April 26 - 27, 2017 - SANTA CLARA, CA
Resolving the Technical and Business Challenges of Getting Connected to the Internet of Things

Agenda - Presentation Abstracts

May 25th
Registration/badge pick-up: 8:00 am - 6:00 pm
Conference Sessions: 8:45 am - 5:00 pm
Exhibits, Mezzanine area: 9 am - 6:30 pm
Exhibits, Santa Clara Ballroom: 12:15 pm - 6:30 pm
Networking Reception: 5:00pm - 6:30 pm

May 26th
Registration/badge pick-up: 8:00 am - 4:00 pm
Conference Sessions: 8:30 am - 5:00 pm
Exhibits, Mezzanine area: 9 am - 5:00 pm
Exhibits, Santa Clara Ballroom: 10:00 am - 2:30 pm


Keynote of Internet Things
Location: Magnolia
IoT Driving the Need for More Secure Big Data Analytics

A global telecommunications company ingests 300 million customer records in under 1.5 minutes every day. A mid-size firm handles 3.7 billion transactions annually. A car manufacturer is streaming real-time sensor data from vehicles. With Big Data analytics at the heart of all these systems, driving transformation, innovation and identification of new threats, these projects include massive quantities of sensitive data. But with centralized Big Data platforms, cyber-attackers can now focus on a known, single target and with IoT connected devices, physical risk is added to data breach risk. What has to happen is a movement to data-centric security, where data is transformed by encryption that retains value for analytics, but not for attackers. Format and order-preserving encryption can help protect enterprise data in Big Data platforms and IoT ecosystems right now. The promise of homomorphic encryption is that nearly all computation can be done directly on encrypted data. This presentation will cover the technical deep dive into how data can be anonymized and protected at scale today, how crypto technologies have to change, and how these original use cases will be transformed.

No IoT without SoT - the Security of Things!

Underwriters Laboratories has been working for a safer world for over a hundred years. In today's world though, there is no safety without security. As the connected society continues to expand, we are rapidly approaching the practical limits of classical IT security certification. Since nobody certifies the internet, how can we make sure that the Internet of Things becomes a reliable and trustworthy place to be in? This presentation gives an overview of IoT security today - as well as a glimpse of where crowd-sourced testing and public ledger technology could bring the SoT of tomorrow!

Update on the Universe of IoT

Conference Chair, Markus Levy will do a kickoff of the 3rd annual IoT DevCon.

Whose Hat is This? Right-Fitting Your Business Strategy for the IoT

As IoT opens up new opportunities from wearables to infrastructure, it is clear there is no one-size-fits-all approach to strategy and implementation. Whether you are a startup or an established company who wants to take advantage of the benefits the connected world has to offer, the challenges are more than just technical. From how you view customers to envisioning products to supporting those products and customers, both the definers and designers must consider the applications and environments in which the products will be used in order to benefit end customers and the business. As we are increasingly tasked with putting our IoT hats on, how do we make sure they fit? Vin D'Agostino will discuss the top dozen questions businesses should ask themselves as they embark on their IoT journey.


Strategizing the IoT (II)
Location: Cypress
How do you Cut away the IoT Hype and Find the Revenue Opportunity?

There is a huge amount of hype around the growth of the connected device industry and it is often difficult to see where the real business opportunity lies. When we think of the IoT, we often think of the more consumer focused devices for smart home applications - connected fridges, alarm systems etc. - and how revenue can be generated from device sales. However, if developers want to benefit from recurring revenues, the real opportunity lies in applications further afield which require a cellular connection. This presentation will tell you how you can generate an additional recurring revenue stream, own the customer ensuring ‘stickiness’ and create opportunities for delivering long term value.

IoT Data Demands Big Change in Business Analytics

While operational analytics will continue to play an important role in collecting and analyzing data as the IoT continues to evolve, companies will start to move from closed-loop message response silos based exclusively on central cloud processing to longer-term and more comprehensive data retention and aggregation at the edge and intermediate tiers. By retaining the data at the edge, companies can leverage the utility value of the data locally enhancing operational systems and providing for investigative and predictive analytics with a long-term goal of machine learning. This session will explore the infrastructures businesses will need to implement in order to adapt to this new and unpredictable data reality to update legacy systems that cannot handle the speed and volume of IoT data.

