109207246
Dark 1
255255255
Light 1
13156155
Dark 2
099190
Light 2
8516528
Accent 1
2147342
Accent 2
185175164
Accent 3
151757
Accent 4
1931870
Accent 5
25522162
Accent 6
255255255
Hyperlink
23613729
Followed Hyperlink
127175221
Tata Blue 50%
203215238
Tata Blue 25%
179149197
Purple 50 %
212195223
Purple 25 %
255242171
Yellow 50 %
255249213
Yellow 25 %
229205186
Brown 50 %
248241235
Brown 25 %
180213154
Green 50 %
214231200
Green 25 %
241240202
Light Green 50%
251251241
Light Green 25%
Title and Content
2
Ever Smaller, Faster, Cheaper, Inter & Intra Connected
Devices and Things
Increasing Complexity of Resultant Ecosystems will
increase Security & Privacy concerns
Tremendous new business opportunities will emerge as a
consequence in this new frontier
3
’
Smart TransportationSmart Kitchen Smart Home
Automation
Smart OfficeSmart Dining
Smart Navigation
Smart
ShoppingSmart
SocializingSmart Infotainment
4
UCLA creates ARPANET, the beginning of Internet
1969
1982
e-Commerce appearance (ATM & telephone banking)
1990
Official public face of Internet
1994
e-Commerce online appearance
1995
Official launch of AMAZON.COM
Official launch of
YAHOO.COM
Official launch of EBAY.COM,
MSN.COM
1998
ICQ launching
Official launch of
GOOGLE.COM
2000
Dot-Com companies
collapse
WIKIPEDIA.ORGlaunching
2001
OVERTURE.COM official launching
2002 2005
LIVE.COM official launching
YouTube launching
2006
Twitter launching
2007 2008 2009 2010
Online TV Shows
iPhone & Mobile Web
Internet Election in US
ICANN policy changes
1st
Webmail
2004
Concept of Web 2.0 & Social Media; Facebook launched
PAYPAL.COM official launching
US passes the Cybersecurity Enhancement Act
1971
Email was born
1991
1st WWW page; 1st
Webcam
334 users on the network
255,000 users on the network
300 million users on the network
640 million users on the network
1.1 billion users on the network
1.7 billion users on the network
“social” or “experience” webcommunicate, connect, and share
information
Phase-I Phase-II Phase-III Phase-IV
Concept of IOT
5
• With advances in miniaturization and nanotechnology, smaller and smaller things will have the ability to interact and connect, at alower cost
• Eventually - particles as small as dust might be tagged and networked
• Lack of integration between virtual & real world – causes many business problems
• RFID and related technologies finally close this gap
Advances in Miniaturization RFID technology - pivotal enablers of IoT
Source: ITU “Ubiquitous Network Societies and their impact on the telecommunication industry
6
• The number of devices could range from a minimum of six billion to a maximum of 44 billion by 2020.• Household items will make up over 70% of all connected devices• By 2020, North America will have the most devices per person, with the highest estimates predicting
as many as 23.2 devices per person in the region.• The Middle East and Africa are expected to have the fewest devices, where estimates are as low as 0.2
per person
Forecast of Internet Usage
• The concept of Internet of Things can be regarded as an extension of the existing interaction betweenhumans and applications through the new dimension of “Things” communication and integration.
• The vision of Future Internet based on standard communication protocols considers the merging ofcomputer networks, Internet of Media (IoM), Internet of Services (IoS), and Internet of Things (IoT)into a common global IT platform of seamless networks and networked “things”.
Future Internet
IoT IoM IoS IoE
IoT – Internet of Things IoM – Internet of Media
IoS – Internet of Services IoE – Internet of
EnterprisesSource: CASAGRAS
Society
8
The Changing Web – From 1.0 to 3.0 The Internet of Things Was “Born” Between 2008 and 2009
The evolution from Internet of People to Internet of Things IoT Can Be Viewed as a Network of Networks
Source: Gary Hayes, 2006
9
• A new dimension in the world of information and communication technologies (ICTs): from anytime, any place connectivity foranyone, we will now have connectivity for anything, ideally using Any path/network and Any service.
