The Internet of Things revolution started in 2015 and will continue to be strong in 2016. 2015 was the year everyone talked about the Internet of Things. (So was 2014. And 2013.) But unlike before, it was the year everyone started making plans, laying groundwork, and building the infrastructure. Internet of Things is coming. It’s not a matter of if or whether, but when and how. The premise of IoT is that a connected world will offer gains through efficiency.
The Internet of Things (IoT) has been called the next Industrial Revolution — it will change the way all businesses, governments, and consumers interact with the physical world. The Internet of Things (IoT) is an environment in which objects, animals or people are provided with unique identifiers and the ability to transfer the data over a network without requiring human-to-human or human-to-computer interaction. IoT has evolved from the convergence of wireless technologies, micro-electromechanical systems (MEMS)
and the Internet. IoT is also called the Internet of Everything. A critical component for the IoT system to be a success will be secure bi-directional communication, mobility and localization services.
In the future, everything will be connected. It won’t just be our phones that access the Internet; it will be our light bulbs, our front doors, our microwaves, our comforters, our blenders. You can call it the Internet of Things, The Internet of Everything, Universal Object Interaction, or your pick of buzzwords that begin with Smart. They all hold as inevitable that everything, everything will be connected, to each other and to the Internet. And this is promised to change the world. Remember that the objects themselves do not benefit us, but what services and functions they make it possible to obtain. We will enjoy the outcome, hopefully even better quality products, informative and reliable services, and even new applications.
There will be lots of money spend on IoT in 2016, the exact sum is hard to define, but it is estimated that nearly $6 trillion will be spent on IoT solutions over the next five years. IoT is now a very large global business dominated by giants (IBM, Intel, Cisco, Gemalto, Google, Microsoft, Amazon, Bosch, GE, AT&T, T-Mobile, Telefonica and many others). I see that because it is still a young and quickly developing market, there will be lots of potential in it for startups in 2016.
There will be a very large number of new IoT devices connected to Internet in the end of 2016. According to Business Insider The Internet of Things Report there was 10 billion devices connected to the internet in 2015 and there will be will be 34 billion devices connected to the internet by 2020. IoT devices will account for 24 billion, while traditional computing devicesw ill comprise 10 billion (e.g. smartphones, tablets, smartwatches, etc.). Juniper research predicted that by 2020, there will be 38.5 billion connected devices. IDC says it’ll be 20.9 billion. Gartner’s guess? Twenty-five billion. The numbers don’t matter, except that they’re huge. They all agree that most of those gadgets will be industrial Internet of Things. The market for connecting the devices you use all day, every day, is about to be huge.
Businesses will be the top adopter of IoT solutions because they see ways the IoT can improve their bottom line: lowering operating costs, increasing productivity, expand to new markets and develop new product offerings. Sensors, data analytics, automation and wireless communication technologies allow the study of the “self-conscious” machines, which are able to observe their environment and communicate with each other. From predictive maintenance that reduces equipment downtime to workers using mobile devices on the factory floor, manufacturing is undergoing dramatic change. The Internet of Things (IoT) is enabling increased automation on the factory floor and throughout the supply chain, 3D printing is changing how we think about making components, and the cloud and big data are enabling new applications that provide an end-to-end view from the factory floor to the retail store.
Governments are focused on increasing productivity, decreasing costs, and improving their citizens’ quality of life. The IoT devices market will connect to climate agreements as in many applicatons IoT can be seen as one tool to help to solve those problems. A deal to attempt to limit the rise in global temperatures to less than 2C was agreed at the climate change summit in Paris in December 2015. Sitra fresh market analysis indicates that there is up to an amount of EUR 6 000 billion market potential for smart green solutions by 2050. Smart waste and water systems, materials and packaging, as well as production systems together to form an annual of over EUR 670 billion market. Smart in those contests typically involves use of IoT technologies.
Consumers will lag behind businesses and governments in IoT adoption – still they will purchase a massive number of devices. There will be potential for marketing IoT devices for consumers: Nine out of ten consumers never heard the words IoT or Internet of Things, October 2015! It seems that the newest IoT technology extends homes in 2016 – to those homes where owner has heard of those things. Wi-Fi has become so ubiquitous in homes in so many parts of the world that you can now really start tapping into that by having additional devices. The smart phones and the Internet connection can make home appliances, locks and sensors make homes and leisure homes in more practical, safer and more economical. Home adjusts itself for optimal energy consumption and heating, while saving money. During the next few years prices will fall to fit for large sets of users. In some cases only suitable for software is needed, as the necessary sensors and data connections can be found in mobile phones. Our homes are going to get smarter, but it’s going to happen slowly. Right now people mostly buy single products for a single purpose. Our smart homes and connected worlds are going to happen one device, one bulb at a time. The LED industry’s products will become more efficient, reliable, and, one can hope, interoperable in the near future. Companies know they have to get you into their platform with that first device, or risk losing you forever to someone else’s closed ecosystem.
The definitions what would be considered IoT device and what is a traditional computing devices is not entirely clear, and I fear that we will not get a clear definition for that in 2016 that all could agree. It’s important to remember that the IoT is not a monolithic industry, but rather a loosely defined technology architecture that transcends vertical markets to make up an “Internet of everything.”
Too many people – industry leaders, media, analysts, and end users – have confused the concept of
“smart” with “connected”. Most devices – labeled “IoT” or “smart” – are simply connected devices. Just connecting a device to the internet so that it can be monitored and controlled by someone over the web using a smart phone is not smart. Yes, it may be convenient and time saving, but it is not “smart”. Smart means intelligence.
IoT New or Not? YES and NO. There are many cases where whole IoT thing is hyped way out of proportion. For the most part, it’s just the integration of existing technologies. Marketing has driven an amount of mania around IoT, on the positive side getting it on the desks of decision makers, and on the negative generating ever-loftier predictions. Are IoT and M2M same or different? Yes and no depending on case. For sure for very many years to come IoT and M2M will coexist.
Nearly a dozen contenders are trying to fill a need for long distance networks that cut the cost and power consumption of today’s cellular machine-to-machine networks. Whose technology protocols should these manufacturers incorporate into their gear? Should they adopt ZigBee, Apple’s HomeKit, Allseen Alliance/AllJoyn, or Intel’s Open Interconnect Consortium? Other 802.15.4 technologies? There are too many competing choices.
Bluetooth and Wi-Fi, two pioneers of the Internet of Things are expanding their platforms and partnerships. Crowdfunding sites and hardware accelerators are kicking out startups at a regular clip, typically companies building IoT devices that ride Bluetooth and Wi-Fi. Bluetooth Special Interest group is expected to release in2016 support for mesh networks and higher data rates.
Although ZWave and Zigbee helped pioneer the smart home and building space more than a decade ago, but efforts based on Bluetooth, Wi-Fi and 6LoWPAN are poised to surpass them. Those pioneering systems are actively used and developed. Zigbee Alliance starts certification for its unified version 3.0 specification in few months (includes profiles for home and building automation, LED lighting, healthcare, retail and smart energy). EnOcean Alliance will bring its library of about 200 application profiles for 900 MHz energy harvesting devices to Zigbee networks. Zigbee will roll out a new spec for smart cities. The Z-Wave Security 2 framework will start a beta test in February and Z-Wave aims to strike a collaboration withleading IoT application framework platforms. Zigbee alredy has support Thread.
The race to define, design and deploy new low power wide area networks for the Internet of Things won’t cross a finish line in 2016. But by the end of the year it should start to be clear which LPWA nets are likely to have long legs and the opportunities for brand new entrants will dim significantly. So at the moment it is hard to make design choices. To protect against future technology changes, maybe the device makers should design in wireless connectivity chips and software that will work with a variety of protocols? That’s complicated and expensive. But if I pick only one technology I can easily pick up wrong horse, and it is also an expensive choice.
Within those who want to protect against future technology changes, there could be market for FPGAs in IoT devices. The Internet of Things (IoT) is broken and needs ARM-based field programmable gate array (FPGA) technology to fix it, an expert told engineers at UBM’s Designers of Things conference in San Jose. You end up with a piece of hardware that can be fundamentally changed in the field.
There seems to be huge set of potential radio techniques also for Internet of Things even for long distance and low power consumpion. Zigbee will roll out a new spec for smart cities in February based on the 802.15.4g standard for metro networks. It will compete with an already crowded field of 900 MHz and 2.4 GHz networks from Sigfox, the LoRa Alliance, Ingenu and others. Weightless-P is an open standard announced by Weightless SIG, which operates at frequencies below one gigahertz. Weightless-P nodes and development cards will be expected to be in the market already during the first quarter of 2016, at the moment Weightless IoT Hardware Virtually Unavailable.
I expect LoRa Technology is expected to be hot in 2016. The LoRaWAN standard enables low-data-rate Internet of Things (IoT) and Machine-to-Machine (M2M) wireless communication with a range of up to 10 miles, a battery life of 10 years, and the ability to connect millions of wireless sensor nodes to LoRaWAN gateways. LoRa® technology works using a digital spread spectrum modulation and proprietary protocol in the Sub-GHz RF band (433/868/915 MHz). I see LoRa technology interesting because lots of activity around in Finland in several companies (especially Espotel) and I have seen a convincing hands-in demo of the LoRa system in use.
It seems that 3GPP Lost its Way in IoT and there is fragmentation ahead in cellular standards. In theory 3GPP should be the default provider of IoT connectivity, but it seems that it has now failed in providing one universal technology. At the moment, there are three major paths being supported by 3GPP for IoT: the machine-type version of LTE (known as LTE-M) and two technologies coming from the Cellular-IoT initiative — NB-IoT and EC-GSM. So here we are with three full standardization efforts in 3GPP for IoT connectivity. It is too much. There will like be a base standard in 2016 for LTE-M.
The promise of billions of connected devices leads everyone to assume that there will be plenty of room for multiple technologies, but this betrays the premise of IoT, that a connected world will offer gains through efficiency. Too many standard will cause challenges for everybody. Customers will not embrace IoT if they have to choose between LTE-M and Sigfox-enabled products that may or may not work in all cases. OEM manufacturers will again bear the cost, managing devices at a regional or possibly national level. Again, we lose efficiency and scale. The cost of wireless connectivity will remain a barrier to entry to IoT.
Today’s Internet of Things product or service ultimately consists of multiple parts, quite propably supplied by different companies. An Internet of Things product or service ultimately consists of multiple parts. One is the end device that gathers data and/or executes control functions on the basis of its communications over the Internet. Another is the gateway or network interface device. Once on the Internet, the IoT system needs a cloud service to interact with. Then, there is the human-machine interface (HMI) that allows users to interact with the system. So far, most of the vendors selling into the IoT development network are offering only one or two of these parts directly. Alternatives to this disjointed design are arising, however. Recently many companies are getting into the end-to-end IoT design support business, although to different degrees.
Voice is becoming more often used the user interface of choice for IoT solutions. Smartphones let you control a lot using only your voice as Apple, Google, Microsoft and Samsung have their solutions for this. For example Amazon, SoundHound and Nuance have created systems that allow to add language commands to own hardware or apps. Voice-activated interface becomes pervasive and persistent for IoT solutions in 2016. Right now, most smart home devices are controlled through smartphones, and it seems like that’s unlikely to change. The newest wearable technology, smart watches and other smart devices corresponding to the voice commands and interpret the data we produce – it learns from its users, and generate as responses in real time appropriate, “micro-moments” tied to experience.
Monitoring your health is no longer only a small group oriented digital consumer area. Consumers will soon take advantage of the health technology extensively to measure well-being. Intel Funds Doctor in Your Pocket and Samsung’s new processor is meant for building much better fitness trackers. Also, insurance companies have realized the benefits of health technologies and develop new kinds of insurance services based on data from IoT devices.
Samsung’s betting big on the internet of things and wants the TV to sit at the heart of this strategy. Samsung believes that people will want to activate their lights, heating and garage doors all from the comfort of their couch. If smart TVs get a reputation for being easy to hack, then Samsung’s models are hardly likely to be big sellers. After a year in which the weakness of smart TVs were exploited, Samsung goes on the offensive in 2016. Samsung’s new Tizen-based TVs will have GAIA security with pin lock for credit card and other personal info, data encryption, built-in anti-malware system, more.
This year’s CES will focus on how connectivity is proliferating everything from cars to homes, realigning diverse markets – processors and networking continue to enhance drones, wearables and more. Auto makers will demonstrate various connected cars. There will be probably more health-related wearables at CES 2016, most of which will be woven into clothing, mainly focused on fitness. Whether or not the 2016 International CES holds any big surprises remains to be seen. The technology is there. Connected light bulbs, connected tea kettles, connected fridges and fans and coffeemakers and cars—it’s all possible. It’s not perfect, but the parts are only going to continue to get better, smaller, and cheaper.