Making The IoT a Reality: Keep it Open!

The IoT holds a great deal of promise companies large and small, and for the future of society. However to realise any of its potential, interoperability between products – including a growing number of new categories of products and key players - will be essential. This simply will not happen if key components are controlled by proprietary forces masquerading as "open": such agendas will stifle growth except in highly specialised "walled gardens" – and that's not what IoT should be all about. In this talk, we will examine where openness is needed across every aspect of the system, including OSes, protocols, and other dependencies. We will in particular focus on the need for a truly open, multi-domain, heterogeneous security as the backbone of any open IoT system.

Scalable Secure Identity for IoT

One of the biggest challenges with IoT is the provisioning of identity to millions of devices that will soon enter the world. If done correctly, this requires secure digital uniqueness coupled with a system or service that validates that uniqueness. Unlike the biological world where uniqueness simply comes for ‘free’ (different DNA, different fingerprint…), the digital world is very unusual and has unsolved challenges. Rod will discuss the problem of creating, managing, and validating uniqueness at scale. IoT is not the first time identity at scale has been required. This talk will analyze ways that governments have solved uniqueness in the past, what is being done today with mobile devices, and how intelligent key management and cryptographic choices are critical for a secure IoT.

Survival Kit for Your IoT Journey

When thinking about implementing or extending an IoT solution, any discussion should start with a the topic of business transformation. There are a variety of ways to add additional value to your customers, innovate business processes, and improve your customer and market intelligence. This topic will discuss the journey from idea to implementation to continuous innovation in IoT. The discussion will cover the benefits of an IoT Platform and an extended ecosystem and how that may impact both the ability to innovate and time to value. Major take-aways: 1. What to consider when design my IoT solution? 2. How do I leverage my intellectual property? 3. How can IoT help me transform my business? What areas will it impact? and more.


Strategizing the IoT (I)
Location: Magnolia
A Dev Guide: Connectivity and Wearables

The wearable device market is taking off, which has set off a chain reaction of opportunity for developers. A core technology pillar for any wearable device is wireless connectivity, which makes choosing the right technology and development route essential. What are the best wireless options for connecting to these wearables: NFC, BT, BT Smart, WiFi? How to determine the best option for a given use case? This session will outline various wireless connectivity options, including pros, cons, tradeoffs and benefits as they relate to the emerging wearables market, and deliver practical guidance on the advantages and disadvantages developers may encounter based on what connection method they choose and how it might affect different use-case scenarios.

Charting a New Course for Semiconductors in the Era of the Internet of Things

As we explore what's next for the semiconductor industry, we see powerful, macro forces at work that are pushing chips into the center of new global markets. Although no stranger to boom and bust cycles, semiconductor companies are eager for new growth and innovation opportunities. As technology and market forces evolve, many believe the Internet of Things to be the 'next big thing' that will drive the industry forward. In this talk I'll discuss how the Internet of Things can help steer industry growth back into the fast lane with the potential to open up new sources of revenue.

Processors Evolve for IoT Clients

Initial IoT client devices mainly use standard microcontroller or microprocessor chips. These products are not optimized for IoT, however, and they lack wireless connectivity. A new wave of IoT processors is now reaching the market, many with connectivity integrated in the package or on the die. This presentation discusses these technology trends and provides an overview of new IoT processors from vendors such as Marvell, MediaTek, NXP, Samsung, Silicon Labs, and Texas Instruments.

Standardizing Technology and Encouraging Collaboration to Drive the IoT

There will be no future for the IoT without cooperation among industry leaders. Interoperability of devices is key to the IoT reaching it’s full potential. Bluetooth works with 30,000 companies, is developing a mesh protocol, and is working on a common language that will allow external organizations to use Bluetooth to communicate between devices. CSR and Cassia are putting Bluetooth together with their own technologies and innovative implementations to further mesh and hub technologies, while Parks & Associates are watching all this from the outside and analyzing how this will shape the future of the IoT.

