SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
Securing the Internet of Things:
secure supply chain management

Stephen Miles, Research Affiliate
MIT Auto-ID Labs
S_miles@mit.edu
                        Networking day on EU-US RFID lighthouse pilot
                        projects on May 5th, 2009
                        Avenue de Beaulieu 25, Room O/S1, Brussels
 s_miles@mit.edu
                        1160 Auderghem
Multi-dimensional view of international conflict and
            cooperation in cyberspace
          MIT Center for International Studies (CIS)
                                        Tuesday, April 21, 2009 Wall Street Journal Tech
                                        By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN
                                        WASHINGTON -- Computer spies have broken into the
                                        Pentagon's $300 billion Joint Strike Fighter project -- the Defense
                                        Department's costliest weapons program ever -- according to
                                        current and former government officials familiar with the
                                        attacks… The intruders were able to copy and siphon off several
                                        terabytes of data related to design and electronics systems,
                                        officials say...The latest intrusions provide new evidence that a
                                        battle is heating up between the U.S. and potential adversaries
Speaker: Dr. Joel Brenner               over the data networks that tie the world together.
National Counter
Intelligence Executive, DNI
“Cyber International
Relations,”
MIT’s Center for
International Studies and
the Belfer Center for
Science and International
Affairs, Harvard Kennedy
School of Government.
13 Apr 2009 E38-714, MIT
            Page 2, “Securing the Internet of things;” s_miles@mit.edu
            US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
The Application of RFID to Enhance Supply Chain Security




Transatlantic Symposium on the Societal Benefits of RFID
   Washington DC, USA September 22nd 2008

“The transportation sector has always been concerned with efficiency, security
and safety issues. After 9/11, the hazardous materials industry saw major
changes, intensifying security requirements. New regulations made it more
challenging to comply and to ship hazardous materials. Homeland Security has
provided an influx of resources to raise awareness and to develop improved and
better solutions. Tracking technologies such as RFID and sensors have proven
to bring substantial benefits to support the agenda.
The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed
technologies and databases in hazardous material shipping. Sensor Net is an
RFID+sensor enabled application that helps to identify and monitor materials
as they move through the supply chain. It provides awareness of the location of
hazardous materials at every moment, in real time.”

     Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge
     National Laboratory)

     Prepared by Rebecca Schindler for the European Commission, Information
     Society and Media Directorate General, Networked Enterprise & Radio
     Frequency Identification (RFID) Unit (D4)

Page 3, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                                            ORNL Sensornet




     Oak Ridge National Laboratory (ORNL) and strategic partners are working
     together to build a comprehensive incident management system for the near-
     real-time detection, identification, and assessment of chemical, biological,
     radiological, nuclear, and explosive (CBRNE) threats…

     The web service interfaces use Open GIS Consortium (OGC) XML schemas for
     publication of sensor data and alerts. OGC is an association developing open,
     vendor-independent computing standards for geographic information systems
     (GIS) and other related technologies. OGC specifies the usage of the Geography
     Markup Language (GML), an XML grammar written in XML Schema, for the
     encoding of geographic information. Although GML provides specifications for
     describing a variety of geographical information, the fundamental element of
     GML is a geographic "feature".




Page 4, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                 UPU "Global Monitoring System – RFID Infrastructure”




                  The official size of the global letter post market is 437 billion items (UPU
                  2005). The Universal Postal Union (UPU) is a specialized agency of the
                  United Nations which has been charged with improving the global
                  performance of mail. A link between letter mail quality of service and the
                  payments made between countries has been agreed as the method for
                  achieving this objective. There is a need for a Global Monitoring System
                  (GMS) to provide the neutral and independent measurement for such a
                  scheme.
                  UPU is developing a Global Monitoring System (GMS) to measure
                  service performance that will use RFID (Radio Frequency Identification)
                  technology
                  First QSF Global Project to participate in the Global Monitoring System
                  under development*
                         • *Quality of Service Fund Regional Training Workshop; 2008, UPU




Page 5, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
European Secure Supply Chain Academic Resource:
FP7 Secure SCM project




                   •     SecureSCM will realize secure computation protocols
                         for collaborative Supply Chain Management.
                   •      Build novel protocols for data confidentiality in supply chain
                         optimization.
                   •      Implement and evaluate those protocols under real world
                         constraints.
                   •      Demonstrate the benefits of data protection in a number of
                         domains, including Aerospace and Logistics.
                   •      Research the obstacles to practical adoption of
                         collaborative supply chain management.