Connectivity of IoT devices will still have challeges in 2016. While IoT standards organizations like the Open Interconnect Consortium and the AllSeen Alliance are expected to demonstrate their capabilities at CES, the industry is still a ways away from making connectivity simple. In 2016 it will still pretty darn tedious to get all these things connected, and there’s all these standards battles coming on. So there will be many standards in use at the same time. The next unsolved challenge: How the hell are all these things going to work together? Supporting open APIs that connect with various services is good.
Like UPnP and DLNA, AllJoyn could become the best-kept secret in the connected home in 2016 — everyone has it, no one knows about it. AllJoyn is an open-source initiative to connect devices in the Internet of Things. Microsoft added support for AllJoyn to Windows in 2014.
Analysis will become important in 2016 on IoT discussions. There’s too much information out there that’s available free, or very cheaply. We need systems to manage the information so we can make decisions. Welcome to the systems age.
The rise of the Internet of Things and Web services is driving new design principles. The new goal is to delight customers with experiences that evolve in flexible ways that show you understand their needs. “People are expecting rich experiences, fun and social interactions… this generation gets bored easily so you need to understand all the dimensions of how to delight them”
With huge number of devices security issues will become more and more important. In 2016, we’ll need to begin grappling with the security concerns these devices raise. The reality of everything being connected can have unintended consequences, not all of them useful – Welcome to the Internet of stupid (hackable) things.
Security: It was a hot topic for 2015 and if anything it will get hotter in 2016. The reason is clear. By adding connectivity embedded systems not only increase their utility, they vastly increase their vulnerability to subversion with significant consequences. Embedded systems that add connectivity face many challenges, of which the need for security is both vital and misunderstood. But vendors and developers have been getting the message and solutions are appearing in greater numbers, from software libraries to MCUs with a secure root of trust.
Bruce Schneier is predicting that the IoT will be abused in conjunction with DMCA to make our lives worse instead of better. In theory, connected sensors will anticipate your needs, saving you time, money, and energy. Except when the companies that make these connected objects act in a way that runs counter to the consumer’s best interests. The story of a company using copy-protection technology to lock out competitors—isn’t a new one. Plenty of companies set up proprietary standards to ensure that their customers don’t use someone else’s products with theirs. Because companies can enforce anti-competitive behavior this way, there’s a litany of things that just don’t exist, even though they would make life easier for consumers.
Internet of Things is coming. It’s not a matter of if or whether, but when and how. Maybe it’ll be 2016, maybe the year after, but the train is coming. It’ll have Wi-Fi and Bluetooth and probably eight other things, and you’ll definitely get a push notification when it gets here.
More interesting material links:
1,510 Comments
Tomi Engdahl says:
Reverse Engineering and Networking The A/C Remote Control
http://hackaday.com/2016/09/08/reverse-engineering-and-networking-the-ac-remote-control/
IoT has become such an polarizing, overused term. But here it is in its essence: [zeroflow] had a thing (his airconditioner) and he needed to put it on the Internet.
For his contribution to this modern vernacular atrocity, he first had to build an IR debugging tool and reverse engineer the signals coming from the air conditioner’s remote. He wrote up a really good summary of the process, and worth reading. He loads up an IR library onto an Arduino and dumps the resulting 32 bits of information to his computer.
Next he throws an array of IR LEDS and an ESP8266 onto a bit of protoboard. After writing some code, available on GitHub, he could set the temperature of his room from anywhere on the planet
Steps of the reverse engineering
https://github.com/zeroflow/ESPAircon/wiki/Steps-of-the-reverse-engineering
https://github.com/zeroflow/ESPAircon/wiki
Tomi Engdahl says:
IoT 3 in 1 Tape Measure Get Crowdfunding Love
All-in-one functionality credited for popularity of “Bagel”
http://www.eetimes.com/document.asp?doc_id=1330403&
Bagel Labs (Gyeonggi-do, South Korea) has raised an additional quarter of a million dollars through Indiegogo for its smart IoT tape measure after initially raising $1.35 million in a campaign with Kickstarter. The three-in-one Bagel replaces a tape measure, a wheel measure, and a laser measure with a palm-sized device that communicates and analyzes its results on your iPhone via voice commands. The monumental success of Bagel, according to CEO Soohong Park in an interview with EE Times, is due to its all-in-one functionality for under $75.
“Consumers can easily buy different types of measuring devices — such as metal tape measures, wheel measures, or laser measuring devices — that range from $10 to $20,” Park told EE Times, “but it is hard to find a single tape measure that can measure almost everything in a wide range of settings.”
digital memo with voice recognition and connectivity with smartphones via Bluetooth.
Most smart IoT devices have been substitutes for complicated pieces of equipment and, in some cases, offered even more complicated solutions that consumers still loved for all of their features — such as smartphones. However, Bagel Labs’ conception is to offer the features of the old and new types of measurement devices while making their operation easier
Tomi Engdahl says:
Tech Talk: Micro-Architecting Power
http://semiengineering.com/tech-talk-micro-architecting-power/
A deep dive into how to save power by leveraging idle time.
Sonics CTO Drew Wingard talks about how to save energy on a very granular level when processing 4K video.
Tomi Engdahl says:
Landscape Lighting that Also Texts
http://hackaday.com/2016/09/09/landscape-lighting-that-also-texts/
Your local hardware store or garden supply center probably has everything you need to install landscape lighting all around your property. What’s a little less likely is coming out of that situation with fewer holes in your wallet than in your yard. And even then, it’s pretty much guaranteed that any off-the-shelf equipment won’t send you a text message when your landscape lighting isn’t working properly. [Mark]’s landscape lighting system does, though!
LConnect
LawnConnect – Raspberry Pi Controlled Lawn Lights
https://drkmsmithjr.github.io/LConnect/
A simple Raspberry Pi powered lawn light controller
Never have dark outside lighting again!!!
LawnConnect automatically controls and monitors your lawn lights and lets you know when something is wrong
Tomi Engdahl says:
Cory Doctorow / Locus Online Perspectives:
Proliferation of the Internet of Things and unchecked data collection will escalate the privacy wars, possibly leading to a storm of class action lawsuits
Cory Doctorow:
The Privacy Wars Are About to Get A Whole Lot Worse
http://www.locusmag.com/Perspectives/2016/09/cory-doctorowthe-privacy-wars-are-about-to-get-a-whole-lot-worse/
It used to be that server logs were just boring utility files whose most dramatic moments came when someone forgot to write a script to wipe out the old ones and so they were left to accumulate until they filled the computer’s hard-drive and crashed the server.
Then, a series of weird accidents turned server logs into the signature motif of the 21st century, a kind of eternal, ubiquitous exhaust from our daily lives, the CO2 of the Internet: invisible, seemingly innocuous, but harmful enough, in aggregate, to destroy our world.
Here’s how that happened: first, there were cookies.
Then, Google and a few other companies came up with a business model.
Google and the other early ad-tech companies worked out that they could place ads on other people’s websites, and that those ads could act as a two-way conduit between web users and Google.
The idea caught the zeitgeist, and soon everyone was trying to figure out how to gather, aggregate, analyze, and resell data about us as we moved around the web.
Of course, there were privacy implications to all this.
As more and more companies twigged to the power of ‘‘surveillance capitalism,’’ these agreements proliferated, as did the need for them, because before long, everything was gathering data. As the Internet everted into the physical world and colonized our phones, we started to get a taste of what this would look like in the coming years. Apps that did innocuous things like turning your phone into a flashlight, or recording voice memos, or letting your kids join the dots on public domain clip-art, would come with ‘‘permissions’’ screens that required you to let them raid your phone for all the salient facts of your life: your phone number, e-mail address, SMSes and other messages, e-mail, location – everything that could be sensed or inferred about you by a device that you carried at all times and made privy to all your most sensitive moments.
When a backlash began, the app vendors and smartphone companies had a rebuttal ready: ‘‘You agreed to let us do this. We gave you notice of our privacy practices, and you consented.’’
This ‘‘notice and consent’’ model is absurd on its face, and yet it is surprisingly legally robust.
Notice and consent is an absurd legal fiction.
Indeed, you can’t examine the terms of service you interact with in any depth – it would take more than 24 hours a day just to figure out what rights you’ve given away that day. But as terrible as notice-and-consent is, at least it pretends that people should have some say in the destiny of the data that evanescences off of their lives as they move through time, space, and information.
The next generation of networked devices are literally incapable of participating in that fiction.
The coming Internet of Things – a terrible name that tells you that its proponents don’t yet know what it’s for, like ‘‘mobile phone’’ or ‘’3D printer’’ – will put networking capability in everything: appliances, lightbulbs, TVs, cars, medical implants, shoes, and garments. Your lightbulb doesn’t need to be able to run apps or route packets, but the tiny, commodity controllers that allow smart lightswitches to control the lights anywhere (and thus allow devices like smart thermostats and phones to integrate with your lights and home security systems) will come with full-fledged computing capability by default, because that will be more cost-efficient that customizing a chip and system for every class of devices.
That fact of general-purposeness is inescapable and wonderful and terrible
You will ‘‘interact’’ with hundreds, then thousands, then tens of thousands of computers every day. The vast majority of these interactions will be glancing, momentary, and with computers that have no way of displaying terms of service, much less presenting you with a button to click to give your ‘‘consent’’ to them. Every TV in the sportsbar where you go for a drink will have cameras and mics and will capture your image and process it through facial-recognition software and capture your speech and pass it back to a server for continuous speech recognition (to check whether you’re giving it a voice command). Every car that drives past you will have cameras that record your likeness and gait, that harvest the unique identifiers of your Bluetooth and other short-range radio devices, and send them to the cloud, where they’ll be merged and aggregated with other data from other sources.
In theory, if notice-and-consent was anything more than a polite fiction, none of this would happen. If notice-and-consent are necessary to make data-collection legal, then without notice-and-consent, the collection is illegal.
But that’s not the realpolitik of this stuff: the reality is that when every car has more sensors than a Google Streetview car, when every TV comes with a camera to let you control it with gestures, when every medical implant collects telemetry that is collected by a ‘‘services’’ business and sold to insurers and pharma companies, the argument will go, ‘‘All this stuff is both good and necessary – you can’t hold back progress!’’
The returns from data-acquisition have been declining for years.
But diminishing returns can be masked by more aggressive collection.
The best way to secure data is never to collect it in the first place. Data that is collected is likely to leak. Data that is collected and retained is certain to leak. A house that can be controlled by voice and gesture is a house with a camera and a microphone covering every inch of its floorplan.
The IoT will rupture notice-and-consent, but without some other legal framework to replace it, it’ll be a free-for-all that ends in catastrophe.
I’m frankly very scared of this outcome and have a hard time imagining many ways in which we can avert it, but I do have one scenario that’s plausible: class action lawsuits.
Right now, companies that breach their users’ data face virtually no liability.
Eventually, some lawyer is going to convince a judge that, say, 1% the victims of a deep-pocketed company’s breach will end up losing their houses to identity thieves as a result of the data that the company has leaked, and that the damages should be equal to 1% of all the property owned by a 53 million (or 500 million!) customers whom the company has wronged. It will take down a Fortune 100 company, and transfer billions from investors and insurers to lawyers and their clients.
When that day comes, there’ll be blood in the boardroom. Every major investor will want to know that the company is insured for a potential award of 500X the company’s net worth
The danger, of course, is the terms of service. If every ‘‘agreement’’ you click past or flee from includes forced arbitration – that is, a surrender of your right to sue or join a class action – then there’s no class to join the class action.
Tomi Engdahl says:
The Week In Review: IoT
http://semiengineering.com/the-week-in-review-iot-17/
Verizon and Qualcomm team for IoT tech; startup sends robotic sailboats over the seven seas; Sony offers virtual assistant in IoT line.
Verizon Communications and Qualcomm Technologies agreed on integrating Verizon’s ThingSpace Internet of Things platform with Qualcomm’s MDM9206 Category M (Cat M1) Long-Term Evolution modem. The companies will use the carrier’s 4G LTE network as the gateway for deploying and managing IoT applications, beginning in early 2017. Separately, Verizon announced that it will provide a Cat M1 offering to Neptune Technology Group for water metering, employing the MDM9206 LTE modem. Verizon also announced it is working with ITK to offer data analytics on sustainable farming practices for three companies in the wine business: Delicato Family Vineyards, Scheid Vineyards, and Renteria Vineyard Management.