The Semiconductor Revolution - Shifting Gears in the IoT World

How semiconductor technologies continue to push the efficiency envelope for ultra low power, low leakage, higher performance, smaller area, and lower cost in the IoT space that result in richer user experiences for IoT end products


Connectivity: Protocols and Standards
Location: Cypress
Analysis of BlueTooth Mesh Networks

Typical use cases for protocol test and analysis of Bluetooth technology has historically involved a particular set of tasks oriented around stack analysis, performance optimization, software debug, wireless coexistence, and hardware characterization. With mesh networking, a key enabler of the IoT, the use of Bluetooth protocol analyzers changes significantly. We'll explore some of the expected cases for these types of tools in these environments and briefly discuss the state of standardizations efforts on Bluetooth mesh networking.

Deep Dive: Which LPWAN Technology is Right for IoT?

Low Power Wide Area Network (LPWAN) technologies like LoRa, Weightless, Sigfox, and others are becoming increasingly important with the growth of the IoT. With more computation happening on the edge, these technologies are a critical part of what will make IoT successful. In this talk we will delve into the merits of each technology - from established to emerging - and identify where each LPWAN technology should be used in the IoT landscape.

Interoperability and the Internet of Things: To Standardize or Not to Standardize?

The Internet of Things (IoT) encompasses a range of technology verticals, from consumer electronics and connected cars to industrial controls and the smart grid. However, while this immense diversity has created a market opportunity valued as high as $14.4 trillion, it has also generated significant interoperability issues stemming from a vast amount of available communications protocols. As a result, multiple consortia have coalesced to develop standardized connectivity frameworks that will advance the IoT. In this presentation, Dr. Stan Schneider, CEO at Real-Time Innovations (RTI) will consider the current connectivity landscape and define approaches that enable ubiquitous connectivity for the IoT.

Making the Right Connection: Understanding Wireless Protocol Options for the IoT

If you're designing for the IoT, it's vital to understand the benefits and best use cases for each of the different wireless protocols available. The choices vary significantly for battery-operated devices versus powered devices and for sensors with small amounts of information versus streaming video or audio-capable devices. Existing wireless technologies such as Wi-Fi, ZigBee and Bluetooth are readily available, each offering benefits or drawbacks depending on the use case. New protocols such as Thread provide ultra-low-power, IP-based connectivity for mesh networks. This presentation will evaluate leading wireless protocol options and how they fit unique IoT design requirements and provide an optimal end user experience.

Performance and Energy Costs Associated with IoT Connectivity

One of the key characteristics of an IoT device is that it connects, directly or indirectly, to the Internet. That connectivity has an associated performance and energy cost - a critical design factor when it comes to optimizing battery life and responsiveness. The system designer must carefully select the microcontroller and RF module to ensure optimal conditions based on the application's requirements. This presentation will describe a new industry standard for measuring performance and energy consumption of microcontrollers and RF modules as they communicate with the outside world, helping designers sort out the competitive landscape of products.

Running IP on IoT? The Story of Ubiquitous Connectivity with Standard Protocols

Today, our lives and society are connected and dependent on smartphones, WiFi and Cellular connectivity. By 2020, we will have 26+ billions of devices with different capabilities from smartphones to sensors and wearables. Smartphones are connected to the wearables, home devices; different technologies such as Bluetooth low-energy, ZigBee, NFC, Zwave, Celular IoT modules etc. will transmit data from a web of sensors all around us collecting data from the people, farmland, offices, Hospitals, Energy sectors, Transportation systems etc for various applications. Today's isolated applications and proprietary ways of IoT data communications, interfacing with islands of technollgies will need to evolve into convergence to a common communication method of IP Infrastructure and Service.


