Here is a list f IoT predictions for year 2018. With the number of connected devices set to top 11 billion – and that’s not including computers and phones – in 2018, Internet of Things will clearly continue to be a hot topic. Here is my prediction list:
1. Artifical Intelligence – it will be talked a lot
2. Blockchain – blockchain will be hyped to be a solution for many IoT problems, and it will turn out that it is not the best solution for most of problems it is hyped for – and maybe it will find few sensible uses for it in IoT. Blockchain can add immutability and integrity to some IoT transactions.
3. 4G mobile for IoT: NB-IoT and LTE-M are ready to be tested or used in many markets
4. 5G will be hyped a lot for IoT applications but it is nowhere near for any real big IoT use cases
6. Security issues will be talked a lot. IoT security is far from solved issue.
7. Privacy issues of IoT will be talked a lot when our homes and pockets are starting to be filled with ever listening digital assistants.
8. Industrial Internet of Things (IIoT) will be massive
9. More CPU power will be added or used in the edge. Pushing processing power to the “edge” brings a number of benefits and opportunities.
10. Hardware based security: Hardware based security on microprocessors will be talked a lot after “Meltdown” and “Spectre” disaster
Links to more predictions:
https://www.forbes.com/sites/danielnewman/2017/12/19/the-top-8-iot-trends-for-2018/#17a9943267f7
https://www.ibm.com/blogs/internet-of-things/top-5-iot-trends-in-2018/
https://www.inc.com/james-paine/3-internet-of-things-trends-to-watch-in-2018.html
https://www.i-scoop.eu/iot-2018-1/
https://dzone.com/articles/iot-trends-for-2018
1,393 Comments
Tomi Engdahl says:
Data center infrastructure often an overlooked security risk: Report
http://www.cablinginstall.com/articles/pt/2018/04/data-center-infrastructure-often-an-overlooked-security-risk-report.html?cmpid=enl_cim_cim_data_center_newsletter_2018-04-24&pwhid=e8db06ed14609698465f1047e5984b63cb4378bd1778b17304d68673fe5cbd2798aa8300d050a73d96d04d9ea94e73adc417b4d6e8392599eabc952675516bc0&eid=293591077&bid=2078269
Maria Korolov of Data Center Knowledge notes that “in the rush to secure networks, servers, and endpoint devices many organizations overlook the risks hidden in the physical infrastructure necessary to keep data centers operating. Power supplies, heating and cooling systems, even security systems themselves can all be entry points for both determined threat actors and casual attackers who scan the internet for insecure access points. One of the most high-profile attacks in recent times, the Target breach, involved a third-party HVAC provider.”
Data Center Infrastructure, the Often-Overlooked Security Risk
http://www.datacenterknowledge.com/security/data-center-infrastructure-often-overlooked-security-risk
Power supplies, cooling systems, even security systems themselves can all be entry points for attackers.
One of the most high-profile attacks in recent times, the Target breach, involved a third-party HVAC provider.
“The bad guys are going after anything that’s open and available,” said Bob Hunter, founder and CEO at AlphaGuardian Networks.
Take, for example, rack power distribution units. Since data center administrators need to know what’s going on with the power to their servers, the PDUs typically offer either local or remote monitoring, but the security on these systems is extremely weak.
Hackers can get in and hijack systems for ransom, or, more frequently and insidiously, keep their access a secret in order to steal data or compute cycles.
Network segmentation is a good security principle, he added, but it only serves to slow down attackers, not stop them completely.
“Segmentation is a speed bump,” he said. “In the Target break, the building management system was on a physically separate network from the data itself, so they had to jump from one to the other. It took a while to do that, but at the end of the day, they were able to do it.”
And the people responsible for infrastructure security are often busy with other tasks, such as maintaining data center operations, he added.
“To add additional complexity, the industrial control systems were not designed with security in mind,” said Niall Browne, CSO at Domo, a business intelligence company. “They often have default passwords and have not been patched in years, as the manufacturer was slow to release upgrades, or the customer was hesitant to deploy them for fear of causing a service interruption to critical functions.”
“The customer leaves their back doors open and gets hacked; that can shut down the entire data center eventually.”
It’s one of the biggest vulnerabilities in the data center, Hunter said.
“Everyone wants remote access to the PDUs, because they want to remotely reboot their PDUs if the server goes down,” he said.
Ponemon Institute recently released a survey of risk professionals, in which 97 percent said that unsecured internet-enabled devices could be catastrophic for their organizations.
“If it has an IP address, it can be hacked and needs to be secured,” said Mike Jordan, senior director at consulting firm The Santa Fe Group. “You can slap an IP address on anything these days. Data center infrastructure is no exception, and it makes subcontracting support of data center infrastructure like HVAC, security cameras, and power management more compelling.”
However, only 9 percent of survey respondents said they were fully aware of all the physical devices in their environment that were connected to the internet.
Tomi Engdahl says:
As Germany’s Industrie 4.0 Matures, IoT Security Stays Top of Agenda
https://www.eetimes.com/author.asp?section_id=36&doc_id=1333216
IoT security news dominates at industrial and factory automation trade show in Germany.
If there’s one big topic of discussion in IoT right now, it’s security. It’s no surprise then that at the Hannover Messe in Germany this week, one of the biggest trade fairs focused on industrial and factory automation, we should see announcements around IoT security. Microprocessor IP provider Arm and IoT cybersecurity company WISeKey were two of the firms talking about what they are doing to help address security concerns.
Tomi Engdahl says:
Ultrasonic Sensors Measure Up in Home-Automation Applications
http://www.electronicdesign.com/embedded-revolution/ultrasonic-sensors-measure-home-automation-applications?code=UM_NL8DS1&utm_rid=CPG05000002750211&utm_campaign=16881&utm_medium=email&elq2=37c9ca67b13e4571962b54a8de923d90
Sponsored by Texas Instruments: Long used in sonar and more recently automotive systems, this venerable technology lives on in modern products for the home.
Ultrasonics or ultrasound is a radar-like system that uses ultrasonic signals at frequencies above those typical for human hearing, usually above 16 to 20 kHz. The 40- to 70-kHz range tends to be most popular. Its main application is object detection and distance measurement.
Tomi Engdahl says:
Q&A: The Myth of Home Automation
http://www.electronicdesign.com/iot/qa-myth-home-automation?code=UM_NL8DS1&utm_rid=CPG05000002750211&utm_campaign=16881&utm_medium=email&elq2=37c9ca67b13e4571962b54a8de923d90
In the smart-home market, connected systems are losing out to point solutions. Technology Editor Bill Wong talks with Cyril Brignone, Chief Executive Officer of Arrayent, about home-automation myths.
There are a lot of myths swirling around the home-automation market. In the smart-home arena, connected systems are losing out to point solutions. I talked with Cyril Brignone, Chief Executive Officer of Arrayent, to find out why.
Cloud computing is important in that it enables product designers to remove complexity locally and push that complex to the cloud, where computation and memory resources are much more scalable. The cloud is where mobile voice-recognition processing is done for Apple Siri, Google, and Amazon’s Alexa. It is also emerging to be the place where companies can create interoperable systems much more rapidly than was possible before.