Saildrone, a venture-funded startup working out of the former Alameda Naval Air Station in the San Francisco Bay Area, is sending robotic sailboats out across the seven seas to gather data.
The Microsoft IoT Grove Kit aims to help developers and makers with IoT projects. Its GrovePi+ cape is compatible with Raspberry Pi development boards running the Windows 10 IoT core for rapid projects. The kit is available for pre-orders.
Sequans Communications is touting the Monarch, its new LTE Category M1/NB1 chip for the Internet of Things.
Multi-Tech Systems this week unveiled a 4G LTE Cat 1 version of its SocketModem Cell platform, which will ship in November and will work on the networks of AT&T, Verizon, and T-Mobile, along with Canadian network operators.
CalAmp said its LMU-2600 and LMU-4200 products with 4G LTE Cat 1 cellular technology will be available in the fourth quarter for connected vehicle, enterprise trucking, fleet management, insurance telematics, and mobile workforce management IoT applications.
Tomi Engdahl says:
The Microsoft IoT Grove Kit aims to help developers and makers with IoT projects. Its GrovePi+ cape is compatible with Raspberry Pi development boards running the Windows 10 IoT core for rapid projects. The kit is available for pre-orders.
Microsoft’s new IoT Grove Kit makes it easier to explore the Internet of Things
https://mspoweruser.com/microsofts-new-iot-grove-kit-makes-it-easier-to-explore-the-internet-of-things/
The new Microsoft IoT Grove Kit is an easy to use solution for Makers, as well as a powerful prototyping platform for IoT startups and enterprise innovators. Building up an IoT project on a Raspberry Pi has never been an easy job for most developers as it involves messy hardware connections and complicated software programming. Microsoft is trying to solve this problem with their new Microsoft IoT Grove Kit.
“The GrovePi+ cape included in the kit is fully compatible with a Raspberry Pi B/B+/A+/2/3 that runs the Windows 10 IoT core for rapid maker projects. With the GrovePi+, the gap between the powerful Raspberry Pi and the easy-to-use Grove system has truly been filled.”
Tomi Engdahl says:
Radio Technology Lets Wearables Piggyback on Power from Larger Devices
http://www.designnews.com/author.asp?section_id=1386&doc_id=281528&cid=nl.x.dn14.edt.aud.dn.20160912.tst004c
New radio technology from researchers at the University of Massachusetts Amherst allows small and low-power devices like wearables to run by piggybacking on power from larger devices with which they communicate.
Calling their technology “Braidio” for the braid of radios that can be connected, Professor Deepak Ganesan and graduate students in the College of Information and Computer Sciences at UMass said their method for offloading energy could extend battery life hundreds of times in some cases for mobile devices such as fitness trackers and smart watches.
The technology itself is fairly simple, using a Bluetooth Low Energy-style active radio modified using a few additional off-the shelf components, researchers said in a paper, “Braidio: An Integrated Active-Passive Radio for Mobile Devices with Asymmetric Energy Budgets,” provided to Design News by Ganesan. The result is a low-power, tightly integrated, low-cost radio that can operate as an active and passive receiver, they said.
Extending battery life for mobile devices
UMass Amherst introduces ‘Braidio’ technology, lets mobile devices share power
http://www.eurekalert.org/pub_releases/2016-08/uoma-ebl082516.php
AMHERST, Mass. – In a paper presented today at the Association for Computing Machinery’s special interest group on data communication (SIGCOMM) conference in Florianópolis, Brazil, a team of computer science researchers at the University of Massachusetts Amherst led by professor Deepak Ganesan introduced a new radio technology that allows small mobile devices to take advantage of battery power in larger devices nearby for communication.
They hope using “energy offload” techniques may help to make these devices smaller and lighter in the future.
Ganesan and colleagues have dubbed the new technology Braidio for “braid of radios,” and say it can extend battery life hundreds of times in some cases.
“We take for granted the ability to offload storage and computation from our relatively limited personal computers to the resource-rich cloud,” he adds. “In the same vein, it makes sense that devices should also be able to offload how much power they consume for communication to devices that have more energy.”
Braidio operates like a standard Bluetooth radio when a device has sufficient energy, but operates like RFID when energy is low, offloading energy use to a device with a larger battery when needed. So, when a smartwatch and smartphone are equipped with Braidios, they can work together to proportionally share the energy consumed for communication, they explain.
Tomi Engdahl says:
IoT Needs Security All the Way Down to the Sensors
http://www.designnews.com/author.asp?section_id=1386&doc_id=281498&
Embedded applications are far more vulnerable to security risks than most engineers realize, an expert will tell attendees at the upcoming Design & Manufacturing Show in Minneapolis.
”You can’t just say, ‘The gateway is secure and the cloud is secure,’ and assume that’s enough,” Alan Grau, president and co-founder of Icon Labs, told Design News. “We’re trying to bring awareness to the fact that you need to have security all the way down to the end points.”
Numerous studies have shown that most IoT applications are woefully unprepared for cyber attacks. A 2014 study by Hewlett-Packard, for example, revealed that 70% of the most commonly used IoT devices contain gaping security holes. On average, such devices have 25 vulnerabilities, the study said. Similarly, a 2009 Columbia University study, Brave New World: Pervasive Insecurity of Embedded Network Devices, concluded that embedded devices were about 18 times more vulnerable to attack than enterprise devices, such as office laptops.
Tomi Engdahl says:
IoT Devices With Default Telnet Passwords Used As Botnet
https://it.slashdot.org/story/16/09/11/1155202/iot-devices-with-default-telnet-passwords-used-as-botnet
IoT devices, like DVR recorders or webcams, which are running Linux with open telnet access and have no passwords or default passwords are currently a target of attacks which try to install malware which then makes the devices a node of a botnet for DDoS attacks. As the malware, called Linux/Mirai, only resides in memory, once the attack has been successful, revealing if your device got captured isn’t so easy, and also analyzing the malware is difficult, as it will vanish on reboot.
Experts from MalwareMustDie spotted a new ELF trojan backdoor, dubbed ELF Linux/Mirai, which is now targeting IoT devices.
http://securityaffairs.co/wordpress/50929/malware/linux-mirai-elf.html
Experts from MalwareMustDie have analyzed in August samples of a particular ELF trojan backdoor, dubbed ELF Linux/Mirai, which is now targeting IoT devices. The name of the malware is the same of the binary,”mirai.*,” and according to the experts, several attacks have been detected in the wild.
The ELF Linux/Mirai is very insidious; it is still undetected by many antivirus solutions as confirmed by the very low detection ratio in the VirusTotal online scanning service.
“The reason for the lack of detection is because of the lack of samples, which are difficult to fetch from the infected IoT devices, routers, DVR or WebIP Camera, the Linux with Busybox binary in embedded platform, which what this threat is aiming.” states the analysis from MalwareMustDie Blog.
And continues: “The threat was starting campaign in early August even if this ELF is not easy to be detected since it is not showing its activity soon after being installed: it sits in there and during that time, no malware file will be left over in system, all are deleted except the delayed process where the malware is running after being executed.”
This means that when the infections succeeded, it is not easy to distinguish an infected system by a not infected one, except than from the memory analysis, and we are talking about a kind of devices that are not easy to analyze and debug. The normal kind of analysis conducted from the file system or from the external network traffic doesn’t give any evidence, at the beginning.
“Countries that are having Linux busybox IoT embedded devices that can connect to the internet, like DVR or Web IP Camera from several brands, and countries who have ISP serving users by Linux routers running with global IP address, are exposed as target, especially to the devices or services that is not securing the access for the telnet port (Tcp/23) service“
At the moment for all the sysadmins who want to protect their systems there is a list of mitigations actions:
If you have an IoT device, please make sure you have no telnet service open and running.
Blocking the used TCP/48101 port if you don’t use it, it’s good to prevent infection & further damage,
Monitor the telnet connections because the Botnet protocol used for infection is the Telnet service,
Reverse the process looking for the strings reported in the MalwareMustDie detections tool tips.
But, what we know about this Linux/Mirai ELF malware exactly, and why it is not so common among the malware analysts?
Tomi Engdahl says:
Organizations must update network access policies to address attacks on IoT devices, says Gartner
http://www.cablinginstall.com/articles/pt/2016/09/organizations-must-update-network-access-policies-to-address-attacks-on-iot-devices-says-gartner.html?cmpid=Enl_CIM_CablingNews_September122016&eid=289644432&bid=1524170
By 2020, Internet of Things (IoT) devices will outnumber users with laptops, tablets or smartphones by more than 3x, predicts Gartner, Inc.
By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide, estimates the researcher. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT organizations have issues identifying these devices and characterizing them as part of current network access policy, say technology analysts from Gartner. The researcher concludes that infrastructure and operations (I&O) leaders must therefore update their network access policies to seamlessly address the onslaught of IoT devices.
“Many IoT devices will use the established bandwidth of the enterprise network provided by the IT organization (i.e. wireless 1.3 Gbps of 802.11ac Wave 1, or 1.7 Gbps of 802.11ac Wave 2). However, the researcher emphasizes that it is important that the IT organization works directly with facilities management (FM) and business units (BUs) to identify all devices and projects connected to the enterprise infrastructure and attaching to the network.
Once all of the devices attached to the network are identified, the IT organization must create or modify the network access policy as part of an enterprise policy enforcement strategy. This should determine if and how these devices will be connected, as well as what role they will be assigned that will govern their access.
In order to monitor access and priority of IoT devices, I&O leaders need to consider additional enterprise network best practices. These can be defining a connectivity policy, as many IoT devices will be connected via Wi-Fi; performing spectrum planning — many IoT devices may be using 2.4GHz, but may not be using 802.11 protocols such as Bluetooth, ZigBee or Z-Wave, which may create interference; or considering packet sniffers to identify devices that may do something undesirable on the network.
While more IoT devices are added to the enterprise network, I&O leaders will need to create virtual segments. These will allow network architects to separate all IoT assets (such as LED lights or a video camera) from other network traffic, supporting each FM application or BU process from other enterprise applications and users.
Tomi Engdahl says:
Digi International XBee® S2D ZigBee
Thread-Ready RF Modules
http://www.mouser.fi/new/Digi-International/digi-xbee-s2d-modules/
Digi XBee® S2D ZigBee Thread-Ready RF Modules provides a larger memory capacity to enable designers to easily upgrade to the Thread networking protocol. The Thread-Ready RF Modules maintain the proven benefits of previous XBee versions, while adding a higher memory Silicon Labs EM3587 chipset. These modules offer 512kB flash memory. This higher memory capacity allows designers to fully implement the Thread networking protocol in end nodes and routers. The Thread protocol provides a low-power, self-healing, IPv6 addressable mesh network with advanced security at the networking layer.
Tomi Engdahl says:
Do you think that activity bracelet data is protected?
Activity or fitnessrannekkeita were sold during the first quarter of the year over 20 million copies. They collect all sorts of information to the user. Unfortunately, the data is easy to capture on their way to the cloud.
Technical University of Darmstadt, cyber security now Professor Ahmad-Reza Sadeghi explained that almost all of the data is outside the bracelets to capture. The study included 17 different bracelets from large manufacturers such as Xiaomi and Garmin.
While all cloud-based solutions for transferring data wristbands encrypted protocols, such as HTTPS, only four of the wristband was ylipääätän done anything about it, that the data would remain protected. According to Sadeghin even these methods do not prevent a motivated hacker.
Sadeghin team was able to make the so-called. man-in-the-middle attack, or to manipulate the data the way to cloud services. For example, five bracelets saved data only in raw text format in smartphone, which is a big security risk.
Sadegh says that insurance companies and others who build services upon monitoring of the activity, should be given to information security professionals manage storage, transfer and verification of data. This is becoming more and more important position in the activity bracelet data will be taken, for example, to accept the court as evidence.
Source: http://etn.fi/index.php?option=com_content&view=article&id=5031:luuletko-etta-aktiivisuusrannekkeen-data-on-suojassa&catid=13&Itemid=101
Tomi Engdahl says:
GAMS preview: IIoT and the state of manufacturing
http://www.plantengineering.com/single-article/gams-preview-iiot-and-the-state-of-manufacturing/3c38b723f25b565bbc4238d18937a58d.html?OCVALIDATE=
In preparation for the 2016 GAMS Conference on Sept. 14 in Chicago, CFE Media asked our panelists to discuss some of the key issues facing manufacturing. This is one in a daily series of issues
CFE Media: We’ve been actively talking about the Industrial Internet of Things (IIoT) for the past two years, and it’s been looming on the horizon for years before that. Assess where manufacturing is today in both its understanding of and implementation of IIoT.