Security: Analysis and Methods (I)
Location: Magnolia
Enabling Secure Applications in a Connected World

Social networks are full of examples showing hacked embedded systems leading to potentially catastrophic consequences. Security is a well-known, important challenge in the IoT. From the low power sensor to the computing node, many applications will involve basic and/or advanced security techniques. Cryptography is one element of security. However, other aspects must be taken into account like firmware/device authentication, secure key storage, and secure communication. Integrating those aspects in embedded design and semiconductors is essential to secure applications. In the segmented market of IoT, the trade-off between cost, performance, power consumption, and security level can be different from one application to the other. The presentation is highlighting the required flexibility and scalability of the hardware security solution addressing the different challenges of the IoT.

Guidelines and Performance Impact Associated with Implementing Security in IoT

Many security perils accompany the development of IoT devices and networks. Practical and objective guidance on addressing these new security conundrums are hard to come by. This presentation describes the collaborative efforts of industry leaders to reign in this multi-faceted challenge to provide security guidelines to IoT device developers. Topics discussed include 1) IoT security basics and the different levels of security complexity or functionality; 2) security functions that are typically not well-implemented in IoT; 3) security costs in terms of performance and energy; 4) security costs relative to the risk assessment; 4) what standards are in place and how to sort them out; and 5) performance, energy, and memory costs associated with implementing the proper security features.

How to create the Internet of Secure Things

How to create the Internet of Secure Things In this presentation, we will cover the approaches that can be taken to secure your IoT device, both large and small; and how this links with existing security strategies Creating an Internet of Secure Things starts by securing the Things themselves. We will discuss how to secure these devices. Topics covered will include: • Hardening the device via secure boot, secure remote updates, anti-tamper and embedded firewalls. • Machine to machine authentication. • Securing communication. • Leveraging hardware security capability (hardware crypto support and TMP/TEE and device identify). • Enabling monitoring and management by integrating with enterprise security management systems for event reporting, audit support, and policy management

Implementing Security for IoT

Millions of devices are getting connected and we need to address vulnerabilities with the available scalable security solutions. In this talk I will discuss security considerations for IoT and functional security use cases for different applications. This will also explain how to implement security for IoT with available scalable security solutions and tools associated with the solution to protect IoT devices and systems deployed in different application areas such as Smart home/buildings/city, Industrial Control Systems (SCADA, PCS, DCS), Healthcare Equipment and Networks, hand held field devices, Network Appliances.

Platform Approach to Secure IoT Development

As the IoT market evolves, the security of connected devices is becoming a major concern. Cybersecurity challenges are rising. Motives and skillsets of threat agents vary. There are multiple types of threats to IoT systems and the challenges involved are unlike anything embedded developers have previously faced. IoT systems cannot be secured by providing security in a single layer alone. Security needs to be addressed holistically at the Device, Network, Application, Physical and Human Layers for end-to-end system security.  However, the implementation and ongoing maintenance required for this level of security is complicated, and many developers don't have the resources or the expertise needed to design an IoT system that can withstand the sophisticated threats. A generic cookie cutter solution cannot serve the purpose. An advanced flexible and extensible platform with secure building blocks is required to help accelerate secure IoT system development.


Application Development Frameworks
Location: Camino Real
A Cloud-Centric Ecosystem Approach to Ease IoT Development

To create a successful Internet of Things, connected devices and applications must be able to easily, securely and intelligently interact across silos. True interoperability among different vendors will enable analytics that provide deep insights to end users. We discuss two use cases of a cloud-based IoT ecosystem that addresses the above challenges. 1) An IoT solution provider with full control of devices and applications within its own system uses the ecosystem to build an IoT solution that collects, transmits, stores, analyzes, and acts on intelligence without having to manage infrastructure. 2) Multiple players each focus on their core strength (devices, applications, analytics, etc.) and build an end-to-end IoT solution collectively on the ecosystem, without integration pain.

APPle Pi In 25

Connect a raspberry pi to the ThingWorx platform and create an application in 25 minutes-from scratch!