Wong: Why aren’t adoption rates increasing?
Brignone: It’s simple economics: high cost means low adoption. The home-security market is based on a hardware cost subsidized by a subscription contract model. Security hardware is expensive and it takes skilled labor to install and set up. The upfront cost is too high for any adoption, so the cost is spread across a two- or three-year contract. It’s a business model the wireless carriers borrowed to make $650 smartphones affordable.
Wong: So what’s the solution?
Brignone: First you have to realize that no one wakes up on Saturday morning and says to themselves: “I have a home-automation problem.” Second, recognize what retailers have known for years—consumers go online or drive to a store on a mission, which is to find a point solution to fix their pain.
Wong: So what’s a consumer-product company to do?
Brignone: For now, be really good at one task/solution to start. Product reviews with 4+ stars matter more than brands these days. It is only then that you can add more features to your first product. Later add a second and third product that customers will consider buying. Over time, consumers will acquire a number of connected point solutions that are solving problems for them a few times a week. This will take time, of course.
And then they will move to stage two, wanting their things to work together. This is the Google Nest strategy. Thermostat first. Smoke detector second (the Trojan horse is adding more sensors to the home), and then the DropCam camera. They have added the Connect to Nest program to grow their ecosystem that already includes products from Whirlpool, Chamberlain, Mercedes, OSRAM, and Philips. These companies can take advantage of Nest’s Home and Away API capabilities for their own products. They are laying the groundwork for connected systems that work the way individuals work.
Tomi Engdahl says:
The Autonomous Factory: Inertial Sensors Conquer IoMT Challenges
http://www.electronicdesign.com/industrial/autonomous-factory-inertial-sensors-conquer-iomt-challenges?code=UM_NL8DS1&utm_rid=CPG05000002750211&utm_campaign=16881&utm_medium=email&elq2=37c9ca67b13e4571962b54a8de923d90
Building around location-aware, industrial smart sensors helps boost the quality and accuracy of information retrieval, leading to much more efficient machine automation.
The automation of industrial machinery, whether it be in manufacturing, agriculture, logistics, energy, automotive, or unmanned aerial vehicles, promises great gains in resource efficiency, equipment accuracy, and safety. Key to enabling these gains is the identification of the appropriate sensing technologies to enhance the contextual knowledge of the equipment’s condition.
In many situations, the determination of position while operating in a complex or harsh environment is of especially critical value. The Internet of Moving Things (IoMT) has many challenges on the path to great efficiency gains, and high-performance inertial sensors are helping make the difference.
Tomi Engdahl says:
Engineering tomorrow’s connected house today
https://www.avnet.com/wps/portal/us/products/technology-solutions/home-and-building-automation/antennas-avnet-molex/?cmp=GLOBAL-AMER-MOLEX-221-CONNECTEDHOME-TPM-RR-ED-HOMEAUTOM-EBLAST-201804
In the Internet of Things (IoT), connection isn’t a luxury: it’s a necessity. Luckily, even a single antenna can transmit and receive unprecedented amounts of data. Antennas are the unsung hero of the ever-changing world of IoT, from home automation to energy solutions and surveillance products.
Today’s home has to do more than look good—it has to seamlessly communicate with all of the appliances inside.
That high expectation for the modern home means engineers have to grapple with home automation needs from lighting solutions and connected outlets. Security and surveillance endpoints range from door locks to smoke detectors. Energy and utility concerns span thermostats and weather stations.
Yet with the right design, hardware and help, the dream of tomorrow’s fully connected home can become a reality today.
Tomi Engdahl says:
Casino’s Aquarium Leaks High Rollers’ Personal Data
Posted by Robert Vamosi on April 17, 2018
https://blogs.synopsys.com/from-silicon-to-software/2018/04/17/casinos-aquarium-leaks-high-rollers-personal-data/
It might have been a deleted scene from one of the Ocean’s Eleven movies. Data thieves hack into a major casino. They attack not through the main but a secondary network and, once inside, bootstrap their way into other parts of the casino network until they get lucky and find a cache of sensitive data that they proceed to steal.
Unfortunately, the above scenario has happened in the real world.
Speaking at the Wall Street Journal CEO Council in London last Thursday Nicole Eagan, the CEO of cybersecurity company Darktrace, retold the story of how an aquarium thermometer in an unnamed North American casino’s lobby contained an exploitable vulnerability that allowed remote attackers to get onto the casino’s corporate network. “They then found the high-roller database and then pulled that back across the network, out the thermostat, and up to the cloud,” she said during the panel discussion.
The story about the casino was widely reported last summer. “Someone used the fish tank to get into the network, and once they were in the fish tank, they scanned and found other vulnerabilities and moved laterally to other places in the network,”
“There’s a lot of internet of things devices, everything from thermostats, refrigeration systems, HVAC [air conditioning] systems, to people who bring in their Alexa devices into the offices,” Eagan said on Thursday. “There’s just a lot of IoT. It expands the attack surface and most of this isn’t covered by traditional defenses.”
In general, internet connected devices are very basic by design. Beyond using basic Wi-Fi protocols, which encrypt data in transit, IoT devices do not have very sophisticated security. Nor do many of them allow for updates and upgrades of their firmware or software. This creates a challenge: If a vulnerability were found, how would the vendor push out a fix? And, sadly, how many IoT vendors even bother to continue their software development lifecycle beyond release?
Tomi Engdahl says:
Event-Driven Vision Comes Aboard
Prophesee launches event-driven sensor on a single-computer board
https://www.eetimes.com/document.asp?doc_id=1333212
Capturing “events” in images by using a bio-inspired approach sounds not just cool but downright futuristic. But how many developers have actually witnessed event-based machine vision technology at work?
Most developers have heard or read about it, and they might be curious. But they‘re stuck on the sideline without hands-on experience with novel non-frame-based machine vision technology.
Prophesee, a Paris-based startup, wants these spectators in the game. The company is rolling out this week a first-of-its- kind reference system for vision system developers to try, test and understand how neuromorphic vision works.
Initial users targeted for Prophesse’s reference design will be “developers of industry automation machines and robotics,” Luca Verre, CEO of Prophesee told EE Times. “Our customers in automotive and IoT systems will also find the reference system useful to characterize [Prophesee’s] sensor performance.”
Tomi Engdahl says:
Cloud-based safety suite to enhance worker safety
https://www.controleng.com/single-article/cloud-based-safety-suite-to-enhance-worker-safety/3cd21db3ee0d79871fc78ab8d875ea8d.html
Honeywell released a way for companies to improve productivity and regulatory compliance by connecting their existing inventory of personal protective equipment (PPE) through radio identification (RFID) tags.
Honeywell released a way for companies to improve productivity and regulatory compliance by connecting their existing inventory of personal protective equipment (PPE) using Honeywell’s cloud-based Safety Suite software and specialized electronic tags.
The connected worker solution uses Honeywell’s ultra-high frequency radio identification (RFID) tags that can be attached to any safety equipment. They are designed to withstand the tough conditions characteristic of many commercial work sites. The tags can be scanned directly into the safety suite software, which means equipment can be tracked for usage, maintenance, and training, which is intended to result in better inventory management decisions and compliance reporting.
