SlideShare a Scribd company logo
1 of 44
Some thoughts on IoT
Geoff Huston
Chief Scientist, APNIC
Technology
Does technology change society, or do we develop
and adopt technology to address society’s changes?
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent calligraphy.
He responded to a need in ancient Chinese society
for more and higher quality written documents that
could be produced faster
Technology
Does technology change society, or do we develop
and adopt technology to address society’s changes?
When Meng Tian invented the camel hair
paintbrush in 250 BCE he did not invent calligraphy.
He responded to a need in ancient Chinese society
for more and higher quality written documents that
could be produced faster
The most profound technologies are those that
disappear. They weave themselves into the fabric
of everyday life until they are indistinguishable
from it...
- Mark Weiser 1991
Technology
So how should we look at the Internet of Things?
Is this merely a temporary consumer fad, destined to be
replaced by the next cool technology item?
Or is this an instance of a profound technology change that
answers a basic need in our society that will bed down to be
a part of our everyday life for many years to come?
To try and answer this, lets try and put this
question into some broader context of the
evolution the computer and communications
enterprise
Computers were esoteric high frontier research projects
1946 – Eniac – a numeric calculator
1964: IBM 360
Then they became a “must have” business tool
1964 IBM 360 – commercial computing
The Computing Evolutionary Path
Extravagant statements of techno power
1976 CRAY-1 – “super” computing
The Computing Evolutionary Path
1976: Apple I
But there was also the hobbyist market
1976 – Apple-1 “personal” computing
Consumer computers as a statement of design style
1984 – Mac
From Style to Mass Marketed Luxury Item
2007 – Apple’s iPhone
With desktop devices the Internet of computers was a dedicated activity
dedicated chair
lighting
wired bandwidth
large view screens
privacy
dedicated worktop
reliable power
The Internet is now anywhere and everywhere
Its trivial, commonplace and blends into all our activities
radio connectivity
battery power
hand sized
Thumb
operated
As dedicated “things” are replacing it
Maybe its about the demise of the “traditional” computer
Connecting “things” to the Internet is nothing new
Simon Hackett’s Internet Remote Radio of 1990
John Romkey’s Internet Toaster – Let them eat Toast!
Connecting “things” to the Internet is nothing new
This new IoT is just the old IoT
The use of microprocessors to undertake simple
tasks is about as old as the Intel 4004 and the
Zylogics Z80 processor chips
This new IoT is just the old IoT
(with new lipstick!)
And we are already living in a processing-dense
world
A modern car has around 150 – 200 microprocessor-
controlled systems, from the windscreen wipers, to the
entry system, to engine control and all things in between
Many / most consumer appliances have all turned to
microprocessor control
Industrial processes, logistics and inventory control,
environmental monitoring all use various forms of
embedded processing
So why is IoT a hot topic today?
This new IoT is just the old IoT
(with new lipstick!)
And we are already living in a processing-dense
world
A modern car has around 150 – 200 microprocessor-
controlled systems, from the windscreen wipers, to the
entry system, to engine control and all things in between
Many / most consumer appliances have all turned to
microprocessor control
Industrial processes, logistics and inventory control,
environmental monitoring all use various forms of
embedded processing
So why is IoT a hot topic today?
The Hype
• Gartner Predictions
• CES shows
• Home Apps
• Car Apps
IoT is …?
• It is a generic term that encompasses a huge variety
of application that have little in common other than
a propensity to operate in an unmanaged
environment
• Its hard to talk about the IoT in anything other than
highly generic terms
Why now?
• Low power, high capability silicon now dominates chip
fabrication plants
Saturation of the smart device market
Full stream silicon production volumes requires some form
of consumption model
• Radio Technology: RFID, Bluetooth, WiFi, LTE
• Improvements in AD convertors is providing range and
bandwidth to radio systems
• Protocol development provides ”seamless” connectivity
• i.e. Passports and Clothing Tags, Apple earbuds, Home
controllers and similar
• Actors seeking new markets
• 5G for SIMs and wide area mobility
• Smart phone platform providers seeking to enter the
car, home and work environments
• Industrial and process automation seeking to expand
market reach
Why now?
• Because we have saturated our traditional markets
for technology and the production capacity is being
redirected to new opportunities
• PC sales volumes plummeting
• Smartphone sales are now peaking
• The computer technology industry is seeking to use its
existing capability to provide new product to high
volume markets
• Which means looking at low unit margin very high
volume opportunities by adding ”smart” network centric
interfaces and controllers to existing devices and
functions
The opportunities
• “smart” lighting - e.g. Philips
• “smart” home appliances and networks - e.g. Miele
• “smart” power management
• ”smart” labels for retail
• “smart” traffic control
• “smart” image analysis
• “smart” video surveillence
• Almost anything else that uses the word “smart”
The Variety of Life
It’s a set of discrete applications that have highly
divergent requirements:
• Radius of connectivity varies from mm to kilometers
• Bandwidth varies from bits to gigabits per second
• Data volumes vary from bytes to petabytes
• Connectivity models may be push or pull
• Connectivity may be ad-hoc relays to dedicated wired
• Transactions may be unicast, multicast or anycast in nature
