SlideShare uma empresa Scribd logo
1 de 30
IOT = (Proprietary Networks != Internet) Of Things
T.Rob Wyatt
»WebSphere MQ security guy
»Security blogger
»Autistic blogger
»Enthusiastic fan of Internet of Things

Moved to IBM in order to improve the state of
middleware security and to help build the
instrumented, networked, interactive world of
pervasive, embedded computing.
1.   Subscribe to service
2.   Possibly configure gateway
3.   Configure device to network
4.   Possibly configure device to gateway
5.   Device talks to vendor cloud
6.   User Interface talks to cloud
Device                Gateway                Local data intercept?
WiThings scale        Wi-Fi Router           No
Fitbit                PC, Phone              No
Garmin, Omron         PC                     File
Schlage LiNK          Z-Wave Bridge          No
iFit                  Wi-Fi Router           No
Summer Baby Monitor   Proprietary            No
Ford Sync             Cell data modem        No
Ninja Blocks          Ethernet Router        No (Open HW/SW FTW!)
Ceiva photo frame     Wi-Fi router           No
LIFX LED Bulb         Wi-Fi / Mesh network   No
» Security is hard. Solve the problem with an
  encrypted tunnel from the device to the vendor.
» No need to authenticate data so long as the secure
  connection provides identity context.

In a world where vendors claim ownership of your data,
   this model is expected. It is the status quo. Who
   would even think of doing it any other way?

WE would, that's who.
 Our data is OUR data. That's why we call it that.
» Network goes down? The house blue screens?
» You want to push a device's feed to a 3rd party?
» You want H/A or offsite redundancy?
» You want a different data granularity or
  availability than the vendor gives you?
» Your vendor goes out of business and you have
  10,000 hours left on your $100 LED bulb?
»   User needs to configure each device type
»   Doesn’t scale
»   Devices don’t talk to one another
»   Functionality degrades or fails without
    connectivity
»   Vendor-first data capture
»   User options severely limited by vendors
»   Lot$ of $ub$cription$
»   Limited sense-and-respond, esp. across vendors
»   Devices self-configure
»   Devices talk locally first, to vendor is optional
»   Local functionality does not require Internet
»   Full if-this-then-that capability in home
»   Data owners are free to use their own data
»   Interoperability across different device types
    and/or different vendors
1.    Consumer enters device GUID into their dashboard.
2.    Power up the device in the vicinity of the router. Press the sync
      button on the device, then the WPS* button on the router.
3.    Device joins the network and acquires an IP address from DHCP.
4.    Device issues MQTT Connect on DHCP server port 1883
5.    Device subscribes to an admin topic that publishes on-boarding
      info.
6.    Device now publishes the manufacturer's MQTT feed URL to the
      dashboard.
7.    User dashboard now displays device-specific options to publish to
      the vendor, subscribe from the vendor, etc.
8.    User has options to publish topic feeds at any level to 3 rd parties.


(* Note: Requires some rework to make WPS secure or to replace it.)
After install of the new device, all data is exchanged
locally unless specifically provisioned by the user.
Optionally, the user can authorize various interactions with device vendor:
1.Publish device data to vendor.
2.Subscribe to vendor administrative alerts (recall notices, offers, etc.)
3.Allow vendor to send inbound control messages.
IT’S MY DATA!
If I want to give it to someone
             OTHER
than the device manufacturer,
          Why can’t I?
What’s the point if

»My device vendor controls all my device data

»My ability to correlate across devices depends
on my vendors communicating with one another
and writing code

»The protocols are all proprietary

»I can’t inject my own events into the
ecosystem

Optional interaction with 3rd party vendors:
1.User registers with 3rd party value-added service.
2.3rd party provides a URL for device notifications.
3.User subscribes external URL to topic using local dashboard,
4.3rd party now receives/sends data
and events from homeowner.
»   Community / Regional load control
»   Volunteer distributed sensor net for research
»   Aggregators/rules engines (Smart Things, IFTTT)
»   Special Interest communities
»   Activists (e.g. green-ness badges)
»   Notification providers (stocks, weather alerts)
»   Augmented reality
»   ___________________________ (You pick it)
»   WPS that actually works as intended
»   User dashboard
»   Local event capture, correlation and rules
»   Pub/Sub messaging architecture
»   Internet traversable protocols
»   Globally managed topic namespace
    (But can be prototyped with existing public servers.)
Questions? Comments? Rotten tomatoes?