When equipment is scanned into the suite, safety managers can track and manage their inventory of PPE, making sure it is tested on schedule or repaired or replaced as needed, reducing the frequency of equipment failure or non-compliance.
Tomi Engdahl says:
Five smart warehousing predictions
https://www.controleng.com/single-article/five-smart-warehousing-predictions/750c70ba2f4da978f6ae705138d0e0c4.html
Warehousing and logistics is evolving from being a static component in the supply chain to an area ripe for smart transformation. Five predictions including robotics and predictive maintenance are highlighted.
1. Robotics and cognitive computing
Taking a cue from Amazon, Alibaba, et al, process automation will move center stage—not only via the use of physical robots that replicate manual tasks, but also through robotic software applications and cognitive computing services, such as AI and machine learning (ML).
2: Predictive maintenance
A mix of different technologies is impacting on the traditional idea of maintenance. Until the advent of the Internet of Things (IoT) and supporting technologies, maintenance had been a passive, reactive process: i.e. waiting for things to break, then fixing them.
3. Warehousing on demand
Most are familiar with how sharing-economy platforms and apps, such as Uber, Airbnb, and Laundrapp, have disrupted centuries-old sectors, such as personal transport, accommodation, and cleaning. What few people realize is the model is now being applied to industrial warehousing.
4. 3-D printing and collaborative robots (cobots)
In the future, the distinctions between factory floor and warehouse may begin to disappear. Once some factories move away from monolithic, mass-production and distribution cycles. For example, some warehouses may become smaller, smarter, and more closely integrated with manufacturing, even as others follow the Alibaba model by becoming larger and more automated.
5. IoT standards and regulations
Today’s smart warehouses are increasingly rolling out transformation strategies that deploy sensors connected to the IoT—so robots, workers, managers, and even smart vehicles know the location of every item and can track them on their journeys.
As Kristi Montgomery, VP of innovation at Kenco Innovation Labs, pointed out, no standards yet define how IoT devices should communicate with each other, or store and process information.
She thinks that will change, and soon: “The promise of IoT is disrupting all industries, and it seems like the future is bright. The emergence of IoT is an amazing thing for supply chain executives. And it’s especially exciting as the enabling technology is becoming less expensive and more readily available, meaning that large-scale deployments are now possible.
“However, despite all the excitement and possibilities, some real roadblocks remain, namely, IoT technology is like the Wild West: there are no existing standards,” she added. “These will define how IoT devices will communicate and how data will be collected, processed, handled, stored, and summarized. Those concerns extend from 2018 into the future, as companies work to establish a regulatory standard, though nothing has emerged yet.”
Tomi Engdahl says:
Securing the Keys to the Kingdom
Hardening the IoT-connected supply chain
http://scnavigator.avnet.com/article/april-2018/building-effective-cyber-hygiene-into-the-connected-supply-chain/
In the IT community, it is often said that the best defense against a cyber-attack is to “think like a hacker.” This tactic may work when an attack is directed at network infrastructure, and the goal is to protect technical information from exfiltration or exploitation. But, when the threat reaches into the realm of industrial technology, cybersecurity is a very different kind of problem. The union of the digital world with a variety of automation, control and safety systems in the “Factory of the Future” has dramatically expanded the cyberattack surface. This has shifted the economics of cybercrime “by facilitating hacking at scale,” according to Lior Div, CEO and co-founder of Cybereason, in a recent CSOonline article. “Attackers can target one organization and, in the process, gain a foothold to compromise hundreds or thousands more.” Supply chains have, in essence, become the gift that keeps on giving for cybercriminals, he explained.
To harden the IoT-connected supply chain, cybersecurity strategies need to move beyond a single enterprise’s digital infrastructure and encompass all the players within the value chain.
In other words, it’s time to stop thinking like hackers and start bringing the risk-based, end-to-end perspective of supply chain professionals to the resistance.
Tomi Engdahl says:
Google Home Mini setup is exceedingly user-friendly
https://www.edn.com/electronics-blogs/brians-brain/4460571/Google-Home-Mini-setup-is-exceedingly-user-friendly
Last October, when Google launched the “mini” member of its Home smart speaker family, retail partner Walmart unveiled a companion promotion: buy up to two units at $49 each, and after activating each unit and linking it to your Google Express online shopping account (as well as linking that account to your Walmart account), you’ll receive a $25-off coupon code, good for a purchase at Walmart.
Tomi Engdahl says:
Trust and then verify your IoT security
https://www.edn.com/electronics-blogs/bakers-best/4460462/Trust-and-then-verify-your-IoT-security-
Firmware authenticity and integrity
Trust and then verify is always a good strategy. The verification process involves making sure your device only runs with authorized firmware or uses authorized configuration data. You do this by using cryptographic digital signatures, which is like putting a seal or signature at the bottom of a letter. For the highest level of security and efficient key distribution, consider the asymmetric cryptographic algorithms for signatures, specifically the FIPS 186 Elliptic Curve Digital Signature Algorithm (ECDSA).
Asymmetric cryptography
In an asymmetric cryptography environment, there are mathematically related key pairs (public and private).
The holder of the private key is the equipment’s “manufacturer.” When firmware or data is released, the manufacturer includes a private key-created ECDSA signature with the shipment. The receiver of this firmware or data verifies authenticity with the public key. An attacker can access the public key, but the ECDSA makes it mathematically infeasible to derive the private key. This is the benefit of asymmetric cryptography.
Secure boot and secure download systems
It is possible to generate embedded system security methods with a secure microcontroller or secure hardware. Software or microcontroller/processor solutions are perfectly able to prevent unauthorized system access. An important characteristic of the microcontroller/processor option is the ability to perform computational activities. Major controller/processor vendors have these systems along with software libraries.
If a system does not have a secure microcontroller with authenticity and integrity in its computational capacity, an alternative hardware-based IC solution presents a cost-effective compact approach.
Tomi Engdahl says:
What can the IIoT do?
https://www.plantengineering.com/single-article/what-can-the-iiot-do/c7bc086d7a6d76c8a46a2e5f88e11cef.html
The Industrial Internet of Things (IIoT) enhances manufacturing operations by enhancing connectivity, equipment management, monitoring production, and customer relationships. Nine additional IIoT benefits are highlighted.
1. Monitor production
2. Manage equipment remotely
3. Equipment maintenance
4. Item identification and communication
5. Continuous improvement with data analysis
6. Autonomous material handling
7. Improved communication with suppliers
8. Improved customer relationships
9. Enhanced management decisions
In a highly competitive environment, the management team must have real-time information to make decisions that can have a significant impact on a company’s costs and profits. The IIoT enables management getting the right information to see what’s happening on the manufacturing floor
Tomi Engdahl says:
High-impact assets need a team approach
Collaborative efforts can bridge maintenance and design in the asset design stage.
https://www.plantengineering.com/single-article/high-impact-assets-need-a-team-approach/15cabbc72b493d20ccb4294ca9f7e0c6.html
Lifecycle of high-impact assets
High-impact assets typically go through four stages of lifecycle:
1. Conceptual feasibility of asset design: This is a sketch phase of the assets to get a very initial (abstract-level) technical and commercial idea of the parameters under which an asset will operate. However, the principles of an asset design remain the same. The level of asset feasibility undertaken depends on the type and nature of an asset. In some cases, multiple operating parameters are studied to identify optimum technical and commercial design.
