SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020
IoT Security Assessment Framework
A data driven approach for the businesses
1
Complex & uncomprehended
The businesses should know 

• What they are deploying

• A checklist for a calculated risk 

• Potential attack surface

• Risk vs bene
fi
ts
IoT Security
Constrained
Devices
Big Scale
Tech Illiterates
Lack of UI, challenging to
design & con
fi
gure,
update, and prone to
errors
Applications & devices
are personal, and
involves humans &
physical world
Variety of devices,
protocols, &
applications
Big Impact
Safety & economic
risks, loss of
privacy and
business
interruptions
2
Typical IoT Network Segments
Typical networking technologies and corresponding security protocols
3
Cloud
PAN WAN
LAN Internet
IPSec Tunnel IPSec Tunnel
WiFi/
Ethernet
BB/LTE/MPLS
BLE,
802.15.4,
WiFi
SSP
Edge Router Apps
OTAE
CoAP/UDP/DTLS/IPv6
IoT Security Assessment Framework
The proposal
The assessment framework standard will
provide

• A way for the industry to assess IoT
applications consisting of IoT devices and
Edge

• A checklist for devices and edge

• Necessary and su
ffi
cient conditions

• A scoring mechanisms

• Enable decision making

• Data driven analytics for security assessment
A set guidelines for the
device vendors and
application developers
A method for evaluating the
IoT applications for security
needs
Self assessment/IEEE
certi
fi
cation
4
Existing/Ongoing Standards/Work ...
@IEEE-SA
• Healthcare Device Security Assurance Working Group (EMB/Stds Com/
HDSecWG)

• Standard for Wireless Diabetes Device Security Assurance: Product
Security Evaluation Program

• This standard de
fi
nes a framework for a connected electronic product
security evaluation program
P2621.1
P2733
• Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/
Clinical IoT DDI with TIPPSS)

• Standard for Clinical Internet of Things (IoT) Data and Device
Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety,
Security

• This standard establishes the framework with TIPPSS principles (Trust,
Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things
(IoT) data and device validation and interoperability.
5
Existing/Ongoing Standards/Work
Outside IEEE
• GSMA IoT Security Guidelines and Assessment

• Provides recommendations for the secure design, development and
deployment of IoT services

• OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance
GSMA
IoTSF
• IoT Security Foundation - A not-for-pro
fi
t organization

• Provides advice and framework for IoT Security

• Has over 100 members, including ARM, NXP, Microchip, Samsung,
Vodafone, Qualcomm
6
ETSI EN 303 645
• IoT Security requirements for Consumer Devices

• Under development

• A potential candidate to collaborate
Other Established Standards/Compliance Guidelines
These will in
fl
uence the development of any new security standards
Information technology — Security techniques — Evaluation
criteria for IT security
ISO/IEC 15408
GDPR
Regulation on the protection of natural persons with regard to
the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (Data Protection
Directive)
HIPAA
The Health Insurance Portability and Accountability Act of
1996
PCI DSS Payment Card Industry Data Security Standard
7
IEEE Standard for an Architectural Framework for the Internet
of Things
IEEE 2413
IoT Security Requirements
The capabilities of the end devices should be considered for security assessment
Characteristic Class 0 Class 1 Class 2
RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB
Internet No IP CoAP IPv6, HIP
Cryptography Over the air
Symmetric
cryptography
PKI based
Protection One level up
Assisted at one level
up
Self and services at
one level up
Interface IoT Services
Security Provisioning
and Services
Security Services
Applications
Only for trusted
environments
Battery powered
under the Roof
Mains powered &
standalone devices
8
The Need for a New Standard
Data driven; Easy to understand and to be used by Business users
• Training, scaling, reducing costs and making
IoT deployments more secure 

• Device capabilities based approach

• De
fi
ning Necessary and Su
ffi
cient conditions

• Scoring/grading mechanism

• Easy to interpret checklist and summary for
for weighing risk vs. bene
fi
ts and decision
making

• Data driven approach (applying ML/AI for
assessment)

• Self assessment/IEEE certi
fi
cation
9
5C
Five Criteria
Broad Market Potential
A standards project authorized by IEEE 802 shall have a broad market potential. Speci
fi
cally, it
shall have the potential for:
11
• Broad sets of applicability

• IoT being adopted almost all business sectors, including residential and government
use. And security and privacy is the number one concern while considering an IoT
application. Hence the output of this project will have broad set of applicability.

• Multiple vendors and numerous users

• The number of devices that would be connected to the Internet is estimated to be in
tens of billions in the near future.

