IoT Seminar (Oct. 2016) Hatem Oueslati - IOTEROP

Preview:

Citation preview

Interoperability, Security and Device Management solutions for IoT

MAIN IOT ROADBLOCKS

Security Interoperability Device Management

Source: US Department of Homeland Security

IOT SECURITY FAULTS: BIG CONSEQUENCES !

Traffic signals

HACKED

Smart Meters

HACKED

Smart Buildings

HACKED

Public transportation

HACKED

HACKED

Smart Grid

HACKED

Traffic controls

The visionWater and electricity distributionOptimize efficiency, detect loss, reduce waste

TransportationAnalyze et optimize traffic flows, alert drivers and passengers

Environmental QualityAir and water analysis, enhance citizens’ health

Security and preventionAssist weakest people, prevent risks and alert citizens

FRAGMENTATION : REAL PAINS !

The market realityFragmented solutionsServices incompatibilities, useless and costly redundancy

ComplexityManagement and deployment over costs, no possible extension

IncompatibilitiesSensors and infrastructures incompatible, complex deployment and over costs

InefficiencyCostly maintenance, Services creation limited, limited innovation

FRAGMENTATION : REAL PAINS !

Tesla: embeds an OMA DM technology GM: no OMA DM technology

29 000 cars remotely updated with a software patch

380 000 cars to return to service for a manual update

Source: Frost & Sullivan 2015

IOT DEVICE MANAGEMENT : AN EXAMPLE

STANDARDS ARE THE KEYS

Security

Discovery

Device Management

CRUDN

Resource Model

Data Model

Authentication

Messaging

Registration

UDP

DTLS

CoAP

LWM2M

Objects

IP

Transport

RD

Onboarding

TCP

TLS

SMS

Non-IP (e.g.

LORAWAN)

Application

Spot on the OMA Lightweight M2M technology

STANDARDS ARE THE KEYSCompared to COAP only

MISSING !

Security

Discovery

Device Management

CRUDN

Resource Model

Data Model

Authentication

Messaging

Registration

UDP

DTLS

CoAP

IP

Transport

Onboarding

TCP

TLS

Application

RD

STANDARDS ARE THE KEYSCompared to MQTT

MISSING !

Security

DiscoveryDevice Management

Resource Model

Data Model

Authentication

Messaging

Registration

IP

Transport

Onboarding

TCP

TLS

Application

MQTT N

CRUD

Today

Tomorrow

WHAT LWM2M CAN CHANGE

No direct interactions

Big integration costs

direct interactions

Unique and standardized exchanges

Interoperability and device management of sensors. Making sensors intelligent: dynamic policy changes, increased data relevance…

Increased data flow security using light but powerful cryptography. Secure device authentication and registration.

WHAT LWM2M CAN CHANGE

3 Founders from Palm and Intel with 17 years of embedded systems experience

Creators of the Eclipse’s Wakaama project and principal maintainers

Members of OMA and actively participating to the standards

Provide a commercial LWM2M software stack for the industry

IOTEROP: WHO ARE WE ?

Thank you !

Recommended