2. Front end engineering design (basic engineering): Once the economic, technical, and commercial parameters are identified for optimum asset operations, the focus shifts to details of the asset’s design and in particular how the asset is going to be built up—engineering design, components, material, fluid conditions, operating conditions, and life expectancy of an asset are evaluated in detail in order to come up with an asset-execution blueprint. Asset prototypes and/or fabrication are finalized at this stage.
3. Asset build-up and start-up: At this stage, the asset is built up (custom built, in batch, or in volume) and the emphasis is to start and operate the asset as close as possible to its design conditions established in the previous step. Safe start-up and operating conditions take highest priority, followed by commercial targets.
4. Asset disposal or decommissioning: Safe, sustainable, and compliant removal from service of assets is the key focus at this stage.
Conceptual, feasibility, and front-end engineering designs focus on asset (or plant) productivity—typical parameters that take precedence are economic feasibility, asset efficiency or asset utilization rate, production efficiency, and plant/asset start-up. Elements like cost estimate and equipment sizing continue to be a key focus. Asset maintenance in most cases is considered only in Step 2 or Step 3.
Tomi Engdahl says:
Integrating IIoT technologies to maximize facility operations
https://www.plantengineering.com/single-article/integrating-iiot-technologies-to-maximize-facility-operations/e6ef018da8ddd0086415341d46b6015f.html
Gain valuable data insights by integrating operations, information technology (IT) systems, and creating a more effective Industrial Internet of Things (IIoT) solution.
The IIoT is not the same old stuff in industrial applications because there are very significant innovations driving opportunities and lower cost such as:
Cloud: connectivity, data collection, sharing, simplicity
Sensors: more, cheaper, wireless, edge processing, OPC unified architecture (UA) and message queuing telemetry transport (MQQT) protocol support
Analytics: more data can now be used to provide much more insight by implementing new approaches. Software platforms makes this possible by using technologies such as Big Data, machine learning, open source, etc.
Business models: remote monitoring of assets by vendors, selling thrust versus engines, distributing risks.
CE: How can controls, automation, and instrumentation help with integration and use of IIoT technologies?
Risse: Stick to a business case, start small and create value. Just don’t overthink this as top down—IIoT projects often take too long and cost too much. Try to find a greenfield in a brownfield scenario—something new in something existing (use case should depend on what matters most—ingredient quality, energy use, emission compliance, etc.) For example:
Skunkworks: Raspberry Pi to track sensor data on wireless to inform/contextualize a sensor.
Midsize: cloud IIoT platform for disconnected data sets (remote assets) that expand visible range for operators, or optimization context for engineers.
High level: remote monitoring center to centralize operations.
CE: What value is being created and how, with integration of operations and information technology (IT) systems?
Risse: Value doesn’t have to be in dollars. It could be safety or any other priority for the organization such as regulatory compliance. The value is in the time to insight to improvement. Or, to put it another way: sooner means value, and the insight means value, and the sooner the insight is the square of value (or multiplier) because it’s sooner (like area under the curve). How it’s created is insight.
Many vendors love to talk about sensors, wireless, and other technologies, but the point of all this is improved outcomes through quicker insights and delivering the profit impact of doing something better, sooner. Also, the value could be the same insight an organization has been wanting to achieve for years. Now it’s profitable to do so because the cost of achieving the insight went down (cheaper data storage, collection, new analytics, faster insights). The IIoT is a point in progression in terms of lower costs for most of the components in these types of systems.
Tomi Engdahl says:
White Paper –
Security for the Industrial Internet of Things
Device Security for the IIoT
https://www.renesas.com/en-us/docs/solutions/factory/device-security-for-the-iiot.pdf?acctid=5545
Tomi Engdahl says:
ABB’s world’s first digital transformer
ABB intends to revolutionize power grid converting stations. The company has introduced the world’s first digital converter. The Ability converter was presented at the Hanover Industrial Fair.
According to ABB, all converters that are being manufactured at the plant will soon be digital. They enable remote monitoring of equipment and data analyst in real time over the network. This will lead to a better picture of the operation of the power grid.
Abilityyn is an integrated digital hub that can be connected with intelligent devices. This makes the platform suitable for future developments as well. For example, power outages can be anticipated much more accurately than real-time status data.
Source: http://etn.fi/index.php?option=com_content&view=article&id=7902&via=n&datum=2018-04-24_15:14:48&mottagare=31202
Tomi Engdahl says:
https://www.uusiteknologia.fi/2018/04/26/iot-tekniikkaa-vartioimattomiin-tasoristeyksiin/?utm_source=dlvr.it&utm_medium=facebook
Tomi Engdahl says:
https://tulevaisuudentuotekehitys.com/2018/04/17/helvarin-matti-vesterinen-tuntee-itseoppivat-valonohjausjarjestelmat/
Tomi Engdahl says:
Vandals Crack Open Dockless Scooter, Discover Particle Electron Board Inside
https://makezine.com/2018/04/25/vandals-crack-open-dockless-scooter-discover-particle-electron-board-inside/
San Francisco, among other cities, has become a US launchpad for dockless electric scooter rentals, where, overnight, the downtown’s sidewalks and stoops are suddenly teeming with the abandoned-at-first-glance-but-not-really transports.
With the VC money behind these rides further irking some, stories and images of e-scooter vandalism have become common
That vandalism has led to one interesting discovery that lands close to the maker community — a photo of cracked-open Bird scooter on twitter reveals that part of the electronics is a Particle Electron board, a microcontroller that offers cellular LTE connectivity, most likely to help a rider unlock a scooter via the company’s app, and for the company to keep track of the scooter’s location.
We don’t know how many of them are powered by Particle boards or other maker-friendly devices, but it’s not unlikely that, with today’s business strategy of moving fast and adjusting later, the rapid prototyping needs have likely leveraged these tools in many scooter and e-bike instances.
Tomi Engdahl says:
Inside Adafruit, the Open-Source Manufacturing Maker Champions
https://makezine.com/2017/06/13/open-source-ideals-engineering-genius-helm-adafruit-maker-revolution-manufacturing/
Tomi Engdahl says:
The Week in Review: IoT
Orangeworm; medical insecurity; SamSam ransomware.
https://semiengineering.com/the-week-in-review-iot-95/
Cybersecurity concerns continued to generate news this week. Symantec reported a corporate espionage hacking campaign against manufacturers of medical supplies, dubbing the efforts “Orangeworm.” The hackers have attacked 24 or more targets this year, and almost 100 since 2015, according to the security software and services firm.
Meanwhile, the House Energy and Commerce Committee is seeking inputs about preventing cyberattacks on medical devices and systems. The committee would like to know if vendors can update legacy devices or will it be necessary to swap out existing devices for new products.
An exploit targeted at Nvidia’s Tegra X1 mobile/embedded processor takes advantage of an apparently unpatchable vulnerability in the Nintendo Switch game console and other X1-based systems.
