Subscribe to our Newsletter | To Post On IoT Central, Click here


Security (129)

The smart technology of IoT or Internet of Things is really changing the technological landscape from all aspects. It is a network of connected devices that work through exchanging data between each other through a cloud network.

IoT technology has had a deep impact on the world of technology and web development is one of them. You might ask how these two things are connected, well, as it turns out, IoT devices need to work with web development because it needs both a front-end and back-end development, and that is where web development comes in. in the past few years, IoT has changed the web development in a lot of ways. Here are a few examples of that. 

 

  • Continuous Website Optimization

Internet of Things is a constantly evolving sector and there is no possibility of this stopping soon. And that is why the web developers have to constantly keep on optimizing their websites to match the evolving nature of the website. This is the only true way to stay relevant in the industry of IoT.

 

  • Raising The Bar On The Expertise

IoT has definitely increased the bar on the expertise when it comes to the knowledge of coding and framework. IoT developers need better knowledge of web development languages and database management. 

This need for advanced knowledge has definitely raised the bar for the developers to enter the game. They can’t just start with web development with just JavaScript knowledge anymore. They need serious knowledge of coding today. That’s hiring a reliable web development company in NYC is a necessity. 

  • Speed Of Data Transaction

The traditional data process is through request analysis by web servers. But this process is not useful when it comes to IoT. for IoT devices, the data transaction speed is much higher and that is why the traditional process is replaced by the cloud data transmission process. This way the devices work faster by transmitting data faster.

 

  • Need For An Increase In Security

IoT devices are more prone to get hacked and manipulated by hackers. And that is why web developers have to up their security game. A normal security protocol for web development is not enough for IoT devices. They need stricter security design pattern for the connected device's network to keep it safe for the users. You can follow the best practices for mobile app security here as well. 

 

  • Power Management Needs

On an IoT network, the programs that run in the background drain a lot of power. This results in decreased communications and work. And that is why web developers have to design the layout in such a way that it will minimize the amount of power being used. Before you go forward with the web development plan for IoT device network, you have to design a power management plan.

 

  • Dynamic UI

The normal UI design process by web developers has changed a lot due to the IoT industry. And that is why the developers have to rethink their UI development approach. Following the best practices to develop IoT based designs is the right way to go for web developers today. 

 

The impact of IoT is all-encompassing and even web development is not out of its impact. The developers have to change the normal practices they used to follow to match pace with the constantly evolving process of Internet of Things. Above mentioned are only a few ways IoT is effecting web development. The impact is even deeper than you think and it is going to get even deeper with time. 

Read more…

Bad Cars: Anatomy of a Ransomware Attack

By Alan Grau, VP of IoT, Embedded Systems, Sectigo

TV and science fiction writers have let their imaginations run wild with theories about what could happen if your car was attacked by bad actors. There have been a few real-world cases where white-hat hackers and researchers have been able – in limited, controlled instances – to actually penetrate a car’s electronics and communications systems, take over the car’s steering and acceleration systems, and potentially do real damage.

However, there are other scenarios that might not be as obvious or as dramatic.

For example, what if your car’s computer was infected by a virus that greatly reduced the engine’s efficiency or capped the car’s maximum driving speed? What if the virus did something less dramatic, such as make the car unable to lock the controls for automatic window operation, or simply prevent the car from starting? No one would die, but the car owner would be very upset, posing a disaster for the automobile’s manufacturers.

3239139993?profile=RESIZE_710x

Motor City Ransomware

Electric Vehicles require sophisticated control and safety technologies for their electrical power systems to safely manage the high voltages that store and distribute from their battery systems. If something goes wrong, the car cannot operate, people could get electrocuted, or the car could burst into flames or explode. These are real dangers that are managed by the car’s network of fuses, circuit breakers, and control systems.

What would happen if a cyber hacker got into these sensitive electronic systems and turned off the safety and control system?

Why would someone do this? Money, of course.

Suppose the bad guys successfully penetrated and infected these vehicles? Imagine now that they had the software or security keys that could fix these problems, but hold them as ransom, jeopardizing an automaker’s entire fleet of new cars.

How many millions (or tens of millions) of dollars would the automaker pay to get that solution? Holding a manufacturer hostage is a very real possibility, as evidenced by the results that today’s hackers are getting by attacking hospitals and cities and successfully extracting substantial ransoms to just return these institution’s data. In a recent WIRED article, The Biggest Cybersecurity Crisis of 2019 So Far, which discusses the risks to “things” and across supply chains, the FBI explained, "We are seeing an increase in targeted ransomware attacks. Cyber criminals are opportunistic. They will monetize any network to the fullest extent.”

Pre- and Post-Assembly Infections

It is possible that cars could be infected before they even hit the auto dealers’ lots. Bad actors have the capability to infect a small electronic part, essential to the auto manufacturing food chain, purchased from one of the hundreds of component suppliers.

How could auto manufacturers possibly test each electronic element? It is almost impossible - and requires that parts manufacturers themselves take more care in their software development process to ensure the software in these components are not infected during manufacturing process, or during the testing and shipping processes.

