SlideShare a Scribd company logo
1 of 21
Download to read offline
1
SMARTSOLARPANEL - SECURITYAND CHALLENGES
SIMPA ENERGY INDIA
SIMPANETWORKS,INC.
Simpa sells solar power systems on financing to households and shops in rural India.
Bohitesh Misra
Vice President – IT & BI
Simpa Networks, Inc.
Email: bohitesh.misra@gmail.com
2
100million
households
with no connection
to the electricity grid
or inadequate supply
500million
people
relying on kerosene
as primary source
of lighting
multi-billion
dollar opportunity for
solar-as-a-service
in rural India
THE PROBLEM
AND OPPORTUNITY
OUR AIM
SIMPA WILLCREATE10MILLIONSOLARROOFTOPSIN
10YEARS
3
SIMPA EVOLUTION
Registered in
United States
in 2011
Inception
Started
operations in
Karnataka in
2011. Moved to
Uttar Pradesh
in 2013
Operation
Reached
29,500
customers by
February 2017
Scale up
01 THE COMPANY
Startup, growth stage. award-
winning with experienced
leadership team.
energy poverty
02 THE PROBLEM
03 OUR SOLUTION
solar-as-a-service
for the energy-poor
4
AWARDS & RECOGNITION
‘Make in India’ Award
• July, 2016
• The India Today ‘Make
in India’ Award in the
Renewable Energy
category
Millennium Alliance
Award
• April, 2016
• Award sponsored by
FICCI for clean energy
sector.
Parivartan Award
• October 2015
• Sustainability
Leadership Awards
2015 in Delhi
Climate Solver Award,
WWF
• September 2015
• Energy Access
category- recognized in
the Distributed
Renewable Energy
category
May 2015: OPIC Impact Award in the renewable energy category which recognized
exceptional achievement in international private-sector development.
November 2014: Off-Grid Energy Challenge Award as part of The Climate Group’s
access to rural energy project in India, Bijli – Clean Energy for All.
5
5, 890,151
clean energy
days bought
1.003
GWh of clean energy
generated
3,500
solar
entrepreneurs
empowered
1471
tons of CO2
emissions saved
1500
rural jobs created
139,297
people with
clean energy
48%
female
beneficiaries
served
As of December 2016
OUR IMPACT TODAY
6
OUR CUSTOMERS
off-grid households poor-grid households micro-enterprises
energy-poor households and micro-enterprises in rural India
rural households with no
connection to the national
electricity grid.
aspirational, investing in a
brighter future for their
children
rural households getting less
than 12 hours per day from
unreliable grid
needing reliable back-up for
lighting and cooling to survive
the blistering summer heat
small shops such as tea stalls,
village shops, and restaurants
located in areas where staying
open later will generate new
income every day
Existing
Solutions
• Kerosene & candles: dirty and expensive.
• Small solar lanterns: cheap, but inadequate and poor quality.
• Local Solar Products on cash: too expensive, too risky.
• Bank financed SHS: advertised, but not readily available. Also too risky.
7
SMART PANEL (INTERNET OF THINGS) SOLUTION
8
SIMPA : PRODUCT RANGE
 Solar Home Systems  Charging Systems  TV Entertainment System
 Plug n Play Systems  Power House Systems
Solar as a service
9
SIMPA : IOT SOLUTION
Requirement of Solar energy meter system
• Tracking of power usage, payment, alerts and activations
• Pay-as-you-Go
• True Solar-As-A-Service
• Tamper protection
• Control moved closer to source
• Bluetooth Connectivity for Recharge, Balance and Monitoring
• Consumption based metering
• Energy Credit monitoring
10
SIMPA : IOT SOLUTION
Features of IoT Solution
• GSM/GPRS module with an M2M embedded SIM to transmit the required information
to the host server
• MCU+BLE chip for all calculation and processing,
• Flash memory to store information for backup
• Temperature sensor to monitor the ambient temperature
• Circuitry to sense the input voltage, input current or reverse voltage
• The device to be powered from the SPV input power
11
WHAT IS IOT?
• The Internet of Things (IoT) refers to the
ever-growing network of physical objects
that feature an IP address, and the
communication that occurs between these
objects and other Internet-enabled devices
and systems.
12
Connectivity Data AnalyticsThings
WHATIS IOT?
13
IOT SOLUTIONS
Mobility
Drinking water
Waste water
Pollution
Fire safety
Medical emergency
Public Order
Cities
Flooding
Waste treatment
Energy
Grid
Gas distribution
Solar & wind energy
Fuel distribution
Power plant
Nuclear waster
Oil & gas production
Coal Mines
Toll roads
Monitor traffic
Air traffic control