The City of Atlanta will spend more than $2.6 million to recover from a SamSam ransomware attack on its online services. The ransomware attacker demanded about $55,000 in Bitcoin, which wasn’t paid by the city.
San Francisco-based IFTTT received $24 million in a new round of funding led by Salesforce Ventures. IBM, Chamberlain Group, and Fenox Venture Capital also participated. IFTTT, which offers an Internet of Things platform for hundreds of applications, has raised a total of $63 million in private funding since its founding in 2010.
Maciej Kranz of Cisco Systems outlines five “dark side” IoT challenges that must be addressed to increase adoption of the technology by consumers, enterprises, and other parties.
Tomi Engdahl says:
There Is Light At The End Of The IoT Tunnel
https://www.forbes.com/sites/forbestechcouncil/2018/04/26/there-is-light-at-the-end-of-the-iot-tunnel/#4aa1171e53a7
From Alexa’s random outbursts of laughter to claims that your smart refrigerator wants to kill you, it is easy to see why the Internet of Things (IoT) invokes negative connotations. Some may even say IoT has a dark side, fueled by security and privacy concerns along with uncertainty about what these devices can do.
Although we are talking about the consumer realm, where IoT is more of an overhyped novelty, similar concerns remain in the much larger business (B2B) market. While IoT holds promise to completely transform businesses, disrupt markets and create new value propositions, its perceived dark sides are impeding progress. Just one year ago, Cisco research showed that 60% of IoT initiatives stalled at the proof-of-concept (PoC) stage, and only 26% of businesses considered their IoT projects a total success.
Times are changing, however. Over 69% of global organizations are adopting or planning to adopt IoT solutions this year, and the global IoT market is expected to reach as high as $8.9 trillion by 2020. Clearly, IoT continues forward despite the concerns.
Here are five dark sides to IoT, and how we can address them.
1. IoT is driving nearly every industry and company to become more technology focused, with data as a key asset. Thus, securing not only IoT devices but also the data they collect, share and store is paramount. In fact, 97% of risk professionals believe that a data breach or cyberattack caused by unsecure IoT devices could be “catastrophic” for their organizations.
2. Along with security, IoT needs to ensure privacy to deliver on its promise. In the consumer realm, this evokes thoughts of Big Brother, while in the enterprise, IoT privacy centers on protecting employee data, customer data, the location of the data and more — which, if illicitly accessed or breached, could have a far greater impact than a Roomba sharing data without your knowledge.
3. The lack of standards has hampered IoT adoption and made way for some of the dark sides to prevail. The issue is that legacy, single-vendor, proprietary solutions lead to disparate systems, data silos and security gaps, whereas IoT success requires interoperability and data-sharing within multivendor, best-in-class solutions.
4. The hype surrounding IoT causes shortsightedness when enterprises embark on their IoT journeys. Blinded by IoT as the next shiny object, organizations mistakenly focus on “cool” technology to achieve quick gains and incremental results. This focus on the technology rather than the business problem perpetuates other misconceptions about IoT that hinder adoption.
5. The fifth dark side of the IoT tunnel is its complexity. IoT is a convergence of markets, sub-markets and ecosystems, with seemingly endless use cases in all vertical sectors, payoffs, opportunities and new value propositions. At the same time, IoT requires fresh approaches to security, change management and selling strategies, along with horizontal standards.
Although IoT’s dark side may be grabbing the headlines, the industry is making strides to shed light on and overcome IoT’s shortcomings.
Tomi Engdahl says:
mmWave sensors make cities smarter
Let’s examine the application of mmWave sensors in smart cities.
http://www.electronicdesign.com/industrial-automation/mmwave-sensors-make-cities-smarter?utm_rid=CPG05000002750211&utm_campaign=16960&utm_medium=email&elq2=2c627904f5d942c2b80042110b1596fb
According to a paper published by the United Nations, the world’s population is projected to grow to reach 9.1 billion people in 2050 – 2 billion more people than there are today. The current migration of the world’s population to urban centers will continue at an accelerated pace. In fact, projections estimate that 70 percent of the world’s population will reside in urban areas, compared to 49 percent today.
These urban centers will need to strike a balance between geographical sprawl and an increased scarcity of resources, such as arable land, water and energy. Urban planners are rapidly adopting technology to meet these challenges, creating smart cities to maximize resources and improve the quality of life of exploding populations. These smart cities are deploying sensors to monitor resource levels, as well as the movement of people and goods. Sensors using millimeter-wave (mmWave) radar technology will become prevalent because of its unique characteristics of range, velocity and angle detection with high accuracy, long distance and robustness of operation independent of environmental conditions.
http://e2e.ti.com/blogs_/b/industrial_strength/archive/2017/09/14/mmwave-sensors-make-cities-smarter?HQS=epd-pro-rap-mmwavesensors_iwr-csbs-blog-informatlc-wwe&DCM=yes
Tomi Engdahl says:
Study shows Google Assistant is smarter than its rivals
https://www.digitaltrends.com/cool-tech/google-assistant-smarter-than-rivals/
Tomi Engdahl says:
Younger consumers adopt voice technology faster, but use voice assistants less, report claims
https://techcrunch.com/2018/04/30/younger-consumers-adopt-voice-technology-faster-but-use-voice-assistants-less/?utm_source=tcfbpage&utm_medium=feed&utm_campaign=Feed%3A+Techcrunch+%28TechCrunch%29&sr_share=facebook
Here’s an odd juxtaposition for you. According to a new report on voice assistants released today by PwC, younger users are adopting voice technology at a faster rate than their older counterparts, but are somehow using their voice assistants less often. The report found that users 18 through 24 had fewer “heavy” users of voice technology, compared with those 25 to 49, and 50 or older.
That is, younger users prefer to use voice technology in private instead of in public. They said that using voice assistants in public “just looks weird.” And because younger users likely spend more time outside the home, they end up using voice assistants less.
Tomi Engdahl says:
Alexa will soon gain a memory, converse more naturally, and automatically launch skills
https://techcrunch.com/2018/04/26/alexa-will-soon-gain-a-memory-converse-more-naturally-and-automatically-launch-skills/?utm_source=tcfbpage&sr_share=facebook
Alexa will soon be able to recall information you’ve directed her to remember, as well as have more natural conversations that don’t require every command to begin with “Alexa.” She’ll also be able to launch skills in response to questions you ask, without explicit instructions to do so. The features are the first of what Amazon says are many launches this year that will make its virtual assistant more personalized, smarter, and more engaging.
Tomi Engdahl says:
https://www.tivi.fi/Kaikki_uutiset/fyysiset-sim-kortit-vaihtumassa-sahkoisiin-kayttajaprofiileihin-t-t-operaattorit-vastustavat-6721864?utm_source=Facebook&utm_medium=Social&utm_campaign=TV_AE_NA_04&utm_content=Ad+-+Post%3A+%2FTivi%2Fposts%2F10155448985712267
Tomi Engdahl says:
Microsoft Unveils New Solution for Securing Critical Infrastructure
https://www.securityweek.com/microsoft-unveils-new-solution-securing-critical-infrastructure
Microsoft last week unveiled Trusted Cyber Physical Systems (TCPS), a new solution designed to help protect critical infrastructure against modern cyber threats.
