Resolving the Technical and Business Challenges of Getting Connected to the Internet of Things

Agenda - List of presentations



Internet of Keynote Things
Securing the Internet of Things

As the IoT gains momentum, one challenge has become more evident - the lack of unified guidelines for ensuring security of IoT applications. The things on the internet are increasingly vulnerable to security breaches. Recently, execution of unauthorized code enabled the exfiltration of millions of credit cards and in another case, vital automotive systems were taken over by a hacker injecting rogue data into a car's controller network. Securing the IoT is a multi-faceted issue, encompassing platform trust, access control, and data security in systems spanning cloud data centers, networking processors, and sub-$1 nodes. A holistic view of the systems and challenges comprising the Internet of Things is needed for it to achieve its potential value and transform into the Internet of Tomorrow.


(Very) Preliminary Session List for IoT DevCon
Achieving Energy Efficiency for IoT SoC Designs with Advanced Techniques in IP

Reducing energy consumption and system costs are critical in today's IoT applications. New investments in IP and tools play a significant role in extending battery life, reducing energy costs and enabling added functionality for wearable and machine-to-machine devices. Developing SoCs for IoT applications requires IP that not only supports low power process technologies but also implements advanced low power techniques for energy-efficient sensing, processing and communications. This presentation will cover the latest trends in IoT designs and the most popular architectures used in today's IoT applications for high-end, low-end and smart analog systems. It will also cover IoT specific design considerations to improve system power usage and overall energy efficiency for a variety of apps.

Can You See Inside Your SSD?

The key ingredient to a successful IoT device design is durable solid-state storage. It’s important to note that most of these devices must withstand harsh environments and data activity that goes far beyond the norm. In addition to best components and manufacturing, solid-state devices of choice provide a bigger window inside the drive – enabling monitoring, fine-tuning, overprovisioning and security to maximize efficiency and prolong drive life. This presentation discusses these considerations and how Virtium is focusing its efforts to expand the window into their drives with its SSD Software Suite. The suite of tools helps designers understand workload histories, wear, performance tuning and when to plan maintenance and transitions. Attendees of this presentation will increase their knowledge of all of the variables and the tools available for optimum industrial embedded SSD implementation.

Dashboard of Things: Programming Interactions between Devices, Apps and Data

With IoT, enterprises and consumers will soon be programming automatic interactions between data and devices (e.g., Turn on the lights at sunset). But how can we orchestrate and control millions of complex interactions at once? The Dashboard of Things provides a simple, yet powerful platform to monitor and program all connected devices and activities. In this session, you will learn how to connect your own apps and devices to the Dashboard of Things to reach new audiences and empower users to engage with your products in new ways. Using a new programming language called NPL, we will demonstrate how to write Potionsť to automatically perform any action, even using complex scenarios with multiple conditions and triggers.

Don't Reinvent the Wheel for IoT Security

Why start over with IoT security? For decades, other industries have dealt with similar problems - how can we get strong security at a low price and with low power? And what if the attacker has physical access to a device that must be protected? These are not unsolvable problems or even new ones. On the contrary, they are solved problems. In this talk, we'll review the lessons learned by industries that faced these security problems and compare the problems they faced to those of IoT security. We'll explore the similarities and differences in threat models and other constraints. And we'll see how existing technologies such as hardware-based security technologies have been successfully adapted for IoT applications.

Don't Trust the IoT, Or Why You Need Better Security Now

By 2015, Cisco estimates 50 billion things connected to the Internet - all vulnerable to attacks, hacks and malware. It is possible for OEMs to implement meaningful security. This presentation will explore the basic tenets of trust and how to use it in the IoT. Cannady will address protection of identity credentials, attestation of integrity and built-in access control as fundamental attributes of a security architecture that can be applied equally well to embedded devices, end user devices and cloud servers, with examples. Cannady also will address mandatory access control. References for further information and relevant tools will be provided. The talk will give designers and ISVs a clear view to embedded security using industry standards and tools and how to start using these

Innovation: The Maker Way

IoT is currently at the peak of inflated expectations. While the market will be massive, we have really only delivered consumer value in very specific cases. The talk will explore the Maker Way: how to use recent and major advances in technology, design and practice to quickly create products with provably high user value.

IoT As A Service: The Quickest Way for your Startup to Enable IOT

Today's startups eschew traditional ERP and back-office solutions for many reasons. Instead, they develop custom suites by aggregating single-purpose web applications that conform to Software As A Service (SAAS) and Enterprise 2.0 models. A broad market of these applications exist, but an IoT solution remains suspiciously absent. This presentation proposes a method for 'IoT As A Service'(IOTAAS)that fits within this model: offloading the most difficult aspects of deploying IoT and integrating with the evolving SAAS ecosystem. IOTAAS should at a minimum provide cloud storage, tenant-customer management, device registration and a RESTful API, all with scalable billing. This will ultimately remove the barriers to entry into the IoT space, and enable increased industry-wide innovation.