Page 6, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
US Secure Supply Chain Academic Resources:
NSF CISE Cybertrust International Research Collaboration:



               "How does cybersecurity change when we attach ‘things’ connected
                 by RFID, sensors and actuators to the network? “



              •     Mustaque Ahamad, co-director, Georgia Tech Information Security
                    Center.
                    CT-ISG: Trusted Passages: Managing Distributed Trust to Meet
                    the Needs of Emerging Applications
              •     Kevin Fu, University of Massachusetts, Amherst
                    CT-T Collaborative Research: Security for Smart Tags
              •     Berk Sunar, Worcester Polytechnic Institute,
                    CT-ER: Exploring Physical Functions for Lightweight and Robust
                    Cryptography




Page 7, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
GTRI and GT Ireland end-to-end presence for US-EC RFID
Lighthouse Pilot in Georgia and Ireland




                                                                MIT – SAP Modeling
                                                                the impact of security
                                                                on EPC network
                                                                performance




Page 8, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Adding sensors for tracking containers in the US Navy



GTRI Container Security Device

•Developed for Department of Homeland Security
•Continually monitors for door openings
•Container visibility throughout the supply chain

   My ID is…
                         I have been opened
                         in route…




                                                                GTRI Integrated RFID Sensor


                                                                In alignment with GS-1 Transportation Working
                                                                Group (TWG) XCAT Specifications
I am
emitting a                       I am located here…
chemical…                                                       •Developed for Department of Navy
                                                                •Monitors environmental conditions and location
                                                                of container
                                                                •Meets communication standards for safe
                                                                shipping
             Page 9, “Securing the Internet of things;” s_miles@mit.edu
             US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Commercial asset tracking examples




•   TrenStar beer keg tracking:




•   iGPS pallet tracking
                                                                         4/13 @6pm Stata Center
                                                                         (Bldg. 32) Rm 144,
                                                                         Tracking RTIs with RFID presents
                                                                         challenges : placement for maximun
                                                                         tags read, types and location of tags,
                                                                         type and placement of readers,
                                                                         choice of frequencies…

         Page 10, “Securing the Internet of things;” s_miles@mit.edu
         US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Securing our Cities; Trash Tracking




                                                                MIT CSAIL
                                                                GSM RFID TAG
                                                                Lewis Girod




Page 11, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’
connected by RFID, sensors and actuators to the network?“




                                                                    photo background cc by benlo
  Page 12, “Securing the Internet of things;” s_miles@mit.edu
  US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09   (http://www.flickr.com/photos/25203067@N00/58482958/
Academic Resources; participants from the RFID Academic
          Convocations/European Commission EU RFID Forum.




•   RFID Academic Convocations: MIT
    Open Courseware program -
    http://ocw.mit.edu/OcwWeb/Engine
    ering-Systems-Division/ESD-
    290Spring-
    2005/ConferenceVideos/
•   EU RFID Forum; hosted by the
    European Commission DGINFSO -
    http://www.rfidconvocation.eu/Con
    vocation.htm
•   RFID Technology and
    Applications, Edited by Stephen
    Miles, Sanjay Sarma, John
    Williams -
    www.cambridge.org/978052188093
    0




          Page 13, “Securing the Internet of things;” s_miles@mit.edu
          US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09

Weitere ähnliche Inhalte

Was ist angesagt?