Of course, cyber infections could happen on the actual assembly line where the cars are put together. With many car manufacturing plants using IoT connected robots and machines, there is always a possibility of infection happening on the assembly line.

These components could even become infected after assembly, during the manufacturers’ testing and process. Infection, during installation, or with after-market parts and upgrades, could arise after the vehicles arrive at the dealers’ facilities.

Already aware of the possibility and the potential disastrous effects of infected cars reaching the market, manufacturers throughout the supply chain need to become more aware of how their devices could be attacked and infected even before they leave the warehouse. This means embedding IoT security from day one - from the smallest electronic components to final assembly of motors, transmissions and other large vehicle components.

About Sectigo

Sectigo (formerly Comodo CA) provides award-winning, purpose-built and automated PKI management solutions to secure websites, connected devices, applications, and digital identities. As the largest commercial Certificate Authority, trusted by enterprises globally for more than 20 years, and more than 100 million SSL certificates issued in over 200 countries, Sectigo has the proven performance and experience to meet the growing needs of securing today’s digital landscape. For more information, visit www.sectigo.com.

 

 

 

Read more…

Heavy equipment is mainly used extensively in industries such as construction, oil and gas, mining, forestry, energy, civil engineering, military engineering, transportation, and many others. Industrial heavy machines include construction equipment, wheel loaders, oilfield pieces, manufacturing equipment, earthmovers, hydraulic cranes, bulldozers, oversized trucks, forklifts, and more. Organizations rely on heavy machinery to speed up production and to avoid human errors or health risks.

With developments in IoT, it is possible to decrease equipment downtime while improving the efficiency of the output. Companies that supply industrial machinery and components are seeing strong interest in connected machinery and components which providing many IoT consulting Companies. IoT-powered asset management solutions offer a host of benefits, including predictive maintenance to prevent equipment failure, increased asset reliability, improved asset health, accident avoidance in the workplace, and downtime reduction.

Smart Asset Monitoring with IoT

Safety of personnel and assets, theft or pilferage of assets, accidents and resulting injuries, and bottlenecks in the supply chain are some of the common challenges that are prevalent in asset-intensive industries like manufacturing, utilities, construction. By improving visibility into day-to-day operations, replacing legacy systems with an integrated solution and automating manual processes, many of these challenges can be overcome. 

Digitalization, combining connected devices with IoT-based solutions, can help to overcome these issues. End-to-end clarity on the status of the equipment enables improved decision-making, increases asset reliability, and also improves the people and process efficiency. With the advances in technology, mature organizations have heavy machinery that is computerized, automated and enabled with connectivity and big data analytics, which increases the efficiency of the overall product development process.

Use cases: IoT in heavy machinery management

Let’s take a look at some of the use cases where IoT is transforming the way heavy equipment and related assets are managed.

Smart heavy equipment in warehouse management

Material handling equipment like trucks, forklifts, pallet trucks, and pump trucks are very important for any warehouse to perform daily activities such as loading, unloading, transporting goods to different areas, and picking goods from risky areas. Needless to say, these machines and their operators need to be managed properly to minimize the chances of accidents. Warehouse operators need to take preventive measures for vehicle accidents and injuries that occur while from shifting material, and take proper care while handling hazardous materials.

Today, futuristic warehouses are using driverless robotic equipment to assist in picking and moving operations. Guidance systems like global positioning system (GPS), lasers, and radio-frequency identification (RFID) are used in such warehouses and equipment.

For example, advanced driverless pallet trucks and forklifts are equipped with audible warnings and lights and have built-in sensors to detect obstructions. These sensors come with lasers or camera systems, which are positioned to detect objects and activity from the floor and are able to determine the height and distance around all sides of vehicles and warehouse corners. This makes the equipment intelligent – it knows when to slow down and stop to avoid a collision.

With the recent advances in IoT for warehouse equipment, the market has a new breed of smart forklifts that come equipped with 360-degree detection forklift antenna, which is able to detect when the workers come into forklift zone. When a worker is detected within the predefined danger zone, audio and visual alarms are set off inside the forklift cab to alert the driver. This helps to reduce the risk of injuries and property damage.

Smart heavy equipment in the construction sector

According to a MarketandMarkets report, the heavy construction equipment market size is estimated to grow from USD 121.46 Billion in 2015 to USD 180.66 Billion by 2020, at a CAGR of 7.0%. Depending on the construction application, heavy machines are mainly categorized into four types:

  • Earth moving equipment
  • Construction vehicles
  • Material handling equipment
  • Construction equipment

Wireless technology has a huge impact on the construction industry to provide connectivity for heavy equipment. These machines use technology-enabled devices combined with cloud computing, allowing storage and sharing of data.

IoT is playing a key role in boosting productivity, improving preventive maintenance, minimizing downtime, and reducing repair costs. Sensors integrated with the equipment are able to detect and send automated alerts related to the status of the equipment systems and parts. They can also compile and analyze usage and maintenance data, helping with preventive and predictive maintenance.

 

One of the major problems in the construction industry are injuries caused due to accidents involving people and heavy equipment. As the number of heavy equipment continues to rise, the risk also increases. IoT can help to make the equipment smarter and safer.