Public transport
Traffic reports
Road network
Violations
Airports
Taxi
Healthcare
Patient
Mobile care
Surgical equipment
Monitoring
Implants
Tooling
Labs
Radiology
DiabetesSafety
Buildings
Water
Lifts and escalators
Fire safely, Pollution, drinking water, traffic
Light, water, air, power, lifts, sign posts
Solar, wind, power plants, oil & gas plants
Patients, labs, implants, monitoring,
Traffic, violations, air traffic, tolls, taxi
14
SMART PANEL SECURITY RISKS AND CHALLENGES
15
IOT SECURITY ISSUES
• August 2014, a sweep of more than 32,000 devices found “at least 2000 devices
with hard-coded Telnet logins.
• IoT devices may also act as wireless access points (WAPs).
• There has been a rise in IoT devices being hacked and added to botnets to
order to carry out malicious attacks
• IoT devices are typically tiny and lack physical security or are locked to factory
default passwords
• These small internet connected devices often have low computing power,
making them too weak to support advanced encryption
16
IOT SECURITY CONSIDERATIONS
• Device Considerations
– Are communications encrypted?
– Is storage encrypted?
– How is logging performed? Is there logging and alerting?
– Is there an updating mechanism?
– Are there default passwords?
– What are the offline security features?
– Digitally signed and encrypted firmware is a necessity
• Gateway considerations
– Is there replay and denial of service defensive capabilities?
– Is there local storage? Is it encrypted?
– Is there anomaly detection capability?
17
IOT SECURITY CONSIDERATIONS
• Cloud considerations
– Is there a secure web interface?
– Is there security event reporting?
– How are 3rd party components tracked and updated?
– Is there an audit capability?
– Is there complex, multifactor authentication allowed?
• Mobile considerations
– What countermeasures are in place for theft or loss of device?
– Does the mobile authentication degrade other component security?
– Is local storage done securely?
– Is there an audit trail of mobile interactions?
– Can mobile be used to enhance authentication for other components?
18
Category IoT Security Consideration Recommendations
I1: Insecure Web Interface •Ensure that any web interface coding is written
to prevent the use of weak passwords
When building a web interface consider
implementing lessons learned from web
application security.
I2: Insufficient Authentication
/ Authorization
•Ensure that applications are written to require
strong passwords where authentication is needed
Refer to the OWASP Authentication Cheat Sheet
I3: Insecure Network Services •Ensure applications that use network services
don't respond poorly to buffer overflow, fuzzing
Try to utilize tested, proven, networking stacks
and interfaces that handle exceptions gracefully.
I4: Lack of Transport
Encryption
•Ensure all applications are written to make use of
encrypted communication between devices
Utilize encrypted protocols wherever possible to
protect all data in transit
I5: Privacy Concerns •Ensure only the minimal amount of personal
information is collected from consumers
Data can present unintended privacy concerns
when aggregated
I6: Insecure Cloud Interface •Ensure all cloud interfaces are reviewed for
security vulnerabilities, e.g. API interfaces and
cloud-based web interfaces
Cloud security presents unique security
considerations, as well as countermeasures.
I7: Insecure Mobile Interface •Ensure that any mobile application coding is
written to disallows weak passwords …
Mobile interfaces to IoT ecosystems require
targeted security. Consult the OWASP Mobile
I8: Insufficient Security
Configurability
•Ensure applications are written to include
password security options or enabling two-factor
authentication
Security can be a value proposition. Design
should take into consideration a sliding scale of
security requirements
I9: Insecure
Software/Firmware
•Ensure all applications are written to include
update capability and can be updated quickly …
Many IoT deployments are either brownfield
and/or have an extremely long deployment
cycle...
I10: Poor Physical Security •Ensure applications are written to utilize a
minimal number of physical external on the
device
Plan on having IoT edge devices fall into
malicious hands.
OWASPIOT TOP 10
19
IOT BASED DATA - ANALYTICS
20
SIMPA HAPPY CUSTOMERS
http://www.simpanetworks.com
21
Thank You