Rich Carpenter, GE: There are two main advancements:
1. With various systems having been moved to cloud infrastructures, customers are less concerned and more open than they were when IIoT discussions first started.
2. As technology has improved, it is not possible to use plant floor data for Big Data/analytics initiatives without having to disturb the plant floor control systems. This has broadened the audience within the manufacturing customer base for the data.
Rob McGreevy, Schneider Electric: Manufacturers have long been collecting production data from across operations. The number of low cost data generating sensors enabled by the Industrial Internet of Things has made it even easier to generate massive amounts of industrial data. However, data alone is not where manufacturers get value. The real value of IIoT comes converting that data and turning it into actionable information. Enterprise Asset Performance Management leveraging predictive analytics technology is one example of an application where significant improvements and savings have been achieved. Predictive analytics based on advanced pattern recognition and machine learning is uncovering opportunities to extend asset life, reduce unplanned downtime and improve reliability and performance. Our customers have seen savings up to $7 million in a single early warning catch. These types of initiatives are having a direct impact on the bottom line, helping to justify continuing investment in an IIoT strategy.
Rick Vanden Boom, Applied Manufacturing Technologies (AMT): I think manufacturing is just getting started to consider the possibilities and benefits of IIoT. Manufacturing systems typically have a high degree of connectivity, but more on a local level (within the system itself or within a plant or company) and most often geared towards enabling system functionality and basic data reporting. We are just starting to see the possibility of self-monitoring machines and systems, self-optimization, preemptive maintenance calls, and even ordering spare parts. Jose Rivera, CSIA: On one end of the spectrum you have some companies being very concerned about security and viewing IIoT as a threat. These companies have basically put a lock on their doors.
On the other end of the spectrum you have companies fully embracing it. An example often cited is ThyssenKrupp and their deployment of IIoT for doing predictive maintenance—technology guidance to technician going to the site, etc. This was an impressive development with Microsoft
In my opinion, when it comes to IIoT the proven model has been around asset management. Here is where you have a quickly growing number companies getting on the bandwagon. The model had been around decades but only for large expensive capital equipment (e.g., a turbine), long before IIoT.
In between the two ends of the spectrum of IIoT deployment you have companies deploying IIoT, but not necessarily realizing that what they are doing falls under the IIoT umbrella.
There are good examples going beyond the simple asset management of a machine to reach into operations improvement.
As prices for IIoT equipment have been coming down, experimentation is taking place in plants by curious and innovative personnel.
Tomi Engdahl says:
European Commission Investigating Smart Appliances
Posted Sep 12, 2016 at 9:30 am
https://www.eeweb.com/company-blog/power_integrations/european-commission-investigating-smart-appliances/
The European Commission (EC) has started a preparatory study on smart appliances for an attainable efficiency, interoperability, and energy labeling regulations. The Ecodesign Directive preparatory study (Lot 33) was started late last year and is calculated to be fully accomplished in September 2016.
Smart appliances are defined as appliances that can respond to external signals, modifying energy consumption to optimize the balance between enrgy supply and demand. The first part of the study focused on defining and categorizing smart appliances according to their functionality and degree of intelligence.
The approah is horizontal in nature, covering different product types meeting the study’s “smart” requirements.
Tomi Engdahl says:
Network monitoring and the IIoT
http://www.controleng.com/single-article/network-monitoring-and-the-iiot/98e731d6ef2cd78c5f96066ee0aa27c3.html?OCVALIDATE&ocid=101781
The risk of a potential cyber attack is going to increase as the Industrial Internet of Things (IIoT) becomes more widely adopted. Greater awareness and cooperation is needed to head off those risks before they become a reality.
Every industry has its price point for an unplanned shutdown where some may be in the thousands of dollars per hour to others being in the millions of dollars per hour.
Any kind of unplanned shutdown—whether it is accidental or malicious—is expensive. The attack surface is about to get that much larger with the adopting of the Industrial Internet of Things (IIoT), which means security professionals and the executive suite will need to get on the same page.
That is why one of the latest trends moving through the manufacturing automation sector right now is network monitoring.
The idea of increased network visibility only makes sense with more sensors bringing in more data and more connections coming from multiple locations. IIoT adoption is going to happen sooner or later because the benefits far outweigh the negatives. Manufacturers want the business to become more productive, easier to manage and more cost-effective to operate. In addition, IIoT will allow moving ancient legacy systems into a more modern era to take advantage of all things new technology and connectivity bring to the table.
CFE Media
The negative, though, means the manufacturer could be a cyber security sitting duck if they don’t see—and understand—what is coming at them.
“The operational technology (OT) side is babes in the woods with the network of things,” said Frank Williams, chief executive at Statseeker. “With all the different devices connected to the network and the network becoming connected to the enterprise, the network today is another piece of technology.”
Williams said that there are currently around 40,000 sensors at a typical process plant. The IIoT will increase those numbers to something over 250,000 sensors per plant. Each of those sensors will produce near real-time data at an update rate of four times a minute, or 250 milliseconds per datum. That means each sensor will produce over 5,000 data points per day. That’s 1.44 billion data points per plant, per day. Each of those sensors needs to end up monitored and diagnostically checked for proper operation as part of the network.
Business enabler
“We are starting to see what could happen if you connect your industrial environment to different areas on the Internet,” said Yoni Shohet, co-founder and chief executive at SCADAfence. “Take the example of the German nuclear plant in April, where they didn’t have a direct or constant connection to the outside world, they just connected once in a while, and still malware was able to penetrate into the control systems. There is definitely a need to monitor inside all industries.
“We talk to customers and they are surprised at what they have on their networks and they quickly understand they need to monitor their facilities worldwide because they don’t really know what is running on their networks. They don’t have any real time or up to date information on the assets running inside their network.”
“More companies are seeing cyber security as an enabler for new business opportunities and new technology capabilities in the industrial environment and not as a threat to the productivity of the production,” Shohet said. “Companies must understand that to truly adopt it or else they will not invest budget in a productivity solution.
“We are seeing in general the trend of the IT-OT convergence; we are starting to see tools used in both environments in order to have some kind of a standard and similar platforms in order to integrate cyber security organization-wise and not technology-wise in the existing organizational processes. It is only natural,” Shohet said.
“I think the general, if the IT and OT teams are communicating properly, it could exist. If they are not communicating properly, they probably won’t be installing cyber security at all because the OT personnel are skeptical of it,” Shohet said.
“Hackers don’t ask permission before they take control,” said Eric Knapp, chief cybersecurity engineer at Honeywell Process Solutions (HPS) at the 2016 Honeywell Users Group (HUG) Americas conference in San Antonio. “Cyber attacks happen all the time. We need to understand how attacks work to protect (users’) networks.”
Tomi Engdahl says:
What will drive test & measurement?
http://www.edn.com/electronics-blogs/rowe-s-and-columns/4442643/What-will-drive-test—measurement-?_mc=NL_EDN_EDT_EDN_today_20160913&cid=NL_EDN_EDT_EDN_today_20160913&elqTrackId=2106bbedc5d14758b064d7f0f67e72fc&elq=45c9648aa602409c8f2fef230e54a088&elqaid=33840&elqat=1&elqCampaignId=29576
Will IoT change anything or is it all just an integration of existing technologies? Will most of the IoT testing be for testing software, as in for security?
Witte: The IoT trend is a great example of “all the technology exists” but the pervasive adoption of it will produce dramatic shifts for many industries. For the T&M industry, it is likely to drive change in several fundamental ways:
Our T&M products will be IoT devices, collectors of data that fit into big data systems. We already see this now with Ethernet-enabled instruments and it will continue to expand.
The cyber security issues associated with IoT are huge and currently unsolved. Dramatic improvement in this area is required. Access to IoT data must be controlled but cannot be too cumbersome, which will impede broad deployment.
Many of the expected IoT devices will be low cost which will put pressure on the cost of test in manufacturing. In some cases, BIST may be sufficient to meet customer quality requirements. In other cases, functional test will be used and it must be fast and cheap.
Ushani: IoT and predictive analytics will definitely play a big role in the future of test and measurement. Data loggers will exchange information to prevent disasters like the Fukushima Accident. Robots will exchange T&M data to stop a heart attack or fine tune a musical instrument. From wearable technology to remote tracking systems; artificial neural networks will be implemented in T&M networks.
Tomi Engdahl says:
Home> Community > Blogs > Eye on IoT
Zombie-proof your IoT design
http://www.edn.com/electronics-blogs/eye-on-iot-/4442673/Zombie-proof-your-IoT-design?_mc=NL_EDN_EDT_EDN_today_20160913&cid=NL_EDN_EDT_EDN_today_20160913&elqTrackId=8c7e2111ba6b4537b6384b308c0bcee5&elq=45c9648aa602409c8f2fef230e54a088&elqaid=33840&elqat=1&elqCampaignId=29576
Home> Community > Blogs > Eye on IoT
Zombie-proof your IoT design
Richard Quinnell -September 09, 2016
inShare7
Save Follow
PRINT
PDF
EMAIL
When asked about security features, many IoT device developers still express reluctance to implement protections. “There’s nothing hackers would want from this device,” many rationalize. But without cyber-security, your device risks being forced to join a zombie army known as botnet.
In case you have not heard of them, botnets are collections of connected devices that are running malware allowing an external party to use them without the owner’s awareness. In particular, the abuser can make these connected devices accept and relay messages via their Internet connection. As the device user never sees these messages (they target a fourth party), this hijacking operation can go unnoticed indefinitely.
While an individual device may not be particularly interesting to an abuser (aka, a bot-herder), an army of them can be very useful. Two of the most common uses for a botnet are distributed denial-of-service (DDoS) attacks and dissemination of spam emails.
Traditional botnet recruits are insecure home network routers and personal computers. But with rising numbers of IoT devices in deployment, many of them with little to no security, the bot-herders are beginning to change their conscription targets. A recent survey reported in Dark Reading found a botnet based on the BASHLITE malware family with more than one million zombies, 96% of which were IoT devices.
Without increases in security for next-generation IoT designs, such zombie armies can only be expected to grow.
The problem, as many developers exclaim, is that “Security’s too expensive!” It’s true that many of the traditional security processes and algorithms require many more compute resources than small IoT devices can provide. Further, these processes and algorithms don’t scale down effectively to match resource constraints. But if adding security into a design seems expensive, consider the cost of not having it. Companies have already had their products tank and their reputations shredded, and sometimes been forced into million-dollar recalls, because their IoT designs had eschewed security. And everyone pays if the bot-herders build and unleash zombie armies based on your unprotected design.
And cost may not be an issue for much longer. Devices like the Microchip ECC508 have started becoming available for tacking security onto microcontroller-based designs for under a dollar.
So, developers thinking of creating a new IoT device should at least stop casually dismissing security and start considering it as seriously as every other design tradeoff.
Tomi Engdahl says:
Hackaday Prize Entry: The Internet Of Garbage
http://hackaday.com/2016/09/13/hackaday-prize-entry-the-internet-of-garbage/
The Internet of Things is garbage. While the most visible implementations of the Internet of Things are smart lights that stop working because the company responsible for them folded, or smart thermostats that stop working because providing lifetime support wasn’t profitable, IoT could actually be useful, albeit in devices less glamorous than a smart toaster. Smart meters are a great idea, and so is smart trash. That’s what [mikrotron] and company are entering into the Hackaday Prize – smart trash cans – and it’s not as dumb as spending $40 on a light bulb.
The idea behind the Internet of Trash is to collect data on how full a trashcan is, and publish that data to the Internet. This information will be used by a city’s trash collectors and recycling agencies to know when it’s time to collect the garbage.
Internet of Trash
Trashcan sending the data to the internet!
https://hackaday.io/project/13111-internet-of-trash
Tomi Engdahl says:
Bewegungsfelder Is A Wireless IMU Motion Capturing System
http://hackaday.com/2016/09/13/bewegungsfelder-is-a-wireless-imu-motion-capturing-system/
For several years, hackers have been exploring inertial measurement units (IMUs) as cheap sensors for motion capturing. [Ivo Herzig’s] final Diploma project “Bewegungsfelder” takes the concept of IMU-based MoCap one step further with a freely configurable motion capturing system based on strap-on, WiFi-enabled IMU modules.
The Bewegungsfelder system consists of multiple, ESP8266-powered standalone IMU sensor nodes and a motion capturing server. Attached to a person’s body (or anything else) the nodes wirelessly stream the output of their onboard MPU6050 6-axis accelerometer/gyroscope to a central motion capturing server.
