New products, Conferences, Books, Papers, Internet of Things

Archive for May, 2011

The 2nd Workshop on the Security of the Internet of Things

The 2nd Workshop on the Security of the Internet of Things

Dalian, China – October 19, 2011, in conjunction with IEEE iThings 2011

Important Dates

Paper Submission due: June 17, 2011
Acceptance notification: July 18, 2011
Final papers due: August 1, 2011

Workshop date: 19 October 2011

Before the Internet of Things (IoT) vision takes its first steps, it is essential to consider the security implications of billions of intelligent things cooperating with other real and virtual entities over the Internet. In fact, we need to plan well in advance what kind of technological mechanisms, protocols and standard infrastructures we will need in order to protect the IoT.

The goal of the second edition of this wokshop, which is organized in conjunction with IEEE iThings 2011, is to continue the debate on the existing advances and the different security challenges associated with the protection of the IoT.

All papers included in the iThings 2011 workshops will be published by IEEE Computer Society (EI indexed). Besides, selected best papers from iThings 2011 workshops will be recommended for publication in special issues ofseveral SCI-indexed international journals.

More information about this workshop is available here. Also, the papers from the previous edition (SecIoT’10) can be accessed for free here.

 

With M2M, the machines do all the talking

From O’Reilly Radar:

The shift from transporting voice to delivering data has transformed the business of mobile carriers, but there’s yet another upheaval on the horizon: machine to machine communications (M2M).

In M2M, devices and sensors communicate with each other or a central server rather than with human beings. Theses device often use an embedded SIM card for communication over the mobile network. Applications include automotive, smartgrid, healthcare and environmental usages.

M2M traffic differs from human-generated voice and data traffic. Mobile carriers are adapting by creating entirely new companies for M2M, such as Telenor’s M2M carrier Telenor Connexion, and m2o city, Orange’s joint venture with water giant Veolia. I talked to Göran Brandt, head of business development at Telenor Connexion and Rodolphe Fruges, VP of M2M at Orange Business Services about the future of mobile and M2M.

More info here.

Job offer in Copenhagen

We need an Embedded SW / HW hacker that has experience with RF networks for a very interesting medico-tech startup run by software entrepreneurs in Copenhagen.

Below is a short description of what we’re looking for:

You are an excellent debugger, able to build from source even when it requires some hoops, you are a problem-solver that aren’t fazed by making incompatible things compatible and you have some experience with SAAS.
As a person you are a good communicator and are able to drive yourself forward without to many helping hands.

We are a fast moving startup and you will be part of a senior team – we will expect you to hit the ground running and be able to handle most of our embedded SW/HW work – so some soldering is expected. Our company is young but fun and we’re working on a revolutionary new thing! You will be part of a team consisting of some of the best programmers, designers and Business developers in Denmark.

Contact info: Klaus Hougesen (klh@carecord.com) and Claus Dahl (cd@carecord.com)

Streetline Networks has immediate engineering openings

At Streetline Networks, we are realizing the promise of sensor networks to revolutionize how cities are run. Streetline deploys Cloud-based SaaS solutions with robust sensing using mesh sensor networks to measure parking and traffic trends, manage city assets, and direct drivers to available parking spots in real-time through mobile devices on the iPhone and Android platforms.

Streetline is actively recruiting for the following openings at its Peninsula offices:

1. Director of Engineering, Applications
2. Senior Software Engineer, Applications
3. Senior Software Engineer, Sensing and Processing
4. Senior Project Manager
5. Senior Software Engineer, Infrastructure
6. Senior Software Engineer, System Integration

Our system spans embedded sensor hardware, networking equipment, and signal processing all the way up to Cloud-based SaaS/web and mobile user applications — these positions call for very strong systems thinking, technical breadth and creative innovations well beyond the typical web or desktop application. We are searching for people with 5+ years experience.

More info here.

The Internet Of Things: How Will We Trust A Word It Says?

From the WSJ:

Cisco ran a rather grandiosely named “Pan-European Security Council” yesterday, which wasn’t really any such thing. Nor, alas, did it deliver on its promise to look at the security issues surrounding the future internet when 50 billion or more devices are wired up, the so-called “internet of things”.

This was a missed opportunity because this is an area worth investigating, and a networking company like Cisco could have brought some real insight. Instead we were treated to the usual diet of how teenagers use Facebook and, that hoariest of hoary internet subjects, the internet-enabled fridge.

But what are the security issues surrounding an internet of 50 billion devices, 48 billion of which are going to be cheap remote sensors of some kind? And what are the security implications?

One of the key issues is data integrity. How do you trust the data your sensors are sending? In fact how do you even know it is a sensor that is sending data at all, and not a bot or piece of malware?

Then there is the problem of encryption. When smart meters are installed across the grid you can be sure that they will have a high degree of encryption built into them—after all they are likely to be pretty expensive pieces of kit. You can be sure that authentication and encryption will be built in.

But what about a cheap (less than €1) sensor that is, say, responsible for reporting whether a parking place is occupied, or one that reports on the tensions in a restraining cable. How much encryption will be built into a 10¢ chip? But if it sends its data unencrypted, and it doesn’t use proper authentication, then it really is a simple matter of jumping in and adding whatever data you want to that stream.

So what? Why does this matter? Well it comes down to data integrity. There are two sorts of cyber criminals (actually there are loads, but let’s just take two for now); those out to make a quick buck, and those who are rather more sophisticated and perhaps have other, more destructive, aims.

More info here.

Dust Networks Expands WSN Product Line with 6LoWPAN Offering

Dust Networks®, the leader in intelligent wireless sensor network solutions, today announced the availability of their new SmartMesh® IP wireless sensor network (WSN) evaluation kits. SmartMesh IP combines the reliability and ultra-low power of Dust Networks’ industrial products with native Internet Protocol (IP), for a robust, standards-based offering perfect for a broad range of applications

“Dust Networks’ TSMP technology was the foundational building block of the IEC62591 wireless standard that enabled explosive growth in the industrial wireless sensing market,” said Harry Forbes, Senior Analyst with ARC Advisory Group. “With their new IP-based product, enterprise customers can benefit from the same low power and reliability that industrial customers have relied on for years,” Forbes continued.

SmartMesh IP provides robust wire-free connectivity for applications where low power, reliability, and ease of deployment matter. With Dust Networks’ new Eterna™ 802.15.4e SoC technology, every node in a SmartMesh IP network will run on batteries for 10 years, or forever with an energy harvesting power source. Even a simple solar calculator cell can power a SmartMesh IP router in a busy network. The ability to put a sensor anywhere, without wiring, allows network deployments that do not disrupt a building’s operations or occupants. With built-in intelligence that enables the mesh network to self-form and self-maintain, SmartMesh systems are easily deployed by field technicians with no wireless technology expertise.

More info here.

 

CEO of GreenPeak explains ZigBee RF4CE

Interview — what is Zigbee RF4CE?

Removing the clutter of multiple remote controls scattered around the coffee table is a silent desire of many consumers. But the real driving factor for acceptance of RF4CE is cable TV companies and service providers who want to expand their service into the home. Specifically, the remote control has become the key point of contact with the consumer, so what more can be done with it?

Operators are recognizing the opportunity to provide additional services. Examples are using the remote control to turn up or down the lights, the heating or air-conditioning, but also to monitor/manage the energy consumption, to manage security, to control the locks of the house – in essence the longer term view for the remote control is as a dashboard, controlling many functions in and around the house.

The interview link is here.