Enterprise IoT – An MVP Based Approach to bringing an IoT Product to Market using Microsoft Azure

Changing customer behavior is disrupting enterprise business models. Digital Transformation initiatives have become an urgent and critical enabler to meet the customer expectations. IoT and Information are the underpinnings for evolving business models and digital transformation. In this session we will look at a Minimum Viable Product approach to building an IoT strategy and product. We will also compare the anatomy of the MVP product and compare that to various services available from Microsoft Azure. Finally, we will demonstrate the use of Microsoft Azure in building and bringing the MVP to market.

The New Hero Developer Paradigm as we Integrate Cloud and Fog Computing

The IoTs will challenge the status quo of how IT and development organizations operate! Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. Craig Sproule, CEO and technical visionary of Metavine's Genesis, will demonstrate how to move beyond today's coding paradigm and share the must have mindsets for removing complexity from the development process, accelerate application delivery times, and ensure that developers will become heroes (not bottlenecks) in the IoT revolution.

Why the Need for Special Operating Systems for IoT and Wearable Devices?

IoT device manufacturers must cope with constraints (e.g. small footprint, low-power) while addressing the large scale of the Internet (rapid project pace, interoperability, large app developer communities). This encompasses delivering smartphone-like capabilities on microcontroller-based hardware. This also involves creating software that delivers incredible user experience and adjusts to business needs. Operating systems are essential foundations to enable IoT devices. Traditional, embedded RTOS solutions may not address IoT challenges and mobile OS solutions cannot shrink to match IoT constraints. This session bridges the gap between the Internet and embedded worlds, and shows how to leverage proven methods used by PC and mobile developers for the technical and cost constrainted IoT.


At the Edge (I)
Location: Bayshore East
Accelerating IoT Sensor Node Implementation with Open Standard M2.COM

To optimize IoT development, such as diversifying IoT applications and standardizing different technologies, developers have established an open platform for IoT sensors and sensor nodes. But, one of the key challenges to the advancement of IoT enabled devices today is the lack of a widely adopted open platform. In order to accelerate new IoT opportunities, it is crucial to have a platform like the M2.COM that not only saves development time and cost with a standardized sensor interface but also allows developers to connect to anything from anywhere.

Code Analysis Made Easy

The widely used C/C++ languages are known for their flexibility and proximity to hardware. However, these languages also feature a huge number of undefined behaviors and their flexibility lets you write code that may not work the way you intended; your code could be syntactically correct but nuances of the language may force the code to operate in unexpected ways. In the best case, these mistakes are detected during the development cycle, but they could easily escape into the field and necessitate a product recall. Fortunately, static- and runtime-code analysis can be integrated seamlessly into your workflow. We will demonstrate how they can be used to detect potential errors in your application so errors can be eliminated as early and cheaply as possible.

Managing the Plurality of IoT

There is an increasing number of ways for capturing and delivering sensor data to the cloud. Sensors talk to sensor nodes via bus or wirelessly, e.g. I2C, SPI, Bluetooth, Zigbee. Sensor nodes talk to aggregators and onward to the cloud, via wire or wirelessly, spanning multiple processor types, OSes, transports, protocols and APIs. While some of these are de jure or de facto standards, the plurality complicates matters. This complexity can be reduced by using a simple industry-standard API providing a single abstraction for IoT communication. Applications simply send and receive, regardless of the underlying communications infrastructure. The abstraction relieves the application programmer of knowing or learning the plurality of hardware and software, and provides application portability.

Rebalancing the Energy Budget in IoT Systems

Industry experts agree that to become reality, the IoT must overcome the hurdles of energy consumption. While microprocessor and other logic manufacturers continue to improve the energy efficiency of their products, non-volatile memory manufacturers have sorely lagged behind. Techniques to overcome technology barriers and new technologies are now available to meet the energy imperative, enabling simple systems to operate many times longer on finite energy supplies.

Utilizing an Ecosystem to Build Smarter Personal Devices, Homes, Cities, and Manufacturing

Building a winning IoT "Smart Thing" starts with a great idea. However, simply having that great idea isn't enough. Actually executing the idea presents an array of both hardware and software challenges. To quickly implement the idea, developers need an array of tools to support the development. The presentation will apply a case study with the STM32ODE development environment to jumpstart a design, including functional blocks for a wireless sensor node, voice and music over BLE with speech recognition, noise cancelling and beamforming, a 6lowpan SubGhz wireless mesh topology network, and WiFi wireless connectivity to the cloud.