Additionally, IoT can help to track assets as they move around the site, or to a different site, ensuring that the assets are never stolen or lost – an ongoing issue on large construction sites that causes delays and decreases productivity.

Smart heavy equipment in transport and logistics

Transportation and logistics businesses want to optimize the supply chain. Many transportation companies are already using mobile devices, such as barcode scanners, mobile computing devices, and radio frequency identification (RFID) to solve challenges related to the supply chain. With RFID, many companies are achieving a high level of shipping and receiving accuracy, inventory accuracy, and faster order processing, along with a reduction in labor costs.

However,  due to drivers’ careless behavior, while driving heavy trucks or conveyors, company owners have to shell out a big amount for accident-related injuries, material loss or shipping delays. By using advanced technology that is capable of monitoring driver’s behavior and delivering alerts in case of possible collisions, the risk of these issues can be minimized.

Computer vision-based techniques and ADAS solutions, with a number of onboard sensors, can help with lane detection, traffic signal detection, driver behavior detection, GPS tracking, fuel management, report generation, notification alert, and predictive maintenance.

Using such solutions, the driver receives support to detect and avoid accidents. It is also possible to monitor a driver operating a heavy machine and automatic alerts can be generated if the driver is sleepy or inactive for a long duration.

Another effective solution for tracking of heavy machines/vehicles is based on installing GPS fleet tracking devices on the vehicles to gain real-time data updates. This is an efficient and secure solution that helps to resolve issues related to operational inefficiencies, theft, and fleet maintenance, increasing the overall productivity of the machines and vehicles.

Read more…

Plenty of companies yearn to integrate cloud computing with their IT infrastructure but feel hesitant to do so due to concerns about data security. A lot of public cloud host service providers make use of the same hardware infrastructure to manage the needs of various clients which can compromise the security of data systems.

 

However, it is possible to hire the expertise of private cloud computing companies as they follow data security methods that can work for HIPAA and PCI-sensitive organizations. By getting private cloud computing solutions, companies can have greater control over their data security needs.

 

Here are 5 handy tips for implementing cloud computing concepts while maintaining the highest levels of security.

  1. The first thing that you need to keep in mind is the location of your data. Unless you know the location of your data, it won’t be possible for you to secure it. While it is still important for you to use technologies like firewall, data encryption, and intrusion detection methods, knowing your data’s location allow you to prevent security breaches when the cloud system stops working. You should be able to use dedicated hardware to implement stringent security parameters for your data that you share through cloud computing.
  2. Make sure that you keep your data perfectly backed up. When you take backups of your data, you can be sure of the fact that your data is safe against any kind of losses. This can also help you secure all important information about your business and provide you with the peace of mind that you seek.
  3. The data centers that you choose to work with for your company should always take data security in a serious manner. They should be able to implement the best security measures in the servers in which your data is kept. It is important that they are PCI or HIPAA certified and SSAE 16, SOC 2 and SAS 70 audited. Managed services like intrusion detection, firewalls and antivirus can really work out well for you by making your data, applications, and enterprise more resilient.
  4. A good way to ensure security for your data would be to check out the clients that a cloud service provider has worked with. By seeing whether the cloud provider has already worked with clients in the past requiring critical and stringent security measures, it is possible for you to make sure that your data is in good hands. Organizations operating in the financial, insurance, healthcare and government sectors are certainly good examples requiring high-end data security. By contacting these companies, you can be sure if they offer excellent data security.
  5. It is important that you also carry out detailed tests to ensure that the cloud systems are equipped with the best security features.

 

These are the top 5 and most important cloud computing security tips that many app development companies india agencies are adopting in their development and implementation processes so as to have better security for their product or services.

Read more…

Your home security system. Air condition system. Your car. Why, even your coffee maker. Almost every imagine digital appliance is now connected to the Internet. The era of connected things has arrived.

IoT is no longer a science project that businesses are putting off for the future. It is a promise to a future that must be leveraged now. In fact, today, it is more difficult to find a coffee-maker or any home appliance without Wifi or Bluetooth connectivity. Not just at homes, even at corporations, connected devices has become a serious boardroom topic. According to DigiCert’s State of IoT Security survey 2018, 83% of organizations say the Internet of Things (IoT) is important to business today, and 92% say it will be in two years.

IoT can bring to businesses several benefits like improved operational efficiency, new revenue channels, business agility, and enhanced customer experience.

However, there are enterprise concerns that dwarf the possibility of gaining these benefits.

Among the top 4 enterprise concerns for IoT are security and privacy.

Source: DigiCert’s State of IoT Security survey 2018

How the Internet of Things can become the Internet of ‘Threats’

If not controlled, secured and monitored, the Internet of Things can go from smart connected things to a web of connected threats. Here are some ways how connected devices can go rogue.

#1 The connected risk of BYOD

Global corporations are losing no time in enabling their employees with BYOD (Bring Your Own Device) and WFH Work From Home working models. Although these working models amplify productivity, they also carry with them the risk of IoT.