T.Rob Wyatt
t.rob.wyatt@us.ibm.com
iot@t-rob.net
http://t-rob.net
http://linkedin.com/in/tdotrob
http://facebook.com/tdotrob
You really need these next slides but there was no
way to fit them in the 5 minutes I had to talk so I
cheated and sort of stuck them in the end where
you'll find them if you download this deck and
accidentally scroll past the Thank You! Page
because your finger twitched, your curiosity got
the better of you or perhaps you are one of those
people who sits through the movie credits thinking
there will be an Easter Egg scene at the very end
that makes it all worthwhile. There is.
» An open, royalty-free protocol invented in 1999.
» Optimized for constrained devices, unreliable
  networks and high bandwidth costs.
» Proposed to OASIS for standards acceptance.
» Implemented samples in dozens of languages.
» Scales to millions of connected devices.
» Backed by Eclipse Foundation Paho project.
» http://mqtt.org
» http://bit.ly/oasismqtttc
» Stephen Nicholas performed some power
  profiling on Android to measure battery drain.
» Mutually authenticated connections.
» Comet polling for HTTPS.
» MQTT wins by large margin.
» Effects multiplied when polling on more than
  one subscription.
» http://stephendnicholas.com/archives/1217
» Open-source (BSD licensed) MQTT broker
» Binaries for the usual Linuxes, but also iPhone,
  Open WRT, Raspberry PI, and others.
» I easily got it running on a Synology NAS drive.
» Free test broker
   ˃ Unencrypted @ test. mosquitto.org:1883
   ˃ Server-auth SSL @ test. mosquitto.org:8883
   ˃ Mutual-auth SSL @ test. mosquitto.org:8883

» http://mosquitto.org
»   Open Messaging for M2M and IoT
»   Focused on protocol standardization, tools.
»   C & Java clients delivered.
»   Clients developed under EPL 1.0
» http://projects.eclipse.org/projects/technology.paho
» Provide M2M development, simulation, testing,
  debugging and deployment tools.
» Initial focus on the Lua language
» Delivered development, modeling and
  simulator tools so far.
» http://projects.eclipse.org/projects/technology.koneki
» Embedded runtime exposing high-level Lua API
  that can be used to develop portable M2M
  applications easily.
» Project and samples on Eclipse git
» http://projects.eclipse.org/projects/technology.mihini
» Eclipse-based visual development and server
  platform for mobile apps.
» Build, test, deploy, and manage your
  smartphone and tablet apps for iOS, Android,
  Blackberry, and Windows Phone devices.

» http://ibm.co/dWworklight
» Gelernter, David, Mirror Worlds (Oxford University Press, 1991).
» Kelley, Kevin, Out of Control: The New Biology of Machines, Social
  Systems, & the Economic World (Addison, Wesley, 1994).
» Mitchell, William J., City of Bits (MIT Press, 1995).
» Dyson, George B., Darwin Among the Machines
  (Perseus Books, 1997).
» Dodsworth, Clark Jr., Contributing Editor, Digital Illusion:
  Entertaining the Future with High Technology (ACM Press, 1998).
» Holland, John H., Emergence: From Chaos to Order
  (Perseus Books 1998).
» Gershenfeld, Neil, When Things Start to Think
  (Harry Holt and Company, 1999).
20130226 How Personal Is Your Cloud?

Mais conteĂșdo relacionado

Destaque

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)T.Rob Wyatt
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...Kim Clark
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015matthew1001
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityT.Rob Wyatt
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM Systems UKI
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQStuart Feasey
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesMorag Hughson
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneMorag Hughson
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMarkTaylorIBM
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security OverviewMarkTaylorIBM
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...T.Rob Wyatt
 

Destaque (12)

What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)What I did on my summer vacation (in Hursley)
What I did on my summer vacation (in Hursley)
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...
 
Mq light, mq, and bluemix web sphere user group july 2015
Mq light, mq, and bluemix   web sphere user group july 2015Mq light, mq, and bluemix   web sphere user group july 2015
Mq light, mq, and bluemix web sphere user group july 2015
 
Build and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of MediocrityBuild and Operate Your Own Certificate Management Center of Mediocrity
Build and Operate Your Own Certificate Management Center of Mediocrity
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 
IBM MQ Channel Authentication
IBM MQ Channel AuthenticationIBM MQ Channel Authentication
IBM MQ Channel Authentication
 
DevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQDevOps & Continuous Test for IIB and IBM MQ
DevOps & Continuous Test for IIB and IBM MQ
 
WebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changesWebSphere MQ CHLAUTH - including V8 changes
WebSphere MQ CHLAUTH - including V8 changes
 
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have DoneWhere is My Message?: Use MQ Tools to Work Out What Applications Have Done
Where is My Message?: Use MQ Tools to Work Out What Applications Have Done
 
MQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 levelMQ What's New Beyond V8 - V8003 level
MQ What's New Beyond V8 - V8003 level
 
MQ Security Overview
MQ Security OverviewMQ Security Overview
MQ Security Overview
 
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
IBM MQ CONNAUTH/CHLAUTH Doesn't Work Like You Think it Does (and if you aren'...
 

Semelhante a 20130226 How Personal Is Your Cloud?

