SlideShare uma empresa Scribd logo
1 de 26
Microcontrollers with Cybernetic
Security for IoT
Market Perspectives and Technology
Overview
Cleber Gomes, PhD
Brazilian National Counsel of Technological and Scientific Development Scholar @
National Metrology, Quality and Technology Institute
December 2014
Our Goal
• To develop low-cost cybernetic security
solutions for microcontrollers used in IoT
devices
• Solutions must be flexible and demand low
power, small silicon footprint
Market Perspective
• Number of IoT devices in 2012, including hub
devices like computers and smartphones,
approximately 8,7 Billion
• 1/3 are non-hub devices that use low cost, low
power microcontrollers
• That is, number of active low cost IoT devices,
consumer, industrial, medical, military, at end
of 2012 approximately 2,5 Billion
Market Perspective
• 2,5 Billion represents around 1% of objects
with potential to become connected to IoT
• That is, potential number of active IoT devices,
which use low cost microcontrollers, is 250
Billion
• Source:
http://www.forbes.com/sites/quora/2013/01/07/how-many-
things-are-currently-connected-to-the-internet-of-things-iot/
Market Perspective
• Number of active IoT devices at end of 2014
approximately 16 Billion
• Of which 44% are hub devices
• Sources:
http://www.forbes.com/sites/gilpress/2014/08/22/internet-
of-things-by-the-numbers-market-estimates-and-forecasts/
• https://www.abiresearch.com/press/the-internet-of-things-
will-drive-wireless-connect
Market Perspective
• Estimated number of IoT devices at end of
2020 approximately 40 Billion
• Of which 68% are non-hub
• That is, number of active low cost IoT devices,
at end of 2020 approximately 27 Billion
• Source: https://www.abiresearch.com/press/the-internet-of-
things-will-drive-wireless-connect
Market Perspective
Year
Number of low cost
microcontrollers in
IoT (Billion)
2012 2,5
2014 9
2020 27
2050(?) 250
Market Perspective
• For market penetration of 1% we have an
estimated number of sold microcontrollers
with cybernetic security for IoT applications at
end of 2020 of 270 Million
Market Perspective
Year
Estimated number of
sold microcontrollers
with low-cost
cybernetic security
for IoT (Million),
market penetration
of 1%
2012 25
2014 90
2020 270
2050(?) 2500
Market Perspective
• Another way to estimate the market potential
of microcontrollers used in devices for IoT, is
to take the evolution of Internet itself, shown
in next slide
• Source: http://www.internetworldstats.com/emarketing.htm
Market Perspective
Date INTERNET USERS (Millions) %World population Source
Dec, 1995 16 0.4 %IDC
Dec, 1997 70 1.7 %IDC
Dec, 1999 248 4.1 %Nua Ltd.
Aug, 2001 513 8.6 %Nua Ltd.
Dec, 2003 719 11.1 %Internet World Stats
Dec, 2005 1018 15.7 %Internet World Stats
Dec, 2007 1319 20.0 %Internet World Stats
Dec, 2009 1802 26.6 %Internet World Stats
Dec, 2011 2267 32.7 %Internet World Stats
Dec, 2013 2802 39.0 %Internet World Stats
Market Perspective
• If we apply a similar growth rate to the IoT
market, we find an estimated number of sold
microcontrollers with cybernetic security for
IoT applications, at end of 2020, of 400
Million, for market penetration of 1%
Market Perspective
Year
Estimated number of sold
microcontrollers with low-
cost cybernetic security for
IoT (Million), market
penetration of 1%
2012 25
2014 90
2016 207
2018 331
2020 400
2022 477
2024 572
2026 687
2028 824
2030 1000
Market Perspective
• We can achieve 1% microcontroller market
penetration through:
• Developing innovative solutions for low-cost,
small footprint cybernetic security, ideal for
IoT applications
• Pursuing international patents
• Building strategic partnerships
Market Perspective
• We seek to build strategic partnerships with:
• IP vendors
• Microcontroller manufacturers
• OEM manufacturers
Technology Overview
• Excluding higher cost “hub” devices, like
smartphones, tablets and computers, the list
of potential IoT applications for low-cost
cybernetic security enabled microcontrollers is
extense:
Technology Overview
o Smartmeters for:
• Electricity
• Pollution
• Gas
o Smartsensors for:
• Geographic Monitoring:
 Military
 Security perimeter
• Health Monitoring:
 Wearable
 Implanted (for instance smart pacemakers)
 Ingestible
Technology Overview
o Smartsensors for:
• Environmental Monitoring:
 Pollution
 Water Quality
 Water Flow and Level
 Fires
 Sismical Monitoring
 Natural Disaster Prevention
 Wildlife Monitoring
 Deforestation Monitoring
Technology Overview
o Smartsensors for:
• Industrial Monitoring:
 Machinery Maintenance
 Logging
 Disposal Analysis
 Structural Monitoring
 Safety Equipment Monitoring
Technology Overview
o Smartsensors for:
• Behavior/Position Monitoring of children and elderly
• Presence/Movement Monitoring for Smart Home
Technology Overview
o Smart appliances:
• Smart Power Outlets
• Smart Tags for Position Tracking of objects
• Smart Light Bulbs
• City Management:
 Smart trash cans
 Parking space monitoring
 Pollution and water sewage alerts
 Power line monitoring
Technology Overview
• In the near future cybernetic security will be a
must for devices used in IoT
• There will be great demand for low-cost, low-
power, low-performance-overhead cybernetic
security solutions
• The most cost effective way to achieve these
solutions is to build them at the ground level,
embedded in the microcontroller
Technology Overview
• Low-cost solutions for the following key
cybernetic security technologies will be needed:
 Separation of data between zones of different trust
levels and access privileges
 Detection and logging of security events
 Digital signature of data and software for authenticity
and integrity verification
 Tamper resilient device identification
 Secure storage
 Encapsulation tampering detection
 Light Weight Cryptography
Technology Overview
• To date, we have succeded to demonstrate a
highly flexible, low-cost solution for the two
first key technologies:
 Separation of data between zones of different
trust levels and access privileges
 Detection of security events
Technology Overview
• Our solution for data separation, control of
access privileges and security policy definition
constitutes a low-cost, more flexible,
alternative to ARM`s TrustZone
Technology Overview
• Our solution provides an effective defense
against Buffer Overflow and Denial of Service
attacks, besides allowing static, dynamic and
temporal definition of access rights to data