For instance, an insecure connected device at an employee’s home can be hacked into by a hacker thereby gaining access to the office system. If the employee has failed to take adequate security measures for the office gadgetry, then it leaves the ground open for the hacker to seed an infectious malware, virus or anything malicious into the office network. That is the connected risk of BYOD which IoT creates.

#2 DDoS attacks

Source: DigiCert’s IoT Security Infographic

Do you know that insecure IoT devices can take down cities? IoT botnets combined with DDoS attacks can bring connected urban infrastructure to a grinding halt. This is not any sci-fi or fictional scenario. Hackers can track down IoT sensors, hack into their weak interfaces and run commands to shut down services or to hijack their functioning.

To cite a real-world example, cities like New York, Singapore, Barcelona, etc. are already running extensive public utilities with the help of IoT. IBM’s white paper - The Dangers of Smart City Hacking found more than 17 security vulnerabilities that make it “painfully easy” to take down large IoT-based urban networks. The security vulnerabilities included public default passwords, SQL injection, authentication bypass and so on.

#3 Premise Intrusion

Home security device shipments worldwide is expected to touch 700 Millions by 2019. According to Alarms.org, three-fourth of homeowners buy security systems that can be monitored through their mobile devices. While these systems saves time and provide convenience, they also become easy targets that hackers can infiltrate easily.

By hacking into the smartphone or a weak smart device, the hacker can take down the home security system thereby gaining access to the entire household. The same scenario applies to corporate offices as well, which makes IoT a certain Internet of Threats.

So, do these security threats mean that it is the end of the road for IoT app development? Not so. There are best practices that enterprises can embrace to insulate their IoT networks from vulnerabilities.

Best practices to establish security in IoT app development

IoT is a relatively new concept. The IT industry as a whole is yet to attain widespread knowledge and authority on its usage, maintenance and security. Here are some best practices that can help thwart the security risks involved in IoT app development.

#1 Review the risk involved

Having a brief idea of the risk landscape will help device a strategic security policy specifically for IoT devices. Penetration testing can be carried out to identify key vulnerabilities that should be addressed on high priority. For example, default public passwords is a vulnerability that can be resolved quickly without much ado.

#2 Setup device identity

Each device in the IoT network must be identified and tagged to grant secure access. Use secure over-the-air updates to keep the device security intact and in tune with the latest development.

#3 Encryption

More than the connected device, it is the data that it creates and exchanges that is of value. Every data exchange by the devices in the network should be secured with end-to-end encryption, code signing or with SSL certificates.

#4 Public Key Infrastructure

Public Key Infrastructure (PKI) can help create the basic framework required for authenticating device identities and for establishing the integrity of security patches. It also facilitates easier management of public-key encryption thus making it a perfect choice for establishing IoT security.

#5 Plan long-term

IoT is going to be here for the long-term. It is not any short-term fad that can be easily replaced. It is got a strong hardware presence which cannot be removed easily. Hence, any security measures made for IoT networks should be planned for the long-term.

What’s next?

With the promise of IoT comes several perils as well. IoT botnets can take down large-scale and sensitive connected networks, including urban infrastructure, home security systems, etc. McKinsey Global Institute estimates the economic impact that IoT can create to be in the range of $3.9 trillion to $11.1 trillion worldwide by 2025. But, the true economic benefit of IoT can be attained only if it is secured and insulated from security threats. To sum it up, security should be the bottom line of IoT app development. Without security, IoT can create more damage than the benefits that it can provide.

Read more…

A Broad View of the Impact of Artificial Intelligence on Remanufacturing 

The advancement and utilization of Artificial Intelligence (AI) is poised to make a similar impact in the 4th Industrial Revolution we are currently experiencing as Henry Ford’s assembly line did over 100 years ago.  A convergence of machine learning algorithms, big data analytics, and connectivity between machines due to Internet of Things (IoT) capabilities are impacting and reshaping industry and business around the globe.  Here is a broad overview of some of the contexts within remanufacturing these advances are rapidly being applied.

 

Design for Remanufacturing

Barriers for remanufacturing can always be traced back to the initial product design stage.  If products were better designed to accomplish the goals of the remanufacturing process, massive improvements and efficiencies can be accomplished.  The adoption of ubiquitous information and communication technologies (ICTs) thanks to elements of advanced AI as described above continue to blur the lines between virtual environments and the real world to create more sophisticated cyber-physical production systems (CPPSs).

 

Advanced Remanufacturing Processes

Artificial intelligence technologies are exponentially expanding computing power and connectivity which results in greater volumes of data that can be analyzed in a more robust manner than ever before.  This will allow remanufacturers to think big and push the envelope to develop more ambitious goals and objectives for their programs.  Lack of data or advanced robotics capabilities will no longer be impediments for remanufacturers to successfully process a higher percentage of product components and materials.

 

Robotics in Remanufacturing

Robots have already proven their capabilities in remanufacturing under certain conditions with relatively small and simple batches of components that usually involve some significant human oversight.  Advances in AI are moving the needle in identifying and creating new patterns in the way humans and machines interact.  This application of emerging technology shows significant promise to expand the capabilities of robotics in remanufacturing to tackle progressively more complex scenarios with less and less human interaction with greater efficiency.