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatDuo Security
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerAbhinav Biswas
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7Rapid7
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)André Fucs de Miranda
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014Brian Knopf
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Tomoaki Sato
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Duo Security
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainValerie Lampkin
 
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...WithTheBest
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the DeviceDr. Ranbijay Kumar
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of thingsBernard Kufluk
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeekNightHyderabad
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerRick G. Garibay
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014Mirko Presser
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data CommonskingsBSD
 

Semelhante a 20130226 How Personal Is Your Cloud? (20)

The Internet of Things: We've Got to Chat
The Internet of Things: We've Got to ChatThe Internet of Things: We've Got to Chat
The Internet of Things: We've Got to Chat
 
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & DockerTouring the Dark Side of Internet: A Journey through IOT, TOR & Docker
Touring the Dark Side of Internet: A Journey through IOT, TOR & Docker
 
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
The Internet of Fails - Mark Stanislav, Senior Security Consultant, Rapid7
 
New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)New Botnets Trends and Threats (BH Europe 2007)
New Botnets Trends and Threats (BH Europe 2007)
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)Ethereum Devcon1 Report (summary writing)
Ethereum Devcon1 Report (summary writing)
 
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
Internet of Fails: Where IoT Has Gone Wrong and How We're Making it Right by ...
 
IoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and BlockchainIoT with the Best: Watson IoT Bluemix and Blockchain
IoT with the Best: Watson IoT Bluemix and Blockchain
 
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
IBM's Watson IoT Platform Allows You to Quickly Connect Devices to Bluemix Cl...
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
JAM805 - Beyond the Device
JAM805 -  Beyond the DeviceJAM805 -  Beyond the Device
JAM805 - Beyond the Device
 
Connecting devices to the internet of things
Connecting devices to the internet of thingsConnecting devices to the internet of things
Connecting devices to the internet of things
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
Geek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
 
From the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's PrimerFrom the Internet of Things to Intelligent Systems: A Developer's Primer
From the Internet of Things to Intelligent Systems: A Developer's Primer
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
Toward a Mobile Data Commons
Toward a Mobile Data CommonsToward a Mobile Data Commons
Toward a Mobile Data Commons
 

Último

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 

Último (20)

🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 

20130226 How Personal Is Your Cloud?

  • 1. IOT = (Proprietary Networks != Internet) Of Things
  • 2. T.Rob Wyatt »WebSphere MQ security guy »Security blogger »Autistic blogger »Enthusiastic fan of Internet of Things Moved to IBM in order to improve the state of middleware security and to help build the instrumented, networked, interactive world of pervasive, embedded computing.
  • 3.
  • 4. 1. Subscribe to service 2. Possibly configure gateway 3. Configure device to network 4. Possibly configure device to gateway 5. Device talks to vendor cloud 6. User Interface talks to cloud
  • 5. Device Gateway Local data intercept? WiThings scale Wi-Fi Router No Fitbit PC, Phone No Garmin, Omron PC File Schlage LiNK Z-Wave Bridge No iFit Wi-Fi Router No Summer Baby Monitor Proprietary No Ford Sync Cell data modem No Ninja Blocks Ethernet Router No (Open HW/SW FTW!) Ceiva photo frame Wi-Fi router No LIFX LED Bulb Wi-Fi / Mesh network No
  • 6. » Security is hard. Solve the problem with an encrypted tunnel from the device to the vendor. » No need to authenticate data so long as the secure connection provides identity context. In a world where vendors claim ownership of your data, this model is expected. It is the status quo. Who would even think of doing it any other way? WE would, that's who. Our data is OUR data. That's why we call it that.
  • 7. » Network goes down? The house blue screens? » You want to push a device's feed to a 3rd party? » You want H/A or offsite redundancy? » You want a different data granularity or availability than the vendor gives you? » Your vendor goes out of business and you have 10,000 hours left on your $100 LED bulb?
  • 8.
  • 9. » User needs to configure each device type » Doesn’t scale » Devices don’t talk to one another » Functionality degrades or fails without connectivity » Vendor-first data capture » User options severely limited by vendors » Lot$ of $ub$cription$ » Limited sense-and-respond, esp. across vendors
  • 10. » Devices self-configure » Devices talk locally first, to vendor is optional » Local functionality does not require Internet » Full if-this-then-that capability in home » Data owners are free to use their own data » Interoperability across different device types and/or different vendors
  • 11. 1. Consumer enters device GUID into their dashboard. 2. Power up the device in the vicinity of the router. Press the sync button on the device, then the WPS* button on the router. 3. Device joins the network and acquires an IP address from DHCP. 4. Device issues MQTT Connect on DHCP server port 1883 5. Device subscribes to an admin topic that publishes on-boarding info. 6. Device now publishes the manufacturer's MQTT feed URL to the dashboard. 7. User dashboard now displays device-specific options to publish to the vendor, subscribe from the vendor, etc. 8. User has options to publish topic feeds at any level to 3 rd parties. (* Note: Requires some rework to make WPS secure or to replace it.)
  • 12. After install of the new device, all data is exchanged locally unless specifically provisioned by the user.
  • 13. Optionally, the user can authorize various interactions with device vendor: 1.Publish device data to vendor. 2.Subscribe to vendor administrative alerts (recall notices, offers, etc.) 3.Allow vendor to send inbound control messages.
  • 14.
  • 15. IT’S MY DATA! If I want to give it to someone OTHER than the device manufacturer, Why can’t I?
  • 16. What’s the point if
 »My device vendor controls all my device data
 »My ability to correlate across devices depends on my vendors communicating with one another and writing code
 »The protocols are all proprietary
 »I can’t inject my own events into the ecosystem