Mais conteúdo relacionado

Mais procurados

Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesM2M Alliance e.V.
 
Internet of things
Internet of thingsInternet of things
Internet of thingsAli Nezhad
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)MachinePulse
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of ThingsON Semiconductor
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)Midhul N
 
Applications of IOT (internet of things)
Applications of IOT (internet of things)Applications of IOT (internet of things)
Applications of IOT (internet of things)Vinesh Gowda
 
Smart home over IoT
Smart home over IoTSmart home over IoT
Smart home over IoTm_tamjeed
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Ahmed Mahmoud
 
Cisco Internet of Things
Cisco Internet of ThingsCisco Internet of Things
Cisco Internet of ThingsPanduit
 
Iot presentation
Iot presentationIot presentation
Iot presentationJ A Bhavsar
 
Bundling services to Smart Home Internet of Things
Bundling services to Smart Home Internet of ThingsBundling services to Smart Home Internet of Things
Bundling services to Smart Home Internet of ThingsAmalist Client Services
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Internet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliInternet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliiTrain
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilitySenseware
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions Cigniti Technologies Ltd
 
IoT Application Development Trends to Watch Out in 2021
IoT Application Development Trends to Watch Out in 2021IoT Application Development Trends to Watch Out in 2021
IoT Application Development Trends to Watch Out in 2021Elena Mia
 

Mais procurados (20)

Effective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sourcesEffective IIoT Implementation combining different data sources
Effective IIoT Implementation combining different data sources
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
 
The Industrial Internet of Things
The Industrial Internet of ThingsThe Industrial Internet of Things
The Industrial Internet of Things
 
Iot
IotIot
Iot
 
Internet of Things (IOT)
Internet of Things (IOT)Internet of Things (IOT)
Internet of Things (IOT)
 