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defenseDinesh More
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...ijcisjournal
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU
 

Was ist angesagt? (6)

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
L010517180
L010517180L010517180
L010517180
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
 
6G Communication
6G Communication6G Communication
6G Communication
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
 

Andere mochten auch

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous LogisticsAkiso Yadav
 
IoT applications for supply chain
IoT applications for supply chainIoT applications for supply chain
IoT applications for supply chainAndrej Planina
 
Some conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainSome conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainStefan Harrstedt
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14Mark Morley, MBA
 
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...InterimONE
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deckLora Cecere
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of thingsSergey Zhdanov
 
What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...Global Business Intelligence
 
Master Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksMaster Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksSAP Ariba
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsVala Afshar
 

Andere mochten auch (11)

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous Logistics
 
IoT applications for supply chain
IoT applications for supply chainIoT applications for supply chain
IoT applications for supply chain
 
Some conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainSome conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chain
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deck
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...
 
Master Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksMaster Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business Networks
 
IoT and the Supply Chain
IoT and the Supply ChainIoT and the Supply Chain
IoT and the Supply Chain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Ähnlich wie Euus stephanmiles

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Big Data Value Association
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUMEUBrasilCloudFORUM .
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Christo Ananth
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingIJECEIAES
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS SystemIRJET Journal
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU
 
Cyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCameron Kiddle
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Mikolaj Leszczuk
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfChristo Ananth
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)Francesco Flammini
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 

Ähnlich wie Euus stephanmiles (20)

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
10probs.ppt
10probs.ppt10probs.ppt
10probs.ppt
 
Cyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in Science
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Itec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_aItec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_a
 

Kürzlich hochgeladen

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...lizamodels9
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Sheetaleventcompany
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptxnandhinijagan9867
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...lizamodels9
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperityhemanthkumar470700
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...daisycvs
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876dlhescort
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Falcon Invoice Discounting
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLkapoorjyoti4444
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 

Kürzlich hochgeladen (20)

Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
Call Girls Zirakpur👧 Book Now📱7837612180 📞👉Call Girl Service In Zirakpur No A...
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
Russian Call Girls In Rajiv Chowk Gurgaon ❤️8448577510 ⊹Best Escorts Service ...
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
Quick Doctor In Kuwait +2773`7758`557 Kuwait Doha Qatar Dubai Abu Dhabi Sharj...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
Cheap Rate Call Girls In Noida Sector 62 Metro 959961乂3876
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLWhitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
Whitefield CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 