 

Critical Failure Prediction

In industrial manufacturing settings, there is continuous pressure to improve efficiency, increase productivity, and reduce costs.  IoT connectivity and other elements of AI are being brought to bear in this environment to improve predictive maintenance and avoid machine failure during critical phases of production.  These same benefits of monitoring automated equipment on the front-end of the manufacturing process can also deliver the same benefits to the remanufacturing setting as well.  Not only can unexpected downtime be eliminated, but the ability to plan and schedule preventive maintenance more proactively and efficiently can occur as well.

 

Inventory Forecasting

One of the most significant challenges all remanufacturers face is predicting how much demand there will be for returned products with the flow of returned items coming into the remanufacturing process.  Of course, the quality of the materials being returned can make a significant difference as well.  AI technologies can greatly improve upon existing forecasting models that attempt to predict product returns.  Elements of Big Data and Machine Language Learning can leverage and up-date real-time data on sales, product usage, and warranty activity and more accurately predict product life expectancy and the rate and timing of returns into the remanufacturing process.  

 

Resilient Remanufacturing Networks (ReRuN)

Sustainability is the objective of remanufacturing in a world that has shifted from a linear model where products used to end up in a landfill once they are no longer functioning for their intended use.  As a society, we continue to grow more aware of the finite nature of our natural resources that has led companies to produce products according to a circular model whereas many components of an item are reused as many times as is practical.  

 

As stated in the points above, AI and other emerging technologies are already making significant improvements in all phases of the product life-cycle that occur prior to remanufacturing.  By embracing a ReRuN mindset that is calculated as early as the product concept/design phase, remanufacturing outcomes are positioned for greater outcomes due to improved forecasting in all elements of the remanufacturing process.

 

Closed-Loop Supply Chain Management

There can be no true resiliency for remanufacturing unless a complete closed-loop supply chain management strategy is employed.  In-depth studies on remanufacturing are just now starting to take place and raise awareness of the opportunities to be leveraged during the remanufacturing process to impact economic and environmental sustainability.  The advances in AI and all emerging technologies will help put remanufacturing on equal footing with all other phases of product life cycle.  Because this emphasis on remanufacturing is just starting to expand and receive attention, it also holds the most potential for impacting the entire product lifecycle.

 

The Future is Now

In the news, every day we continue to see advancements in the development of products and processes that seem to be right out of science fiction movies and shows of the 1960’s and 1970’s.  From flying cars to putting a colony of people on Mars, humankind is entering a bold new era where we now have the technology to execute just about anything we can imagine.  This coupled with an increased global awareness of our finite resources and need to be good stewards of our planet, will continue to bring greater emphasis and attention to remanufacturing in all phases of the product cycle.  AI and other emerging technologies are finally catching up and giving industry the tools to create this new reality.

 

Joseph Zulick is a writer and manager at MRO Electric and Supply. MRO Electric and Supply maintains a comprehensive stock of FANUC CNC and FANUC Robotics parts which are used in several industries including but not limited to engineering, manufacturing, packaging, and plant automation.

Read more…

In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that understanding was a definition of trustworthiness and the designation of five characteristics that define trustworthiness.

As defined by the IIC in its recently released Industrial Internet of Things Vocabulary v2.1 document: “Trustworthiness is the degree of confidence one has that the system performs as expected. Characteristics include safety, security, privacy, reliability and resilience in the face of environmental disturbances, human errors, system faults and attacks.”

Let’s take a deeper look at the 5 foundational characteristics at the core of trustworthiness:

  • Safety ensures that a system operates without causing unacceptable risk of physical injury or damage to the health of people. This protection of humans is focused either directly or indirectly, as the result of damage to property or to the environment.
  • Security protects a system from unintended or unauthorized access, change or destruction while Information Technology (IT) security ensures availability, integrity and confidentiality (AIC model) of data at rest, in motion or in use.
  • Reliability describes the ability of a system or component to perform its required functions under stated conditions for a specified period of time.
  • Resilience describes the ability of a system or component to prevent or at least reduce any serious impact of a disruption while maintaining an acceptable level of service.
  • Privacy protects the right of individuals to control or influence what information related to them may be collected and stored and by whom and to whom that information may be disclosed.

Achieving trustworthiness in industrial IoT systems requires recognition that a complex IoT system is comprised of subsystems and the integral components of the subsystems. The trustworthiness of the overall system depends upon the trustworthiness of each of the subsystems and each of the components, how they are integrated, and how they interact with each other. Trustworthiness must be pervasive in IoT systems, which means there must be trustworthiness by design and a means to achieve assurance that the trustworthiness aspects have been addressed properly. Permeation of trust is the flow of trust within a system from its overall usage down to its smallest components and requires trustworthiness of all aspects of the system. Trustworthiness requires ongoing effort over time as systems and circumstances change.

As such, the IIC Trustworthiness Task Group, in close cooperation with the IIC Security Working Group, is tasked to frequently enhance and redefine the definition and role of trustworthiness in industrial systems as the IIoT continues to evolve. Ultimately, their goal is to moves system designers from traditional safety thought processes into a new paradigm for system design that takes into consideration all 5 of the trustworthiness characteristics and their interactions within the system.  