Applications of IOT (internet of things)
Applications of IOT (internet of things)Applications of IOT (internet of things)
Applications of IOT (internet of things)
 
Smart home over IoT
Smart home over IoTSmart home over IoT
Smart home over IoT
 
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
Talk on Industrial Internet of Things @ Intelligent systems tech forum 2014
 
Cisco Internet of Things
Cisco Internet of ThingsCisco Internet of Things
Cisco Internet of Things
 
Iot presentation
Iot presentationIot presentation
Iot presentation
 
Bundling services to Smart Home Internet of Things
Bundling services to Smart Home Internet of ThingsBundling services to Smart Home Internet of Things
Bundling services to Smart Home Internet of Things
 
IoT Tsunami is Here
IoT Tsunami is HereIoT Tsunami is Here
IoT Tsunami is Here
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Internet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin RamliInternet of Things by Ir Dr Nordin Ramli
Internet of Things by Ir Dr Nordin Ramli
 
The Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your FacilityThe Internet of Things is Here: Implementing IoT in Your Facility
The Internet of Things is Here: Implementing IoT in Your Facility
 
IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions IoT Testing is the Backbone of Your Smart Home Solutions
IoT Testing is the Backbone of Your Smart Home Solutions
 
Iot for food business
Iot for food businessIot for food business
Iot for food business
 
5G IoT Use Cases
5G IoT Use Cases5G IoT Use Cases
5G IoT Use Cases
 
IoT Application Development Trends to Watch Out in 2021
IoT Application Development Trends to Watch Out in 2021IoT Application Development Trends to Watch Out in 2021
IoT Application Development Trends to Watch Out in 2021
 

Destaque

IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
Back-End application for Distributed systems
Back-End application for Distributed systemsBack-End application for Distributed systems
Back-End application for Distributed systemsAtif Imam
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Market Research Reports, Inc.
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systemssandra sukarieh
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsPayamBarnaghi
 
7 distributed and real systems
7 distributed and real systems7 distributed and real systems
7 distributed and real systemsmyrajendra
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DevicePriyanka Aash
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit INANDINI SHARMA
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsAman Srivastava
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Bernard Moon
 

Destaque (20)

IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
Back-End application for Distributed systems
Back-End application for Distributed systemsBack-End application for Distributed systems
Back-End application for Distributed systems
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
 
Opportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data AnalyticsOpportunities and Challenges of Large-scale IoT Data Analytics
Opportunities and Challenges of Large-scale IoT Data Analytics
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
CS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMSCS6601 DISTRIBUTED SYSTEMS
CS6601 DISTRIBUTED SYSTEMS
 
7 distributed and real systems
7 distributed and real systems7 distributed and real systems
7 distributed and real systems
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Distributed system notes unit I
Distributed system notes unit IDistributed system notes unit I
Distributed system notes unit I
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Distributed System
Distributed System Distributed System
Distributed System
 
Distributed Systems Real Life Applications
Distributed Systems Real Life ApplicationsDistributed Systems Real Life Applications
Distributed Systems Real Life Applications
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Distributed Systems
Distributed SystemsDistributed Systems
Distributed Systems
 
Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016Internet of Things & Hardware Industry Report 2016
Internet of Things & Hardware Industry Report 2016
 

Semelhante a IoT-market-estimative

IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019Ahmed Banafa
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) Ahmed Banafa
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019Ahmed Banafa
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxssuserc5ee4c
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxJanasudhan1
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptxSourajitMaity1
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)milemadinah
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018Ahmed Banafa
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIPerry Lea
 
IoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdfIoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdfWorldResourcesWebina
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationInnodisk Corporation
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptxOdedeleIfeoluwa
 
Why IoT Application Development Is In Demand.pptx
Why IoT Application Development Is In Demand.pptxWhy IoT Application Development Is In Demand.pptx
Why IoT Application Development Is In Demand.pptxCerebrum Infotech
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationAditya Basu
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017Ahmed Banafa
 

Semelhante a IoT-market-estimative (20)

IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
9 IoT predictions for 2019
9 IoT predictions for 20199 IoT predictions for 2019
9 IoT predictions for 2019
 
New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference ) New trends of IoT in 2018 and beyond (SJSU Conference )
New trends of IoT in 2018 and beyond (SJSU Conference )
 
Hot technologies of 2019
Hot technologies of 2019Hot technologies of 2019
Hot technologies of 2019
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
02_Internet-of-things-IOT-by-Davis-M-Onsakia_ISOC-IoT-SIG.pptx
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
8 trends of IoT in 2018
8 trends of IoT in 20188 trends of IoT in 2018
8 trends of IoT in 2018
 
IOT PPT.pptx
IOT PPT.pptxIOT PPT.pptx
IOT PPT.pptx
 
The Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROIThe Internet of Things - beyond the hype and towards ROI
The Internet of Things - beyond the hype and towards ROI
 
IoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdfIoT applications in rural and agriculture in pdf
IoT applications in rural and agriculture in pdf
 
Overcoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component IntegrationOvercoming the AIoT Obstacles through Smart Component Integration
Overcoming the AIoT Obstacles through Smart Component Integration
 
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final  [Auto-saved].pptxGroup 4 IT INfrastructure Group presentation Final  [Auto-saved].pptx
Group 4 IT INfrastructure Group presentation Final [Auto-saved].pptx
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Io t first(1)
Io t first(1)Io t first(1)
Io t first(1)
 
Why IoT Application Development Is In Demand.pptx
Why IoT Application Development Is In Demand.pptxWhy IoT Application Development Is In Demand.pptx
Why IoT Application Development Is In Demand.pptx
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
The Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT ImplementationThe Most Definitive guide to Industrial IoT Implementation
The Most Definitive guide to Industrial IoT Implementation
 
7 trends of IoT in 2017
7 trends of IoT in 20177 trends of IoT in 2017
7 trends of IoT in 2017
 