Why Would One Need Multicore, Heterogeneous Processors for IoT Applications?

Connected devices and the Internet of Things (IoT) represent an area of tremendous innovation and growth for the embedded industry. As types, complexity and number of sensors proliferate, connected devices will need larger amounts of real-time processing capabilities, faster more capable I/O and robust security capabilities while enabling more complex device management interaction. Multicore heterogeneous processing offers the most efficient way to maximize available performance of a processing solution while minimizing overall solution power and cost. In this session, we will explore heterogeneous processing and how developers can take advantage of its strengths to truly differentiate their connected devices.


Data Management: Edge Nodes to the Cloud
Location: Camino Real
50 Billion Messages and Counting: Lessons Learned from Shipping Real-World IoT

Building, deploying, and maintaining Internet of Things solutions for the real world is challenging, starting with rock-solid security and connectivity, to data, processing, and operations at scale, and then integrating with the diverse needs of customers to deliver IoT value. Electric Imp provides a secure and intelligent connectivity platform that is used by 70+ customers in 105+ countries and has processed more than 50 billion data messages to date. In this session, we will discuss real-world scenarios, typical challenges, and key lessons we've learned over the years. This talk includes live demos and is for anyone who needs to understand what it takes to deliver IoT in the real world.

Integrating Analytics and Algorithms into your IoT System

In this presentation, we will discuss three kinds of analytics common in IoT systems: sensor analytics at the edge node for data reduction, cloud-based online analytics for situational awareness, and historical data analytics for developing predictive and classification algorithms. Attendees will see practical techniques for integrating all these types of analytics into your IoT system. We will demonstrate these techniques using various environmental data sources, including data from weather stations, noise monitors, tide gauges, and traffic sensors. These examples utilize embedded programming, image and signal processing, and machine learning techniques to demonstrate how analytics can be integrated at all phases in your IoT system.

New and Better Products from IoT Analytics

Know what IoT analytics can do for you so you can set expectations and get the most from your analytics solution.As you develop a connected product, IoT analytics lets you understand fast what's not working, so you can fix it. In the next phase, when your connected product enters field trials, IoT analytics tells you how your connected product is interacting with the cloud, with mobile apps, and with other IoT products. In the final phase, when your connected product hits the market, IoT analytics tells you how customers actually use your product. In addition to adding more sophisticated insights with each phase of your IoT product lifecycle, IoT analytics also creates an important feedback loop. Use it to create new and better products.

Secure the Asset and Data, Optimize the WAN, Simplify Provisioning - then IoT Will Scale!

Most of our nation’s critical infrastructure - power grids, rail and transportation systems, city lighting systems, refineries, oilrigs, pipelines, building automation systems - were built long ago. With IoT, there is a need to connect these entities to the Internet to tap into their potential. There is a glitch in the path of achieving this security! Secondly, the value proposition of Industrial IoT comes out only when multiple applications have access to the device data on a real-time basis so as to influence the application eco-system. Each application will have its own criteria for policy making on the same data (data brokering). Lastly, in order for Industrial IoT to scale, ease of deployment and management become critical. This session will discuss these topics in-depth.


IoT Gateway
Location: Cypress
Building a Reference Design for a Secure Converged IoT Gateway

This talk will focus on the design and implementation of an NXP i.MX6 based IoT gateway and uses a simple temperature demo to discuss design options for end to end data collection and transmission from edge node to gateway to cloud and includes both web and mobile device based data presentation and control. The gateway runs our Nucleus RTOS and Mentor Embedded Linux on different cores and connects to a number of cloud services including our own Cloud Services Platform.