You can read more about trustworthiness and its relationship with industrial systems and the convergence of IT/OT in the Fall 2018 issue of ICC’s Journal of Innovation.

By Marcellus Buchheit, Co-founder of Wibu-Systems AG and President and CEO of Wibu-Systems USA

This blog originally appeared as a Wibu-Systems Blog

Read more…

Today, retail stores are continually concentrating on utilizing the developing advances like cloud, portable, RFID, beacons, etc., to give associated retail administrations and better shopping knowledge to clients. For instance, store proprietors are incorporating sensors in the key zones of retail locations and associating them to cloud through a gateway that empowers constant information examination identified with items, deals, and clients from these sensors.

Interestingly, IoT and associated advances are overwhelming the retail business.


 

IoT in retail can help retailers improve store operations, enhance customer experience and drive more conversions. Moreover, IoT can help retailers solve day-to-day problems such as tracking energy utilization, managing in-floor navigation, detecting crowded areas, reducing check out timings, managing product shelves, preventing theft, monitoring goods, etc. Let us how IoT helps in few of these scenarios.

In-Store Navigation with IoT-enabled Devices

Identifying in-store navigation is one of the common problems in retail stores. Here, IoT devices with integrated technologies like Bluetooth, Wi-Fi, magnetic positions and augmented reality, etc., can facilitate in-store navigation to help customers navigate through the store and find the desired product.

It gives customers a multichannel shopping experience through digitization of physical assets. In-store navigation also helps increase the path to purchase rate before a product stock outs.

Energy Management with Smart Devices

Energy consumption is a major cost consuming factor for the retail businesses, be it in refrigeration, lighting, heating, air conditioning, etc. Using these energy sources efficiently can bring cost saving of up to 20 percent per year. IoT-enabled smart devices can help resolve problems of energy management and saving.

There are several IoT-based platforms that can log, monitor and beep alarms or alert the in-store personnel about temperature, energy usage, heating, gas leakage, electricity breakdowns, etc., with the help of integrated sensors. Using these smart energy management devices, store owners can directly interact with the controllers of refrigerators and retrieve prioritized information with the help of sensors.

Theft Prevention with Geo-Fencing

The crime of shoplifting in the retail industry is increasing day-by-day, because retailers fail to provide sufficient attention to shoplifters. According to National Association for Shoplifting Prevention (NASP), more than $25 million worth of merchandise gets stolen from retail shops each day. Adding more to retailers’ loss is retail shrinkage, which includes shoplifting, employe theft, paperwork error, vendor fraud and many more.

To overcome the problem of shoplifting and retail shrinkage, retailers can use Geo-fencing technique.
Geo-fencing relies on the global positioning system or a radio frequency identification (RFID) tag that allows a store operator to create a virtual barrier or zone around specific locations in retail shops. When a customer tries to move product from the specific location, an alert is triggered and a message is sent to the store in-charge. Geo-fencing enabled in IoT devices or beacons can help retailers in a number of ways; from keeping goods safe, tracking customers and employee movements, managing company-owned resources to minimizing incidents of theft and loss.

Customer Engagement with Sensor-Enabled Shopping Carts

The sensor-enabled shopping cart is a technique adopted by most of the retail merchandisers. These shopping carts help retailers grow their business in every aspect by helping them visualize shopper’s flows by category/subcategory, understand the shopping pattern, analyze the dwell path, and enable faster checkout.

This smart cart design involves sensors with connectivity protocols around the cart, which have the ability to track the movement of the wheels and match up with the distance the cart has traveled. It helps retailers with an accurate data of shopping carts with the inside-store journey. The data from this cart can be sent to the server or to cloud for further analysis.

 

Read more…

Despite the great promise of IoT to improve business and society, many think it’s being held back due to complexity and the associated lack of required skills to make it a success. Is it possible that the antidote to this complexity and skill shortage problem lies in the existing open standards and technologies that comprise the World Wide Web? In this podcast, Rob Tiffany makes the case for using existing W3C standards to power the Internet of Things.

Check it out at https://theinternetofthings.io/iot-podcast-can-the-web-save-the-internet-of-things/ 

-Rob

Read more…

 

Security systems installed in a typical facility consists of cameras, access control, intrusion sensors and fire alarms. Typically, these devices are places behind a firewall on a dedicated network. Building control systems are installed on a secondary network can contains lighting, HVAC, fire protection, elevators/lifts, chillers and air/moisture sensors. These systems serve their purpose and will continue to be adapted and make facility systems design more complicated. This complexity can be controlled using common development tools and platforms. Not only will this approach make the process of creating smarter, safer, more energy efficient systems but will also reduce the number accidental deaths and injuries that occur every year.

 

The redundant network design approach is not a very efficient nor cost effective way of operating a facility. This is starting to change as savvy building managers are making the decision to integrate security and building control systems and map them onto a single network. This can entail integrating multiple disparate systems, sensors, NVR devices and video management software. The concept of integrating a camera or access control system to an HVAC system, or a visitor/facility management system or edge recording device to a lighting or fire protection system may seem unusual to some. Yet, this is where many security systems integrators and manufactures are missing out on untapped applications and services opportunities. Modern integrated security and building systems can give facility managers and security directors the tools to improve, simplify operations and reduce the efforts of the operations staff and points of control teams.