Microsoft provided the recent Triton and NotPetya attacks as examples of significant threats hitting critical infrastructure. Triton was used in a highly targeted campaign aimed at an organization in the Middle East, while NotPetya disrupted the operations of several major companies, with many reporting losses of hundreds of millions of dollars.
Microsoft’s TCPS project aims to address these types of threats by providing end-to-end security through hardware, software and trust mechanisms that should help organizations ensure they don’t lose control over critical systems.
Cyber-physical systems (CPS) are referred to as Internet-of-Things (IoT) in an industrial context. TCPS is based on four main principles: separating critical from non-critical operations through hardware isolation; ensuring that the code responsible for critical operations can be audited; the ability of each component to process data only from trustworthy sources and each component being able to attest its trustworthiness to other components; and reducing the attack surface by reducing the number of trusted entities.
One crucial component in providing end-to-end security involves trusted execution environments (TEE), Microsoft said. TEE includes Secure Elements (e.g. chip on a credit card), Intel’s Software Guard Extensions (SGX), ARM TrustZone, and Trusted Platform Modules (TPMs) and DICE-capable microcontrollers from the Trusted Computing Group.
TEE offers several advantages from a security viewpoint, including the fact that code running in a TEE is small and thus has a minimal attack surface, the code is considered trusted, all the data is encrypted, and the TEE hardware ensures that software running outside the trusted environment cannot break in.
Tomi Engdahl says:
Thuy Ong / The Verge:
Google announces investment program for early-stage startups working on Google Assistant hardware or features, similar to Amazon’s Alexa Fund — Funding the Google Assistant ecosystem — Today, Google is launching a new investment program for early-stage startups working to broaden Google Assistant hardware or features.
Google starts throwing cash at Google Assistant startups
Funding the Google Assistant ecosystem
https://www.theverge.com/2018/5/2/17310312/google-investment-startups-assistant-travel-hospitality-games
Tomi Engdahl says:
How to Achieve Low-Cost, Advanced Security For Your Embedded System
http://www.electronicdesign.com/embedded-revolution/how-achieve-low-cost-advanced-security-your-embedded-system?code=NN8DK004&utm_rid=CPG05000002750211&utm_campaign=17027&utm_medium=email&elq2=adb98e6ec77646f683537bfeb28da18d
The availability of low-cost processing power plus ubiquitous connectivity have spurred the rise of the Internet of Things (IoT) and the development of large-scale embedded applications that rely on networks of smart nodes. A smart node in an embedded system typically consists of one or more sensors, a microcontroller, and a wired or wireless connection. Examples are found in almost every IoT application: the electrical grid, the home, the doctor’s office, the factory floor, the automobile are just a few.
As embedded systems proliferate, so have concerns about their security, fueled by well-publicized stories about data breaches, viruses, botnets, trojan horses and the like. The results of an embedded-system security breach can range from inconvenient to life-threatening: video cameras, home routers, cars, drug-delivery systems, and even pacemakers have been hacked.
Tomi Engdahl says:
Beyond collaboration: Old, new manufacturing companies cooperate on solutions
https://www.controleng.com/single-article/beyond-collaboration-old-new-manufacturing-companies-cooperate-on-solutions/a8f8ae3369dc274e27aab559d6d75394.html?OCVALIDATE&[email protected]&ocid=101781
How an enclosures company, a computer maker, and a device supplier worked together to provide a plant-floor data center.
There are several official marketing themes at Hannover Messe 2018 in Germany—Connected Enterprise, Factory of the Future, and the ubiquitous Industrie 4.0. But a less visible theme is emerging as industry suppliers look to accelerate growth and deliver on the promise of the Industrial Internet of Things (IIoT): Good old-fashioned cooperation.
As big-name brands such as Microsoft, Intel, Oracle, and SAP try to make their presence felt in the industrial space, they are partnering with traditional manufacturing suppliers in some innovate solutions to allow not just a plug-and-play feel for the software, but a comprehensive solution for some of the hardware issues.
One good example is the partnership between device giant ABB, computer expert Hewlett Packard Enterprise, and enclosures leader Rittal. They announced the Secure Edge Data Center so manufacturers could locate their information technology (IT) assets on the plant floor and deliver secure and reliable data storage and management.
As the use of data continues to rise, more manufacturers are deciding between cloud computing for high-power enterprise analytics and the edge computing needs that will deliver fast sensor data to the plant floor in real time.
By contributing their individual areas of expertise to the solutions, ABB, Hewlett Packard and Secure Edge Data Center Rittal have created a secure box with fast computing and leading-edge sensor technology.
Tomi Engdahl says:
Integrating the Industrial Internet of Things
https://www.controleng.com/single-article/integrating-the-industrial-internet-of-things/a59ae27fb6ff35a0217a28e319233f01.html
The challenge original equipment manufacturers (OEMs) and design engineers wrestle with is integrating new technologies with the Industrial Internet of Things (IIoT) in a way that allows them to complete in today’s evolving and interconnected world.
As corporations push digital transformation efforts to capture higher efficiencies and larger market shares, manufacturers and machine builders face more digitalization demands than ever before. The Industrial Internet of Things (IIoT) can meet those demands by providing companies with enhanced capabilities, increased speed, and more flexible production. However, the challenge original equipment manufacturers (OEMs) and design engineers must overcome is integrating new technologies in a way that allows them to complete in today’s evolving and interconnected world.
Flexible, decentralized solutions and advanced digital engineering tool chains require project teams with the knowledge to install this kind of production architecture. OEM partnerships between automation solution suppliers and service providers experienced in modular, connected solutions are a key factor to successfully implementing the IIoT.
Turn data into intelligence
One of the biggest challenges OEMs and end users face is what to do with the overwhelming flow of data. After all, data without analysis is untapped potential. Data collected and analyzed in the right way over time is what predictive models are built upon and is what will allow end users the ability to reduce costly unplanned downtime. While there are many solutions on the market designed to collect data from a machine and send it to the cloud, OEMs are often left with the complex responsibility of programming an interface to read the technology stream and display pertinent information useful to the end user.
Tomi Engdahl says:
IIoT’s potential has big names looking for new solutions
From cloud security to plastic robots to full enterprise integration, suppliers introduce new ideas from familiar brands.
https://www.controleng.com/single-article/iiots-potential-has-big-names-looking-for-new-solutions/2ed3f8ad0ffff88e28da855725ddc7ae.html
In the manufacturing renaissance that is the Industrial Internet of Things (IIoT), it’s clear that no one supplier can be all things to all plants. It’s also clear more companies are trying to provide more options than before.
SAP is an enterprise software company that has introduced a digital manufacturing cloud. Microsoft is a software company that has expanded into cloud computing, and now is tackling the issue of plant security with the help of the OPC Foundation. Igus, better known as a plastic chain and cable supplier, has branched out into robotics-and discovered lubrication-free gears in the process.
“When you think about digital coming to the shop floor, you look at vertical integration,” said Georg Kube, global vice president for industrial machinery and components for SAP. “That information has to be processed in the logistics system. We’re the people who have done all the logistics, so it was a natural point for us to expand into actually producing the product.”
