd party provides a URL for device notifications. 3.User subscribes external URL to topic using local dashboard, 4.3rd party now receives/sends data and events from homeowner.
  • 18. » Community / Regional load control » Volunteer distributed sensor net for research » Aggregators/rules engines (Smart Things, IFTTT) » Special Interest communities » Activists (e.g. green-ness badges) » Notification providers (stocks, weather alerts) » Augmented reality » ___________________________ (You pick it)
  • 19. » WPS that actually works as intended » User dashboard » Local event capture, correlation and rules » Pub/Sub messaging architecture » Internet traversable protocols » Globally managed topic namespace (But can be prototyped with existing public servers.)
  • 20. Questions? Comments? Rotten tomatoes? T.Rob Wyatt t.rob.wyatt@us.ibm.com iot@t-rob.net http://t-rob.net http://linkedin.com/in/tdotrob http://facebook.com/tdotrob
  • 21. You really need these next slides but there was no way to fit them in the 5 minutes I had to talk so I cheated and sort of stuck them in the end where you'll find them if you download this deck and accidentally scroll past the Thank You! Page because your finger twitched, your curiosity got the better of you or perhaps you are one of those people who sits through the movie credits thinking there will be an Easter Egg scene at the very end that makes it all worthwhile. There is.
  • 22. » An open, royalty-free protocol invented in 1999. » Optimized for constrained devices, unreliable networks and high bandwidth costs. » Proposed to OASIS for standards acceptance. » Implemented samples in dozens of languages. » Scales to millions of connected devices. » Backed by Eclipse Foundation Paho project. » http://mqtt.org » http://bit.ly/oasismqtttc
  • 23. » Stephen Nicholas performed some power profiling on Android to measure battery drain. » Mutually authenticated connections. » Comet polling for HTTPS. » MQTT wins by large margin. » Effects multiplied when polling on more than one subscription. » http://stephendnicholas.com/archives/1217
  • 24. » Open-source (BSD licensed) MQTT broker » Binaries for the usual Linuxes, but also iPhone, Open WRT, Raspberry PI, and others. » I easily got it running on a Synology NAS drive. » Free test broker ˃ Unencrypted @ test. mosquitto.org:1883 ˃ Server-auth SSL @ test. mosquitto.org:8883 ˃ Mutual-auth SSL @ test. mosquitto.org:8883 » http://mosquitto.org
  • 25. » Open Messaging for M2M and IoT » Focused on protocol standardization, tools. » C & Java clients delivered. » Clients developed under EPL 1.0 » http://projects.eclipse.org/projects/technology.paho
  • 26. » Provide M2M development, simulation, testing, debugging and deployment tools. » Initial focus on the Lua language » Delivered development, modeling and simulator tools so far. » http://projects.eclipse.org/projects/technology.koneki
  • 27. » Embedded runtime exposing high-level Lua API that can be used to develop portable M2M applications easily. » Project and samples on Eclipse git » http://projects.eclipse.org/projects/technology.mihini
  • 28. » Eclipse-based visual development and server platform for mobile apps. » Build, test, deploy, and manage your smartphone and tablet apps for iOS, Android, Blackberry, and Windows Phone devices. » http://ibm.co/dWworklight
  • 29. » Gelernter, David, Mirror Worlds (Oxford University Press, 1991). » Kelley, Kevin, Out of Control: The New Biology of Machines, Social Systems, & the Economic World (Addison, Wesley, 1994). » Mitchell, William J., City of Bits (MIT Press, 1995). » Dyson, George B., Darwin Among the Machines (Perseus Books, 1997). » Dodsworth, Clark Jr., Contributing Editor, Digital Illusion: Entertaining the Future with High Technology (ACM Press, 1998). » Holland, John H., Emergence: From Chaos to Order (Perseus Books 1998). » Gershenfeld, Neil, When Things Start to Think (Harry Holt and Company, 1999).