M2m why all the buzz
This presentation is the property of its rightful owner.
Sponsored Links
1 / 21

M2M: Why all the Buzz? PowerPoint PPT Presentation


  • 64 Views
  • Uploaded on
  • Presentation posted in: General

M2M: Why all the Buzz?. ~ Presented by TuWay Communications ~ Speaker Derek Storm, Business Development Director. Association of Information Technology Professionals February 19, 2014. TuWay Story. Capabilities

Download Presentation

M2M: Why all the Buzz?

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


M2m why all the buzz

M2M: Why all the Buzz?

~Presented by TuWay Communications ~

Speaker

Derek Storm, Business Development Director

Association of Information Technology Professionals

February 19, 2014


Tuway story

TuWay Story

  • Capabilities

    • Sixty year history of providing and servicing advanced wireless solutions.

    • Proven record with mission critical applications in both Public Safety and Enterprise markets.

    • Local, highly trained and certificated technicians, installers and designers.

    • Design Engineering, Project Management, Installation, Service & Maintenance.

  • Select Client List

    • 911 Centers

    • Lehigh County Authority

    • Bethlehem Water Authority

    • Air Products

    • SanofiPastuer

    • SLUHN, LVHN


What is m2m

What is M2M?

M2M technology automates processes and streamlinesworkflow by enabling machines to communicate with each other.

Machine to machine (M2M) is a broad label that can be used to describe any technology that enables networked devices to exchange information and perform actions without the manual assistance of humans

  • A system comprising a device (such as a sensor or meter) to capture an event (such as temperature, inventory level, etc.) that is relayed through a network (wireless, wired or hybrid) to an application (software program) that translates the captured event into meaningful information.


Why now

Why Now?

Vendors Need to Find Ways to Make $$


Market drivers

Market Drivers

  • Improvements in Cellular

  • Sensor Advancements

  • More Powerful Servers and Storage

  • Advent of Big Data

  • Resurgence of Cloud Computing


Market drivers1

Market Drivers

  • Improvements in Cellular

    • Coverage

    • Reliability

    • Capacity

    • Cost

  • Sensor Advancements

  • More Powerful Servers and Storage

  • Advent of Big Data

  • Resurgence of Cloud Computing


Market drivers2

Market Drivers

  • Improvements in Cellular

  • Sensor Advancements

    • Size

    • Battery Life

    • Cost

  • More Powerful Servers and Storage

  • Advent of Big Data

  • Resurgence of Cloud Computing


Market drivers3

Market Drivers

  • Improvements in Cellular

  • Sensor Advancements

  • More Powerful Servers and Storage

    • Size

    • Speed

    • Cost

  • Advent of Big Data

  • Resurgence of Cloud Computing


Market drivers4

Market Drivers

  • Improvements in Cellular

  • Sensor Advancements

  • More Powerful Servers and Storage

  • Advent of Big Data

    • Better Software

    • Mobility

  • Resurgence of Cloud Computing


Market drivers5

Market Drivers

  • Improvements in Cellular

  • Sensor Advancements

  • More Powerful Servers and Storage

  • Advent of Big Data

  • Resurgence of Cloud Computing

    • Fast, Low Cost Implementation

    • Shift from CapEx to OpEx


Security issues

Security Issues

What is the #1 Security Risk??

COMPLACENCY


Security issues1

Security Issues

What Can Be Done?

  • Pay Attention

  • Perceived Threat/ Loss Quantification Determines Response ($$)

  • There is no “Silver Bullet” or “One Size Fits All”

  • Effective Security Uses Layers


Security strategies

Security Strategies

COBIT 5 Now Included in Framework Core:

www.isaca.org/COBIT/Documents/A-COBIT-5-Overview.pdf

NEW Cyber Security Framework

Executive Order 13636


Security strategies1

Security Strategies

  • What is the same?

    • The Need for a Strategy

    • IP Network and Devices

    • Need to Protect Hardware, Data, Processes

  • What is different?

    • Scale

    • Remoteness

    • No Human Oversight

    • Minimal Processing Power

    • Reliance on Battery Power

    • Intermittent or Limited Connectivity/ Bandwidth

    • Ability to Create Critical, Widespread Problems


Security strategies2

Security Strategies

  • VPN, VLAN, Encryption (requires processing and power)

  • Physical Security (including use of analytic video, access control)

  • GPS Overlay

  • Physical Network Separation

  • Industry Specific Firewall or IPS

  • Device Level

    • Secure Booting

    • Device Based Authentication & Access Control

    • Locking/ Wiping

  • Updates and Patches Specific to Environment

  • Third Party Services: Verizon Universal Identity Services


Case studies

Case Studies

Water/ Sewer Authority

Water Supply


What does the future hold

What Does the Future Hold?

  • IPv6/ MIPv6 (HMIPv6)

  • ZigBee(2003): a networking layer built on top of IEEE standard 802.15.4 MAC designed to provide a standards-based protocol for interoperability of sensor networks.

  • ZigBee IP (March 2013)

    • adds network and security layers and an application framework

    • incorporates a scalable architecture with end-to-end IPv6 networking eliminating the need for intermediate gateways

    • based on standard Internet protocols, such as 6LoWPAN, IPv6, PANA, RPL, TCP, TLS and UDP

    • security mechanisms using TLS1.2 protocol, link layer frame security based on AES-128-CCM algorithm and support for public key infrastructure using standard X.509 v3 certificates and ECC-256 cipher suite


What does the future hold1

What Does the Future Hold?

  • 6LoWPAN(2007): introduced an adaptation layer that enabled efficient IPv6 communication over IEEE 802.15.4 LoWPAN links. This will allow previously thought too resource-intensive to be scaled down to operate on the microcontrollers and low-power wireless links used in LoWPAN settings.

  • 6LoWPAN WG finished, 6lo WG (Fall 2013) to focus on constrained node networks with the characteristics of:

    • limited power, memory and processing resources

    • hard upper bounds on state, code space and processing cycles

    • optimization of energy and network bandwidth usage

    • lack of some layer 2 services like complete device connectivity andbroadcast/multicast


What does the future hold2

What Does the Future Hold?

Open Source Platforms and Programming

  • Arduino(www.arduino.cc): an open-source electronics prototyping platform based on flexible, easy-to-use hardware and software.

  • Eclipse Foundation (www.eclipse.org/org): a community for individuals and organizations who wish to collaborate on commercially-friendly open source software.

  • The Mihini Project (www.eclipse.org/mihini): delivers an embedded runtime running on top of Linux, that exposes a high-level Lua API for building Machine-to-Machine applications.

  • Kura (www.eclipse.org/proposals/technology.kura): OSGi-based Application Framework for M2M Service Gateways


What does the future hold3

What Does the Future Hold?

Arduino

  • Arduino can sense the environment by receiving input from a variety of sensors and can affect its surroundings by controlling lights, motors, and other actuators.

  • The microcontroller on the board is programmed using the Arduino programming language (based on Wiring)

  • Utilizes the Arduino development environment (based on Processing)

  • Flutter(www.flutterwireless.com): an open source ARM-powered wireless Arduino with 1000m+ (3200 ft) range and 256-bit AES hardware encryption.


Thank you

Thank You

Derek Storm, Business Development Director

TuWay Communications

2115 City Line Road

Bethlehem, PA 18017

610-814-6923

[email protected]


  • Login