m2m why all the buzz
Download
Skip this Video
Download Presentation
M2M: Why all the Buzz?

Loading in 2 Seconds...

play fullscreen
1 / 21

M2M: Why all the Buzz? - PowerPoint PPT Presentation


  • 102 Views
  • Uploaded on

M2M: Why all the Buzz?. ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director. Association of Information Technology Professionals February 19, 2014. TuWay Story. Capabilities

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' M2M: Why all the Buzz?' - xenos


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
m2m why all the buzz
M2M: Why all the Buzz?

~Presented by TuWay Communications ~

Speaker

Derek Storm, Business Development Director

Association of Information Technology Professionals

February 19, 2014

tuway story
TuWay Story
  • Capabilities
    • Sixty year history of providing and servicing advanced wireless solutions.
    • Proven record with mission critical applications in both Public Safety and Enterprise markets.
    • Local, highly trained and certificated technicians, installers and designers.
    • Design Engineering, Project Management, Installation, Service & Maintenance.
  • Select Client List
    • 911 Centers
    • Lehigh County Authority
    • Bethlehem Water Authority
    • Air Products
    • SanofiPastuer
    • SLUHN, LVHN
what is m2m
What is M2M?

M2M technology automates processes and streamlinesworkflow by enabling machines to communicate with each other.

Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans

  • A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.
why now
Why Now?

Vendors Need to Find Ways to Make $$

market drivers
Market Drivers
  • Improvements in Cellular
  • Sensor Advancements
  • More Powerful Servers and Storage
  • Advent of Big Data
  • Resurgence of Cloud Computing
market drivers1
Market Drivers
  • Improvements in Cellular
    • Coverage
    • Reliability
    • Capacity
    • Cost
  • Sensor Advancements
  • More Powerful Servers and Storage
  • Advent of Big Data
  • Resurgence of Cloud Computing
market drivers2
Market Drivers
  • Improvements in Cellular
  • Sensor Advancements
    • Size
    • Battery Life
    • Cost
  • More Powerful Servers and Storage
  • Advent of Big Data
  • Resurgence of Cloud Computing
market drivers3
Market Drivers
  • Improvements in Cellular
  • Sensor Advancements
  • More Powerful Servers and Storage
    • Size
    • Speed
    • Cost
  • Advent of Big Data
  • Resurgence of Cloud Computing
market drivers4
Market Drivers
  • Improvements in Cellular
  • Sensor Advancements
  • More Powerful Servers and Storage
  • Advent of Big Data
    • Better Software
    • Mobility
  • Resurgence of Cloud Computing
market drivers5
Market Drivers
  • Improvements in Cellular
  • Sensor Advancements
  • More Powerful Servers and Storage
  • Advent of Big Data
  • Resurgence of Cloud Computing
    • Fast, Low Cost Implementation
    • Shift from CapEx to OpEx
security issues
Security Issues

What is the #1 Security Risk??

COMPLACENCY

security issues1
Security Issues

What Can Be Done?

  • Pay Attention
  • Perceived Threat/ Loss Quantification Determines Response ($$)
  • There is no “Silver Bullet” or “One Size Fits All”
  • Effective Security Uses Layers
security strategies
Security Strategies

COBIT 5 Now Included in Framework Core:

www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf

NEW Cyber Security Framework

Executive Order 13636

security strategies1
Security Strategies
  • What is the same?
    • The Need for a Strategy
    • IP Network and Devices
    • Need to Protect Hardware, Data, Processes
  • What is different?
    • Scale
    • Remoteness
    • No Human Oversight
    • Minimal Processing Power
    • Reliance on Battery Power
    • Intermittent or Limited Connectivity/ Bandwidth
    • Ability to Create Critical, Widespread Problems
security strategies2
Security Strategies
  • VPN, VLAN, Encryption (requires processing and power)
  • Physical Security (including use of analytic video, access control)
  • GPS Overlay
  • Physical Network Separation
  • Industry Specific Firewall or IPS
  • Device Level
    • Secure Booting
    • Device Based Authentication & Access Control
    • Locking/ Wiping
  • Updates and Patches Specific to Environment
  • Third Party Services: Verizon Universal Identity Services
case studies
Case Studies

Water/ Sewer Authority

Water Supply

what does the future hold
What Does the Future Hold?
  • IPv6/ MIPv6 (HMIPv6)
  • ZigBee(2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks.
  • ZigBee IP (March 2013)
    • adds network and security layers and an application framework
    • incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways
    • based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP
    • security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite
what does the future hold1
What Does the Future Hold?
  • 6LoWPAN(2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings.
  • 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of:
    • limited power, memory and processing resources
    • hard upper bounds on state, code space and processing cycles
    • optimization of energy and network bandwidth usage
    • lack of some layer 2 services like complete device connectivity andbroadcast/multicast
what does the future hold2
What Does the Future Hold?

Open Source Platforms and Programming

  • Arduino(www.arduino.cc): an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.
  • Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.
  • The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.
  • Kura (www.eclipse.org/proposals/technology.kura): OSGi-based Application Framework for M2M Service Gateways
what does the future hold3
What Does the Future Hold?

Arduino

  • Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators.
  • The microcontroller on the board is programmed using the Arduino programming language (based on Wiring)
  • Utilizes the Arduino development environment (based on Processing)
  • Flutter(www.flutterwireless.com): an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption.
thank you
Thank You

Derek Storm, Business Development Director

TuWay Communications

2115 City Line Road

Bethlehem, PA 18017

610-814-6923

[email protected]

ad