SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
Securing the Internet of Things:
secure supply chain management

Stephen Miles, Research Affiliate
MIT Auto-ID Labs
S_miles@mit.edu
                        Networking day on EU-US RFID lighthouse pilot
                        projects on May 5th, 2009
                        Avenue de Beaulieu 25, Room O/S1, Brussels
 s_miles@mit.edu
                        1160 Auderghem
Multi-dimensional view of international conflict and
            cooperation in cyberspace
          MIT Center for International Studies (CIS)
                                        Tuesday, April 21, 2009 Wall Street Journal Tech
                                        By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN
                                        WASHINGTON -- Computer spies have broken into the
                                        Pentagon's $300 billion Joint Strike Fighter project -- the Defense
                                        Department's costliest weapons program ever -- according to
                                        current and former government officials familiar with the
                                        attacks… The intruders were able to copy and siphon off several
                                        terabytes of data related to design and electronics systems,
                                        officials say...The latest intrusions provide new evidence that a
                                        battle is heating up between the U.S. and potential adversaries
Speaker: Dr. Joel Brenner               over the data networks that tie the world together.
National Counter
Intelligence Executive, DNI
“Cyber International
Relations,”
MIT’s Center for
International Studies and
the Belfer Center for
Science and International
Affairs, Harvard Kennedy
School of Government.
13 Apr 2009 E38-714, MIT
            Page 2, “Securing the Internet of things;” s_miles@mit.edu
            US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
The Application of RFID to Enhance Supply Chain Security




Transatlantic Symposium on the Societal Benefits of RFID
   Washington DC, USA September 22nd 2008

“The transportation sector has always been concerned with efficiency, security
and safety issues. After 9/11, the hazardous materials industry saw major
changes, intensifying security requirements. New regulations made it more
challenging to comply and to ship hazardous materials. Homeland Security has
provided an influx of resources to raise awareness and to develop improved and
better solutions. Tracking technologies such as RFID and sensors have proven
to bring substantial benefits to support the agenda.
The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed
technologies and databases in hazardous material shipping. Sensor Net is an
RFID+sensor enabled application that helps to identify and monitor materials
as they move through the supply chain. It provides awareness of the location of
hazardous materials at every moment, in real time.”

     Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge
     National Laboratory)

     Prepared by Rebecca Schindler for the European Commission, Information
     Society and Media Directorate General, Networked Enterprise & Radio
     Frequency Identification (RFID) Unit (D4)

Page 3, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                                            ORNL Sensornet




     Oak Ridge National Laboratory (ORNL) and strategic partners are working
     together to build a comprehensive incident management system for the near-
     real-time detection, identification, and assessment of chemical, biological,
     radiological, nuclear, and explosive (CBRNE) threats…

     The web service interfaces use Open GIS Consortium (OGC) XML schemas for
     publication of sensor data and alerts. OGC is an association developing open,
     vendor-independent computing standards for geographic information systems
     (GIS) and other related technologies. OGC specifies the usage of the Geography
     Markup Language (GML), an XML grammar written in XML Schema, for the
     encoding of geographic information. Although GML provides specifications for
     describing a variety of geographical information, the fundamental element of
     GML is a geographic "feature".




Page 4, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Lighthouse Pilot participant resources:
                 UPU "Global Monitoring System – RFID Infrastructure”




                  The official size of the global letter post market is 437 billion items (UPU
                  2005). The Universal Postal Union (UPU) is a specialized agency of the
                  United Nations which has been charged with improving the global
                  performance of mail. A link between letter mail quality of service and the
                  payments made between countries has been agreed as the method for
                  achieving this objective. There is a need for a Global Monitoring System
                  (GMS) to provide the neutral and independent measurement for such a
                  scheme.
                  UPU is developing a Global Monitoring System (GMS) to measure
                  service performance that will use RFID (Radio Frequency Identification)
                  technology
                  First QSF Global Project to participate in the Global Monitoring System
                  under development*
                         • *Quality of Service Fund Regional Training Workshop; 2008, UPU




Page 5, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
European Secure Supply Chain Academic Resource:
FP7 Secure SCM project




                   •     SecureSCM will realize secure computation protocols
                         for collaborative Supply Chain Management.
                   •      Build novel protocols for data confidentiality in supply chain
                         optimization.
                   •      Implement and evaluate those protocols under real world
                         constraints.
                   •      Demonstrate the benefits of data protection in a number of
                         domains, including Aerospace and Logistics.
                   •      Research the obstacles to practical adoption of
                         collaborative supply chain management.