More Related Content

What's hot

smart meter technical seminar report
smart meter technical seminar reportsmart meter technical seminar report
smart meter technical seminar reportravi kant
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
 
Gsm based transformer fault detection system
Gsm based transformer fault detection systemGsm based transformer fault detection system
Gsm based transformer fault detection systemKabilesh K
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoTAshutosh Kumar
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart CityDr. Mazlan Abbas
 
Internet of things for Healthcare
Internet of things for HealthcareInternet of things for Healthcare
Internet of things for HealthcareSmartify Health
 
SMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONSMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONEklavya Sharma
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER pptAyush Jain
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technologySmarak Suman
 
IoT Based Smart Energy Meter
IoT Based Smart Energy MeterIoT Based Smart Energy Meter
IoT Based Smart Energy Meterijtsrd
 
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-systemNIT MEGHALAYA
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics123seminarsonly
 
Wireless Electronic Notice Board
Wireless Electronic Notice BoardWireless Electronic Notice Board
Wireless Electronic Notice BoardSajan CK
 
An approach to smart energy meter
An approach to smart energy meterAn approach to smart energy meter
An approach to smart energy meterChinmayaSrichandan1
 

What's hot (20)

smart meter technical seminar report
smart meter technical seminar reportsmart meter technical seminar report
smart meter technical seminar report
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
Gsm based transformer fault detection system
Gsm based transformer fault detection systemGsm based transformer fault detection system
Gsm based transformer fault detection system
 
Concepts of smart meter
Concepts of smart meterConcepts of smart meter
Concepts of smart meter
 
Home Automation Using IoT
Home Automation Using IoTHome Automation Using IoT
Home Automation Using IoT
 
Introduction to IOT & Smart City
Introduction to IOT & Smart CityIntroduction to IOT & Smart City
Introduction to IOT & Smart City
 
Internet of things for Healthcare
Internet of things for HealthcareInternet of things for Healthcare
Internet of things for Healthcare
 
SMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATIONSMART HOME AUTOMATION USING MOBILE APPLICATION
SMART HOME AUTOMATION USING MOBILE APPLICATION
 
PIR based security system
PIR based security systemPIR based security system
PIR based security system
 
SMART METER ppt
SMART METER pptSMART METER ppt
SMART METER ppt
 
Smart grid technology
Smart grid technologySmart grid technology
Smart grid technology
 
Smart meter
Smart meterSmart meter
Smart meter
 
IoT Based Smart Energy Meter
IoT Based Smart Energy MeterIoT Based Smart Energy Meter
IoT Based Smart Energy Meter
 
Smartgrid
SmartgridSmartgrid
Smartgrid
 
Smart metering-system
Smart metering-systemSmart metering-system
Smart metering-system
 
Smart irrigation system
Smart irrigation systemSmart irrigation system
Smart irrigation system
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Wireless Electronic Notice Board
Wireless Electronic Notice BoardWireless Electronic Notice Board
Wireless Electronic Notice Board
 
An approach to smart energy meter
An approach to smart energy meterAn approach to smart energy meter
An approach to smart energy meter
 
micro fuel cell
micro fuel cellmicro fuel cell
micro fuel cell
 

Similar to Internet of Things (IoT) based Solar Energy System security considerations

Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT PatternsWSO2
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeAndrew Blades
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns John Mathon
 
IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30Krishna Kumar G
 
When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.Guy Bieber
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9Guy Bieber
 
API Adoption Patterns in Banking & The Promise of Microservices
API Adoption Patterns in Banking & The Promise of MicroservicesAPI Adoption Patterns in Banking & The Promise of Microservices
API Adoption Patterns in Banking & The Promise of MicroservicesAkana
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdinEric Jorgensen
 
Q IoT 公私雲- stacy
Q IoT 公私雲- stacyQ IoT 公私雲- stacy
Q IoT 公私雲- stacyStacy Cheng
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)Abhishek kr. Singh
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
The Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'ReillyThe Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'Reillyscoopnewsgroup
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter Sailaja Tennati
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at ScaleWinston Morton
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 

Similar to Internet of Things (IoT) based Solar Energy System security considerations (20)

Successful Industrial IoT Patterns
Successful Industrial IoT PatternsSuccessful Industrial IoT Patterns
Successful Industrial IoT Patterns
 
WSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in FinanceWSO2Con EU 2015: IoT in Finance
WSO2Con EU 2015: IoT in Finance
 
Unveiling the Sydney IoT Landscape
Unveiling the Sydney IoT LandscapeUnveiling the Sydney IoT Landscape
Unveiling the Sydney IoT Landscape
 
Successful Industrial IoT patterns
Successful Industrial IoT patterns Successful Industrial IoT patterns
Successful Industrial IoT patterns
 
IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30IOT in the Indian Context CeBIT India 2015 Oct 30
IOT in the Indian Context CeBIT India 2015 Oct 30
 
When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.When Computers are Everywhere, Will we have superpowers.
When Computers are Everywhere, Will we have superpowers.
 
2016 iot summit_guy_bieber9
2016 iot summit_guy_bieber92016 iot summit_guy_bieber9
2016 iot summit_guy_bieber9
 
API Adoption Patterns in Banking & The Promise of Microservices
API Adoption Patterns in Banking & The Promise of MicroservicesAPI Adoption Patterns in Banking & The Promise of Microservices
API Adoption Patterns in Banking & The Promise of Microservices
 
802.11ac & byod linkdin
802.11ac & byod linkdin802.11ac & byod linkdin
802.11ac & byod linkdin
 
802.11ac Byod Linkdin
802.11ac Byod Linkdin802.11ac Byod Linkdin
802.11ac Byod Linkdin
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Q IoT 公私雲- stacy
Q IoT 公私雲- stacyQ IoT 公私雲- stacy
Q IoT 公私雲- stacy
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
 
Emerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar PrustyEmerging Trends in Cybersecurity by Amar Prusty
Emerging Trends in Cybersecurity by Amar Prusty
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
The Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'ReillyThe Data Center of the Future: The New IP - Phil O'Reilly
The Data Center of the Future: The New IP - Phil O'Reilly
 
Iot presentation1
Iot presentation1Iot presentation1
Iot presentation1
 
Spirent: The Internet of Things: The Expanded Security Perimeter
Spirent: The Internet of Things:  The Expanded Security Perimeter Spirent: The Internet of Things:  The Expanded Security Perimeter
Spirent: The Internet of Things: The Expanded Security Perimeter
 
Iot Security and Privacy at Scale
Iot Security and Privacy at ScaleIot Security and Privacy at Scale
Iot Security and Privacy at Scale
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 

More from Bohitesh Misra, PMP

Innovation in enterpreneurship_2021
Innovation in enterpreneurship_2021Innovation in enterpreneurship_2021
Innovation in enterpreneurship_2021Bohitesh Misra, PMP
 
Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Bohitesh Misra, PMP
 
Building castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBuilding castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBohitesh Misra, PMP
 
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsDisruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsBohitesh Misra, PMP
 
Disruptive technologies - Session 3 - Green it_Smartdust
Disruptive technologies - Session 3 - Green it_SmartdustDisruptive technologies - Session 3 - Green it_Smartdust
Disruptive technologies - Session 3 - Green it_SmartdustBohitesh Misra, PMP
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsBohitesh Misra, PMP
 
Disruptive technologies - Session 1 - introduction
Disruptive technologies - Session 1 - introductionDisruptive technologies - Session 1 - introduction
Disruptive technologies - Session 1 - introductionBohitesh Misra, PMP
 
Business analytics why now_what next
Business analytics why now_what nextBusiness analytics why now_what next
Business analytics why now_what nextBohitesh Misra, PMP
 

More from Bohitesh Misra, PMP (10)

Innovation in enterpreneurship_2021
Innovation in enterpreneurship_2021Innovation in enterpreneurship_2021
Innovation in enterpreneurship_2021
 
Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021Use of data science for startups_Sept 2021
Use of data science for startups_Sept 2021
 
Building castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environmentBuilding castles on sand - Project Management in distributed project environment
Building castles on sand - Project Management in distributed project environment
 
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsDisruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
 
Disruptive technologies - Session 3 - Green it_Smartdust
Disruptive technologies - Session 3 - Green it_SmartdustDisruptive technologies - Session 3 - Green it_Smartdust
Disruptive technologies - Session 3 - Green it_Smartdust
 
Disruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contractsDisruptive technologies - Session 2 - Blockchain smart_contracts
Disruptive technologies - Session 2 - Blockchain smart_contracts
 
Disruptive technologies - Session 1 - introduction
Disruptive technologies - Session 1 - introductionDisruptive technologies - Session 1 - introduction
Disruptive technologies - Session 1 - introduction
 
What is data science ?
What is data science ?What is data science ?
What is data science ?
 
