how to come around the iot data security...

14
Christian Eder congatec AG How to come around the IoT data security challenges. Director Marketing

Upload: others

Post on 22-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

Christ ian Eder

congatec AGHow to come around the IoTdat a secur i t y challenges .

Director Market ing

Page 2: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

− Intel: “... 35ZB of data from things will generate $2 trillion in value by 2020. ...”− Cisco: “"Looking to the future, Cisco IBSG predicts there will be 25 billion devices connected to

the Internet by 2015 and 50 billion by 2020”− Ericsson: “The vision of more than 50 billion

connected devices will see profoundchanges in the way people, businessesand society interact.”

− IDC: “... technology and services revenue toexpand from $4.8 trillion in 2012 to $7.3 trillionby 2017 at an 8.8% CAGR, ...”

− Gartner: “... 26 billion units installed by 2020.IoT product and service suppliers will generateincremental revenue exceeding $300 billion, ...“

huge expected mar ketM ega Trend IoT

May 19, 2015 © 2015 congatec AG 2

Page 3: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

Internet-of-Things to Internet-of-Everything

Source: Cisco IBSG, 2013

May 19, 2015 © 2015 congatec AG 3

Page 4: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

− Devices that are connect ing to the internet− Integrating greater compute capabilities− Using data analytics to extract meaningful information

connect ex ist ing devicesInternet-of-Things

May 19, 2015 © 2015 congatec AG 4

Page 5: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

M ission− Connect ing different communicat ion protocols− Aggregate sensor data− Analyze data locally: filtering, real-time response− Provide security to deliver trust, reliability

W hy Gateways− 85%* of existing industrial embedded devices are unconnected− Systems need to be always connected and continuously monitored− Economics of data require local filtering and analysis

© 2015 congatec AGMay 19, 2015

Gateways

* IHS, IDC Research5

Page 6: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

Reliability− Embedded computer modules and boards

from congatec are the core technology to enable intelligent IOT devices

− From COM to SBC up to full custom design computers (EDM Solution)

Connectivity− Pre-integrated connected capabilities enable

rich network options to save development time and costs

− Extensive network of connectivity (wired, wireless, cellular, short-range)

Security− Protect devices for trust and control− Protect the device & application− Protect the data at rest and in flight

M anageability− Enable common provisioning frameworks− Enable remote, secure upgrades− Provide web-based configuration utilities

basic challenges

© 2015 congatec AG 6

Internet-of-Things

May 19, 2015

Page 7: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

Internet-of-Thingst opology

INTERNETCLOUD

BIG DATA

Device

Sensor Hub Sensor Hub

GATEWAY

LAN

Free

scal

e i.M

X6

AM

D G

-Ser

ies

Inte

l® A

tom

™ /

Cel

eron

®

Inte

l® C

ore™

i3, i

5

Qse

ven

Min

i-ITX

Pico

-ITX

CO

M E

xpre

ss

EDM

S - C

usto

m D

esig

n

Inte

l® C

ore™

i7

Software

Hardware

Reliabil ity Connect ivity Manageabil ity Secur ity

Device

May 19, 2015 © 2015 congatec AG 7

Page 8: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

Customer IoT Device/Gateway Application

Certified congatec Intel Gateway Solution IoTGateway Solution

Windriver Linux Kernel (image signature validated)

Hardware

Userspace

congatec Boards and Modules (Secure Boot, TPM)

Intel® Atom™ Processor E3800 Series

Bootloader (image signature validated)

TPM Driver

Encrypted StorageGRsecurtity

Appli cation Integrity MonitorRoot Certificate Interface

Manageability

Reliability

Security ConnectivityHost Tools

SST

- Sec

urity

Sig

ning

Too

l

ZigBeeCellular 2G/3G/4GBluetoothSerialUSBVPNWi-Fi Access PointMQTT

Open SSL LibrarySRM Signing ToolCertificate MgmtSecure BootApplication IntegrityMonitorApplication ResourceControlSecure PackageManagementEncrypted Storage

McAfeeEmbedded Cont rol

OMA DMTR-069Web-BasedConfigurationInterfacesRuntimeEnvironmentLuaJavaOSGi

Page 9: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

May 19, 2015 © 2015 congatec AG 9

Page 10: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

− Based on Intel® Atom™ E3800 − Qseven Module + Carrier Board− Software included (time limited trial license)

− A hardware root of trust, data encryption, attestation, and software lockdown for security

− Connectivity up to the cloud and enterprises− Connectivity down to sensors and existing controllers embedded in

the system− Preprocess filtering of selected data for delivery− Local decision making, enabling easy connectivity to legacy systems− Local computing for in-device analytics

quali f ied hard-/sof tw are combinat ion

© 2015 congatec AGMay 19, 2015

congatec IoT Gateway Development K it

Page 11: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

congatec IoT Gateway Development K ithardw are view

©2015 congatec AG 11May 19, 2015

Page 12: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

The congatec IOT kit provides the abilityto immediately start evaluatingdevices or gateways for Industry 4.0− conga-QA3 Intel® Atom™ Qseven module− Full featured Qseven IoT mini carrier board− 7” touch display with cable set− Intel® dual band wireless AC 7260 card & antenna − Bootable USB stick Intel IOT Gateway Solution OS (W indriver IDP trial)− Accessories (cables, adapters, power supply …)− Documentation

f or f astest design-in

© 2015 congatec AG 12

IOT Gateway Development K it

May 19, 2015

Page 13: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*

− Predict ive Maintenance− IoT device feeds performance and sensor data

into central control systems to allow for predictive maintenance. This eliminates time and labor costs.

− Resilient Distributed Systems− Operators are alerted as soon as a problem

occurs. Then remote diagnostics and corrective action are possible. Rebooting or restarting elements to upload new software and hot-patching.

− Transportat ion− Predictable service, vehicle to vehicle

communicat ion, … for more predict ion and efficiency

− Building Automation− Reduce power consumpt ion based on the

schedules and usage pat terns. Connect heat ing, light ing and security systems remotely. Smart power meters and intelligent power sources help to balance supply and demand.

− Industrial Automation− Industry 4.0. Connect product ion, services and

business.− Smart Energy

− M2M monitoring and control with enhanced reliability, security, and performance. Integrates power sources for more economical energy.

f or t he Inter net -of -Things

© 2015 congatec AG 13May 19, 2015

Use Cases

Page 14: How to come around the IoT data security challenges.files.iccmedia.com/events/iotcon15/pdf/leopold/15h00_congatec.pdfHow to come around the IoT data security challenges. ... −85%*