SAP said in a press release its Digital Manufacturing Cloud is a plant solution that features “loT size one and paperless production capabilities. It integrates business systems with the shop floor, allowing for complete component and material level visibility for single and global installations.”
“Manufacturing changed; it’s become more focused on the individual order, the individual workpiece,” Kube said. “Now that become we’ve become faster, more individual needs needed to be catered to. We want and need more products in small batches. That was not humanly doable before, and that is why digital came onto the shop floor.”
Inherent in the digital age is cybersecurity, and Microsoft is working with the OPC Foundation to security connect its Azure cloud service through OPC UA servers. The goal is to allow automatic security in cloud computing.
Tomi Engdahl says:
Arm debuted the Cortex-M35P processor. Aimed at IoT applications, the IP combines anti-tampering technology and software isolation to protect against physical and close proximity side-channel attacks, including power and electromagnetic analysis. A safety package to support ISO 26262 certification is available. Additionally, Arm’s CryptoCell and CryptoIsland security IP are now available hardened with side-channel attack protection.
Source: https://semiengineering.com/the-week-in-review-design-128/
Tomi Engdahl says:
The Week in Review: IoT
Arm IP for IoT; Google funding; Nokia sells health unit.
https://semiengineering.com/the-week-in-review-iot-96/
Arm this week introduced the Cortex-M35P processor with anti-tampering technology and software isolation. The company also debuted security intellectual property to protect Internet of Things devices from physical cyberattacks and close proximity side-channel attacks. Paul Williamson, Arm’s vice president and general manager of the IoT Device IP line of business, provides more details in this blog post.
The Department of Homeland Security’s Science & Technology Directorate announced that Atlanta-based Ionic Security was the first company to successfully complete prototype testing and graduate to the pilot deployment phase of the department’s Silicon Valley Innovation Program.
The National Institute of Standards and Technology brought out version 1.1 of its Framework for Improving Critical Infrastructure,
The Food and Drug Administration released its Medical Device Safety Action Plan: Protecting Patients, Promoting Public Health.
Google kicked off an investment program for early-stage startups using the Google Assistant technology. The program will offer financial resources, early access to Google features and tools, Google Cloud Platform access, and promotional support. Four startups are the first recipients of investments: GoMoment, Edwin, BotSociety, and Pulse Labs.
Is AT&T Digital Life on life support? The carrier’s smart home subsidiary seems to be losing favor with AT&T, which is more focused on its proposed $85 billion acquisition of Time Warner, opposed by the Trump administration.
The Eclipse Foundation surveyed 502 IoT developers during the first three months of this year. Among its findings: Amazon Web Services and Microsoft Azure are the leading IoT cloud services, while “Google Cloud Platform is failing to gain traction.” AWS adoption stands at 51.8% this year, a 21% gain from 2017, Microsoft Azure is favored by 31.2% of developers (a 17% year-over-year gain), and Google Cloud Platform is embraced by 18.8% of the respondents, down 8% from a year ago.
Nokia has agreed to sell its Digital Health business to Éric Carreel, co-founder and former chairman of Withings, which Nokia acquired in 2016 and rebranded last year.
The IoT-Ready Interface Specification V1.0 was introduced by the IoT-Ready Alliance on the one-year anniversary of the forming of the alliance, which is developing a standard socket for IoT-enabled light-emitting diode lighting fixtures. The new specification is said to define a socket that allows any IoT sensor or control module to connect with a luminaire or a building system.
Tomi Engdahl says:
IoT-Ready Alliance™ Introduces First Internet of Things Interface Specification – Enabling Future-proof Buildings
https://www.prnewswire.com/news-releases/iot-ready-alliance-introduces-first-internet-of-things-interface-specification–enabling-future-proof-buildings-300642441.html
Marking its one-year anniversary, the IoT-Ready AllianceTM introduces its first specification, The IoT-ReadyTM Interface Specification V1.0. The Specification defines a socket that allows any type of Internet of Things (IoT) sensor or control module to connect seamlessly to a luminaire or other building system. The standard is network-protocol independent, which enables IoT-Ready™-compliant products to utilise any networking protocol, either wired or wireless and is suitable for all LED lighting and building control networks.
Key Benefits of Adopting the IoT-ReadyTM Standard
Specifies all interface elements: mechanical, electrical and software
Provides a complete family of interoperable solutions to Smart Building IoT interface problems
Allows in-field retrofit, replacements and upgrades without disassembly
Specification is developed under a Royalty-free license
Works with any network protocol including Thread, BLE, ZigBee, Z-Wave, Wi-Fi, IP/Ethernet etc.
Is backwards compatible with legacy lighting controls
Can be implemented with traditional lighting controls until IoT is needed
Provides a low-cost option to future-proof luminaires or other system components in buildings
Suitable for a range of applications, from simple low-cost lighting control to high-end IoT sensing
IoT-Ready Alliance Introduces Its First IoT-Ready Interface Specification V1.0
https://www.coinspeaker.com/2018/05/04/iot-ready-alliance-introduces-first-iot-ready-interface-specification-v1-0/
The IoT-Ready Alliance introduces its first IoT-Ready Interface Specification V1.0, which defines a socket allowing any type of IoT control module to connect seamlessly to a luminaire or other building system.
“We’re very pleased that our collaborative environment and focus on results has enabled us to converge on a robust Specification so quickly. The Specification achieves our design goals of broad industry support, extensibility, low-cost, and simplicity of implementation. In working with a range of companies from the lighting, lighting-control and IoT industries, I’ve seen what we can accomplish when we focus on results instead of defending industry turf. Now that our first Specification is published and products are on the market, we look forward to working together with other technical standards bodies in the lighting, building management, and IoT spaces to ensure a single set of coherent standards world-wide,” said Evan Petridis, Chair of the IoT-Ready Alliance Technical Committee.
Tomi Engdahl says:
Sean O’Kane / The Verge:
Android Auto to get support for RCS, group messaging, better integration with 3rd-party apps, more; new Volvos to have built-in Google Maps, apps, and Assistant — Plus, some new features for Android Auto — Google’s previously announced integration with Volvo cars is finally solidifying.
New Volvos will have Google Maps, apps, and Assistant — even if you don’t have an Android phone
https://www.theverge.com/2018/5/7/17325550/android-auto-volvo-maps-assistant-google-io-2018
Tomi Engdahl says:
Ron Amadeo / Ars Technica:
Android Things, Google’s IoT platform for developers, out of beta with version 1.0, as Google promises to deliver updates for every device for three years — Google’s solution to IoT security is to do all the updates itself, for free. — It’s Google I/O week and even though the keynote …
Android Things 1.0 launches, Google promises 3 years of updates for every device
Google’s solution to IoT security is to do all the updates itself, for free.
https://arstechnica.com/gadgets/2018/05/android-things-hits-version-1-0-with-centralized-google-update-system/
It’s Google I/O week and even though the keynote isn’t until tomorrow, news is already hitting the (Wi-Fi) airwaves. After being announced all the way back in 2016 and going through eight developer previews, Android Things is finally hitting version 1.0. Android Things is yet another Android OS form factor that lives alongside Android TV, Android Automotive, and (Android) Wear OS. Things is meant for IoT devices, with a special focus on fixing the security nightmare that IoT devices usually create.