• Dynamic network of billions or trillions of wireless identifiable “things” communicating with one another and integrating thedevelopments from concepts like Pervasive Computing, Ubiquitous Computing and Ambient Intelligence
• Fusion of the digital world and the physical world through - pervasive networks, miniaturization of devices, mobile communication,and new models for business processes
IoT – Adding a New Dimension
Source: CASAGRAS
ANYTIME
ANYWHERE
ANYBODY
10
Audio web surfing
The end of .com domination
Input revisited
Mobile networking
Web surf on any device
Text-to-Speech reads; Rather than reading and clicking, theaudience can tell the browser where they want to go withspoken commands
Integrating the Internet into every possible device
Multi-touch computing; Touch screen technology; SimpleGesture implementation
For years, Internet has been about serving the singular user.Multiple-user experiences seem like the next logical step
In the very near future new extensions will be popping moreoften; Domain Service giants will start selling "ExtensionSubscriptions"
- 11 -
Challenges
of IoT
Security & PrivacyTechnological
Standardization
Managing & fostering rapid
innovation
• Technological standardization in most areas - nanotechnology and robotics, is still in its infancy, or remainsfragmented
• Managing and fostering rapid innovation is a challenge for governments and industry alike
• The most important challenges are the protection of data and privacy
• Concerns over privacy and data protection are widespread, particularly as sensors and smart tags can track users’movements, habits and ongoing preferences
• Protecting privacy must not be limited to technical solutions, but encompass regulatory, market-based and socio-ethical considerations
Security & Privacy Needs Facets of Privacy Protection in IoT
Resilience to attacks
Data authentication
Access control
Data Integrity
Encryption, Signatures by tags/objects
Client privacy
Internet of Things – New security and privacy challenges – by Rolf H. Weber
• Categorization and analysis is a first step towards understanding the Internet of Things
• The categorization of IoT helps to detail on the security and privacy sensitivity in the respectivefields
• Have to identify how sensitive are they to security & privacy properties
• Enables to develop an integrated security & privacy approach for the Internet of Things
Categorization & Technologies that Make Up IoT Sensitivity to Security & Privacy
Security and Privacy Challenges in the Internet of Things by Christoph P. Mayer -KiVS Workshop on Global Sensor Networks
14
Source: The Internet Society survey,2011
The following chart shows the % contribution of threats coming from major sources as analyzed by the Internet Society
SaaS Will Move from a Complement to a Competitor of Other Security Platforms
Identity Will Be Core to Cloud Security
Security Will Become Predictive
Virtualization Security Will Seep Out of the Datacenter and into Other Facets of the Enterprise
Data and Application Security Will Become Embedded Everywhere
Crime Corporations, Rogue Government Agencies Will Buy Security, System & N/W Mgmnt Products
Consumers & Enterprises Will Continue to Grow Spending on Endpoint Security at Surprising Rates
Vulnerabilities will become more common
Attackers will take the path of least resistance - Humans
Attackers will try to defraud people and organizations through Social Media
Managed Services Will Get Cloudy
Mobile Security Will Move Beyond Security
SMBs Will See More Targeted Attacks Against Data and Resources
Will See Improved Social Engineering Attacks
Source: IDC Top 10 Predictions Worldwide Security Products and Services
17
Possible Business Models around Internet of Things( Gartner)
Forecast on Business around Security and Privacy
18
Many consumer packaged goods, such assoda cans and boxed goods, already have2D barcodes that lead to promotionalcontent
Smart Advertising
Food product companies, such as Hormel, use 2D barcodes to present recipes
Information Collation
Amazon's mobile apps can recognize physical media items, like DVDs, using
image recognition. The item can then be purchased from Amazon.
Image Processing & Recognition
•Sell TVs on a pay-as-you-go basis.•Pay per hour of runtime of lawn tractor
Variety of Pay-per options
•Connected car systems could delivermessages to renew car registrations•Dynamic advertising, recipes or gamescould be added to cereal boxes with e-paper
Content Delivery
Consumers could get a free coffee machine based on minimum consumption of
branded "coffee cartridges" (for example, Illy coffee)
Consumption based biz models
Consumer electronics can be remotely "tuned" to room conditions.
Remote maintenance, monitoring and optimization
Gartner: CIO Advisory: Which 'Internet of Things' Business Models Are Right for Your Customers?
A consumer could get discounts on groceries for buying/ordering them from
an advertised supermarket in a connected refrigerator which is ad supported
Connected Appliances, Ad-supported biz models
Medicine bottles can monitor the rate of consumption of medicines and
automatically prompt/remind your doctor or pharmacy to contact you to schedule the next delivery (and propose an order
amount).
Replenishment model
19IDC Worldwide and U.S. Security Services 2011–2015 Forecast
IDC Worldwide Network Security 2010–2014 Forecast IDC Worldwide Network Security 2010–2014 Forecast
0
500
1,000
1,500
2,000
2,500
3,000
3,500
4,000
4,500
5,000
2008 2009 2010 2011 2012 2013
Other
Security and vulnerabilitymanagement
Identity and accessmanagement
Network security
Endpoint security
Web security
Messaging security
Worldwide Security SaaS Forecast by Market, 2008-
2013 ($M)
IDC Security Services Market Analysis Perspective for 2010
20
• According to Forrester Survey, security spending is centered on network security and data security - newcybersecurity threats (Stuxnet, Aurora, etc.); changing IT architectures (virtualization in the data center, openenterprise initiatives, consumerization, and employee mobility); regulations, etc.
• Significant trends in security spending strategies - Rising adoption of managed security services (MSS) andsoftware-as-a-service- (SaaS) based security solutions
• Fueled by the increasing focus of browser-based attacks and greater user mobility, SaaS-based web security isprimed to enter the mainstream.
• Vulnerability scanning, DDoS protection, identity management services, log management, and endpoint securityare all growing
Forrester Forrester
21
Vast Business Opportunities with increased proliferation of
interconnected devices and things
New business models and services that exploit this inter
and intra connectedness will emerge & begin to dominate
Resultant complexity will necessitate new methodologies
for maintaining and increasing security in these worlds
Success will go to those who are able to plan, participate
in and foster the growth of these new ecosystems
Top Related