Building Reliable IoT Edge Devices using Real-Time Java

The IoT promises new ways of collecting, analyzing, and acting on information gathered from the real world in order to improve the way people live and work on our planet. Connecting cyber-physical systems to the IoT is not simply a matter of selecting network carriers, protocols, and cloud services. The IoT, just like the Internet itself, is a distributed architecture; a hierarchy of interconnected systems. An intelligent M2M gateway can aggregate, analyze, and respond to sensor data at the edge of the network. In some cases, an action in response to critical input needs to be taken within milliseconds. This presentation will discuss how to use embedded, real-time Java and OSGi frameworks to build reliable M2M gateways, saving time and money in the process.

IOT Gateways: Unlock New Business Models at the Edge

IoT Gateways are essential enablers required to deliver service to the end points. This talk will aim to define simple to complex gateways (hardware), and software stack, key carebaouts, current deployment models in healthcare (remote patient monitoring), and home security/automation. Finally, as value of data from IoT increases, it becomes increasingly important ensure that the source of this data is reliable and can be trusted, and secured. With IoT the costs of data acquisition are generally higher due not just to the nature of the data source being physical (and requiring some hardware), but also Opex costs associated with setup, configuration, and ongoing support. What business models could be unlocked? What are the requirements to enable that?

The Cloudy, Foggy and Misty Internet of Things - Towards Fluid IoT Architectures

Early IoT apps were built around cloud-centric architectures where information generated at the edge by the things is conveyed & processed in a cloud infrastructure. These architectures centralize processing & decision making at the datacenter by assuming sufficient connectivity, bandwidth & latency. As application of the IoT extends to industrial apps, the assumptions underlying cloud-centric architectures start to be violated as for many of these apps connectivity, bandwidth & latency to the datacenter are a challenge. This presentation will examine new Fog & Mist Computing architectures that have emerged as forms of Cloud Computing closer to the "Edge" & to the "Things" that should alleviate the connectivity, bandwidth & latency challenges faced by Industrial IoT apps.

The Necessity and Challenges of IoT Gateway Performance Analysis

IoT gateways play a crucial role in collecting, processing, securing, and managing edge-node devices and data. Understanding a gateway’s performance and energy constraints and how these can change based on environment and usage gives you metrics to make decisions about improving efficiency, ultimately translating into a positive business impact. Predicting when a gateway might fail empowers you with information to design systems and develop software that takes advantage of the available resources through a balanced view of real, measurable performance of the system. This talk focuses on the benefits and challenges of building an IoT gateway benchmark and explores the critical need for real-world application data to build out credible industry standards.


Security: Analysis and Methods (II)
Location: Magnolia
Improving Cyber Security for the IoT with a novel Noninvasive Methodology

Critical to the IoT is the security of the systems and the data being collected, assimilated, and in many cases, transmitted out, specifically in terms of Information Trust and Assurance. A significant number of systems controlling critical infrastructure have little-to-none Cyber Security provisions since they are implemented in embedded systems and resource constrained platforms. This system-level vulnerability poses a serious threat to critical infrastructure control systems. Where many of these systems have legacy processors, or utilize unique hardware that cannot support the performance degradation that typical antivirus introduce, systems are open to intrusion. This presentation introduces a noninvasive methodology to address the growing Cyber Security problem.

Securing Smart Factories in the IoT

The increasing connectivity of the industrial sector is literally opening the doors to highly sensitive data and critical infrastructure. This speech will illustrate the most common threat that Smart Factories are facing and will provide you with a host of established security technologies to prevent critical incidents effecting operational, data and brand security.

Securing the Things in the Internet of Things - Challenges, Opportunities and Techniques

As devices, sensors, objects and people are given digital identities that connect them to the Internet by the billions, the need for security and privacy becomes a critical factor for both market adoption and safety. The 40-year-old security methods we now use on our PCs and networks cannot address many of these IoT devices. In this presentation, we provide a brief overview of security functions and available cryptography tools, look at the hurdles in securing small devices which are part of the IoT, and explore existing and proposed standards for security usable by IoT devices. The presentation concludes with a review of the options available to developers who struggle to apply security to intermittently connected, low resource IoT devices that are greatly time and energy constrained.