• Balanced costs (LAN versus attached stations)

• This project reduces the cost of IoT applications deployment by providing a repeatable
approach for security assessment and reduces the need for special skilled personnel.
Compatibility
IEEE 802 LMSC de
fi
nes a family of standards. All standards should be in conformance: IEEE Std
802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be
thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate
compatibility with this criterion, the Five Criteria statement must answer the following questions.
12
A. Does the PAR mandate that the standard shall comply with IEEE Std 802,
IEEE Std 802.1D and IEEE Std 802.1Q? 

• No. However, the standard would use the IEEE 802 standards.

B. If not, how will the Working Group ensure that the resulting draft standard is
compliant, or if not, receives appropriate review from the IEEE 802.1 Working
Group? 

• Not applicable.
Distinct Identity
Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project
shall be:
13
• Substantially di
ff
erent from other IEEE 802 standards

• This standard is not related to IEEE 802 standards.

• One unique solution per problem (not two solutions to a problem)

• There is no standard within IEEE that provides this capability.

• Easy for the document reader to select the relevant speci
fi
cation

• Yes, this project will de
fi
ne an assessment framework for deploying IoT
applications based on best practices for security and privacy.
Technical Feasibility
For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the
proposed project shall show:
14
• Demonstrated system feasibility

• Security assessment is typically prerequisite for any connected applications in the enterprise,
however the approach is proprietary.

• Proven technology, reasonable testing

• Not applicable.

• Con
fi
dence in reliability

• This standard will not reduce any existing system reliability.

• Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation.

• Not applicable.
Economic Feasibility
For a project to be authorized, it shall be able to show economic feasibility (so far as can
reasonably be estimated) for its intended applications. At a minimum, the proposed project shall
show:
15
• Known cost factors, reliable data

• This project will not introduce any new costs, rather will help in reducing
the cost of connected application deployment and maintenance.

• Reasonable cost for performance

• The benefit of security assessment will outweigh the cost of
assessment.

• Consideration of installation costs

• Not applicable.
Questions & Suggestions
16

Contenu connexe

Tendances

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTINGMosin A
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsChetan Kumar S
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Tyrone Systems
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Fastly
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...Intellipaat
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingCygnet Infotech
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journeyChetan Kumar S
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?Fastly
 

Tendances (20)

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Edge computing
Edge computingEdge computing
Edge computing
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 

Similaire à IoT Security Assessment - IEEE PAR Proposal

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSGabriel Paredes Loza
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAndy Taylor
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTRAJESHWARI M
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DividePriyanka Aash
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsAgence du Numérique (AdN)
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfKbNguyen1
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 SecurityDuncan Purves
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateBrandon Height
 

Similaire à IoT Security Assessment - IEEE PAR Proposal (20)

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWS
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdf
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
 

Plus de Syam Madanapalli

IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingSyam Madanapalli
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsSyam Madanapalli
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTSyam Madanapalli
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsSyam Madanapalli
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected WorldSyam Madanapalli
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsSyam Madanapalli
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceSyam Madanapalli
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart CitiesSyam Madanapalli
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School StudentsSyam Madanapalli
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliSyam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliSyam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015Syam Madanapalli
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesSyam Madanapalli
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchSyam Madanapalli
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of governmentSyam Madanapalli
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning SystemSyam Madanapalli
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSyam Madanapalli
 

Plus de Syam Madanapalli (20)

IoT, Careers, and Skills
IoT, Careers, and SkillsIoT, Careers, and Skills
IoT, Careers, and Skills
 
IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof Computing
 
Embracing the VUCA
Embracing the VUCAEmbracing the VUCA
Embracing the VUCA
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School Kids
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoT
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected World
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & Analytics
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a Service
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart Cities
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School Students
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and Opportunities
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a Switch
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning System
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For India
 

Dernier

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 

Dernier (20)

Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 

IoT Security Assessment - IEEE PAR Proposal

  • 1. Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020 IoT Security Assessment Framework A data driven approach for the businesses 1
  • 2. Complex & uncomprehended The businesses should know • What they are deploying • A checklist for a calculated risk • Potential attack surface • Risk vs bene fi ts IoT Security Constrained Devices Big Scale Tech Illiterates Lack of UI, challenging to design & con fi gure, update, and prone to errors Applications & devices are personal, and involves humans & physical world Variety of devices, protocols, & applications Big Impact Safety & economic risks, loss of privacy and business interruptions 2
  • 3. Typical IoT Network Segments Typical networking technologies and corresponding security protocols 3 Cloud PAN WAN LAN Internet IPSec Tunnel IPSec Tunnel WiFi/ Ethernet BB/LTE/MPLS BLE, 802.15.4, WiFi SSP Edge Router Apps OTAE CoAP/UDP/DTLS/IPv6
  • 4. IoT Security Assessment Framework The proposal The assessment framework standard will provide • A way for the industry to assess IoT applications consisting of IoT devices and Edge • A checklist for devices and edge • Necessary and su ffi cient conditions • A scoring mechanisms • Enable decision making • Data driven analytics for security assessment A set guidelines for the device vendors and application developers A method for evaluating the IoT applications for security needs Self assessment/IEEE certi fi cation 4
  • 5. Existing/Ongoing Standards/Work ... @IEEE-SA • Healthcare Device Security Assurance Working Group (EMB/Stds Com/ HDSecWG) • Standard for Wireless Diabetes Device Security Assurance: Product Security Evaluation Program • This standard de fi nes a framework for a connected electronic product security evaluation program P2621.1 P2733 • Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/ Clinical IoT DDI with TIPPSS) • Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety, Security • This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. 5
  • 6. Existing/Ongoing Standards/Work Outside IEEE • GSMA IoT Security Guidelines and Assessment • Provides recommendations for the secure design, development and deployment of IoT services • OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance GSMA IoTSF • IoT Security Foundation - A not-for-pro fi t organization • Provides advice and framework for IoT Security • Has over 100 members, including ARM, NXP, Microchip, Samsung, Vodafone, Qualcomm 6 ETSI EN 303 645 • IoT Security requirements for Consumer Devices • Under development • A potential candidate to collaborate
  • 7. Other Established Standards/Compliance Guidelines These will in fl uence the development of any new security standards Information technology — Security techniques — Evaluation criteria for IT security ISO/IEC 15408 GDPR Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive) HIPAA The Health Insurance Portability and Accountability Act of 1996 PCI DSS Payment Card Industry Data Security Standard 7 IEEE Standard for an Architectural Framework for the Internet of Things IEEE 2413
  • 8. IoT Security Requirements The capabilities of the end devices should be considered for security assessment Characteristic Class 0 Class 1 Class 2 RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB Internet No IP CoAP IPv6, HIP Cryptography Over the air Symmetric cryptography PKI based Protection One level up Assisted at one level up Self and services at one level up Interface IoT Services Security Provisioning and Services Security Services Applications Only for trusted environments Battery powered under the Roof Mains powered & standalone devices 8
  • 9. The Need for a New Standard Data driven; Easy to understand and to be used by Business users • Training, scaling, reducing costs and making IoT deployments more secure • Device capabilities based approach • De fi ning Necessary and Su ffi cient conditions • Scoring/grading mechanism • Easy to interpret checklist and summary for for weighing risk vs. bene fi ts and decision making • Data driven approach (applying ML/AI for assessment) • Self assessment/IEEE certi fi cation 9
  • 11. Broad Market Potential A standards project authorized by IEEE 802 shall have a broad market potential. Speci fi cally, it shall have the potential for: 11 • Broad sets of applicability • IoT being adopted almost all business sectors, including residential and government use. And security and privacy is the number one concern while considering an IoT application. Hence the output of this project will have broad set of applicability. • Multiple vendors and numerous users • The number of devices that would be connected to the Internet is estimated to be in tens of billions in the near future. • Balanced costs (LAN versus attached stations) • This project reduces the cost of IoT applications deployment by providing a repeatable approach for security assessment and reduces the need for special skilled personnel.
  • 12. Compatibility IEEE 802 LMSC de fi nes a family of standards. All standards should be in conformance: IEEE Std 802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate compatibility with this criterion, the Five Criteria statement must answer the following questions. 12 A. Does the PAR mandate that the standard shall comply with IEEE Std 802, IEEE Std 802.1D and IEEE Std 802.1Q? • No. However, the standard would use the IEEE 802 standards. B. If not, how will the Working Group ensure that the resulting draft standard is compliant, or if not, receives appropriate review from the IEEE 802.1 Working Group? • Not applicable.
  • 13. Distinct Identity Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project shall be: 13 • Substantially di ff erent from other IEEE 802 standards • This standard is not related to IEEE 802 standards. • One unique solution per problem (not two solutions to a problem) • There is no standard within IEEE that provides this capability. • Easy for the document reader to select the relevant speci fi cation • Yes, this project will de fi ne an assessment framework for deploying IoT applications based on best practices for security and privacy.
  • 14. Technical Feasibility For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the proposed project shall show: 14 • Demonstrated system feasibility • Security assessment is typically prerequisite for any connected applications in the enterprise, however the approach is proprietary. • Proven technology, reasonable testing • Not applicable. • Con fi dence in reliability • This standard will not reduce any existing system reliability. • Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation. • Not applicable.
  • 15. Economic Feasibility For a project to be authorized, it shall be able to show economic feasibility (so far as can reasonably be estimated) for its intended applications. At a minimum, the proposed project shall show: 15 • Known cost factors, reliable data • This project will not introduce any new costs, rather will help in reducing the cost of connected application deployment and maintenance. • Reasonable cost for performance • The benefit of security assessment will outweigh the cost of assessment. • Consideration of installation costs • Not applicable.