Euus stephanmiles

  • 1. Securing the Internet of Things: secure supply chain management Stephen Miles, Research Affiliate MIT Auto-ID Labs S_miles@mit.edu Networking day on EU-US RFID lighthouse pilot projects on May 5th, 2009 Avenue de Beaulieu 25, Room O/S1, Brussels s_miles@mit.edu 1160 Auderghem
  • 2. Multi-dimensional view of international conflict and cooperation in cyberspace MIT Center for International Studies (CIS) Tuesday, April 21, 2009 Wall Street Journal Tech By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks… The intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say...The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries Speaker: Dr. Joel Brenner over the data networks that tie the world together. National Counter Intelligence Executive, DNI “Cyber International Relations,” MIT’s Center for International Studies and the Belfer Center for Science and International Affairs, Harvard Kennedy School of Government. 13 Apr 2009 E38-714, MIT Page 2, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 3. The Application of RFID to Enhance Supply Chain Security Transatlantic Symposium on the Societal Benefits of RFID Washington DC, USA September 22nd 2008 “The transportation sector has always been concerned with efficiency, security and safety issues. After 9/11, the hazardous materials industry saw major changes, intensifying security requirements. New regulations made it more challenging to comply and to ship hazardous materials. Homeland Security has provided an influx of resources to raise awareness and to develop improved and better solutions. Tracking technologies such as RFID and sensors have proven to bring substantial benefits to support the agenda. The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed technologies and databases in hazardous material shipping. Sensor Net is an RFID+sensor enabled application that helps to identify and monitor materials as they move through the supply chain. It provides awareness of the location of hazardous materials at every moment, in real time.” Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge National Laboratory) Prepared by Rebecca Schindler for the European Commission, Information Society and Media Directorate General, Networked Enterprise & Radio Frequency Identification (RFID) Unit (D4) Page 3, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 4. Lighthouse Pilot participant resources: ORNL Sensornet Oak Ridge National Laboratory (ORNL) and strategic partners are working together to build a comprehensive incident management system for the near- real-time detection, identification, and assessment of chemical, biological, radiological, nuclear, and explosive (CBRNE) threats… The web service interfaces use Open GIS Consortium (OGC) XML schemas for publication of sensor data and alerts. OGC is an association developing open, vendor-independent computing standards for geographic information systems (GIS) and other related technologies. OGC specifies the usage of the Geography Markup Language (GML), an XML grammar written in XML Schema, for the encoding of geographic information. Although GML provides specifications for describing a variety of geographical information, the fundamental element of GML is a geographic "feature". Page 4, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 5. Lighthouse Pilot participant resources: UPU "Global Monitoring System – RFID Infrastructure” The official size of the global letter post market is 437 billion items (UPU 2005). The Universal Postal Union (UPU) is a specialized agency of the United Nations which has been charged with improving the global performance of mail. A link between letter mail quality of service and the payments made between countries has been agreed as the method for achieving this objective. There is a need for a Global Monitoring System (GMS) to provide the neutral and independent measurement for such a scheme. UPU is developing a Global Monitoring System (GMS) to measure service performance that will use RFID (Radio Frequency Identification) technology First QSF Global Project to participate in the Global Monitoring System under development* • *Quality of Service Fund Regional Training Workshop; 2008, UPU Page 5, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 6. European Secure Supply Chain Academic Resource: FP7 Secure SCM project • SecureSCM will realize secure computation protocols for collaborative Supply Chain Management. • Build novel protocols for data confidentiality in supply chain optimization. • Implement and evaluate those protocols under real world constraints. • Demonstrate the benefits of data protection in a number of domains, including Aerospace and Logistics. • Research the obstacles to practical adoption of collaborative supply chain management. Page 6, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 7. US Secure Supply Chain Academic Resources: NSF CISE Cybertrust International Research Collaboration: "How does cybersecurity change when we attach ‘things’ connected by RFID, sensors and actuators to the network? “ • Mustaque Ahamad, co-director, Georgia Tech Information Security Center. CT-ISG: Trusted Passages: Managing Distributed Trust to Meet the Needs of Emerging Applications • Kevin Fu, University of Massachusetts, Amherst CT-T Collaborative Research: Security for Smart Tags • Berk Sunar, Worcester Polytechnic Institute, CT-ER: Exploring Physical Functions for Lightweight and Robust Cryptography Page 7, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 8. GTRI and GT Ireland end-to-end presence for US-EC RFID Lighthouse Pilot in Georgia and Ireland MIT – SAP Modeling the impact of security on EPC network performance Page 8, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 9. Adding sensors for tracking containers in the US Navy GTRI Container Security Device •Developed for Department of Homeland Security •Continually monitors for door openings •Container visibility throughout the supply chain My ID is… I have been opened in route… GTRI Integrated RFID Sensor In alignment with GS-1 Transportation Working Group (TWG) XCAT Specifications I am emitting a I am located here… chemical… •Developed for Department of Navy •Monitors environmental conditions and location of container •Meets communication standards for safe shipping Page 9, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 10. Commercial asset tracking examples • TrenStar beer keg tracking: • iGPS pallet tracking 4/13 @6pm Stata Center (Bldg. 32) Rm 144, Tracking RTIs with RFID presents challenges : placement for maximun tags read, types and location of tags, type and placement of readers, choice of frequencies… Page 10, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 11. Securing our Cities; Trash Tracking MIT CSAIL GSM RFID TAG Lewis Girod Page 11, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 12. An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’ connected by RFID, sensors and actuators to the network?“ photo background cc by benlo Page 12, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09 (http://www.flickr.com/photos/25203067@N00/58482958/
  • 13. Academic Resources; participants from the RFID Academic Convocations/European Commission EU RFID Forum. • RFID Academic Convocations: MIT Open Courseware program - http://ocw.mit.edu/OcwWeb/Engine ering-Systems-Division/ESD- 290Spring- 2005/ConferenceVideos/ • EU RFID Forum; hosted by the European Commission DGINFSO - http://www.rfidconvocation.eu/Con vocation.htm • RFID Technology and Applications, Edited by Stephen Miles, Sanjay Sarma, John Williams - www.cambridge.org/978052188093 0 Page 13, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09