 

In the past, the security industry has relied on it’s own approach to integrated systems know as physical security information management (PSIM). PSIM attempts to provide an open architecture to integrate multiple security system products into a single operating platform. This approach has been very hit-or-miss and has left a bad taste in the mouths of systems integrators and end-users. On the flip side of the coin, facility managers have their own integration platform known as a building automation system (BAS). As it relates to physical security, BAS systems are intended to integrate with PSIMs and control individual security systems. However, BAS systems come in many different flavors; many of them are not viewed in a glowing light by building operation end users. Past integrations are not all filled with doom-and-gloom. There are some successful integrations attempted by the collaborative efforts of building controls and physical security organizations. The question is why is this design practice not more common where the benefits and economics make sense?

 

In order to facilitate the adoption and implementation of an integrated system the use of open standard protocols is an absolute must. The building automation industry created BACnet and LONworks which allow for real-time remote connectivity between sensors, actuators, controller devices and software. In the case of LONworks, hardware manufactures have the ability to include a chipset with built-in building control system support. It took some time, but finally the security industry created the protocols ONVIF and PSIA. These open architectures allows the end-user to choose vendors selecting either security or BAS equipment based on features and price. The end-user can also decide to install partial system upgrades without the risk of making costly investments in obsolete legacy systems. With that said, The security industry is curious about implementing the building controls protocols but needs an easier way to integrate them into their hardware and software products in an ad-hoc applications based manner.

 

There are security directors that are not completely sold on the idea of integrating with building control systems. On the other hand, facility managers may question the benefits of sharing a network with security systems especially when functions do not overlap with life-safety systems. However, system integration between building controls, physical and now cybersecurity offers more than just staffing convenience and operational efficiency. Here are a few results from a truly integrated security system.

Faster Response to Incidents – With the use of a robust mobile software solution and integration approaches such camera-to-access control-to-lighting or HVAC staff members can be freed from a console which makes them readily available to respond to incidents or equipment failure.

Provide more accurate compliance reports – Data provided by building controls and security edge devices can be paired with artificial intelligence technologies such as neural networks and genetic algorithms. This helps facilities to comply with government regulations with regards to security.

Reduce accidents and save money – Integrated systems provide better control of building and security systems. For example, if some accidentally stumbles into a restricted area or manages to make it to overly heated or chilled area the access control system, Variable air volume (VAV), or other HVAC system components can send alerts and create historical trend reports. Also a single network architecture can make managing system components easier.

 

Integrated building control and security systems are gaining some traction. However, it is still not a mainstream approach among many manufactures and systems integrators. One proposed solution is to utilize a common platform that is utilizes the industry protocol standards as application and system component building blocks.

Read more…

The dream of making money with IoT, AI and Blockchain

Have you ever think about how could you make money with the Internet of Things (IoT) or Artificial Intelligence (AI) and of course with Blockchain?  What would happen if you could use the three of them in a new business model?.  Apparently, Success, Success and Success.

In the next sections I provide information of some business models implemented with these three technologies.

IoT Business Models

As IoT moves past its infancy, certain trends and economic realities are becoming clear. Perhaps the most significant of those is the realisation that traditional hardware business models just don’t work in IoT. Take a look at “The top 5 most successful IoT business models” that have emerged as particularly effective applications for IoT.

If any of you is building an IoT product, this article ” IoT Business Models For Monetizing Your IoT Product”  show how to make money with IoT.

Zack Supalla, the founder and CEO of Particle, an Internet of Things (IoT) startup, suggest “6 ways to make money in IoT”.

Finally, in “How IoT is Spawning Better Business Models” we can read three ways companies like Rolls Royce, Peloton, MTailor or STYR Lab  was rethinking their business model and have created revolution in the marketplace. 

Blockchain Business Models 

It sounds repetitive, but yes "Blockchain technology may disrupt the existing business models”. The authors´ s findings concerning the implications of blockchain technology for business models are summarised in the following picture.

 

Do you think that blockchain will likely to cut into big-players’ revenues? Then, this article: “New Blockchain-Based Business Models Set to Disrupt Facebook and Others”, is for you.

If you are ambitious and you are planning to build a viable business on blockchain, then read “Building an International Business Model on Blockchain”.

I am also an advocate of the coming era of decentralization (at least in my most optimistic version) and Blockchain is a step more to create value when the End of All Corporate Business Models will arrive.

AI Business Models 

Companies from all industries, of all shapes and sizes are thus faced with an important set of questions: Which AI business models and applications can I use ? And what technologies and infrastructures are required?.

It seems that we all are convinced that artificial intelligence is now the most important general-purpose technology in the world that can drive changes at existing business models. Not surprised then, that  AI is Revolutionizing Business Models.  The “data trap” strategy, that in venture capitalist Matt Turck’s words consists of offering (often for free) products that can initialize a data network effect. In addition, the user experience and the design are becoming tangibly relevant for AI, and this creates friction in early stage companies with limited resources to be allocated between engineers, business, and design.