Big data and analytics
Big data and analyticsBig data and analytics
Big data and analytics
 
Business analytics why now_what next
Business analytics why now_what nextBusiness analytics why now_what next
Business analytics why now_what next
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 

Internet of Things (IoT) based Solar Energy System security considerations

  • 1. 1 SMARTSOLARPANEL - SECURITYAND CHALLENGES SIMPA ENERGY INDIA SIMPANETWORKS,INC. Simpa sells solar power systems on financing to households and shops in rural India. Bohitesh Misra Vice President – IT & BI Simpa Networks, Inc. Email: bohitesh.misra@gmail.com
  • 2. 2 100million households with no connection to the electricity grid or inadequate supply 500million people relying on kerosene as primary source of lighting multi-billion dollar opportunity for solar-as-a-service in rural India THE PROBLEM AND OPPORTUNITY OUR AIM SIMPA WILLCREATE10MILLIONSOLARROOFTOPSIN 10YEARS
  • 3. 3 SIMPA EVOLUTION Registered in United States in 2011 Inception Started operations in Karnataka in 2011. Moved to Uttar Pradesh in 2013 Operation Reached 29,500 customers by February 2017 Scale up 01 THE COMPANY Startup, growth stage. award- winning with experienced leadership team. energy poverty 02 THE PROBLEM 03 OUR SOLUTION solar-as-a-service for the energy-poor
  • 4. 4 AWARDS & RECOGNITION ‘Make in India’ Award • July, 2016 • The India Today ‘Make in India’ Award in the Renewable Energy category Millennium Alliance Award • April, 2016 • Award sponsored by FICCI for clean energy sector. Parivartan Award • October 2015 • Sustainability Leadership Awards 2015 in Delhi Climate Solver Award, WWF • September 2015 • Energy Access category- recognized in the Distributed Renewable Energy category May 2015: OPIC Impact Award in the renewable energy category which recognized exceptional achievement in international private-sector development. November 2014: Off-Grid Energy Challenge Award as part of The Climate Group’s access to rural energy project in India, Bijli – Clean Energy for All.
  • 5. 5 5, 890,151 clean energy days bought 1.003 GWh of clean energy generated 3,500 solar entrepreneurs empowered 1471 tons of CO2 emissions saved 1500 rural jobs created 139,297 people with clean energy 48% female beneficiaries served As of December 2016 OUR IMPACT TODAY
  • 6. 6 OUR CUSTOMERS off-grid households poor-grid households micro-enterprises energy-poor households and micro-enterprises in rural India rural households with no connection to the national electricity grid. aspirational, investing in a brighter future for their children rural households getting less than 12 hours per day from unreliable grid needing reliable back-up for lighting and cooling to survive the blistering summer heat small shops such as tea stalls, village shops, and restaurants located in areas where staying open later will generate new income every day Existing Solutions • Kerosene & candles: dirty and expensive. • Small solar lanterns: cheap, but inadequate and poor quality. • Local Solar Products on cash: too expensive, too risky. • Bank financed SHS: advertised, but not readily available. Also too risky.
  • 7. 7 SMART PANEL (INTERNET OF THINGS) SOLUTION
  • 8. 8 SIMPA : PRODUCT RANGE  Solar Home Systems  Charging Systems  TV Entertainment System  Plug n Play Systems  Power House Systems Solar as a service
  • 9. 9 SIMPA : IOT SOLUTION Requirement of Solar energy meter system • Tracking of power usage, payment, alerts and activations • Pay-as-you-Go • True Solar-As-A-Service • Tamper protection • Control moved closer to source • Bluetooth Connectivity for Recharge, Balance and Monitoring • Consumption based metering • Energy Credit monitoring
  • 10. 10 SIMPA : IOT SOLUTION Features of IoT Solution • GSM/GPRS module with an M2M embedded SIM to transmit the required information to the host server • MCU+BLE chip for all calculation and processing, • Flash memory to store information for backup • Temperature sensor to monitor the ambient temperature • Circuitry to sense the input voltage, input current or reverse voltage • The device to be powered from the SPV input power
  • 11. 11 WHAT IS IOT? • The Internet of Things (IoT) refers to the ever-growing network of physical objects that feature an IP address, and the communication that occurs between these objects and other Internet-enabled devices and systems.