IoT Platform for Signal Processing Savvy Applications

Current IoT development platforms provide adequate control capabilities for bring up of connected-devices, from a simple garage door up to a fancy activity tracker. However, to cope with a smartwatch, smart-glasses or smart home environment, much more powerful development platforms are required. From audio sensing, through scene analysis, to multidimensional connectivity aspects (PAN to WAN), things get quickly out of scope of most development platforms. In this session we will present a DSP based platform for IoT developers seeking advanced signal processing capabilities for intelligent sensing (motion, health, audio, vision), scene analysis, and connectivity, for actionable application assist.

IoT Product Development for Fun and Profit

Building a winning IoT application starts with a great idea. Simply having that great idea though, isn’t enough. Actually executing the idea presents a range of challenges and, in addition to writing the code, demands connecting some combination of processing, connectivity, sensing, actuation, and efficient energy management capabilities. Mastering all the low-level details of all of these functions may be beyond the budget or resources of a startup or small maker, and the path from prototype to production may add another level of complexity.This presentation will describe pitfalls, as well as various tools and techniques that can help manage the costs and complexity and get your idea rapidly to market.

IoT Standards: Too Many Cooks in the Kitchen

The Internet of Things has exploded, with experts now predicting that 30 million devices will be connected to the Internet by 2020. From Google acquiring Nest and Apple announcing the HomeKit, these connected devices are being introduced to make life, as we know it, easier. There's one thing that's not-so-easy though: standards. As the Internet of Things and its standards become more of a hot topic, tech companies are flocking to both join and create their own IoT standards groups, organizations and consortiums. There's a necessity to work together regarding IoT standards and rallying behind one set of standards will significantly push the IoT space forward. Adam will provide an overview of existing standards and their pros and cons, as well as the big players among IoT standards groups.

LTE is an Ideal Wide-Area Wireless Technology for IoT and M2M Devices

The barriers against the use of LTE for M2M and IoT devices are falling away, and LTE is the only truly future-proof technology for the Internet of Things. LTE chipset platforms now exist that are specifically designed to enable low-cost, low-power M2M and IoT devices, and as a result the LTE-enabled Internet of Things is becoming a reality. LTE has been evolving to support lower categories of throughput, such as Category 1 (10 Mbps) available today, and soon, Category 0 (1 Mbps) defined in 3GPP Releases 12 and 13. This presentation will explain the 3GPP releases and specifications and discuss how developers can use the latest low-cateogry LTE chipset platforms to balance functionality, throughput and ultra-high efficiency to the best advantage. Also presented is a comparison between these low-category LTE solutions and other low power wide area technologies.

Meeting the Reliability and Security Demands of the Industrial-IoT

We have seen it time and again: networking protocols long entrenched in specific markets and applications being supplanted by Ethernet. And it's happening once again: this time in Industrial-IoT (IIoT) networks. Ethernet standards are already tackling the last hurdle, adding determinism, as part of the IEEE 802.1TSN efforts. But as these IIoT networks connect to the outside world, each other and the cloud, managing security issues is top priority. This presentation will examine these issues and how best to address them in evolving IIoT networks.

Mesh Networking for Bluetooth and the IoT, Illustrated

Ellisys will illustrate how mesh networking applies to Bluetooth's role in the IoT.

Network All The Things and Make Them Smart! Distributed, Composable, Federated Systems of Things.
Network Performance, Reliability and Metrics for Embedded IP Mesh Networks

Millions of devices have been deployed on IEEE 802.15.4 networks, which use a variety of protocols ranging from proprietary point-to-point to ZigBee and now IP-based mesh networking stacks (Thread). When developing connected device products for 802.15.4 networks, it is important to understand expected device and network behaviors. In wireless mesh networks, device efficiency impacts the behavior of all interacting devices. The software/hardware interaction varies between network implementations, making it difficult to calculate critical parameters such as battery life. In this session, we will explore underlying device and network behaviors enabling developers to make design choices impacting device interaction and the resulting effect on system-level energy consumption and battery life.

Solutions to Embedded IoT Challenges

The Internet of Things (IoT) takes advantage of Cloud Connected Embedded Systems. These systems can be found in products all around you, such as wearable fitness monitors, home security systems, home automation systems, garage door openers, industrial controls, and many others. With a variety of wireless solutions, sensors and eXtreme Low Power (XLP) PIC® microcontrollers, Microchip�s products enable end-to-end solutions that help successfully connect embedded systems to the cloud, taking full advantage of its benefits. In this presentation, we will explore the different roles and responsibilities required to connect an embedded system to the cloud, common pitfalls and how to avoid them. Note: PIC is a registered trademark of Microchip Technology Incorporated in the U.S.A.