• Applications include sensing and reporting, command and
control, adaptation and interfacing
There is little that these environments have in common,
except maybe a common underlying gene pool!
The IoT Gene Pool
Unix
• Its small, its ubiquitous, its well understood, its cheap,
its open source without onerous IPR constraints, it has a
massive set of application libraries
• Customised micro kernels are risky, expensive and rarely
necessary
IP
• Its small, its ubiquitous, it scales, its well understood, its
cheap, its open source without onerous IPR constraints,
and everyone speaks it!
• But which IP?
IPv4 and IoT
• The “conservative” option for IP in this environment
• Ubiquitous support across the entire deployed Internet
• Well understood protocol behaviour
• Widely available APIs
Of course it should also be useful to factor in NATs in IPv4:
• Push model where the “thing” pushes data to a rendezvous
point rather than a constant pollable model of “pull” access
• “pull” and “feeder” models work behind NATs using relays
and/or ALGs split the primary feed from the propagation of
the data
IPv6 and IoT
• It’s the “killer app” for IPv6
• But the numbers suggest otherwise:
• 7B connected “devices” on today’s IPv4 Internet, plus a further 7B
conventional PC and smart devices
• 2.8B announced IPv4 addresses
• 1.3B “used” IPv4 addresses
• We can probably push this model harder!
“Thing” Behaviour
Pull:
• Device is always connected and interrogated by
external agents
• A model of polling or feed subscription where the device
maintains information that can be polled by an external agent
• This requires an public IP address + Port
• It also requires a highly robust core implementation that is
resistant to attack
• It also requires some considerable thought on the
authorization model
• Device is configured to authorize users and/or
• Device uses a third party auth server
• Commonly seen in web cams and other continuous
monitoring applications (though it’s not necessarily required)
Pull vs Push
Push:
• Intermittedly connected and interrogated via external
agents
• Device pushes data to some data collection agent
• Limited connection requirement
• This behaviour NAT ”friendly” as the device is the client and the
collection point is the server
• External access via the data collection agent, not the device
• Does not require dedicated addressing outside of the local context
• This limited access model facilitates defensive measures, including
encrypted communications to the device’s agents and preventing all
third party connections
• And such devices probably should be behind a NAT in any case! (e.g.
cameras)
Security
Seen at NANOG 69…
Security
Interesting ...
“At last count I have about 43 devices on my LAN, with less than a third
running an OS that I can actually interact with. The rest are embedded
systems that get updated (hah!) by the vendors at their whim. Easily two-
thirds would 'phone home' to somewhere at various times. About 7 have
external access without explicitly setting port-forwarding.
Of course, my router monitors and reports on all outbound traffic - but do
I actively look at it? I should. But I don’t. And of course everything we
value on our LAN we protect and encrypt end-to-end and at-rest as the LAN
is actually occupied by foreign devices with unknown network capability...
sure we encrypt absolutely everything...”
An Internet of Stupid Things
We keep on seeing the same stupidity again and again:
• Devices with the telnet port open
• Devices with open DNS resolvers on the WAN side
• Devices with open NTP / SNMP / chargen etc
• Devices with the same preset root password
• Devices using vulnerable libraries that are susceptible to
root kit exploitation
Insanely
The Internet of Stupid Things
• How do you perform field upgrades of otherwise
neglected and unmanaged devices
• What’s the economics of incenting field upgrades
from the manufacturer?
• Who is responsible for broken “things”?
The Internet of Stupid Things
Is this stupidity even avoidable?
• The bleak picture is maybe not!
• In a price sensitive market where system robustness and
quality is largely intangible where is the motive to
maintain high quality code?
• How can a consumer tell the difference in the quality of
the software, in term of its robustness and security of
operation?
high clockspeed industry + commodity components + low
margin = market failure for IoT Security
Privacy
Privacy
Some things you can count on…
• The volumes are already huge, and they’re growing
• “Things” already outnumber everything else on the
Internet
• Security is an unachievable word!
• Privacy is now an historical concept
• Digital pollution is pervasive and we now have an
internet that is a largely chaotic and hostile
environment
And some things we can’t tell
• Will we standardize this area or will it be a diverse
set of mutually incompatible devices?
• Will the market consolidate to be dominated by a
small number of providers and their pseudo-open
proprietary architectures?
• When will the IoT embrace IPv6?
• Will the IoT market ever discriminate on quality and
rebustness?
• How do we manage the risk of coercion of these
devices?
And some things we can’t tell
• How bad can it get?
It’s a tough problem…
"The market can't fix this because neither the buyer nor the seller
cares.
The owners of the webcams and DVRs used in the denial-of-service attacks
don't care. Their devices were cheap to buy, they still work, and they
don't know any of the victims of the attacks.
The sellers of those devices don't care: They're now selling newer and
better models, and the original buyers only cared about price and
features.
There is no market solution, because the insecurity is what economists
call an externality: It's an effect of the purchasing decision that
affects other people. Think of it kind of like invisible pollution."
https://www.schneier.com/blog/archives/2017/02/security_and_th.html
Thanks!

