SlideShare uma empresa Scribd logo
1 de 13
Baixar para ler offline
Securing the Internet of Things:
secure supply chain management

Stephen Miles, Research Affiliate
MIT Auto-ID Labs
S_miles@mit.edu
                        Networking day on EU-US RFID lighthouse pilot
                        projects on May 5th, 2009
                        Avenue de Beaulieu 25, Room O/S1, Brussels
 s_miles@mit.edu
                        1160 Auderghem
Multi-dimensional view of international conflict and
            cooperation in cyberspace
          MIT Center for International Studies (CIS)
                                        Tuesday, April 21, 2009 Wall Street Journal Tech
                                        By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN
                                        WASHINGTON -- Computer spies have broken into the
                                        Pentagon's $300 billion Joint Strike Fighter project -- the Defense
                                        Department's costliest weapons program ever -- according to
                                        current and former government officials familiar with the
                                        attacks… The intruders were able to copy and siphon off several
                                        terabytes of data related to design and electronics systems,
                                        officials say...The latest intrusions provide new evidence that a
                                        battle is heating up between the U.S. and potential adversaries
Speaker: Dr. Joel Brenner               over the data networks that tie the world together.
National Counter
Intelligence Executive, DNI
“Cyber International
Relations,”
MIT’s Center for
International Studies and
the Belfer Center for
Science and International
Affairs, Harvard Kennedy
School of Government.
13 Apr 2009 E38-714, MIT
            Page 2, “Securing the Internet of things;” s_miles@mit.edu
            US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
The Application of RFID to Enhance Supply Chain Security




Transatlantic Symposium on the Societal Benefits of RFID
   Washington DC, USA September 22nd 2008

“The transportation sector has always been concerned with efficiency, security
and safety issues. After 9/11, the hazardous materials industry saw major
changes, intensifying security requirements. New regulations made it more
challenging to comply and to ship hazardous materials. Homeland Security has
provided an influx of resources to raise awareness and to develop improved and
better solutions. Tracking technologies such as RFID and sensors have proven
to bring substantial benefits to support the agenda.
The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed
technologies and databases in hazardous material shipping. Sensor Net is an
RFID+sensor enabled application that helps to identify and monitor materials
as they move through the supply chain. It provides awareness of the location of
hazardous materials at every moment, in real time.”

     Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge
     National Laboratory)

     Prepared by Rebecca Schindler for the European Commission, Information
     Society and Media Directorate General, Networked Enterprise & Radio
     Frequency Identification (RFID) Unit (D4)

Page 3, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                                            ORNL Sensornet




     Oak Ridge National Laboratory (ORNL) and strategic partners are working
     together to build a comprehensive incident management system for the near-
     real-time detection, identification, and assessment of chemical, biological,
     radiological, nuclear, and explosive (CBRNE) threats…

     The web service interfaces use Open GIS Consortium (OGC) XML schemas for
     publication of sensor data and alerts. OGC is an association developing open,
     vendor-independent computing standards for geographic information systems
     (GIS) and other related technologies. OGC specifies the usage of the Geography
     Markup Language (GML), an XML grammar written in XML Schema, for the
     encoding of geographic information. Although GML provides specifications for
     describing a variety of geographical information, the fundamental element of
     GML is a geographic "feature".




Page 4, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                 UPU "Global Monitoring System – RFID Infrastructure”




                  The official size of the global letter post market is 437 billion items (UPU
                  2005). The Universal Postal Union (UPU) is a specialized agency of the
                  United Nations which has been charged with improving the global
                  performance of mail. A link between letter mail quality of service and the
                  payments made between countries has been agreed as the method for
                  achieving this objective. There is a need for a Global Monitoring System
                  (GMS) to provide the neutral and independent measurement for such a
                  scheme.
                  UPU is developing a Global Monitoring System (GMS) to measure
                  service performance that will use RFID (Radio Frequency Identification)
                  technology
                  First QSF Global Project to participate in the Global Monitoring System
                  under development*
                         • *Quality of Service Fund Regional Training Workshop; 2008, UPU




Page 5, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
European Secure Supply Chain Academic Resource:
FP7 Secure SCM project




                   •     SecureSCM will realize secure computation protocols
                         for collaborative Supply Chain Management.
                   •      Build novel protocols for data confidentiality in supply chain
                         optimization.
                   •      Implement and evaluate those protocols under real world
                         constraints.
                   •      Demonstrate the benefits of data protection in a number of
                         domains, including Aerospace and Logistics.
                   •      Research the obstacles to practical adoption of
                         collaborative supply chain management.