Testing the Interoperability of the Internet of Things

As the Internet of Things pushes towards a more connected world, and as time to market continues to be a major competitive advantage, the need to work in an open standardized environment becomes increasingly important. Confirming the interoperability between IoT devices and between components, modules and software within devices will ensure that they are able to connect, and work with other devices in a particular IoT ecosystem. With the growing complexity of designs and increased scale of integration, how will hardware, firmware and software engineers effectively test, debug and validate the intricate communications within and between devices? This session will explore the requirements for IoT validation.

The Internet of Things That See: Bringing Visual Intelligence to Embedded Devices

Improvements in processors, sensors, algorithms, and other technologies are now making it possible to incorporate computer vision into a wide range of products, including size-, cost- and power-constrained systems such as door locks, digital signs, and personal health devices. Incorporating visual intelligence into devices enables devices to know much more about their environments--and hence to be safer, easier to use, and more capable. In this presentation, we'll explore this fast-growing trend, and the opportunities and challenges that it presents. We'll examine the different classes of processors used for embedded vision, and illuminate techniques for reconciling the high computation requirements of typical vision algorithms with the constraints of small embedded devices.

Use Cases for ARM TrustZone - What You Need to Know to Secure IoT Devices

Just when you figured out how to take advantage of multiple cores from ARM Cortex-A9 to A53/57, silicon vendors are changing the roadmaps with heterogeneous devices. Regardless of your industry, security is quickly becoming a key design consideration - especially in IoT. Connected embedded devices today are more pervasive, more powerful, and offer expanded connectivity options giving consumers the ability to download a great variety of arbitrary 3rd party applications.

What steps need to be taken to ensure sensitive data is secure and that your design is robust? In this session, attendees will step through the real life examples of configuring and securing a multicore device to address both the real-time demands and the requirements to incorporate open source software. Concepts covered in this session include:
- Protecting data at rest, in use and in transit
- Secure boot, root of trust, and software attestation
- Anti-tampering, obfuscation, and encryption of data
- Validation of run-time device integrity with local and remote manifest audit

Using an Open Source RESTful Backend for IoT Applications

IoT devices must efficiently and securely store and access data with backend systems, and the REST (Representation State Transfer) API has emerged as the de facto standard for connecting mobile devices with backend data stores. This session will explore the use of an open source REST API platform that may become a standard for IoT development. DreamFactory founder, Bill Appleton, will present examples of how IoT devices can use this services platform to securely store and access data via RESTful services. IoT examples that employ this REST API platform will be covered, including Intel's Galileo Gateway, Raspberry Pi2, and we will explain how Solution Family connects mobile users to industrial machinery.

Using Customized CPU Cores to Build Lower Power and More Secure IoT Chips

In this talk, we will examine the potential IoT market and show some examples of IoT devices, exploring the general requirements for IoT devices and discussing how to create better and more competitive SoC products.

What Does Interoperability Mean for the IoT?

Interoperability is a key requirement for the IoT but what does it really mean? Standard protocols for different vendor's devices to interact with each other? Connection between different languages and operating systems? Wireless technology choice? A way for devices to interact with the cloud? Does it include data syntax? Must we model semantics? Can security interoperate? RTI, the world's largest embedded middleware company, participates in about 15 different "interoperability" efforts, including FACE (avionics), GVA (European vehicle architecture), SGIP (smart grid) and ICE (medical systems). We are leaders in the Industrial IoT and its leading consortium, the Industrial Internet Consortium (IIC). This session will examine the depth of the interoperability problem and explore solutions.

Why Memory Technology Plays a Critical Role in Battling IoT’s Rising Security Threat

The number of IoT is exploding and with this increase comes significant security questions. A study conducted by HP found that more than 70% of IoT devices contain vulnerabilities, a key concern when designing IoT devices for applications such as medical instruments or conditional access systems. The right choice of memory technology to store critical code or data is required for maximum security. A security lock register, bit or memory can be inherently vulnerable to an attack if implemented with the wrong technology.

Without Standards, There's No Internet of Anything

It's no secret that many of the companies building IoT products and services aren't exactly communicating with one another. The IoT is a 'wild west' when it comes to standardization and interoperability, and many IoT products on the market today are not able to communicate with other vendors' smart products and software. For long-term success, the IoT ecosystem needs to avoid a disjointed, incompatible, and proprietary environment and instead pursue a common approach for such things to interconnect and interoperate. This talk will detail an ambitious endeavor to create and deliver such a standard for developers to use in order for their devices and smart things to work together and with the expected billions of other devices to come - regardless of manufacturer, brand or product type.