Bewegungsfelder Inertial Motion Capture (2016)
http://herrzig.ch/work/bewegungsfelder/
Bewegungsfelder is a mobile & customizable inertial motion capture system for skeletal animation. The system is mainly a software to capture and record skeletal animations and standalone IMU sensor modules based on the ESP8266 Wifi SoC.
Tomi Engdahl says:
Ingrid Lunden / TechCrunch:
Verizon acquires Sensity Systems to add LED light control to its IoT platform, ThingSpace; Sensity Systems had raised $75M from Cisco, GE, and others
Verizon acquires Sensity Systems to add LED light control to its IoT platform
https://techcrunch.com/2016/09/12/verizon-acquires-sensity-systems-to-add-led-light-control-to-its-iot-platform/
While Verizon continues to work towards closing its acquisition of Yahoo to boost its media and consumer Internet business (which also includes ownership of AOL, which owns TechCrunch), the company has made another acquisition to keep building out its enterprise services, too. The carrier has bought Sensity Systems, a startup based out of Sunnyvale (also home to Yahoo!) that has built solutions to help businesses and others convert older lighting systems to connected LED systems, making them controllable remotely. This is a straight push for Verizon’s wider Internet of Things “smart city” business, ThingSpace, which will integrate Sensity’s business and technology.
Financial terms are not being disclosed but my guess is that it’s a sizable deal in the hundreds of millions. Sensity had raised around $75 million with investors including strategics like Cisco Systems and GE, along with VCs like Mohr Davidow, Almaz and Trinity. It also has a number of large customers, such as the Westfield chain of shopping malls, the City of Chicago among 42 smart city installations globally.
The deal is expected to close in Q4 2016.
The deal comes on the back of another pair of acquisitions Verizon made this year to build out IoT solutions for vehicles: Telogis in June, also for an undisclosed sum, and Fleetmatics for $2.8 billion in August.
“Rapid urbanization is putting a huge strain on city services globally, coupled with inefficiencies caused by an aging infrastructure that currently supports critical functions, such as fire and emergency services, public transportation, lighting, sewer and sanitation systems,” said Sensity chairman and CEO and co-founder Hugh Martin.
“Sensity realized early on that IoT could be the key to breaking out of this dilemma. We have become the leader in the space by creating a visionary smart city IoT platform and forming a powerful ecosystem of technology partners. With Verizon, we look forward to delivering IoT connected systems on a massive scale to change how cities and communities operate around the world.”
Tomi Engdahl says:
Hacking a Dollar Store Bluetooth Device
http://hackaday.com/2016/09/14/hacking-a-dollar-store-bluetooth-device/
Hardware hackers are always looking for devices to tear apart and scavenge from. It’s hardly a secret that purchasing components individually is significantly more expensive than the minuscule cost per unit that goes along with mass manufacturing. Bluetooth devices are no exception. Sure, they’re not exactly a luxury purchase anymore, but they’re still not dirt cheap either.
Luckily for [Troy Denton], it seems dollar stores have started carrying a Bluetooth camera shutter for just a few dollars (it was three bucks, perhaps the dollar store actually means divisible-by). The device is designed to pair with a smart phone, and has two buttons allowing you to control the camera from afar. The fact that it works at all at that price is a small miracle, but the device also has potential for hacking that adds to its appeal.
Hacking Dollar-Store Bluetooth Devices (The Kindness of Strangers) part 1
http://troydenton.ca/?p=168
Tomi Engdahl says:
Sarah Perez / TechCrunch:
Amazon reintroduces the Echo Dot at $50, down from the $90 launch price, and adds a white option and discounted packs to encourage bulk purchases
Amazon’s connected speaker Echo Dot returns, is now only $50
https://techcrunch.com/2016/09/14/amazons-connected-speaker-echo-dot-returns-is-now-only-50/
We already knew it was coming – thanks to an accidental tweet Amazon posted earlier this week – but now it’s official: Amazon’s connected speaker Echo Dot is back in stock and at a lower price point of $49.99. The Alexa-powered device offers many of the same features that you’ll find in its larger counterpart, the Amazon Echo, including access to Amazon’s voice-based assistant who you can ask to do things like play music, read the news, check the weather, turn on your lights, set timers, use apps, and more.
First unveiled in March of this year, the Echo Dot along with Echo Tap, were Amazon’s first attempt at expanding its Echo family of connected speakers by making them available at lower price points.
Tomi Engdahl says:
How many people can change IoT LED lamps?
Things on the Internet’s hot now, ad nauseam. equivalent of Silicon Labs’ software development Skip Ashton points out that the IoT’s success depends on cost, ease of use, compatibility and the fact that solutions to the test of time.
The cost seems Moore’s Law and electronics in general the attending shape a bit like automatically. Ease of use is another story. – Everyone is able to change a light bulb. But what if the new LED lamps are planted in the radio? How many exchanges if successful, Ashton asks
Ashton did not think that Apple’s similar to one ecosystem model works UNCHR. – Applehan requires that all devices are related to each other. If a woman have an Android phone, Apple believes that a wife must be replaced, Ashton laughed.
For the user, the protocol does not mean anything. What is important is that the device works and is easy to use. – In the IoT device succeeds or crashes, Skip Ashton says.
Source: http://etn.fi/index.php?option=com_content&view=article&id=5046:kuinka-moni-osaa-vaihtaa-iot-ledilampun&catid=13&Itemid=101
Tomi Engdahl says:
Finnish companies will bring IoT technologies to the car
Finland piloted by intelligent maintenance repair service that has been developed Elisa IoT-service platform on top. A new kind of älyautopalvelua will bring changes in the way the use, maintenance than the maintenance of the car. Elisa addition to the pilot telematics company are involved in a car dealership Palin attributable Helpten and the S Group Satakunta Group.
” Instead of tracking of development we want to be involved in creating this future for our customers and developing a service that makes it easier, as well as a car owned by that use. We strongly believe that this is a great value for both private motorists and corporate customers, ”
Elisa IoT on the service platform, the solution implemented enables a variety of data sources and connection services to the system without long-term development projects. For vehicles mounted transmitter transmits the operating and fault information in real-time utilization.
Source: http://www.uusiteknologia.fi/2016/09/16/suomalaisyritykset-tuovat-iot-tekniikan-autoon/
Tomi Engdahl says:
Smartphone TV Remote Courtesy of Homekit and ESP8266
http://hackaday.com/2016/09/16/smartphone-tv-remote-courtesy-of-homekit-and-esp8266/
Good grief, this smartphone-to-TV remote really drives home how simple hardware projects have become in the last decade. We’re talking about a voltage regulator, IR LED, and ESP8266 to add TV control on your home network. The hardware part of the hack is a homemade two sided board that mates an ESP with a micro-USB port, a voltage regulator to step down fom 5 to 3.3 v, and an IR LED for transmitting TV codes.
USB is a standard and now is found on the back of most televisions — power source solved. Cheap WiFi-enabled microcontroller — check. Ubiquitous smartphones and established protocols to communicate with other devices on the network — absolutely. It’s an incredible time to be a hacker.
Television infrared remote codes are fairly well documented and easy to sniff using tools like Arduino — in fact the ESP IR firmware for this is built on [Ken Shirriff’s] Arduino IR library.
ESP8266 TV remote for Homekit
http://www.instructables.com/id/ESP8266-TV-Remote-for-Homekit/
ESP8266-03 TV remote board.
Can control with Homekit, or any TCP socket client.
Powered from 5V with micro USB connector.
Infrared remote library for ESP8266: send and receive infrared signals with multiple protocols.
https://github.com/markszabo/IRremoteESP8266
Based on: https://github.com/shirriff/Arduino-IRremote/
Tomi Engdahl says:
RF Emissions Need Data Model
http://www.eetimes.com/author.asp?section_id=36&doc_id=1330469&
An international standard data model for radio frequency emissions is in the works and welcomes your input.
Wireless communication depends on RF spectrum, a unique natural resource that is endlessly reusable but strictly limited in any place in any fraction of a second. Continued growth in mobile devices, smart vehicles and the Internet of Things depends critically on our ability to maximize spectrum utilization and minimize interference.
In the IoT, the need to minimize interference is heating up, literally, in two ways.
Cross-talk between similar and adjacent systems in smart buildings poses risks to life and property. Secondly, random electronic pulses become more likely to damage the IoT’s electronic devices as the devices miniaturize. Pulses come not only from utility infrastructure, electric cars and other artifacts of our increasingly electrical world, but also from signals and active sensing emissions.
The FCC recently initiated a Noise Floor Inquiry to determine if there is an increasing noise problem, and, if so, its extent.
Tomi Engdahl says:
Processor Cores Feature Improved Security
http://www.eetimes.com/document.asp?doc_id=1330456&
In the escalating war between developers and cybercriminals, processor design needs to continually evolve. In one such evolution, Synopsys has developed next-generation security processor cores with protections that go well beyond encryption. The ARC SEM cores are designed to protect against both passive and invasive attacks aimed at compromising the contents of processor memory.
To handle encryption, the ARC SEM security processor family is designed to use software rather than an encryption engine, according to Angela Raucher, product line manager for ARC EM processors. “Developers of SoCs are looking to save power and area while still implementing security,” Raucher said in an interview with EE Times. “These choices are leading to requirements on the processor side to eliminate the crypto core.” The new processor cores instead offer an optional crypto pack, Raucher added, which are hardware extensions to help accelerate cryptographic calculations.
It has long been known, however, that running cryptographic algorithms in software can expose secret keys to discovery using passive side-channel attacks.
To guard against such attacks, Raucher explained, the ARC SEM cores are designed to flattening the timing of instructions by removing data-dependent instruction cycle count variations. The cores also introduce randomized variations in power and alter timing with random insertions of branch-to-self instructions. Such actions reduce the correlations upon which the attacks depend.
The cores also offer protection against intrusive attacks such as using the debug port to copy code and probe for software keys.
ARC SEM cores support creation of a trusted execution environment, Raucher noted, by providing up to 16 separate protected areas for code and data, with per-region scrambling capability.
Tomi Engdahl says:
The Week In Review: IoT
http://semiengineering.com/the-week-in-review-iot-18/
Verizon acquires “smart cities” startup; hackers find dozens of IoT vulnerabilities; IoT market forecast to hit $883B+ in 2022.
Verizon Communications agreed to acquire Sensity Systems of Sunnyvale, Calif., a supplier of energy-efficient light-emitting diode lighting equipment to serve as the foundation for its Internet of Things platform for smart cities; financial terms weren’t disclosed. The transaction is expected to close in the fourth quarter. Mike Lanman, Verizon’s senior vice president of Enterprise Products and IoT, said in a statement, “Sensity is a leading provider of IoT solutions for smart communities with a strong ecosystem of partners, and this transaction will accelerate the deployment of large-scale implementations that will drive the digital transformation of cities, universities, and venues. Verizon is uniquely positioned through its infrastructure investments at the network, platform and application levels to provide holistic solutions that empower communities to address their most pervasive challenges.”
Cybersecurity researchers at last month’s DEF CON 24 conference report uncovering more than 47 new vulnerabilities in 23 Internet of Things devices from 21 brand-name manufacturers. The study emerged from the second annual IoT Village, a traveling security event
https://www.iotvillage.org/
Tomi Engdahl says:
Zombie-proof your IoT design
http://www.edn.com/electronics-blogs/eye-on-iot-/4442673/Zombie-proof-your-IoT-design?_mc=NL_EDN_EDT_EDN_weekly_20160915&cid=NL_EDN_EDT_EDN_weekly_20160915&elqTrackId=1ad8590d662b4778b5fb8196bee33184&elq=75898752bddb4b0e88cabca45300ae80&elqaid=33894&elqat=1&elqCampaignId=29626
When asked about security features, many IoT device developers still express reluctance to implement protections. “There’s nothing hackers would want from this device,” many rationalize. But without cyber-security, your device risks being forced to join a zombie army known as botnet.
While an individual device may not be particularly interesting to an abuser (aka, a bot-herder), an army of them can be very useful. Two of the most common uses for a botnet are distributed denial-of-service (DDoS) attacks and dissemination of spam emails.
A recent survey reported in Dark Reading found a botnet based on the BASHLITE malware family with more than one million zombies, 96% of which were IoT devices.
Without increases in security for next-generation IoT designs, such zombie armies can only be expected to grow.
The problem, as many developers exclaim, is that “Security’s too expensive!” It’s true that many of the traditional security processes and algorithms require many more compute resources than small IoT devices can provide. Further, these processes and algorithms don’t scale down effectively to match resource constraints. But if adding security into a design seems expensive, consider the cost of not having it.
Companies have already had their products tank and their reputations shredded, and sometimes been forced into million-dollar recalls, because their IoT designs had eschewed security.