Tomi Engdahl says:
Ingrid Lunden / TechCrunch:
Nokia has acquired SpaceTime Insight, a California-based IoT startup that provides predictive analytics based on machine learning algorithms
Nokia acquires SpaceTime Insight, adding AI to its Internet of Things business
https://techcrunch.com/2018/05/07/nokia-acquires-spacetime-insight-adding-ai-to-its-internet-of-things-business/
Nokia last week said that it was selling off its digital health business, after failing to develop it into a substantial business itself, but this week the Finnish company is announcing an acquisition that underscores how it is doubling down in another one of its business areas, the Internet of Things. Nokia has acquired SpaceTime Insight, a California-based IoT startup that provides predictive analytics based on machine learning algorithms.
Tomi Engdahl says:
IoT security: Is cryptocurrency-mining malware your next big headache?
https://www.zdnet.com/article/iot-security-is-cryptocurrency-mining-malware-your-next-big-headache/
IoT devices lack the power of PCs, but some dark web users are still keen to see if compromising connected devices for financial gain is plausible.
But while many crooks will target servers and PCs to secretly mine for cryptocurrencies, an increasing number of cryptojackers are looking towards Internet of Things (IoT) devices as their means of making money.
While IoT devices have far less power than even the most basic PC, they come with the benefit – for the attackers at least – that they often lack proper cyber security controls and that users frequently install the device and more or less forget about it.
As a result, IoT cryptojacking malware is becoming more popular on underground forums, with research by security company Trend Micro detailing examples of it being advertised on the dark web, with one specifically advertised to infect routers – a device in the home or workplace of anyone with an internet connection.
While IoT mining is picking up popularity, at least one user on one of these forums isn’t convinced it is an efficient means of turning a profit. “It’s not worth anything. Nobody will make any profit from mining on routers,” one said.
However, Fernando Mercês, senior threat researcher at Trend Micro notes that “cryptocurrency malware is gaining traction as a topic in forums in the cybercriminal underground” and that some are “dedicated to exploring whether compromising connected devices – however underpowered – for financial gain is a plausible venture”.
Tomi Engdahl says:
IoT Giving Chipmakers a Lift
https://www.eetimes.com/author.asp?section_id=40&doc_id=1333255
Smartphone sales may be dragging, but chipmakers are getting a lift from the long-promised growth of the Internet of Things.
With signs of softness in the smartphone market, chipmakers have been relying on a boost from another area of considerable focus in recent years: the Internet of Things.
Tomi Engdahl says:
What’s Needed to Secure the Industrial IoT
https://www.eetimes.com/document.asp?doc_id=1333145&
Industrial security and cybersecurity — not just security for the more consumer-focused Internet of Things — is a growing problem with not many comprehensive, concrete solutions.
In the factory, there are multiple questions to be considered for industrial IoT (IIoT) networks, such as what kinds of security tech to implement and where, and which threats it should address. Several industry groups have already proposed multi-layered approaches, frameworks and sets of controls for securing devices and assets in IIoT networks, and some technology for protecting connected devices and networks already exists.
According to the Global ICS and IIoT Risk Report by operational technology (OT) security firm CyberX, one-third of the OT networks whose processes are controlled by industrial control systems (ICS) are exposed to the public internet. Half lack anti-virus protection and more than half use easily hackable plain-text passwords in their control networks. More than three-quarters run obsolete Windows systems like XP and 2000 that are unsupported with security patches, while 82 percent run well-known remote access management protocols, making it easier to access and manipulate network equipment. Twenty percent have wireless access points, which can be compromised in multiple ways, including the KRACK WPA2 vulnerability in most Wi-Fi networks, discovered last October.
Global ICS & IIoT Risk Report
https://cyberx-labs.com/en/risk-report-2017
A data-driven analysis of vulnerabilities in real-world OT networks based on analyzing 375 industrial control networks via Network Traffic Analysis (NTA), across multiple industrial sectors in the US, EMEA and APAC.
Tomi Engdahl says:
Siemens Buys Agilion to Boost IoT
https://www.eetimes.com/document.asp?doc_id=1333174&
Siemens has acquired German wireless location solutions developer Agilion GmbH to boost its real-time location systems (RTLS) offering in the ultra-wideband (UWB) frequency spectrum for factory automation and automated guided vehicles (AGVs).
Targeting applications like smart factories and logistics, RTLS enables precise monitoring of the production process and a transparent material flow. Real-time data made available using RTLS about the location and status of assets forms the basis for networking involved players and logistical processes along the value chain. This allows users to continuously and automatically compare the position of every production asset with the 3D model (or digital twin) of the product or production environment. Evaluation and combination of this digital twin with other information — for instance, using apps in the company’s IoT operating system, MindSphere — permit dynamic optimization of production and logistics processes.
Tomi Engdahl says:
https://www.uusiteknologia.fi/2018/03/09/alypuhelin-hallinnoi-pian-rakennuksia/
https://www.editori.fi/artikkeli/rakennukset-siirtyvat-alypuhelimiin–oletko-valmis-/
Tomi Engdahl says:
http://www.etn.fi/index.php/tekniset-artikkelit/7949-sulautettu-iot-vaatii-paikallista-asiantuntemusta
Tomi Engdahl says:
https://www.uusiteknologia.fi/2018/05/04/memristoripiirit-suojaamaan-iot-laitteet/
Tomi Engdahl says:
http://www.etn.fi/index.php/tekniset-artikkelit/7864-raataloity-piiri-on-usein-kaytannollisin
Tomi Engdahl says:
Know the Risks of the Internet of Things
https://it.toolbox.com/article/know-the-risks-of-the-internet-of-things?mid=6158450&lgid=3441165&mailing_id=3823227&tfso=149873&lpid=696
No one is certain just how many devices are already connected to the Internet of Things (IoT) and no one knows exactly how many devices will connect by 2020, but the estimates floated by experts is that more than 50 billion IoT devices are going to be connected by then.
Recent cybercriminal attacks that leave ransomware on computers has made most computer users more security-conscious. Using password managers and end-to-end encryption help alleviate ransomware, virus and other attacks. But, a big hole in home and business computer systems is the IoT.
For example, your IoT coffeemaker could be instructed not to turn off. At best, your coffee pot may have burned coffee on the bottom of the pot. At worst a fire starts and destroys your home.
How Privacy Is Threatened by the Internet of Things
Your teenager comes home from school and finishes the milk. Your refrigerator sees that it has no milk and sends a text to you alerting you that you are out of milk. This is a notable feature, as teenagers are notorious for forgetting things like that. But, besides you getting a text, the information also flows right to the appliance maker, along with the model, repair history, and warranty registration.
When asked why they need this information, manufacturers say that the data helps them make a better refrigerator, but the information is sold by them to marketing firms. This means you might be targeted by marketers for milk products or alternative products to dairy products.
The march towards “smart homes” is ongoing, and we are paying for it by continuous and willfully given loss of privacy. Data collected by manufacturers varies and ranges from an IP address to details about your health and the most private things going on in your life.