Page 6, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
US Secure Supply Chain Academic Resources:
NSF CISE Cybertrust International Research Collaboration:



               "How does cybersecurity change when we attach ‘things’ connected
                 by RFID, sensors and actuators to the network? “



              •     Mustaque Ahamad, co-director, Georgia Tech Information Security
                    Center.
                    CT-ISG: Trusted Passages: Managing Distributed Trust to Meet
                    the Needs of Emerging Applications
              •     Kevin Fu, University of Massachusetts, Amherst
                    CT-T Collaborative Research: Security for Smart Tags
              •     Berk Sunar, Worcester Polytechnic Institute,
                    CT-ER: Exploring Physical Functions for Lightweight and Robust
                    Cryptography




Page 7, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
GTRI and GT Ireland end-to-end presence for US-EC RFID
Lighthouse Pilot in Georgia and Ireland




                                                                MIT – SAP Modeling
                                                                the impact of security
                                                                on EPC network
                                                                performance




Page 8, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Adding sensors for tracking containers in the US Navy



GTRI Container Security Device

•Developed for Department of Homeland Security
•Continually monitors for door openings
•Container visibility throughout the supply chain

   My ID is…
                         I have been opened
                         in route…




                                                                GTRI Integrated RFID Sensor


                                                                In alignment with GS-1 Transportation Working
                                                                Group (TWG) XCAT Specifications
I am
emitting a                       I am located here…
chemical…                                                       •Developed for Department of Navy
                                                                •Monitors environmental conditions and location
                                                                of container
                                                                •Meets communication standards for safe
                                                                shipping
             Page 9, “Securing the Internet of things;” s_miles@mit.edu
             US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Commercial asset tracking examples




•   TrenStar beer keg tracking:




•   iGPS pallet tracking
                                                                         4/13 @6pm Stata Center
                                                                         (Bldg. 32) Rm 144,
                                                                         Tracking RTIs with RFID presents
                                                                         challenges : placement for maximun
                                                                         tags read, types and location of tags,
                                                                         type and placement of readers,
                                                                         choice of frequencies…

         Page 10, “Securing the Internet of things;” s_miles@mit.edu
         US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Securing our Cities; Trash Tracking




                                                                MIT CSAIL
                                                                GSM RFID TAG
                                                                Lewis Girod




Page 11, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’
connected by RFID, sensors and actuators to the network?“




                                                                    photo background cc by benlo
  Page 12, “Securing the Internet of things;” s_miles@mit.edu
  US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09   (http://www.flickr.com/photos/25203067@N00/58482958/
Academic Resources; participants from the RFID Academic
          Convocations/European Commission EU RFID Forum.




•   RFID Academic Convocations: MIT
    Open Courseware program -
    http://ocw.mit.edu/OcwWeb/Engine
    ering-Systems-Division/ESD-
    290Spring-
    2005/ConferenceVideos/
•   EU RFID Forum; hosted by the
    European Commission DGINFSO -
    http://www.rfidconvocation.eu/Con
    vocation.htm
•   RFID Technology and
    Applications, Edited by Stephen
    Miles, Sanjay Sarma, John
    Williams -
    www.cambridge.org/978052188093
    0




          Page 13, “Securing the Internet of things;” s_miles@mit.edu
          US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09

Mais conteúdo relacionado

Mais procurados

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defenseDinesh More
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU
 

Mais procurados (6)

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
L010517180
L010517180L010517180
L010517180
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
 
6G Communication
6G Communication6G Communication
6G Communication
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
 