Tomi Engdahl says:
Home> Tools & Learning> Products> Product Brief
Secure chip works with Amazon Web Services
http://www.edn.com/electronics-products/other/4442548/Secure-chip-works-with-Amazon-Web-Services?_mc=NL_EDN_EDT_EDN_consumerelectronics_20160914&cid=NL_EDN_EDT_EDN_consumerelectronics_20160914&elqTrackId=56085335422940c78d1cc39ea3dccbf6&elq=e47f2e9c0d4346b9b11a570b20ee8a61&elqaid=33853&elqat=1&elqCampaignId=29588
Jointly developed with Amazon Web Services (AWS), the Microchip AWS Zero Touch Secure Provisioning Kit helps designers develop IoT devices that comply with new AWS security regulations. These regulations state that a device must use mutual authentication with a remote server to be authorized on the AWS cloud.
The AT88CKECC-AWS-XSTK kit costs $249 each. Prices for the ECC508 IC start at $0.60 each in lots of 10,000 units.
AWS Zero Touch Secure Provisioning Platform
http://www.atmel.com/applications/IOT/aws-zero-touch-secure-provisioning-platform/default.aspx
All cloud-connected devices need a unique and protected identity that can be securely authenticated. There two main challenges to achieving this goal: providing a secure authentication method and managing the private keys in a large-scale production environment. The AWS-ECC508 meets these challenges by complying with AWS IoT just-in-time registration. While one-way authentication has commonly been used to secure systems, AWS IoT now offers mutual authentication between devices and the remote server. The AWS-ECC508 is an easy, flexible and cost-effective solution for adding this new, mutual authentication process to your device design. Simply solder the tamper-resistant AWS-ECC508 on your board and connect it to the host microcontroller (MCU) over I2C. The AWS-ECC508 is preconfigured to be automatically recognized by the AWS IoT service. All information is contained in a small, easy-to-deploy crypto companion device that is agnostic to surrounding hardware. This solution has been fully evaluated by AWS to comply with all of its security requirements.
Tomi Engdahl says:
The Internet of Things (IoT)
http://www.anritsu.com/en-GB/test-measurement/technologies/internet-of-things?mkt_tok=eyJpIjoiWWpFMFpqRTBNakZrTURJdyIsInQiOiJjNVllYklzSWVrbG50MVlENjdPc2lvVmFuTHVIcUh2TjBscHJGUUpQY2NqNlVTUGt3cmtpdEd1RlJYR0JXcmZpTGxaY0MwWThrbkpSQ1NyVUJnNUdPU3R1ZVZlRmhpb01icmJ2MHBGbmdZYz0ifQ%3D%3D
IoT, along with 5G, are “the next big thing” in the Tech World. Many industries are excited about the opportunities it presents, worried about the changes and perplexed by the challenges.
If you ask 10 people what The Internet of Things means you are likely to get 10 different answers ranging from Big Data to the connected car and autonomous driving. Still, one common denominator remains: The Internet of Things relies on products that are physically connected to the outside world.
Be it wired or wireless, without this connection the Internet of Things will not exist.
Designing your “Thing” and keeping it connected
The number of applications for Things is enormous and has implications in almost all aspects of daily life. The possibilities are endless but the basic anatomy of the typical Thing is essentially the same.
Sensing electronics
Power supply
Control processor
Positioning and tracking systems
Short range wireless connections
Long range wireless connections
Wired connections
Actuators
All of these components need to be working in sync and depending on the application for your Thing the testing requirements vary.
Even if the realm of possibility for the IoT seems infinite it will be enabled by a finite number of Technologies.
The wireless technologies enabling the Internet of Things can be roughly divided into 3 groups though with some overlap:
Cellular, meaning technologies evolved from mobile telephony
Non-cellular, meaning technologies derived from standards such as Bluetooth or WLAN
IoT specific, meaning technologies developed specifically with IoT in mind
The optimal choice of technology or combination of technologies depends on the use case of the end product. Most IoT solutions are projected to be relatively close range connected, typically tens of meters at most. These products will not benefit from a long range Wide Area Network connection and will likely use non-cellular technologies such as Bluetooth Low Energy or Zigbee or z-wave encapsuled within a capillary network of ecosystems like Apple Home Kit, Amazon Alexa, Google Home or possibly the point-to-point connections envisioned in the future for 5G. Longer range connections can be provided by cellular or low power WAN technologies such as LoRa, NB-IOT (a 4G LTE derivative) or 6LoWPAN.
The Price of IoT
It’s often mentioned that IoT devices need to be very modestly priced. This is especially apparent when discussing IoT device manufacturing. The drive for low cost contains the risk of cutting costs in quality control and testing as well.
Whereas a consumer will likely only be looking at the device cost when selecting the suitable product, in the enterprise world there are also other costs to consider.
These include:
Cost of the device
Cost of installation and commissioning
Cost of maintenance and device replacement
Cost of the connections
When concentrating on device cost it’s easy to overlook the costs related to the manual labour of installation and maintenance. However, if an IoT device costs 10 €, for example, the installation and commissioning is likely to cost 100 €. The same goes for maintenance and device replacement in the case of a faulty device. One maintenance and replacement call will very likely cost even more.
Flexible Solution for Manufacturing the IoT
mt8870aThe testing of IoT devices does not have to be all that complex or expensive. Wireless IoT technologies are many but the production testing for all of them is handled in a very similar manner. This means that a huge portion of the production test needs of the wireless IoT device world can be handled with one single solution: The Anritsu Universal Wireless Test Set MT8870A.
Tomi Engdahl says:
Manufacturing the Internet of Things
https://pages.anritsu-emearesponse.com/rs/937-UWP-683/images/Manufacturing_the_IoT.pdf?mkt_tok=eyJpIjoiWWpFMFpqRTBNakZrTURJdyIsInQiOiJjNVllYklzSWVrbG50MVlENjdPc2lvVmFuTHVIcUh2TjBscHJGUUpQY2NqNlVTUGt3cmtpdEd1RlJYR0JXcmZpTGxaY0MwWThrbkpSQ1NyVUJnNUdPU3R1ZVZlRmhpb01icmJ2MHBGbmdZYz0ifQ%3D%3D
Tomi Engdahl says:
Global Internet of Things Security Market to Be Worth $9 Bn in 2016
https://www.asdreports.com/news-18241/global-internet-things-security-market-be-worth-9-bn-2016?utm_source=IIoT+Newsletter&utm_medium=email&utm_campaign=Sept
This 246 page, now available on ASDReports, Internet of Things (IoT) Security Market 2016-2021: Cyber Security Forecasts for Medicine (Connected Health, Telemedicine, Hospital Equipment, mHealth, Health & Fitness Wearable Technology), Transport (Automotive, Connected Car, Connected Aircraft / Aviation, Maritime Vessels, Public Transport), Industrial Internet of Things (IIoT) (Industrial Control Systems (ICS), Critical Infrastructure, Buildings, Machine-to-Machine (M2M), Manufacturing, Retail, Utilities, Energy, Agriculture, Supply Chain Management), Connected Home (Consumer Connected Devices, Smartphones, Tablets, Fixed Line Broadband & Mobile Communications, Smart Appliances) indicates that the IoT Security market is set to reach from $9bn in 2016 as IoT enabled devices become a more ubiquitous part of global society.
The Internet of Things (IoT) Security Market 2016-2021: Cyber Security Forecasts for Medicine (Connected Health, Telemedicine, Hospital Equipment, mHealth, Health & Fitness Wearable Technology), Transport (Automotive, Connected Car, Connected Aircraft / Aviation, Maritime Vessels, Public Transport), Industrial Internet of Things (IIoT) (Industrial Control Systems (ICS), Critical Infrastructure, Buildings, Machine-to-Machine (M2M), Manufacturing, Retail, Utilities, Energy, Agriculture, Supply Chain Management), Connected Home (Consumer Connected Devices, Smartphones, Tablets, Fixed Line Broadband & Mobile Communications, Smart Appliances will be of impressive value to current, and future investors within the IoT Security market, as well as to companies and research centres who wish to broaden their knowledge of the IoT Security industry.
Tomi Engdahl says:
SMARC Architecture Meets Low Power, High Performance Requirements for IIoT Applications
http://intelligentsystemssource.com/smarc-architecture-meets-low-power-high-performance-requirements-for-iiot-applications/
Isolated systems symbolize the past. A network of sophisticated, smaller form factor devices with power-saving thermal characteristics signals the future. When this network makes Industrial Internet of Things (IIOT) applications possible, it does so by achieving both low power consumption and healthy computing performance from control devices, such as IIoT gateways.
Designed to play an essential role in a network that enables intelligent industrial applications is the Smart Mobility ARChitecture (SMARC™) computer-on-module form factor. Supported by a number of embedded computing module vendors and held by the vendor-independent Standardization Group for Embedded Technologies (SGeT), SMARC provides an open-standard definition for both ARM-based and x86-based SoC embedded computing solutions, optimized for low power, cost efficiency and high performance.
SMARC: A Unifying Architecture for IIoT Devices
As SoCs do not need the support chips of a PC platform and draw less power, the amount of board space that needs to be reserved for power converters and power supply lines is greatly reduced. This allows the use of a smaller form factor, facilitating use of SMARC-based computer-on-modules (COMs) in low-power portable equipment. SMARC CPU modules are expected to have an actual power intake between 2 W to 6 W, allowing for passive cooling and further reducing subsequent design effort and overall cost. The standard allows for up to 9W continuous power draw for more demanding scenarios.
Based on the proven connector as it is employed by Mobile PCI Express Module (MXM) video modules, SMARC defines two sizes of module: a full-size that measures 82 mm x 80 mm, and a short module for more compact systems that measures 82 mm x 50 mm. The edge connector supports 314 electrical contacts. For systems that are used in harsh environments, shock- and vibration-proof versions of the connector are readily available. The temperature range of the connector extends from −55°C to +85°C.
The SMARC MXM connector guarantees a high degree of signal integrity, required by high-frequency serial interfaces. For example, on 2.5 GHz signals as employed by PCI Express Gen2, the insertion loss of the connector is just 0.5 dB.
The SMARC module is designed to support a combined height above the carrier of less than 7 mm. The
Case Study: SMARC-based IoT Gateway Powers Machine Failure Prediction Application
Industrial machinery is subject to nearly constant shock and vibration, which generates fatigue and wear on materials and components. Forecasting potential problems in order to implement preventive measures and maintenance or equipment replacement is critical to sustain performance and avoid costly downtime and damage.
The advent of cloud-based IIoT solutions has vastly improved the field of machine failure prediction, with real-time data transmission, remote monitoring and control, and enhanced accuracy, efficiency and economy. IIoT solutions require a vertical integration of networked field devices such as sensors and data loggers, IoT gateways (controllers) and cloud servers. The IoT gateways collect data from the field, implement primary data analysis (“fog computing”) and push the analyzed data to a cloud server for more advanced analytics. At each point, network connectivity is critical.
IIoT gateways powered by x86-based SMARC boards include characteristics that make reliable connectivity and secure data transfer possible. These gateways can offer a fanless, compact footprint that delivers both low power and high performance. Combined with cloud services, SMARC-based IoT gateways can push data to the cloud, deliver remote monitoring and control capabilities, and offer rich libraries and tools allowing OEM customers to easily configure and design intuitive GUIs viewable on any browser-based device for 24/7 data access.
Tomi Engdahl says:
Two radio on the same chip
Many manufacturers develop equipment that have both Bluetooth connectivity that less than gigahertz wireless. Texas Instruments is now presented SimplLink series of radio circuit, which supports both frequency bands.
TI CC1350 praises new circuit
he micro controller adds up to less than a 20 kilometer range gigahertz radio with one button battery.
CC1350-circuit the bottom of the ARM Cortex-M3 core and is packaged in a 4×4-mm QFN the casing.
Source: http://etn.fi/index.php?option=com_content&view=article&id=5055:kaksi-radiota-samalla-sirulla&catid=13&Itemid=101
More: http://www.ti.com/lsds/ti/wireless_connectivity/simplelink/overview.page
Tomi Engdahl says:
Wi-Fi in Sensor Applications
https://www.eeweb.com/blog/eeweb/wi-fi-in-sensor-applications
Sensors are used for measurements and for acquisition of data; but they require an effective data transfer mechanism to enable full-fledged applications that utilize the data they collect. A popular method of data transfer is through wireless means. Among the wireless mechanisms, 802.11 Wi-Fi stands out for a number of reasons. Redpine’s informative paper on the use of Wi-Fi in sensor applications describes these advantages; and also covers the implementation of such application scenarios.