Page 6, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
US Secure Supply Chain Academic Resources:
NSF CISE Cybertrust International Research Collaboration:



               "How does cybersecurity change when we attach ‘things’ connected
                 by RFID, sensors and actuators to the network? “



              •     Mustaque Ahamad, co-director, Georgia Tech Information Security
                    Center.
                    CT-ISG: Trusted Passages: Managing Distributed Trust to Meet
                    the Needs of Emerging Applications
              •     Kevin Fu, University of Massachusetts, Amherst
                    CT-T Collaborative Research: Security for Smart Tags
              •     Berk Sunar, Worcester Polytechnic Institute,
                    CT-ER: Exploring Physical Functions for Lightweight and Robust
                    Cryptography




Page 7, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
GTRI and GT Ireland end-to-end presence for US-EC RFID
Lighthouse Pilot in Georgia and Ireland




                                                                MIT – SAP Modeling
                                                                the impact of security
                                                                on EPC network
                                                                performance




Page 8, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Adding sensors for tracking containers in the US Navy



GTRI Container Security Device

•Developed for Department of Homeland Security
•Continually monitors for door openings
•Container visibility throughout the supply chain

   My ID is…
                         I have been opened
                         in route…




                                                                GTRI Integrated RFID Sensor


                                                                In alignment with GS-1 Transportation Working
                                                                Group (TWG) XCAT Specifications
I am
emitting a                       I am located here…
chemical…                                                       •Developed for Department of Navy
                                                                •Monitors environmental conditions and location
                                                                of container
                                                                •Meets communication standards for safe
                                                                shipping
             Page 9, “Securing the Internet of things;” s_miles@mit.edu
             US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Commercial asset tracking examples




•   TrenStar beer keg tracking:




•   iGPS pallet tracking
                                                                         4/13 @6pm Stata Center
                                                                         (Bldg. 32) Rm 144,
                                                                         Tracking RTIs with RFID presents
                                                                         challenges : placement for maximun
                                                                         tags read, types and location of tags,
                                                                         type and placement of readers,
                                                                         choice of frequencies…

         Page 10, “Securing the Internet of things;” s_miles@mit.edu
         US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
Securing our Cities; Trash Tracking




                                                                MIT CSAIL
                                                                GSM RFID TAG
                                                                Lewis Girod




Page 11, “Securing the Internet of things;” s_miles@mit.edu
US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’
connected by RFID, sensors and actuators to the network?“




                                                                    photo background cc by benlo
  Page 12, “Securing the Internet of things;” s_miles@mit.edu
  US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09   (http://www.flickr.com/photos/25203067@N00/58482958/
Academic Resources; participants from the RFID Academic
          Convocations/European Commission EU RFID Forum.




•   RFID Academic Convocations: MIT
    Open Courseware program -
    http://ocw.mit.edu/OcwWeb/Engine
    ering-Systems-Division/ESD-
    290Spring-
    2005/ConferenceVideos/
•   EU RFID Forum; hosted by the
    European Commission DGINFSO -
    http://www.rfidconvocation.eu/Con
    vocation.htm
•   RFID Technology and
    Applications, Edited by Stephen
    Miles, Sanjay Sarma, John
    Williams -
    www.cambridge.org/978052188093
    0




          Page 13, “Securing the Internet of things;” s_miles@mit.edu
          US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09

Más contenido relacionado

La actualidad más candente

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
Dinesh More
 

La actualidad más candente (6)

Artificial intelligence in cyber defense
Artificial intelligence in cyber defenseArtificial intelligence in cyber defense
Artificial intelligence in cyber defense
 
L010517180
L010517180L010517180
L010517180
 
New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...New Research Articles 2020 June Issue International Journal on Cryptography a...
New Research Articles 2020 June Issue International Journal on Cryptography a...
 
ITU-T Study Group 3 Introduction
ITU-T Study Group 3 IntroductionITU-T Study Group 3 Introduction
ITU-T Study Group 3 Introduction
 
6G Communication
6G Communication6G Communication
6G Communication
 
ITU-T Study Group 2 Introduction
ITU-T Study Group 2 IntroductionITU-T Study Group 2 Introduction
ITU-T Study Group 2 Introduction
 

Destacado

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous Logistics
Akiso Yadav
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Vala Afshar
 

Destacado (11)

IOT & Autonomous Logistics
IOT & Autonomous LogisticsIOT & Autonomous Logistics
IOT & Autonomous Logistics
 
IoT applications for supply chain
IoT applications for supply chainIoT applications for supply chain
IoT applications for supply chain
 
Some conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chainSome conceptual views on iot in the supply chain
Some conceptual views on iot in the supply chain
 
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
OT - How IoT will Impact Future B2B and Global Supply Chains - SS14
 
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
CSCMP 2014: End to End SCM In The Cloud - Supply Chain Exchange II Track 13 -...
 