More Related Content

What's hot

Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...APNIC
 
Pacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetPacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetAPNIC
 
Government
Government Government
Government APNIC
 
btNOG 4: IPv6 deployment - where are we now?
btNOG 4: IPv6 deployment - where are we now?btNOG 4: IPv6 deployment - where are we now?
btNOG 4: IPv6 deployment - where are we now?APNIC
 
APSIG 2016 - IANA Transition: Why do we care?
APSIG 2016 -  IANA Transition: Why do we care?APSIG 2016 -  IANA Transition: Why do we care?
APSIG 2016 - IANA Transition: Why do we care?APNIC
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataAPNIC
 
ARIN IP Address Stewardship
ARIN IP Address StewardshipARIN IP Address Stewardship
ARIN IP Address StewardshipARIN
 
Internet Operations and the RIRs
Internet Operations and the RIRsInternet Operations and the RIRs
Internet Operations and the RIRsARIN
 
IPv6 deployment, India
IPv6 deployment, IndiaIPv6 deployment, India
IPv6 deployment, IndiaAPNIC
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24APNIC
 
IPv6 and Internet of Things: A Nice Couple
IPv6 and Internet of Things: A Nice CoupleIPv6 and Internet of Things: A Nice Couple
IPv6 and Internet of Things: A Nice CoupleRIPE NCC
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOGSiena Perry
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South AsiaAPNIC
 
CES 2016 Panel: Your Customers Are on the New Internet – Are you?
CES 2016 Panel: Your Customers Are on the New Internet – Are you?CES 2016 Panel: Your Customers Are on the New Internet – Are you?
CES 2016 Panel: Your Customers Are on the New Internet – Are you?ARIN
 
IPv6 Deployment, Lao ICT Expo 2016
IPv6 Deployment, Lao ICT Expo 2016IPv6 Deployment, Lao ICT Expo 2016
IPv6 Deployment, Lao ICT Expo 2016APNIC
 
IPv6 performance
IPv6 performanceIPv6 performance
IPv6 performanceAPNIC
 
CNNIC OPM: Global IP address allocation update
CNNIC OPM: Global IP address allocation updateCNNIC OPM: Global IP address allocation update
CNNIC OPM: Global IP address allocation updateAPNIC
 
IPv6 readiness among APEC TEL member economies
IPv6 readiness among APEC TEL member economiesIPv6 readiness among APEC TEL member economies
IPv6 readiness among APEC TEL member economiesAPNIC
 

What's hot (20)

Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
Source Address Validation Everywhere, by Paul Vixie [APNIC 38 / Technical Key...
 
Pacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the InternetPacific ICT Days - IPv6: The future of the Internet
Pacific ICT Days - IPv6: The future of the Internet
 
Government
Government Government
Government
 
btNOG 4: IPv6 deployment - where are we now?
btNOG 4: IPv6 deployment - where are we now?btNOG 4: IPv6 deployment - where are we now?
btNOG 4: IPv6 deployment - where are we now?
 
APSIG 2016 - IANA Transition: Why do we care?
APSIG 2016 -  IANA Transition: Why do we care?APSIG 2016 -  IANA Transition: Why do we care?
APSIG 2016 - IANA Transition: Why do we care?
 
Drilling down into networks from the APNIC data
Drilling down into networks from the APNIC dataDrilling down into networks from the APNIC data
Drilling down into networks from the APNIC data
 
ARIN IP Address Stewardship
ARIN IP Address StewardshipARIN IP Address Stewardship
ARIN IP Address Stewardship
 
Internet Operations and the RIRs
Internet Operations and the RIRsInternet Operations and the RIRs
Internet Operations and the RIRs
 
IPv6 deployment, India
IPv6 deployment, IndiaIPv6 deployment, India
IPv6 deployment, India
 
Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24Internet Resource Management Tutorial at SANOG 24
Internet Resource Management Tutorial at SANOG 24
 
IPv6 and Internet of Things: A Nice Couple
IPv6 and Internet of Things: A Nice CoupleIPv6 and Internet of Things: A Nice Couple
IPv6 and Internet of Things: A Nice Couple
 
Introduction to RPKI - MyNOG
Introduction to RPKI - MyNOGIntroduction to RPKI - MyNOG
Introduction to RPKI - MyNOG
 
Internet infrastructure in South Asia
Internet infrastructure in South AsiaInternet infrastructure in South Asia
Internet infrastructure in South Asia
 
CES 2016 Panel: Your Customers Are on the New Internet – Are you?
CES 2016 Panel: Your Customers Are on the New Internet – Are you?CES 2016 Panel: Your Customers Are on the New Internet – Are you?
CES 2016 Panel: Your Customers Are on the New Internet – Are you?
 
ION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment UpdateION Sri Lanka - IPv6 Deployment Update
ION Sri Lanka - IPv6 Deployment Update
 
IPv6 Deployment, Lao ICT Expo 2016
IPv6 Deployment, Lao ICT Expo 2016IPv6 Deployment, Lao ICT Expo 2016
IPv6 Deployment, Lao ICT Expo 2016
 
Local Solution with Global Potential
Local Solution with Global PotentialLocal Solution with Global Potential
Local Solution with Global Potential
 
IPv6 performance
IPv6 performanceIPv6 performance
IPv6 performance
 
CNNIC OPM: Global IP address allocation update
CNNIC OPM: Global IP address allocation updateCNNIC OPM: Global IP address allocation update
CNNIC OPM: Global IP address allocation update
 
IPv6 readiness among APEC TEL member economies
IPv6 readiness among APEC TEL member economiesIPv6 readiness among APEC TEL member economies
IPv6 readiness among APEC TEL member economies
 

Viewers also liked

A Peering Strategy for the Pacific Islands
A Peering Strategy for the Pacific IslandsA Peering Strategy for the Pacific Islands
A Peering Strategy for the Pacific IslandsAPNIC
 
Equinix peering location matters 2016_feb_24
Equinix peering location matters 2016_feb_24Equinix peering location matters 2016_feb_24
Equinix peering location matters 2016_feb_24EquinixUK
 
Peering 101
Peering 101Peering 101
Peering 101APNIC
 
IANA Numbering Services Review Committee
IANA Numbering Services Review CommitteeIANA Numbering Services Review Committee
IANA Numbering Services Review CommitteeAPNIC
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRSAPNIC
 
NANOG 68: Decoding Performance Data from Large-Scale Internet Outages
NANOG 68: Decoding Performance Data from Large-Scale Internet OutagesNANOG 68: Decoding Performance Data from Large-Scale Internet Outages
NANOG 68: Decoding Performance Data from Large-Scale Internet OutagesThousandEyes
 
Solucion industrialempresarial-161017170618-170221174435
Solucion industrialempresarial-161017170618-170221174435Solucion industrialempresarial-161017170618-170221174435
Solucion industrialempresarial-161017170618-170221174435Maxwell Altamirano
 
Peering Forum: Personals Track
Peering Forum: Personals TrackPeering Forum: Personals Track
Peering Forum: Personals TrackAPNIC
 