Destaque

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous LogisticsAkiso Yadav
 
IoT applications for supply chain
IoT applications for supply chainIoT applications for supply chain
IoT applications for supply chainAndrej Planina
 
Some conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainSome conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainStefan Harrstedt
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
 
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...InterimONE
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deckLora Cecere
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of thingsSergey Zhdanov
 
What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...Global Business Intelligence
 
Master Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksMaster Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksSAP Ariba
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 

Destaque (11)

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous Logistics
 
IoT applications for supply chain
IoT applications for supply chainIoT applications for supply chain
IoT applications for supply chain
 
Some conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainSome conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chain
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deck
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...
 
Master Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksMaster Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business Networks
 
IoT and the Supply Chain
IoT and the Supply ChainIoT and the Supply Chain
IoT and the Supply Chain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Semelhante a Securing Supply Chains with IoT

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Big Data Value Association
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Christo Ananth
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU
 
Cyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCameron Kiddle
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Mikolaj Leszczuk
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfChristo Ananth
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)Francesco Flammini
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 

Semelhante a Securing Supply Chains with IoT (20)

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
10probs.ppt
10probs.ppt10probs.ppt
10probs.ppt
 
Cyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in Science
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Itec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_aItec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_a
 

Último

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadAyesha Khan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...lizamodels9
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...lizamodels9
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Último (20)

BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Greater Noida ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in IslamabadIslamabad Escorts | Call 03070433345 | Escort Service in Islamabad
Islamabad Escorts | Call 03070433345 | Escort Service in Islamabad
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In.../:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
/:Call Girls In Indirapuram Ghaziabad ➥9990211544 Independent Best Escorts In...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
Call Girls In Sikandarpur Gurgaon ❤️8860477959_Russian 100% Genuine Escorts I...
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 