Autonomous webinar final deck
Autonomous webinar final deckAutonomous webinar final deck
Autonomous webinar final deck
 
logistics and the internet of things
logistics and the internet of thingslogistics and the internet of things
logistics and the internet of things
 
What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...What impact will the Internet of Things have on supply chain? A discussion - ...
What impact will the Internet of Things have on supply chain? A discussion - ...
 
Master Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business NetworksMaster Supply Chain Management with Cloud and Business Networks
Master Supply Chain Management with Cloud and Business Networks
 
IoT and the Supply Chain
IoT and the Supply ChainIoT and the Supply Chain
IoT and the Supply Chain
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar a Euus stephanmiles

A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
IJECEIAES
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
IJMIT JOURNAL
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
IJMIT JOURNAL
 

Similar a Euus stephanmiles (20)

Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
Unmanned Aerial Vehicles: COMP4DRONES (ECSEL JU)
 
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
SecureCloud  - Concertation Meeting EUBrasilCloudFORUMSecureCloud  - Concertation Meeting EUBrasilCloudFORUM
SecureCloud - Concertation Meeting EUBrasilCloudFORUM
 
Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47Aicis'18 evaluation paper 47
Aicis'18 evaluation paper 47
 
Sinnott Paper
Sinnott PaperSinnott Paper
Sinnott Paper
 
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
Call for Papers- Special Session: Contemporary Innovations in Data Sciences, ...
 
A data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computingA data quarantine model to secure data in edge computing
A data quarantine model to secure data in edge computing
 
IRJET - Security and Privacy by IDS System
IRJET -  	  Security and Privacy by IDS SystemIRJET -  	  Security and Privacy by IDS System
IRJET - Security and Privacy by IDS System
 
ITU-T Study Group 17 Introduction
ITU-T Study Group 17 IntroductionITU-T Study Group 17 Introduction
ITU-T Study Group 17 Introduction
 
10probs.ppt
10probs.ppt10probs.ppt
10probs.ppt
 
Cyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in ScienceCyberinfrastructure and its Role in Science
Cyberinfrastructure and its Role in Science
 
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
Self-Improving Sustainable Intelligent Transport System (ITS) Using Video Con...
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdfPreprint-IC3I2022 - 14-16 Dec 2022.pdf
Preprint-IC3I2022 - 14-16 Dec 2022.pdf
 
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
EWSN'15 Industry Session - Francesco Flammini (Ansaldo STS)
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Itec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_aItec 610 case_study_team_5_final_080910_a
Itec 610 case_study_team_5_final_080910_a
 

Último

unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
amitlee9823
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
Matteo Carbone
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Último (20)

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort ServiceEluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
Eluru Call Girls Service ☎ ️93326-06886 ❤️‍🔥 Enjoy 24/7 Escort Service
 