ASO AC Report
ASO AC ReportASO AC Report
ASO AC ReportAPNIC
 
Soal try out 1 ujian nasional Kimia 2017
Soal try out 1 ujian nasional Kimia 2017Soal try out 1 ujian nasional Kimia 2017
Soal try out 1 ujian nasional Kimia 2017dasi anto
 
Hia 1693-effective application-development_in_iib
Hia 1693-effective application-development_in_iibHia 1693-effective application-development_in_iib
Hia 1693-effective application-development_in_iibAndrew Coleman
 
Case Studies: TakNet
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNetAPNIC
 
Industria 4.0 y Big Data
Industria 4.0 y Big DataIndustria 4.0 y Big Data
Industria 4.0 y Big DataEnrique Puertas
 
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ ClustersDavid Ware
 
Hia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economyHia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economyAndrew Coleman
 
GetShift - IoT Devices Done Right.
GetShift - IoT Devices Done Right.GetShift - IoT Devices Done Right.
GetShift - IoT Devices Done Right.Sean Greenhalgh
 

Viewers also liked (20)

A Peering Strategy for the Pacific Islands
A Peering Strategy for the Pacific IslandsA Peering Strategy for the Pacific Islands
A Peering Strategy for the Pacific Islands
 
Equinix peering location matters 2016_feb_24
Equinix peering location matters 2016_feb_24Equinix peering location matters 2016_feb_24
Equinix peering location matters 2016_feb_24
 
Peering 101
Peering 101Peering 101
Peering 101
 
IANA Numbering Services Review Committee
IANA Numbering Services Review CommitteeIANA Numbering Services Review Committee
IANA Numbering Services Review Committee
 
Two years of good MANRS
Two years of good MANRSTwo years of good MANRS
Two years of good MANRS
 
NANOG 68: Decoding Performance Data from Large-Scale Internet Outages
NANOG 68: Decoding Performance Data from Large-Scale Internet OutagesNANOG 68: Decoding Performance Data from Large-Scale Internet Outages
NANOG 68: Decoding Performance Data from Large-Scale Internet Outages
 
Estandares
Estandares Estandares
Estandares
 
Solucion industrialempresarial-161017170618-170221174435
Solucion industrialempresarial-161017170618-170221174435Solucion industrialempresarial-161017170618-170221174435
Solucion industrialempresarial-161017170618-170221174435
 
Peering Forum: Personals Track
Peering Forum: Personals TrackPeering Forum: Personals Track
Peering Forum: Personals Track
 
ASO AC Report
ASO AC ReportASO AC Report
ASO AC Report
 
Marketing for entrepreneurial ventures
Marketing for entrepreneurial venturesMarketing for entrepreneurial ventures
Marketing for entrepreneurial ventures
 
Contencioso tributario (1)
Contencioso tributario (1)Contencioso tributario (1)
Contencioso tributario (1)
 
Soal try out 1 ujian nasional Kimia 2017
Soal try out 1 ujian nasional Kimia 2017Soal try out 1 ujian nasional Kimia 2017
Soal try out 1 ujian nasional Kimia 2017
 
Hia 1693-effective application-development_in_iib
Hia 1693-effective application-development_in_iibHia 1693-effective application-development_in_iib
Hia 1693-effective application-development_in_iib
 
Atelier Feedly
Atelier FeedlyAtelier Feedly
Atelier Feedly
 
Case Studies: TakNet
Case Studies: TakNetCase Studies: TakNet
Case Studies: TakNet
 
Industria 4.0 y Big Data
Industria 4.0 y Big DataIndustria 4.0 y Big Data
Industria 4.0 y Big Data
 
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ ClustersIBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ Clusters
IBM WebSphere MQ: Managing Workloads, Scaling and Availability with MQ Clusters
 
Hia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economyHia 1691-using iib-to_support_api_economy
Hia 1691-using iib-to_support_api_economy
 
GetShift - IoT Devices Done Right.
GetShift - IoT Devices Done Right.GetShift - IoT Devices Done Right.
GetShift - IoT Devices Done Right.
 