Securing Supply Chains with IoT

  • 1. Securing the Internet of Things: secure supply chain management Stephen Miles, Research Affiliate MIT Auto-ID Labs S_miles@mit.edu Networking day on EU-US RFID lighthouse pilot projects on May 5th, 2009 Avenue de Beaulieu 25, Room O/S1, Brussels s_miles@mit.edu 1160 Auderghem
  • 2. Multi-dimensional view of international conflict and cooperation in cyberspace MIT Center for International Studies (CIS) Tuesday, April 21, 2009 Wall Street Journal Tech By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks… The intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say...The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries Speaker: Dr. Joel Brenner over the data networks that tie the world together. National Counter Intelligence Executive, DNI “Cyber International Relations,” MIT’s Center for International Studies and the Belfer Center for Science and International Affairs, Harvard Kennedy School of Government. 13 Apr 2009 E38-714, MIT Page 2, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 3. The Application of RFID to Enhance Supply Chain Security Transatlantic Symposium on the Societal Benefits of RFID Washington DC, USA September 22nd 2008 “The transportation sector has always been concerned with efficiency, security and safety issues. After 9/11, the hazardous materials industry saw major changes, intensifying security requirements. New regulations made it more challenging to comply and to ship hazardous materials. Homeland Security has provided an influx of resources to raise awareness and to develop improved and better solutions. Tracking technologies such as RFID and sensors have proven to bring substantial benefits to support the agenda. The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed technologies and databases in hazardous material shipping. Sensor Net is an RFID+sensor enabled application that helps to identify and monitor materials as they move through the supply chain. It provides awareness of the location of hazardous materials at every moment, in real time.” Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge National Laboratory) Prepared by Rebecca Schindler for the European Commission, Information Society and Media Directorate General, Networked Enterprise & Radio Frequency Identification (RFID) Unit (D4) Page 3, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 4. Lighthouse Pilot participant resources: ORNL Sensornet Oak Ridge National Laboratory (ORNL) and strategic partners are working together to build a comprehensive incident management system for the near- real-time detection, identification, and assessment of chemical, biological, radiological, nuclear, and explosive (CBRNE) threats… The web service interfaces use Open GIS Consortium (OGC) XML schemas for publication of sensor data and alerts. OGC is an association developing open, vendor-independent computing standards for geographic information systems (GIS) and other related technologies. OGC specifies the usage of the Geography Markup Language (GML), an XML grammar written in XML Schema, for the encoding of geographic information. Although GML provides specifications for describing a variety of geographical information, the fundamental element of GML is a geographic "feature". Page 4, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 5. Lighthouse Pilot participant resources: UPU "Global Monitoring System – RFID Infrastructure” The official size of the global letter post market is 437 billion items (UPU 2005). The Universal Postal Union (UPU) is a specialized agency of the United Nations which has been charged with improving the global performance of mail. A link between letter mail quality of service and the payments made between countries has been agreed as the method for achieving this objective. There is a need for a Global Monitoring System (GMS) to provide the neutral and independent measurement for such a scheme. UPU is developing a Global Monitoring System (GMS) to measure service performance that will use RFID (Radio Frequency Identification) technology First QSF Global Project to participate in the Global Monitoring System under development* • *Quality of Service Fund Regional Training Workshop; 2008, UPU Page 5, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 6. European Secure Supply Chain Academic Resource: FP7 Secure SCM project • SecureSCM will realize secure computation protocols for collaborative Supply Chain Management. • Build novel protocols for data confidentiality in supply chain optimization. • Implement and evaluate those protocols under real world constraints. • Demonstrate the benefits of data protection in a number of domains, including Aerospace and Logistics. • Research the obstacles to practical adoption of collaborative supply chain management. Page 6, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 7. US Secure Supply Chain Academic Resources: NSF CISE Cybertrust International Research Collaboration: "How does cybersecurity change when we attach ‘things’ connected by RFID, sensors and actuators to the network? “ • Mustaque Ahamad, co-director, Georgia Tech Information Security Center. CT-ISG: Trusted Passages: Managing Distributed Trust to Meet the Needs of Emerging Applications • Kevin Fu, University of Massachusetts, Amherst CT-T Collaborative Research: Security for Smart Tags • Berk Sunar, Worcester Polytechnic Institute, CT-ER: Exploring Physical Functions for Lightweight and Robust Cryptography Page 7, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 8. GTRI and GT Ireland end-to-end presence for US-EC RFID Lighthouse Pilot in Georgia and Ireland MIT – SAP Modeling the impact of security on EPC network performance Page 8, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 9. Adding sensors for tracking containers in the US Navy GTRI Container Security Device •Developed for Department of Homeland Security •Continually monitors for door openings •Container visibility throughout the supply chain My ID is… I have been opened in route… GTRI Integrated RFID Sensor In alignment with GS-1 Transportation Working Group (TWG) XCAT Specifications I am emitting a I am located here… chemical… •Developed for Department of Navy •Monitors environmental conditions and location of container •Meets communication standards for safe shipping Page 9, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 10. Commercial asset tracking examples • TrenStar beer keg tracking: • iGPS pallet tracking 4/13 @6pm Stata Center (Bldg. 32) Rm 144, Tracking RTIs with RFID presents challenges : placement for maximun tags read, types and location of tags, type and placement of readers, choice of frequencies… Page 10, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 11. Securing our Cities; Trash Tracking MIT CSAIL GSM RFID TAG Lewis Girod Page 11, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 12. An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’ connected by RFID, sensors and actuators to the network?“ photo background cc by benlo Page 12, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09 (http://www.flickr.com/photos/25203067@N00/58482958/
  • 13. Academic Resources; participants from the RFID Academic Convocations/European Commission EU RFID Forum. • RFID Academic Convocations: MIT Open Courseware program - http://ocw.mit.edu/OcwWeb/Engine ering-Systems-Division/ESD- 290Spring- 2005/ConferenceVideos/ • EU RFID Forum; hosted by the European Commission DGINFSO - http://www.rfidconvocation.eu/Con vocation.htm • RFID Technology and Applications, Edited by Stephen Miles, Sanjay Sarma, John Williams - www.cambridge.org/978052188093 0 Page 13, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09