Euus stephanmiles

  • 1. Securing the Internet of Things: secure supply chain management Stephen Miles, Research Affiliate MIT Auto-ID Labs S_miles@mit.edu Networking day on EU-US RFID lighthouse pilot projects on May 5th, 2009 Avenue de Beaulieu 25, Room O/S1, Brussels s_miles@mit.edu 1160 Auderghem
  • 2. Multi-dimensional view of international conflict and cooperation in cyberspace MIT Center for International Studies (CIS) Tuesday, April 21, 2009 Wall Street Journal Tech By SIOBHAN GORMAN, AUGUST COLE and YOCHI DREAZEN WASHINGTON -- Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks… The intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say...The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries Speaker: Dr. Joel Brenner over the data networks that tie the world together. National Counter Intelligence Executive, DNI “Cyber International Relations,” MIT’s Center for International Studies and the Belfer Center for Science and International Affairs, Harvard Kennedy School of Government. 13 Apr 2009 E38-714, MIT Page 2, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 3. The Application of RFID to Enhance Supply Chain Security Transatlantic Symposium on the Societal Benefits of RFID Washington DC, USA September 22nd 2008 “The transportation sector has always been concerned with efficiency, security and safety issues. After 9/11, the hazardous materials industry saw major changes, intensifying security requirements. New regulations made it more challenging to comply and to ship hazardous materials. Homeland Security has provided an influx of resources to raise awareness and to develop improved and better solutions. Tracking technologies such as RFID and sensors have proven to bring substantial benefits to support the agenda. The Sensor Net project, led by ORNL, shows how to integrate sensor-deployed technologies and databases in hazardous material shipping. Sensor Net is an RFID+sensor enabled application that helps to identify and monitor materials as they move through the supply chain. It provides awareness of the location of hazardous materials at every moment, in real time.” Randy Walker (Transportation Programs Lead, SensorNet Program, Oak Ridge National Laboratory) Prepared by Rebecca Schindler for the European Commission, Information Society and Media Directorate General, Networked Enterprise & Radio Frequency Identification (RFID) Unit (D4) Page 3, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 4. Lighthouse Pilot participant resources: ORNL Sensornet Oak Ridge National Laboratory (ORNL) and strategic partners are working together to build a comprehensive incident management system for the near- real-time detection, identification, and assessment of chemical, biological, radiological, nuclear, and explosive (CBRNE) threats… The web service interfaces use Open GIS Consortium (OGC) XML schemas for publication of sensor data and alerts. OGC is an association developing open, vendor-independent computing standards for geographic information systems (GIS) and other related technologies. OGC specifies the usage of the Geography Markup Language (GML), an XML grammar written in XML Schema, for the encoding of geographic information. Although GML provides specifications for describing a variety of geographical information, the fundamental element of GML is a geographic "feature". Page 4, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 5. Lighthouse Pilot participant resources: UPU "Global Monitoring System – RFID Infrastructure” The official size of the global letter post market is 437 billion items (UPU 2005). The Universal Postal Union (UPU) is a specialized agency of the United Nations which has been charged with improving the global performance of mail. A link between letter mail quality of service and the payments made between countries has been agreed as the method for achieving this objective. There is a need for a Global Monitoring System (GMS) to provide the neutral and independent measurement for such a scheme. UPU is developing a Global Monitoring System (GMS) to measure service performance that will use RFID (Radio Frequency Identification) technology First QSF Global Project to participate in the Global Monitoring System under development* • *Quality of Service Fund Regional Training Workshop; 2008, UPU Page 5, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 6. European Secure Supply Chain Academic Resource: FP7 Secure SCM project • SecureSCM will realize secure computation protocols for collaborative Supply Chain Management. • Build novel protocols for data confidentiality in supply chain optimization. • Implement and evaluate those protocols under real world constraints. • Demonstrate the benefits of data protection in a number of domains, including Aerospace and Logistics. • Research the obstacles to practical adoption of collaborative supply chain management. Page 6, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 7. US Secure Supply Chain Academic Resources: NSF CISE Cybertrust International Research Collaboration: "How does cybersecurity change when we attach ‘things’ connected by RFID, sensors and actuators to the network? “ • Mustaque Ahamad, co-director, Georgia Tech Information Security Center. CT-ISG: Trusted Passages: Managing Distributed Trust to Meet the Needs of Emerging Applications • Kevin Fu, University of Massachusetts, Amherst CT-T Collaborative Research: Security for Smart Tags • Berk Sunar, Worcester Polytechnic Institute, CT-ER: Exploring Physical Functions for Lightweight and Robust Cryptography Page 7, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 8. GTRI and GT Ireland end-to-end presence for US-EC RFID Lighthouse Pilot in Georgia and Ireland MIT – SAP Modeling the impact of security on EPC network performance Page 8, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 9. Adding sensors for tracking containers in the US Navy GTRI Container Security Device •Developed for Department of Homeland Security •Continually monitors for door openings •Container visibility throughout the supply chain My ID is… I have been opened in route… GTRI Integrated RFID Sensor In alignment with GS-1 Transportation Working Group (TWG) XCAT Specifications I am emitting a I am located here… chemical… •Developed for Department of Navy •Monitors environmental conditions and location of container •Meets communication standards for safe shipping Page 9, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 10. Commercial asset tracking examples • TrenStar beer keg tracking: • iGPS pallet tracking 4/13 @6pm Stata Center (Bldg. 32) Rm 144, Tracking RTIs with RFID presents challenges : placement for maximun tags read, types and location of tags, type and placement of readers, choice of frequencies… Page 10, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 11. Securing our Cities; Trash Tracking MIT CSAIL GSM RFID TAG Lewis Girod Page 11, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09
  • 12. An ‘Internet of Things’ – "How do we ensure cybertrust when we attach ‘things’ connected by RFID, sensors and actuators to the network?“ photo background cc by benlo Page 12, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09 (http://www.flickr.com/photos/25203067@N00/58482958/
  • 13. Academic Resources; participants from the RFID Academic Convocations/European Commission EU RFID Forum. • RFID Academic Convocations: MIT Open Courseware program - http://ocw.mit.edu/OcwWeb/Engine ering-Systems-Division/ESD- 290Spring- 2005/ConferenceVideos/ • EU RFID Forum; hosted by the European Commission DGINFSO - http://www.rfidconvocation.eu/Con vocation.htm • RFID Technology and Applications, Edited by Stephen Miles, Sanjay Sarma, John Williams - www.cambridge.org/978052188093 0 Page 13, “Securing the Internet of things;” s_miles@mit.edu US-EC RFID Lighthouse Pilot Planning Session, Brussels 5/5/09