Similar to IoT Insights on Society, Technology and Security

AusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoTAusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoTAPNIC
 
SGNOG 5: Some thoughts on IoT
SGNOG 5: Some thoughts on IoTSGNOG 5: Some thoughts on IoT
SGNOG 5: Some thoughts on IoTAPNIC
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of ThingsQian JIN
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesAsim Rais Siddiqui
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)Abhishek kr. Singh
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).BHAVIN GOSWAMI
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatinabati
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeJustin Grammens
 
Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01saikiran dabre
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019John D. Johnson
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfDanishMahmood23
 
Internet of things
Internet of thingsInternet of things
Internet of thingsabhishekroc6
 

Similar to IoT Insights on Society, Technology and Security (20)

AusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoTAusNOG 2017: Some thoughts on IoT
AusNOG 2017: Some thoughts on IoT
 
SGNOG 5: Some thoughts on IoT
SGNOG 5: Some thoughts on IoTSGNOG 5: Some thoughts on IoT
SGNOG 5: Some thoughts on IoT
 
Demystifying Internet of Things
Demystifying Internet of ThingsDemystifying Internet of Things
Demystifying Internet of Things
 
IoT Development - Opportunities and Challenges
IoT Development - Opportunities and ChallengesIoT Development - Opportunities and Challenges
IoT Development - Opportunities and Challenges
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)INTERNET OF THINGS (TEAM YMCA)
INTERNET OF THINGS (TEAM YMCA)
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
World of IoT (Internet of Things).
World of IoT (Internet of Things).World of IoT (Internet of Things).
World of IoT (Internet of Things).
 
Internet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabatiInternet of things (IoT) and big data- r.nabati
Internet of things (IoT) and big data- r.nabati
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Arduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things LandscapeArduino, Open Source and The Internet of Things Landscape
Arduino, Open Source and The Internet of Things Landscape
 
Chapter~4.pptx
Chapter~4.pptxChapter~4.pptx
Chapter~4.pptx
 
Io t
Io tIo t
Io t
 
Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01Internetofthings 111021131418-phpapp01
Internetofthings 111021131418-phpapp01
 
Sfit2
Sfit2Sfit2
Sfit2
 
IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019IoT and the industrial Internet of Things - june 20 2019
IoT and the industrial Internet of Things - june 20 2019
 
IoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdfIoT_IO1_1 Introduction to the IoT-1.pdf
IoT_IO1_1 Introduction to the IoT-1.pdf
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Understanding big data using IoT
Understanding big data using IoTUnderstanding big data using IoT
Understanding big data using IoT
 

More from APNIC

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAPNIC
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAPNIC
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsAPNIC
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemAPNIC
 

More from APNIC (20)

IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 
AFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & DevelopmentAFSIG 2023: APNIC - Registry & Development
AFSIG 2023: APNIC - Registry & Development
 
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurityAfghanistan IGF 2023: The ABCs and importance of cybersecurity
Afghanistan IGF 2023: The ABCs and importance of cybersecurity
 
IDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerationsIDNIC OPM 2023: IPv6 deployment planning and security considerations
IDNIC OPM 2023: IPv6 deployment planning and security considerations
 
IDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry SystemIDNIC OPM 2023 - Internet Number Registry System
IDNIC OPM 2023 - Internet Number Registry System
 

Recently uploaded

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 

Recently uploaded (20)

Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 

IoT Insights on Society, Technology and Security

  • 1. Some thoughts on IoT Geoff Huston Chief Scientist, APNIC
  • 2. Technology Does technology change society, or do we develop and adopt technology to address society’s changes? When Meng Tian invented the camel hair paintbrush in 250 BCE he did not invent calligraphy. He responded to a need in ancient Chinese society for more and higher quality written documents that could be produced faster Technology Does technology change society, or do we develop and adopt technology to address society’s changes? When Meng Tian invented the camel hair paintbrush in 250 BCE he did not invent calligraphy. He responded to a need in ancient Chinese society for more and higher quality written documents that could be produced faster
  • 3. The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it... - Mark Weiser 1991 Technology
  • 4. So how should we look at the Internet of Things? Is this merely a temporary consumer fad, destined to be replaced by the next cool technology item? Or is this an instance of a profound technology change that answers a basic need in our society that will bed down to be a part of our everyday life for many years to come?
  • 5. To try and answer this, lets try and put this question into some broader context of the evolution the computer and communications enterprise
  • 6. Computers were esoteric high frontier research projects 1946 – Eniac – a numeric calculator
  • 7. 1964: IBM 360 Then they became a “must have” business tool 1964 IBM 360 – commercial computing
  • 8. The Computing Evolutionary Path Extravagant statements of techno power 1976 CRAY-1 – “super” computing
  • 9. The Computing Evolutionary Path 1976: Apple I But there was also the hobbyist market 1976 – Apple-1 “personal” computing
  • 10. Consumer computers as a statement of design style 1984 – Mac
  • 11. From Style to Mass Marketed Luxury Item 2007 – Apple’s iPhone
  • 12.
  • 13. With desktop devices the Internet of computers was a dedicated activity dedicated chair lighting wired bandwidth large view screens privacy dedicated worktop reliable power
  • 14. The Internet is now anywhere and everywhere Its trivial, commonplace and blends into all our activities radio connectivity battery power hand sized Thumb operated
  • 15. As dedicated “things” are replacing it Maybe its about the demise of the “traditional” computer
  • 16. Connecting “things” to the Internet is nothing new Simon Hackett’s Internet Remote Radio of 1990
  • 17. John Romkey’s Internet Toaster – Let them eat Toast! Connecting “things” to the Internet is nothing new
  • 18. This new IoT is just the old IoT The use of microprocessors to undertake simple tasks is about as old as the Intel 4004 and the Zylogics Z80 processor chips
  • 19. This new IoT is just the old IoT (with new lipstick!) And we are already living in a processing-dense world A modern car has around 150 – 200 microprocessor- controlled systems, from the windscreen wipers, to the entry system, to engine control and all things in between Many / most consumer appliances have all turned to microprocessor control Industrial processes, logistics and inventory control, environmental monitoring all use various forms of embedded processing So why is IoT a hot topic today? This new IoT is just the old IoT (with new lipstick!) And we are already living in a processing-dense world A modern car has around 150 – 200 microprocessor- controlled systems, from the windscreen wipers, to the entry system, to engine control and all things in between Many / most consumer appliances have all turned to microprocessor control Industrial processes, logistics and inventory control, environmental monitoring all use various forms of embedded processing So why is IoT a hot topic today?
  • 20. The Hype • Gartner Predictions • CES shows • Home Apps • Car Apps
  • 21. IoT is …? • It is a generic term that encompasses a huge variety of application that have little in common other than a propensity to operate in an unmanaged environment • Its hard to talk about the IoT in anything other than highly generic terms
  • 22. Why now? • Low power, high capability silicon now dominates chip fabrication plants Saturation of the smart device market Full stream silicon production volumes requires some form of consumption model • Radio Technology: RFID, Bluetooth, WiFi, LTE • Improvements in AD convertors is providing range and bandwidth to radio systems • Protocol development provides ”seamless” connectivity • i.e. Passports and Clothing Tags, Apple earbuds, Home controllers and similar • Actors seeking new markets • 5G for SIMs and wide area mobility • Smart phone platform providers seeking to enter the car, home and work environments • Industrial and process automation seeking to expand market reach
  • 23. Why now? • Because we have saturated our traditional markets for technology and the production capacity is being redirected to new opportunities • PC sales volumes plummeting • Smartphone sales are now peaking • The computer technology industry is seeking to use its existing capability to provide new product to high volume markets • Which means looking at low unit margin very high volume opportunities by adding ”smart” network centric interfaces and controllers to existing devices and functions
  • 24. The opportunities • “smart” lighting - e.g. Philips • “smart” home appliances and networks - e.g. Miele • “smart” power management • ”smart” labels for retail • “smart” traffic control • “smart” image analysis • “smart” video surveillence • Almost anything else that uses the word “smart”
  • 25. The Variety of Life It’s a set of discrete applications that have highly divergent requirements: • Radius of connectivity varies from mm to kilometers • Bandwidth varies from bits to gigabits per second • Data volumes vary from bytes to petabytes • Connectivity models may be push or pull • Connectivity may be ad-hoc relays to dedicated wired • Transactions may be unicast, multicast or anycast in nature • Applications include sensing and reporting, command and control, adaptation and interfacing There is little that these environments have in common, except maybe a common underlying gene pool!