IoT-market-estimative

  • 1. Microcontrollers with Cybernetic Security for IoT Market Perspectives and Technology Overview Cleber Gomes, PhD Brazilian National Counsel of Technological and Scientific Development Scholar @ National Metrology, Quality and Technology Institute December 2014
  • 2. Our Goal • To develop low-cost cybernetic security solutions for microcontrollers used in IoT devices • Solutions must be flexible and demand low power, small silicon footprint
  • 3. Market Perspective • Number of IoT devices in 2012, including hub devices like computers and smartphones, approximately 8,7 Billion • 1/3 are non-hub devices that use low cost, low power microcontrollers • That is, number of active low cost IoT devices, consumer, industrial, medical, military, at end of 2012 approximately 2,5 Billion
  • 4. Market Perspective • 2,5 Billion represents around 1% of objects with potential to become connected to IoT • That is, potential number of active IoT devices, which use low cost microcontrollers, is 250 Billion • Source: http://www.forbes.com/sites/quora/2013/01/07/how-many- things-are-currently-connected-to-the-internet-of-things-iot/
  • 5. Market Perspective • Number of active IoT devices at end of 2014 approximately 16 Billion • Of which 44% are hub devices • Sources: http://www.forbes.com/sites/gilpress/2014/08/22/internet- of-things-by-the-numbers-market-estimates-and-forecasts/ • https://www.abiresearch.com/press/the-internet-of-things- will-drive-wireless-connect
  • 6. Market Perspective • Estimated number of IoT devices at end of 2020 approximately 40 Billion • Of which 68% are non-hub • That is, number of active low cost IoT devices, at end of 2020 approximately 27 Billion • Source: https://www.abiresearch.com/press/the-internet-of- things-will-drive-wireless-connect
  • 7. Market Perspective Year Number of low cost microcontrollers in IoT (Billion) 2012 2,5 2014 9 2020 27 2050(?) 250
  • 8. Market Perspective • For market penetration of 1% we have an estimated number of sold microcontrollers with cybernetic security for IoT applications at end of 2020 of 270 Million
  • 9. Market Perspective Year Estimated number of sold microcontrollers with low-cost cybernetic security for IoT (Million), market penetration of 1% 2012 25 2014 90 2020 270 2050(?) 2500
  • 10. Market Perspective • Another way to estimate the market potential of microcontrollers used in devices for IoT, is to take the evolution of Internet itself, shown in next slide • Source: http://www.internetworldstats.com/emarketing.htm
  • 11. Market Perspective Date INTERNET USERS (Millions) %World population Source Dec, 1995 16 0.4 %IDC Dec, 1997 70 1.7 %IDC Dec, 1999 248 4.1 %Nua Ltd. Aug, 2001 513 8.6 %Nua Ltd. Dec, 2003 719 11.1 %Internet World Stats Dec, 2005 1018 15.7 %Internet World Stats Dec, 2007 1319 20.0 %Internet World Stats Dec, 2009 1802 26.6 %Internet World Stats Dec, 2011 2267 32.7 %Internet World Stats Dec, 2013 2802 39.0 %Internet World Stats
  • 12. Market Perspective • If we apply a similar growth rate to the IoT market, we find an estimated number of sold microcontrollers with cybernetic security for IoT applications, at end of 2020, of 400 Million, for market penetration of 1%
  • 13. Market Perspective Year Estimated number of sold microcontrollers with low- cost cybernetic security for IoT (Million), market penetration of 1% 2012 25 2014 90 2016 207 2018 331 2020 400 2022 477 2024 572 2026 687 2028 824 2030 1000
  • 14. Market Perspective • We can achieve 1% microcontroller market penetration through: • Developing innovative solutions for low-cost, small footprint cybernetic security, ideal for IoT applications • Pursuing international patents • Building strategic partnerships
  • 15. Market Perspective • We seek to build strategic partnerships with: • IP vendors • Microcontroller manufacturers • OEM manufacturers
  • 16. Technology Overview • Excluding higher cost “hub” devices, like smartphones, tablets and computers, the list of potential IoT applications for low-cost cybernetic security enabled microcontrollers is extense:
  • 17. Technology Overview o Smartmeters for: • Electricity • Pollution • Gas o Smartsensors for: • Geographic Monitoring:  Military  Security perimeter • Health Monitoring:  Wearable  Implanted (for instance smart pacemakers)  Ingestible
  • 18. Technology Overview o Smartsensors for: • Environmental Monitoring:  Pollution  Water Quality  Water Flow and Level  Fires  Sismical Monitoring  Natural Disaster Prevention  Wildlife Monitoring  Deforestation Monitoring
  • 19. Technology Overview o Smartsensors for: • Industrial Monitoring:  Machinery Maintenance  Logging  Disposal Analysis  Structural Monitoring  Safety Equipment Monitoring
  • 20. Technology Overview o Smartsensors for: • Behavior/Position Monitoring of children and elderly • Presence/Movement Monitoring for Smart Home
  • 21. Technology Overview o Smart appliances: • Smart Power Outlets • Smart Tags for Position Tracking of objects • Smart Light Bulbs • City Management:  Smart trash cans  Parking space monitoring  Pollution and water sewage alerts  Power line monitoring
  • 22. Technology Overview • In the near future cybernetic security will be a must for devices used in IoT • There will be great demand for low-cost, low- power, low-performance-overhead cybernetic security solutions • The most cost effective way to achieve these solutions is to build them at the ground level, embedded in the microcontroller
  • 23. Technology Overview • Low-cost solutions for the following key cybernetic security technologies will be needed:  Separation of data between zones of different trust levels and access privileges  Detection and logging of security events  Digital signature of data and software for authenticity and integrity verification  Tamper resilient device identification  Secure storage  Encapsulation tampering detection  Light Weight Cryptography
  • 24. Technology Overview • To date, we have succeded to demonstrate a highly flexible, low-cost solution for the two first key technologies:  Separation of data between zones of different trust levels and access privileges  Detection of security events
  • 25. Technology Overview • Our solution for data separation, control of access privileges and security policy definition constitutes a low-cost, more flexible, alternative to ARM`s TrustZone
  • 26. Technology Overview • Our solution provides an effective defense against Buffer Overflow and Denial of Service attacks, besides allowing static, dynamic and temporal definition of access rights to data