Sensors are deployed in a variety of environments and for a number of purposes—including building automation, facility management, environmental monitoring, industrial automation, military zones, asset management, and many others. Legacy sensor networks have used proprietary wireless transport mechanisms, and lately standards based wireless transport like Zigbee or Bluetooth.
These wireless mechanisms are characterized by low operational power, low cost, low range, and largely proprietary network and data transfer protocols, including mesh networking. Sensors can potentially act as relays and be capable of adapting to changing scenarios.
Recently, however, wireless networks based on 802.11 ‘Wi-Fi’ have become pervasive in enterprise and industrial environments, among others, where sensors are often deployed. The presence of a well-established and standardized wireless network has brought about a new possibility in the deployment of sensors—the use of Wi-Fi as the transport mechanism. 802.11 was, of course, not designed with sensor applications in mind, but innovations in implementations have enabled the use of 802.11 while satisfying all sensor requirements and more.
One of the advantages in this scenario is the location of a central controller or coordinator – this can be anywhere on the network, and with Internet connectivity, potentially anywhere in the world. With standardized IP based transport, no additional network infrastructure needs to be added to transfer sensor information to any part of the network.
Wi-Fi may also be used to determine and provide the location of a client device. Typically the device’s transmissions are received by several access points or receivers, or the device receives beacons from the several access points. The relative signal strengths seem, or the relative times of arrival, measured, provide the means to locate the client device. Access points in these scenarios are carefully located so as to provide the best ranging measurements, and a thorough measurement is carried out in advance of the signal propagation nuances of the deployment landscape.
A “sensor” itself is, of course, the device that gathers data – the transducer used for measurement of temperature, humidity, pressure, proximity, position flow, sound, presence or liquids or gases, etc. A wireless communication facility now enables the sensor to be deployed at any location with ease.
The microcontroller is the main programming element in the design. It con gures the sensors and the wireless subsystem; and it handles the battery or power management and the conditioning of sensor data as required. It may also be the device or functional block that provides the ultra-low power timed sleep mode. The Wi-Fi subsystem may be partitioned in various ways, based on the chipset used, but in general consists of a MAC, baseband processor, RF transceiver, and RF front-end.
The battery drain of the system depends on several factors. They include the power consumption of the sensors, the active mode power consumption of the microcontroller and wireless subsystems, and the power consumed in the sleep mode. With typical duty cycles of operation of a few milliseconds ON and several minutes OFF, overall energy drain could be dominated by the sleep mode power, with other influencing factors being the time taken to reach an operating point upon being woken up, and of course, the peak active mode consumption. Sensors used for critical monitoring are also often kept active at all times, and in these cases the sensor’s power consumption becomes important. A fundamental advantage with Wi-Fi based sensor networks is that no sensor node is burdened with the need to relay data from other nodes. The ON or active time therefore becomes highly regulated and predictable.
Transmission of data over the wireless channel can be in one of two modes. In the first mode, the node wakes up and associates to an access point or BSS before transmitting its data, with full compliance to the Wi-Fi network’s protocol. In the second mode, the sensor node wakes up and transmits data without going through the association procedure with the BSS.
Normal or off-the-shelf Access Points would not handle or respond to packets sent by unassociated clients unless they are special class of packets like probe requests.
The power advantage of 802.11 arises from the use of high transmit data rates in order to minimize active time. With modulation schemes up to 64-QAM, Wi-Fi’s spectral efficiency is also higher than most other protocols.
Ease of configuration before deployment, as well as after deployment in some cases, is an important requirement. Factory configuration of devices normally covers RF calibration, MAC address, and some configuration specific information. Other parameters like wireless network configuration, IP address, reporting intervals, and other operational parameters are commonly configured through a serial interface. In some cases they are also configured through the wireless interface itself, through a special mode. These configuration interfaces may also be used to deliver firmware upgrades.
Tomi Engdahl says:
Do you think that activity bracelet data is protected?
Activity or fitnessrannekkeita were sold during the first quarter of the year over 20 million copies. They collect all sorts of information to the user. Unfortunately, the data is easy to capture on their way to the cloud.
Technical University of Darmstadt, cyber security now Professor Ahmad-Reza Sadeghi explained that almost all of the data is outside the bracelets to capture. The study included 17 different bracelets from large manufacturers such as Xiaomi and Garmin.
While all cloud-based solutions for transferring data wristbands encrypted protocols, such as HTTPS, only four of the wristband was done anything about it, that the data would remain protected. According to Sadeghin even these methods do not prevent a motivated hacker.
Sadeghin team was able to make the so-called. man-in-the-middle attack, or to manipulate the data the way to cloud services. For example, five bracelets saved data only raw text a smartphone, which is a big security risk.
Sadeghin by insurance companies and others who build services upon monitoring of the activity, should be given to information security professionals manage storage, transfer and verification of data.
Source: http://etn.fi/index.php?option=com_content&view=article&id=5031&via=n&datum=2016-09-14_11:28:28&mottagare=30929
Tomi Engdahl says:
Things are changing on the way to IoT 2.0 – pardon the pun
According to the Gartner 2016 Hype Cycle the IoT is no longer “emerging.” I thought about this and I am okay with it because it means we have moved past the Trough of Disillusionment and on to creating real value. I have said before that the wave of IoT we’ve seen over the past few years, IoT 1.0, has been mostly a technology push. Early entrants demonstrated all kinds of interesting products showing what was possible: egg minders, step counters, doorbell cameras, self-filling refrigerators, and a wide array of smart home control centers. But overall IoT 1.0 delivered economic disappointment for shareholders — other than those of Arm Holdings, of course. Industrial stalwarts like GE and Honeywell have leveraged the ecosystem and lower cost technologies to extend previous M2M and automation solutions, but these successes have been more incremental than disruptive. The next phase is coming, however, and IoT 2.0 is all about getting back to user-focused design fundamentals driving recurring economic value.
http://intelligentsystemssource.com/things-are-changing-on-the-way-to-iot-2-0-pardon-the-pun/?utm_source=IIoT+Newsletter&utm_medium=email&utm_campaign=Sept
The changes of IoT 2.0 are being led by this move to identify and solve real problems for paying customers – and doing it better than ever before. We see the changes in a number of recent events and those looking to keep up must adapt.
CHANGE: New focus on end users — Companies are shifting to design led processes focusing on end users who not only drive adoption of IoT solutions but also determine the application’s ongoing economic value through sustained use. Digital health provides the most visible examples of this shift as investors have shifted focus, post Theranos, from diagnosis and clinically derived therapies to patient engagement. This shift delivers value from two facts common to all IoT propositions: user engagement is necessary to create the application’s desired outcome and engagement increases both the volume and value of data generated from that use.
ADAPTATION: Augment your marketing and development teams with user focused, design thinkers who can make sure that the technology development that you undertake matters to end users and thus creates sustained impact and value.
CHANGE: Shifting value chain — Mature IoT players like GE are re-evaluating their position in the ecosystem and choosing where they focus.
ADAPTATION: Evaluate your position in the technology stack and make sure that you are developing with your strength and buying from the ecosystem everywhere else.
CHANGE: New, high impact entrants to the IoT ecosystem — The technology ecosystem of the IoT is changing to address the hard problems identified by early entrants. Low Power Long Range (LPLR) radio and Low Power Wide Area Network (LPWAN) technologies like LoRa and NB-IoT make possible battery powered, wireless sensors that last 10 years while communicating at ranges of up to 10 miles. More important, these technologies come at cost-to-connect that is making the promise of billions of connected sensors an economic reality.
Blockchain, a new entrant on the 2016 Hype Cycle, comes out of the cryptocurrency world to address transaction security in the highly decentralized systems of the IoT. Blockchain appears to be perfect for IoT edge deployments where transactions between devices owned by different parties can be authenticated and securely recorded in a distributed ledger. Blockchains will allow automated commerce and asset transactions at a pace and level of trust not available today.
ADAPTATION: Know your technology stack and make sure that your team is either current with the new entrants or getting help from those within the ecosystem who are leading the way. Again, buy where you can and build only where strategic value results.
As Darwin said, “It’s not the strongest or most intelligent who survive but those most responsive to change.” Heads up everyone.
Tomi Engdahl says:
Finnish companies will bring IoT technologies in the car
Finland piloted by intelligent maintenance repair service that has been developed Elisa IoT-service platform on top. A new kind of älyautopalvelua will bring changes in the way the use, maintenance than the maintenance of the car. Elisa addition to the pilot telematics company are involved in a car dealership Palin attributable Helpten and the S Group Satakunta Group.
Digital networking and industrial solutions enable the Internet in many ways also associated with automotive business development. Motoring and mobility digitalization still generally refers to the future, but there are many benefits to participating in the pilot project implemented by now.
Source: http://www.uusiteknologia.fi/2016/09/16/suomalaisyritykset-tuovat-iot-tekniikan-autoon/
Tomi Engdahl says:
Global Internet of Things testbed created in Taiwan
http://www.cablinginstall.com/articles/2016/08/iot-testbed-taiwan.html
SIGFOX, one of the world’s foremost providers of dedicated communications services for the Internet of Things (IoT) in France, and UnaBiz, an IoT network operator in Asia, have joined French and Taiwanese officials in announcing the creation of a global Internet of Things testbed in Taiwan. With the SIGFOX IoT network as its centerpiece, the testbed will provide global IoT connectivity to Taiwan’s huge electronics manufacturing industry and demonstrate multiple applications and use cases.
In addition to supporting Taiwan’s goal of becoming the “Silicon Valley of Asia,” where new and disruptive technologies thrive, the nationwide network and testbed will also provide to SIGFOX the benefits of Taiwanese design and manufacturing expertise as it scales globally, Guidée said. Taiwan’s large high-technology manufacturing sector has extensive experience in developing high-quality products at competitive prices.
UnaBiz, which announced only three weeks ago a strategic partnership with ENGIE and SIGFOX to deploy the network in Singapore, will lead the network deployment in Taiwan, which is expected to have nationwide coverage in early 2018. “This extension to Taiwan is key in our regional development strategy, because Taiwan has the largest ecosystem of devices and solutions to accelerate the adoption of IoT use cases globally,” said Henri Bong, CEO of UnaBiz.
With this rollout, Taiwan will be the 23rd country globally, the second in Asia and the fourth country in the Asia Pacific region to have SIGFOX’s two-way IoT coverage, which provides low-cost, energy-efficient connectivity for countless devices that will make up the Internet of Things. Taiwan’s six largest cities or districts, containing half the country’s population of 23.5 million, will have coverage by mid-2017, expect the test bed companies. The rapid rollout in all countries is facilitated by the fact that SIGFOX’s infrastructure is far lighter than traditional wireless network infrastructure, according to a press release.
Tomi Engdahl says:
IoT: The New Convergence and the Challenges It Brings
https://event.on24.com/eventRegistration/EventLobbyServlet?target=reg20.jsp&partnerref=ws&eventid=1240266&sessionid=1&key=E11085AE1D5FEF5A2961ACB625C97F8B®Tag=&sourcepage=register
The next wave of convergence – the Internet of Things (IoT) – is set to capitalize on the Internet. Billions of previously disparate, unconnected devices are moving to our networks and communicating directly without any human interaction or intervention. By 2020, Gartner estimates that at least 20.8 billion IP-enabled devices will be connected to networks. To support and manage the signal transmission required to make IoT a reality, a common communications infrastructure is necessary.
organizations of all types are using IoT to take a new approach to sharing information, communicating, delivering high-quality AV, ensuring life safety and improving building management
Tomi Engdahl says:
IoT Needs Security All the Way Down to the Sensors
http://www.designnews.com/author.asp?section_id=1386&doc_id=281498&cid=nl.x.dn14.edt.aud.dn.20160913.tst004c
Embedded applications are far more vulnerable to security risks than most engineers realize, an expert will tell attendees at the upcoming Design & Manufacturing Show in Minneapolis.
”You can’t just say, ‘The gateway is secure and the cloud is secure,’ and assume that’s enough,” Alan Grau, president and co-founder of Icon Labs, told Design News. “We’re trying to bring awareness to the fact that you need to have security all the way down to the end points.”
Tomi Engdahl says:
Radio-astronomy with RTL-SDR, RaspberryPI and Amazon AWS IoT
https://www.hackster.io/mariocannistra/radio-astronomy-with-rtl-sdr-raspberrypi-and-amazon-aws-iot-45b617
Radio emissions from sky sources like Sun and Jupiter can be received and converted to digital domain for processing.