  • 13. 13 IOT SOLUTIONS Mobility Drinking water Waste water Pollution Fire safety Medical emergency Public Order Cities Flooding Waste treatment Energy Grid Gas distribution Solar & wind energy Fuel distribution Power plant Nuclear waster Oil & gas production Coal Mines Toll roads Monitor traffic Air traffic control Public transport Traffic reports Road network Violations Airports Taxi Healthcare Patient Mobile care Surgical equipment Monitoring Implants Tooling Labs Radiology DiabetesSafety Buildings Water Lifts and escalators Fire safely, Pollution, drinking water, traffic Light, water, air, power, lifts, sign posts Solar, wind, power plants, oil & gas plants Patients, labs, implants, monitoring, Traffic, violations, air traffic, tolls, taxi
  • 14. 14 SMART PANEL SECURITY RISKS AND CHALLENGES
  • 15. 15 IOT SECURITY ISSUES • August 2014, a sweep of more than 32,000 devices found “at least 2000 devices with hard-coded Telnet logins. • IoT devices may also act as wireless access points (WAPs). • There has been a rise in IoT devices being hacked and added to botnets to order to carry out malicious attacks • IoT devices are typically tiny and lack physical security or are locked to factory default passwords • These small internet connected devices often have low computing power, making them too weak to support advanced encryption
  • 16. 16 IOT SECURITY CONSIDERATIONS • Device Considerations – Are communications encrypted? – Is storage encrypted? – How is logging performed? Is there logging and alerting? – Is there an updating mechanism? – Are there default passwords? – What are the offline security features? – Digitally signed and encrypted firmware is a necessity • Gateway considerations – Is there replay and denial of service defensive capabilities? – Is there local storage? Is it encrypted? – Is there anomaly detection capability?
  • 17. 17 IOT SECURITY CONSIDERATIONS • Cloud considerations – Is there a secure web interface? – Is there security event reporting? – How are 3rd party components tracked and updated? – Is there an audit capability? – Is there complex, multifactor authentication allowed? • Mobile considerations – What countermeasures are in place for theft or loss of device? – Does the mobile authentication degrade other component security? – Is local storage done securely? – Is there an audit trail of mobile interactions? – Can mobile be used to enhance authentication for other components?
  • 18. 18 Category IoT Security Consideration Recommendations I1: Insecure Web Interface •Ensure that any web interface coding is written to prevent the use of weak passwords When building a web interface consider implementing lessons learned from web application security. I2: Insufficient Authentication / Authorization •Ensure that applications are written to require strong passwords where authentication is needed Refer to the OWASP Authentication Cheat Sheet I3: Insecure Network Services •Ensure applications that use network services don't respond poorly to buffer overflow, fuzzing Try to utilize tested, proven, networking stacks and interfaces that handle exceptions gracefully. I4: Lack of Transport Encryption •Ensure all applications are written to make use of encrypted communication between devices Utilize encrypted protocols wherever possible to protect all data in transit I5: Privacy Concerns •Ensure only the minimal amount of personal information is collected from consumers Data can present unintended privacy concerns when aggregated I6: Insecure Cloud Interface •Ensure all cloud interfaces are reviewed for security vulnerabilities, e.g. API interfaces and cloud-based web interfaces Cloud security presents unique security considerations, as well as countermeasures. I7: Insecure Mobile Interface •Ensure that any mobile application coding is written to disallows weak passwords … Mobile interfaces to IoT ecosystems require targeted security. Consult the OWASP Mobile I8: Insufficient Security Configurability •Ensure applications are written to include password security options or enabling two-factor authentication Security can be a value proposition. Design should take into consideration a sliding scale of security requirements I9: Insecure Software/Firmware •Ensure all applications are written to include update capability and can be updated quickly … Many IoT deployments are either brownfield and/or have an extremely long deployment cycle... I10: Poor Physical Security •Ensure applications are written to utilize a minimal number of physical external on the device Plan on having IoT edge devices fall into malicious hands. OWASPIOT TOP 10
  • 19. 19 IOT BASED DATA - ANALYTICS