This article introduces  some good examples of AI business models :

New Business models with the intersection of IoT, AI and Blockchain

With IoT we are connecting the Digital to the Physical world. Connected objects offers a host of new opportunities for companies, especially in terms of creating new services. The amount of data generated by the billions of connected objects will be the perfect complementary feed to many AI applications. Finally, blockchain technology could be used to secure the ‘internet of things’ and create smart contracts in a decentralized infrastructure that boost the democratization of technology and creation of sustainable communities.

You must remember that new business models that include IoT, AI and blockchain need among other characteristics: Volume and Scalability. Volume of devices, Volume of data, Volume of customers, volume of developers and powerful ecosystems to escalate. 

Good luck in your search and implementation of your new business model.

Thanks for your Likes, Comments and Shares

Read more…

With any security system involving a human component, there’s a careful balance between requisite security measures and the user experience. The reason most of us have one or two locks on our front door – instead of twenty – isn’t because we don’t want more security, it’s that the experience would be far too much of a daily hassle.

When it comes to IoT security, the balance is askew in the other direction: the marketplace is glutted with lower end IoT devices that privilege a simplified user experiences over robust security. While this strategy allows consumers relative ease and a frictionless process in activating smart home and other internet-connected products, this devaluing of security leaves a virtual unlocked front door for malicious hackers who have little difficulty in accessing these devices. A largely unsecure IoT industry is proving time and time again to have significant and harmful repercussions, in the form of the mayhem that hackers can inflict on vulnerable users, and for the internet at-large as devices are corrupted for use in devastating IoT botnet-based DDoS attacks that continue to make headlines.

The need for security is, of course, a major issue that the IoT industry must overcome. Even as Gartner foresees the IoT rapidly expanding to 20.4 billion devices by 2020, a recent market survey finds that 90% of consumers do not have confidence in the security of IoT devices. In the same way, IoT security – and customer confidence in it – is just as important to the enterprise, as commercial IoT applications may provide personalized services that utilize sensitive data, involve monetary transactions, or offer other features requiring authentication that is unquestionably safe and frictionless for customers. Altogether, this makes IoT security a key concern that absolutely must be resolved for the IoT industry to have longer term staying power and to reach its full potential.

Passwords are (rightfully) going extinct

Passwords continue to be the default option for account security across all industries. While common, they’re also an overly complex user authentication method that are becoming less effective in securing access, while also becoming more frustrating and challenging from a UX perspective.

Forgetting your password requires ones to waste time with reset emails and security questions – if we can remember them -  a cumbersome process equivalent to fumbling with twenty door looks.  And beyond delivering a subpar UX, most IoT devices are manufactured without a traditional security interface (no screen, no keypad), leaving passwords a poor candidate for IoT security and leading enterprises across industries seek alternative and more secure ways for authenticating users.

Biometrics are the answer to the IoT’s present – and long term – security needs

Biometric security measures are growing in popularity and in widespread use.  Smart phone users are deploying fingerprint identification or facial recognition to unlock screens. Alexa, Siri, and other voice-activated tools have made talking to your technology commonplace, increasing demand for voice-based authentication as a common security solution.

The biometric approach to security is particularly well-suited to the IoT, though, and offers a compelling synergy with the desires of today’s businesses to establish more personalized interactions and relationships with customers. As demonstrated by the rise of chatbots, brands are evolving to include personalities that go beyond mascots and logos. Businesses want the customer’s brand experience to feel familiar – acquaintances and friends don’t require identification when they see you.  Biometric authentication enables a more natural and passive experience, whether that’s opening the smart home lock on your front door, activating IoT devices inside, or interacting with brands and their products by other means.

In addition to the stylistic advantages, several technical advances have enhanced the current viability of biometric security for the IoT. The memory footprint of biometric security algorithms are getting smaller while also getting more efficient.  Algorithms as small as 2MB now have the capability to fully secure IoT devices. And these algorithms are also becoming smarter and can thwart spy movie-esque attempts at trickery; for example, biometrics can now distinguish between your voice and a recording of it. Backed by AI and machine learning that studies individual user behavior, biometrics can also now authenticate users by their gait, how they type, how they apply pressure to a touchscreen, and plenty more of the things that make you, you.

Secure authentication is the only way to commercialize IoT in the enterprise. When this happens, there will be proper verification of monetary transactions and sensitive personal data can be shared. The challenge for the industry is to provide a secure, frictionless (passive) authentication that fully takes advantage of the IoT without compromising the UX.

With the death of passwords accelerating and the stakes of security for IoT industry health so high, the arrival and incorporation of highly capable biometric security measures within IoT devices is certainly a welcome one.

 

Read more…
RSS
Email me when there are new items in this category –

Upcoming IoT Events

More IoT News

How wearables can improve healthcare | TECH(talk)

Wearable tech can help users track their fitness goals, but these devices can also give wearers ownership of their electronic health records. TECH(talk)'s Juliet Beauchamp and Computerworld's Lucas Mearian take a look at how wearable health tech can… Continue

IoT Career Opportunities