  • 26. The IoT Gene Pool Unix • Its small, its ubiquitous, its well understood, its cheap, its open source without onerous IPR constraints, it has a massive set of application libraries • Customised micro kernels are risky, expensive and rarely necessary IP • Its small, its ubiquitous, it scales, its well understood, its cheap, its open source without onerous IPR constraints, and everyone speaks it! • But which IP?
  • 27. IPv4 and IoT • The “conservative” option for IP in this environment • Ubiquitous support across the entire deployed Internet • Well understood protocol behaviour • Widely available APIs Of course it should also be useful to factor in NATs in IPv4: • Push model where the “thing” pushes data to a rendezvous point rather than a constant pollable model of “pull” access • “pull” and “feeder” models work behind NATs using relays and/or ALGs split the primary feed from the propagation of the data
  • 28. IPv6 and IoT • It’s the “killer app” for IPv6 • But the numbers suggest otherwise: • 7B connected “devices” on today’s IPv4 Internet, plus a further 7B conventional PC and smart devices • 2.8B announced IPv4 addresses • 1.3B “used” IPv4 addresses • We can probably push this model harder!
  • 29. “Thing” Behaviour Pull: • Device is always connected and interrogated by external agents • A model of polling or feed subscription where the device maintains information that can be polled by an external agent • This requires an public IP address + Port • It also requires a highly robust core implementation that is resistant to attack • It also requires some considerable thought on the authorization model • Device is configured to authorize users and/or • Device uses a third party auth server • Commonly seen in web cams and other continuous monitoring applications (though it’s not necessarily required)
  • 30. Pull vs Push Push: • Intermittedly connected and interrogated via external agents • Device pushes data to some data collection agent • Limited connection requirement • This behaviour NAT ”friendly” as the device is the client and the collection point is the server • External access via the data collection agent, not the device • Does not require dedicated addressing outside of the local context • This limited access model facilitates defensive measures, including encrypted communications to the device’s agents and preventing all third party connections • And such devices probably should be behind a NAT in any case! (e.g. cameras)
  • 32. Seen at NANOG 69…
  • 33. Security Interesting ... “At last count I have about 43 devices on my LAN, with less than a third running an OS that I can actually interact with. The rest are embedded systems that get updated (hah!) by the vendors at their whim. Easily two- thirds would 'phone home' to somewhere at various times. About 7 have external access without explicitly setting port-forwarding. Of course, my router monitors and reports on all outbound traffic - but do I actively look at it? I should. But I don’t. And of course everything we value on our LAN we protect and encrypt end-to-end and at-rest as the LAN is actually occupied by foreign devices with unknown network capability... sure we encrypt absolutely everything...”
  • 34. An Internet of Stupid Things We keep on seeing the same stupidity again and again: • Devices with the telnet port open • Devices with open DNS resolvers on the WAN side • Devices with open NTP / SNMP / chargen etc • Devices with the same preset root password • Devices using vulnerable libraries that are susceptible to root kit exploitation Insanely
  • 35. The Internet of Stupid Things • How do you perform field upgrades of otherwise neglected and unmanaged devices • What’s the economics of incenting field upgrades from the manufacturer? • Who is responsible for broken “things”?
  • 36. The Internet of Stupid Things Is this stupidity even avoidable? • The bleak picture is maybe not! • In a price sensitive market where system robustness and quality is largely intangible where is the motive to maintain high quality code? • How can a consumer tell the difference in the quality of the software, in term of its robustness and security of operation? high clockspeed industry + commodity components + low margin = market failure for IoT Security
  • 39. Some things you can count on… • The volumes are already huge, and they’re growing • “Things” already outnumber everything else on the Internet • Security is an unachievable word! • Privacy is now an historical concept • Digital pollution is pervasive and we now have an internet that is a largely chaotic and hostile environment
  • 40. And some things we can’t tell • Will we standardize this area or will it be a diverse set of mutually incompatible devices? • Will the market consolidate to be dominated by a small number of providers and their pseudo-open proprietary architectures? • When will the IoT embrace IPv6? • Will the IoT market ever discriminate on quality and rebustness? • How do we manage the risk of coercion of these devices?
  • 41. And some things we can’t tell • How bad can it get?
  • 42. It’s a tough problem… "The market can't fix this because neither the buyer nor the seller cares. The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their devices were cheap to buy, they still work, and they don't know any of the victims of the attacks. The sellers of those devices don't care: They're now selling newer and better models, and the original buyers only cared about price and features. There is no market solution, because the insecurity is what economists call an externality: It's an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution." https://www.schneier.com/blog/archives/2017/02/security_and_th.html
  • 43.