Voice Biometrics are a Natural Fit for Controlling User Permissions in IoT and Mobile Devices

Voice biometrics - specifically, voice authentication and voice identification, have huge advantages in the world of IoT and mobile devices that other biometric security methods don't. First, enabling a device for Voice Biometrics doesn't require additional hardware - such as a fingerprint reader or modified camera. Moreover, voice is a 'natural' way for human users to interface with a variety of devices. For example, many of us would prefer simply telling our home TV what movie to purchase, versus typing in a hard-to-remember password while navigating tiny buttons on a remote. This presentation will provide a brief background on voice authentication and identification, including mechanisms of storing and processing a "voiceprint", followed by several potential real-word applications.

We Cannot Trust the IoT: Vulnerabilities and How to Fix Them

The concept of trust and the Trusted Platform Module (TPM) have been widely adopted in enterprise endpoints & networks for securing crypto keys, protecting private keys, securing authentication & protection against malware & attacks. Devices can implement assurance, health checks, authentication & other security functions. But these tools often are not available to developers of devices for the Internet of Things, where the cost, power, footprint & other considerations make traditional TPM implementations difficult or impossible. This talk will look at the unique requirements for security in IoT systems & infrastructure & the role of trust. Attendees will learn how functions offered by international standards can be applied & how they will be managed. Specific examples will be provided.


At the Edge II
Location: Bayshore East

Code Debugging Techniques for IoT Applications

IoT applications often share some basic requirements; the applications themselves must be small, fast and low-energy, while the time to market should be as short as possible. To help you meet these demands, a wide range of possibilities and techniques for smart code debugging is already at your fingertips. At this session you will learn how to use debug features like various types of complex breakpoints, macros, stack checking, event logging, live data, and profiling in a smart way for comprehensive debugging of your code.

A Holistic Approach to Smart In-Vehicle System Design and Development

Rapid advances in computing, connectivity, and human-machine interfaces are redefining traditional vehicle usage and ownership models and stimulating demand for smart in-vehicle systems that enable trucking companies, taxi operators, and logistics providers to leverage the IoT to increase the efficiency of their fleets and deliver innovative new customer services. In addition to examining the key technology trends that are enabling the smart car revolution, this presentation will outline the holistic approach that embedded and IoT developers need to take in order to overcome the specific system design, development, and deployment challenges for smart in-vehicle applications across a broad spectrum of industries.

Embedded Development Challenges for the IoT

Our everyday ‘things’ used to be isolated, in their own protected space, shielded from the environment, but also not relying on external resource or support. Embedded developers defined software development guidelines that fit these specific constraints. The IoT brings a new paradigm, connecting the device to the cloud, opening many new possibilities and creating new challenges. Resources may be available remotely but come with a security threat. Firmware can be updated but with new risks. Frequent updates require different approaches to software development. Mobile-device savvy users have high expectations for the UI and its ability to run applications. We will review what will change for embedded developers making their devices into IoT devices and how to address these new challenges.

How to Debug What You Cannot See?

IoT devices bring a multiple technologies into SoCs designs. Since these technologies are defined more and more by embedded software, there is an increasing need for effective ways to develop, test and debug software and hardware interaction. ProVIDE, combines two important test and debug methods â software IDE and Protocol Analysis. It enables the software and system developersâ additional control and observability by extending the familiar IDE debug capabilities to allow for analysis and visualization of both internal and external busses and interfaces. In this presentation, we will introduce ProVIDE, a new technology that gives developers a unique view into how their control and data travel across the external bus or interface and synchronize this information with the code execution.

Let's talk constrained: CoAP over Ethernet on an 8-bit MCU

The Constrained Application Protocol (CoAP) is a web transfer protocol designed to use minimal resources, so as to be suitable for small inexpensive nodes. Applying any standards-based protocol in a constrained real-life environment involves tradeoffs, compromises and conflicting optimizations. This presentation will examine an implementation of CoAP on an Ethernet network with all associated libraries running on a single-chip 8-bit microcontroller. We will describe how the system's design objectives and available resources were reconciled to combine the communication stack, data model and application code in a practical node that can operate as a sensor, actuator or controller.