Tomi Engdahl says:
An ESP8266 in Every Light Switch and Outlet
http://hackaday.com/2016/09/20/an-esp8266-in-every-light-switch-and-outlet/
[Hristo Borisov] shows us his clever home automation project, a nicely packaged WiFi switchable wall socket. The ESP8266 has continuously proven itself to be a home automation panacea. Since the ESP8266 is practically a given at this point, the bragging rights have switched over to the skill with which the solution is implemented. By that metric, [Hristo]’s solution is pretty dang nice.
It’s all based around a simple board. An encapsulated power supply converts the 220V offered by the Bulgarian power authorities into two rails of 3.3V and 5V respectively. The 3.3V is used for an ESP8266 whose primary concern is the control of a triac and an RGB LED. The 5V is optional if the user decides to add a shield that needs it.
It’s all controllable from command line, webpage, and even an iOS app; all of it is available on his GitHub.
https://github.com/hborisov/
Switcher – A WiFi Open Source Power Switch and Socket Based on ESP8266
http://hristoborisov.com/index.php/projects/switcher-a-wifi-open-source-power-switch/
This is my latest project – The Switcher, a Wifi, open source, power switch and socket.
Built with modularity in mind – It can be mounted as a wall lights switch or used as a standalone power socket. Switcher gives the ability to control your lights, or any other household appliance, wirelessly over the wifi network and the Internet! There is a dedicated iOS App and web interface which can be used with any browser! You can build your own designs to make unique wall light switches for your house.
The switch uses the prominent ESP8266-01 module, an Arduino program, a 3D printed box and modules. It is free and open source, so you can build and modify it on your own!
At the center of the circuit is the ESP8266 module. Pins 2 (Rx), 3 (RST), 4 (GPIO0), 5 (CH_PD), 6 (GPIO2) are pulled high to prevent booting the ESP into programming mode. This requires “inverting” the GPIO pins programmatically.
The firmware is very simple. It is written in C++ (Arduino) and uses several libraries from the Arduino/ESP8266 project. Additionally I am using the Adafruit NeoPixel library to control RGB LEDs for the on/off indicator.
Switcher – A WiFi Open Source Power Switch and Socket
https://github.com/hborisov/switcher_cpp
iOS App
https://github.com/hborisov/switcher_ios
Tomi Engdahl says:
Seriously, we don’t need smartphone-controlled candles
https://techcrunch.com/2016/09/20/why-why-why-headdesk/
You don’t have to spend a long time in tech journalism before you get pitched a whole stack of companies that make you scratch your head and ask yourself “why?”
LuDela is but one example. The company makes a smartphone-controllable candle featuring real, actual fire. Why? There are plenty of real problems to solve; creating fire at the touch of an app isn’t among them.
As someone who covers a lot of Kickstarter and Indiegogo campaigns, I get an above-average number of emails trying to pitch me on some truly asinine ideas. I’ve seen Bluetooth-controlled shoe organizers.
A small part of me loves these pitches. The creativity is incredible. The chutzpah is admirable. The amount of time and money invested in their pet projects is balls-to-the-wall hard-core. A much bigger part of me doesn’t love these pitches.
Before you start your next venture, consider the opportunity cost of starting that venture.
A startup will take years of hard work, inhuman amounts of dedication and will come with a very real personal cost. Startups are stressful, bad for your physical and mental health and often bad for your existing and new interpersonal relationships.
Unnecessary, but probably extremely successful
“We’re the creators of the world’s first and only real-flame candle you can light and extinguish from your smartphone,” writes the company’s co-founder and CEO.
https://ludela.com/
Tomi Engdahl says:
Expose your Raspberry Pi on Any Network
http://hackaday.com/2016/09/20/expose-your-raspberry-pi/
Everyone’s talking about the Internet of Things (IoT) these days. If you are a long-time Hackaday reader, I’d imagine you are like me and thinking: “so what?” We’ve been building network-connected embedded systems for years.
Internet of Things isn’t a child of this decade. Only the name is.
The big news — if you can call it that — is that the network is virtually everywhere. That means you can connect things you never would have before.
The Problem
There’s still one problem. Sure, the network is everywhere. But that network is decidedly slanted at letting you get to the outside world. Want to read CNN or watch Netflix? Sure. But turning your computer into a server is a little different. Most low-cost network options are asymmetrical. They download faster than they upload. You can’t do much about that except throw more money at your network provider. But also, most inexpensive options expose one IP address to the world and then do Network Address Translation (NAT) to distribute service to local devices like PCs, phones, and tablets. What’s worse is, you share that public address with others, so your IP address is subject to change on a whim.
What do you do if you want to put a Raspberry Pi, for example, on a network and expose it? If you control the whole network, it isn’t that hard. You usually use some kind of dynamic DNS service
That’s fine if you are at home and you control all of your network access and hardware. But suppose you don’t know for sure where your system will deploy.
Solutions
There are a few options for cases like this. NeoRouter has software for many platforms that can create a virtual private network (VPN) that appears to be a new network interface where all the participants are local. If my desktop computer has a NeoRouter IP of 10.0.0.2 and my Pi has 10.0.0.9 then I can simply ssh over to that IP address. It doesn’t matter if the Pi is halfway around the world. The traffic will securely traverse the public Internet as though the two computers were directly connected with no firewalls or anything else between them.
http://www.neorouter.com/products-nrfree
Honestly, that sounds great, but I found it a little difficult to set up. It also isn’t terribly useful by itself. You need to run some kind of server like a Web server. You also need a NeoRouter server on the public Internet with an open port.
A Better Answer
What I wound up using was a service called Pagekite. The software is all open source and there is a reasonable amount of free use on their servers
https://pagekite.net/
https://pagekite.net/wiki/OpenSource/
If you go to the Pagekite web site, they have a really simple “flight plan” to get you started
The concept behind PageKite is that of a reverse proxy. Both the remote computer and the user find the PageKite computer via DNS (see figure below). That server acts as a go-between and since nearly all networks will allow access to a web server, there should be no firewall issues.
Tomi Engdahl says:
Preparing Your Product For The FCC
http://hackaday.com/2016/09/19/preparing-your-product-for-the-fcc/
At some point you’ve decided that you’re going to sell your wireless product (or any product with a clock that operates above 8kHz) in the United States. Good luck! You’re going to have to go through the FCC to get listed on the FCC OET EAS (Office of Engineering and Technology, Equipment Authorization System). Well… maybe.
As with everything FCC related, it’s very complicated, there are TLAs and confusing terms everywhere, and it will take you a lot longer than you’d like to figure out what it means for you.
There are two kinds of things that are getting tested; intentional radiators and unintentional radiators. Intentional means they are purposely putting out RF signals, like WiFi, Bluetooth, or any other transmitting radio. These must be tested and filed with the FCC before you can start selling or even marketing your product.
Then there are unintentional radiators. This could be switching noise from a power supply, accidental antennas from poor ground pours, or long clock traces. You need to have your product tested for unintentional radiation
There’s another thing to consider, and that’s FCC Modular Approval. If you want to avoid all the hassle and expense of intentional emission testing, you can use a wireless module that has modular approval. There are lots of companies that make these modules for BLE, WiFi, Zigbee, GSM, and pretty much any wireless tech. They go through the painful FCC process for you and sell you their module, which has the chip, balun, antenna, crystal, and shield, all in a pretty package that you can solder onto your PCB. This will avoid the intentional emissions testing and give you an optimized transmitter. You’re still responsible for unintentional radiation on your full board, but this is much cheaper and easier and may not even need to be filed.
For low volumes of products, modules are a great way to jumpstart product development and start scaling up, and when you have proven the market and the economics make sense to switch (usually in the tens of thousands in volume), then you can go to your own design.
Tomi Engdahl says:
Hackaday Prize Entry: The Internet Of Meat
http://hackaday.com/2016/09/20/hackaday-prize-entry-the-internet-of-meat/
We’ve only just begun to see the proliferation of smart kitchen gadgets. Dumb crock pots with the intelligence of a bimetallic strip, are being replaced by smart sous vide controllers. The next obvious step is barbecue. For his Hackaday Prize entry, [armin] is building a smart, eight-channel BBQ controller for real barbecue, with smoke and fans, vents and metal boxes.
For his Hackaday Prize entry, [armin] is working on a vastly improved version. The new version supports eight temperature probes, temperature logging and plotting, a webcam, setting alarms, a web interface, 433MHz radio, and PWM and fan control.
BBQ WLAN Thermometer
8-channel (BBQ)-Thermometer hooked to your WLAN
https://hackaday.io/project/9515-bbq-wlan-thermometer
Based on a Raspberry Pi and a small PCB with ADC and some step-up electronics, this thermometer designed by and for the BBQ-community offers the ability of monitoring and logging 8 different temperatures at a time. Hooked up to your local WLAN, you have access to a webbased GUI to display and control all functions.
Functions:
8 Channel Data-Logging
Display of Thermo-Plots
USB-Webcam-capability
Raspicam-capability
Setting of high/low-alarm-tresholds to trigger
a) beeper alarm local
b) webinterface-sound
c) email
d) WhatsAp-Message
Pitmaster-functionality to control BBQ-temperature or Sous-Vide-Device with PID using
a) PWM Fan-control
b) Servo-control
c) I/O-control (0,5Hz PWM)
Support of different local displays (4x20LCD, 2.8″ touch screen)
For the so called “Mini-Version” based on Raspberry PI Zero, files for 3D-printing of the custom case aswell as all gerber-files to produce professional PCB are available.
Tomi Engdahl says:
In the rush to bring the IoT to consumers, security and privacy are often overlooked. Rambus’ Aharon Etengoff advocates for a new paradigm to provide secure foundations for connected devices.
Security is “often overlooked” for the IoT
http://www.rambusblog.com/2016/09/14/security-is-often-overlooked-for-the-iot/
The Online Trust Alliance (OTA) has determined that the overwhelming majority of publicly reported Internet of Things (IoT) vulnerabilities publicly disclosed over the last year could have been easily avoided.
According Craig Spiezle, Executive Director and President of the Online Trust Alliance, security and privacy is often overlooked in the rush to bring connected devices to market.
“If businesses do not make a systemic change we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings,” he stated.
The most glaring IoT security failures analyzed by the OTA included the omission or lack of rigorous security testing throughout the development process; the lack of a discoverable process or capability to responsibly report observed vulnerabilities; insecure or no network pairing control options and a lack of testing for common code exploits and limited transport security and encrypted storage for user IDs and passwords. Last, but certainly not least, the OTA found that a number of IoT devices lacked a sustainable and supportable plan to address vulnerabilities through the product lifecycle, including a dearth of software and firmware update capabilities, along with insecure and untested security patches and updates.
“Security starts from product development through launch and beyond but during our observations we found that an alarming number of IoT devices failed to anticipate the need of ongoing product support,” said Spiezle. “Devices with inadequate security patching systems further opens the door to threats impacting the safety of consumers and businesses alike.”
A new paradigm, designed from the ground up to provide secure foundations for connected devices, is clearly long overdue. Devices should be secured throughout their lifecycle from chip manufacture, to day-to-day deployment, to decommissioning.
According to Steven Woo, VP of Systems and Solutions at Rambus, the semiconductor industry is slowly beginning to realize IoT security is a critical goal that needs to be treated as a first-class design parameter. Nevertheless, software is often selected as the security medium of choice because it is relatively simple to deploy and layer on top of existing systems.
“It’s certainly no secret that software-based security can be hacked. However, a silicon-based hardware root-of-trust offers a range of robust security options for IoT devices. Enabled by Moore’s Law, integration of a silicon root-of-trust into IoT silicon makes a lot of sense. As more and more devices are brought online, the importance of heightened security will only increase. Providing hardware-based security via a root-of-trust is going to be very important going forward,” he added.
OTA Finds 100% of Recently Reported IoT Vulnerabilities Easily Avoidable
https://otalliance.org/news-events/press-releases/ota-finds-100-recently-reported-iot-vulnerabilities-easily-avoidable
IoT devices could be used as weapons if security and privacy best practices are not followed
The Online Trust Alliance (OTA), the non-profit with the mission to enhance online trust, today announced that every vulnerability or privacy issue reported for consumer connected home and wearable technology products since November 2015 could have been easily avoided. Specifically, OTA found had device manufacturers and developers implemented the security and privacy principles outlined in the OTA IoT Trust Framework, the recently reported susceptibilities would have never occurred.
“In this rush to bring connected devices to market, security and privacy is often being overlooked,” said Craig Spiezle, Executive Director and President of the Online Trust Alliance. “If businesses do not make a systemic change we risk seeing the weaponization of these devices and an erosion of consumer confidence impacting the IoT industry on a whole due to their security and privacy shortcomings.”