  • 17. Optional interaction with 3rd party vendors: 1.User registers with 3rd party value-added service. 2.3rd party provides a URL for device notifications. 3.User subscribes external URL to topic using local dashboard, 4.3rd party now receives/sends data and events from homeowner.
  • 18. » Community / Regional load control » Volunteer distributed sensor net for research » Aggregators/rules engines (Smart Things, IFTTT) » Special Interest communities » Activists (e.g. green-ness badges) » Notification providers (stocks, weather alerts) » Augmented reality » ___________________________ (You pick it)
  • 19. » WPS that actually works as intended » User dashboard » Local event capture, correlation and rules » Pub/Sub messaging architecture » Internet traversable protocols » Globally managed topic namespace (But can be prototyped with existing public servers.)
  • 20. Questions? Comments? Rotten tomatoes? T.Rob Wyatt t.rob.wyatt@us.ibm.com iot@t-rob.net http://t-rob.net http://linkedin.com/in/tdotrob http://facebook.com/tdotrob
  • 21. You really need these next slides but there was no way to fit them in the 5 minutes I had to talk so I cheated and sort of stuck them in the end where you'll find them if you download this deck and accidentally scroll past the Thank You! Page because your finger twitched, your curiosity got the better of you or perhaps you are one of those people who sits through the movie credits thinking there will be an Easter Egg scene at the very end that makes it all worthwhile. There is.
  • 22. » An open, royalty-free protocol invented in 1999. » Optimized for constrained devices, unreliable networks and high bandwidth costs. » Proposed to OASIS for standards acceptance. » Implemented samples in dozens of languages. » Scales to millions of connected devices. » Backed by Eclipse Foundation Paho project. » http://mqtt.org » http://bit.ly/oasismqtttc
  • 23. » Stephen Nicholas performed some power profiling on Android to measure battery drain. » Mutually authenticated connections. » Comet polling for HTTPS. » MQTT wins by large margin. » Effects multiplied when polling on more than one subscription. » http://stephendnicholas.com/archives/1217
  • 24. » Open-source (BSD licensed) MQTT broker » Binaries for the usual Linuxes, but also iPhone, Open WRT, Raspberry PI, and others. » I easily got it running on a Synology NAS drive. » Free test broker ˃ Unencrypted @ test. mosquitto.org:1883 ˃ Server-auth SSL @ test. mosquitto.org:8883 ˃ Mutual-auth SSL @ test. mosquitto.org:8883 » http://mosquitto.org
  • 25. » Open Messaging for M2M and IoT » Focused on protocol standardization, tools. » C & Java clients delivered. » Clients developed under EPL 1.0 » http://projects.eclipse.org/projects/technology.paho
  • 26. » Provide M2M development, simulation, testing, debugging and deployment tools. » Initial focus on the Lua language » Delivered development, modeling and simulator tools so far. » http://projects.eclipse.org/projects/technology.koneki
  • 27. » Embedded runtime exposing high-level Lua API that can be used to develop portable M2M applications easily. » Project and samples on Eclipse git » http://projects.eclipse.org/projects/technology.mihini
  • 28. » Eclipse-based visual development and server platform for mobile apps. » Build, test, deploy, and manage your smartphone and tablet apps for iOS, Android, Blackberry, and Windows Phone devices. » http://ibm.co/dWworklight
  • 29. » Gelernter, David, Mirror Worlds (Oxford University Press, 1991). » Kelley, Kevin, Out of Control: The New Biology of Machines, Social Systems, & the Economic World (Addison, Wesley, 1994). » Mitchell, William J., City of Bits (MIT Press, 1995). » Dyson, George B., Darwin Among the Machines (Perseus Books, 1997). » Dodsworth, Clark Jr., Contributing Editor, Digital Illusion: Entertaining the Future with High Technology (ACM Press, 1998). » Holland, John H., Emergence: From Chaos to Order (Perseus Books 1998). » Gershenfeld, Neil, When Things Start to Think (Harry Holt and Company, 1999).