SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020
IoT Security Assessment Framework
A data driven approach for the businesses
1
Complex & uncomprehended
The businesses should know 

• What they are deploying

• A checklist for a calculated risk 

• Potential attack surface

• Risk vs bene
fi
ts
IoT Security
Constrained
Devices
Big Scale
Tech Illiterates
Lack of UI, challenging to
design & con
fi
gure,
update, and prone to
errors
Applications & devices
are personal, and
involves humans &
physical world
Variety of devices,
protocols, &
applications
Big Impact
Safety & economic
risks, loss of
privacy and
business
interruptions
2
Typical IoT Network Segments
Typical networking technologies and corresponding security protocols
3
Cloud
PAN WAN
LAN Internet
IPSec Tunnel IPSec Tunnel
WiFi/
Ethernet
BB/LTE/MPLS
BLE,
802.15.4,
WiFi
SSP
Edge Router Apps
OTAE
CoAP/UDP/DTLS/IPv6
IoT Security Assessment Framework
The proposal
The assessment framework standard will
provide

• A way for the industry to assess IoT
applications consisting of IoT devices and
Edge

• A checklist for devices and edge

• Necessary and su
ffi
cient conditions

• A scoring mechanisms

• Enable decision making

• Data driven analytics for security assessment
A set guidelines for the
device vendors and
application developers
A method for evaluating the
IoT applications for security
needs
Self assessment/IEEE
certi
fi
cation
4
Existing/Ongoing Standards/Work ...
@IEEE-SA
• Healthcare Device Security Assurance Working Group (EMB/Stds Com/
HDSecWG)

• Standard for Wireless Diabetes Device Security Assurance: Product
Security Evaluation Program

• This standard de
fi
nes a framework for a connected electronic product
security evaluation program
P2621.1
P2733
• Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/
Clinical IoT DDI with TIPPSS)

• Standard for Clinical Internet of Things (IoT) Data and Device
Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety,
Security

• This standard establishes the framework with TIPPSS principles (Trust,
Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things
(IoT) data and device validation and interoperability.
5
Existing/Ongoing Standards/Work
Outside IEEE
• GSMA IoT Security Guidelines and Assessment

• Provides recommendations for the secure design, development and
deployment of IoT services

• OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance
GSMA
IoTSF
• IoT Security Foundation - A not-for-pro
fi
t organization

• Provides advice and framework for IoT Security

• Has over 100 members, including ARM, NXP, Microchip, Samsung,
Vodafone, Qualcomm
6
ETSI EN 303 645
• IoT Security requirements for Consumer Devices

• Under development

• A potential candidate to collaborate
Other Established Standards/Compliance Guidelines
These will in
fl
uence the development of any new security standards
Information technology — Security techniques — Evaluation
criteria for IT security
ISO/IEC 15408
GDPR
Regulation on the protection of natural persons with regard to
the processing of personal data and on the free movement of
such data, and repealing Directive 95/46/EC (Data Protection
Directive)
HIPAA
The Health Insurance Portability and Accountability Act of
1996
PCI DSS Payment Card Industry Data Security Standard
7
IEEE Standard for an Architectural Framework for the Internet
of Things
IEEE 2413
IoT Security Requirements
The capabilities of the end devices should be considered for security assessment
Characteristic Class 0 Class 1 Class 2
RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB
Internet No IP CoAP IPv6, HIP
Cryptography Over the air
Symmetric
cryptography
PKI based
Protection One level up
Assisted at one level
up
Self and services at
one level up
Interface IoT Services
Security Provisioning
and Services
Security Services
Applications
Only for trusted
environments
Battery powered
under the Roof
Mains powered &
standalone devices
8
The Need for a New Standard
Data driven; Easy to understand and to be used by Business users
• Training, scaling, reducing costs and making
IoT deployments more secure 

• Device capabilities based approach

• De
fi
ning Necessary and Su
ffi
cient conditions

• Scoring/grading mechanism

• Easy to interpret checklist and summary for
for weighing risk vs. bene
fi
ts and decision
making

• Data driven approach (applying ML/AI for
assessment)

• Self assessment/IEEE certi
fi
cation
9
5C
Five Criteria
Broad Market Potential
A standards project authorized by IEEE 802 shall have a broad market potential. Speci
fi
cally, it
shall have the potential for:
11
• Broad sets of applicability

• IoT being adopted almost all business sectors, including residential and government
use. And security and privacy is the number one concern while considering an IoT
application. Hence the output of this project will have broad set of applicability.

• Multiple vendors and numerous users

• The number of devices that would be connected to the Internet is estimated to be in
tens of billions in the near future.

• Balanced costs (LAN versus attached stations)

• This project reduces the cost of IoT applications deployment by providing a repeatable
approach for security assessment and reduces the need for special skilled personnel.
Compatibility
IEEE 802 LMSC de
fi
nes a family of standards. All standards should be in conformance: IEEE Std
802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be
thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate
compatibility with this criterion, the Five Criteria statement must answer the following questions.
12
A. Does the PAR mandate that the standard shall comply with IEEE Std 802,
IEEE Std 802.1D and IEEE Std 802.1Q? 

• No. However, the standard would use the IEEE 802 standards.

B. If not, how will the Working Group ensure that the resulting draft standard is
compliant, or if not, receives appropriate review from the IEEE 802.1 Working
Group? 

• Not applicable.
Distinct Identity
Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project
shall be:
13
• Substantially di
ff
erent from other IEEE 802 standards

• This standard is not related to IEEE 802 standards.

• One unique solution per problem (not two solutions to a problem)

• There is no standard within IEEE that provides this capability.

• Easy for the document reader to select the relevant speci
fi
cation

• Yes, this project will de
fi
ne an assessment framework for deploying IoT
applications based on best practices for security and privacy.
Technical Feasibility
For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the
proposed project shall show:
14
• Demonstrated system feasibility

• Security assessment is typically prerequisite for any connected applications in the enterprise,
however the approach is proprietary.

• Proven technology, reasonable testing

• Not applicable.

• Con
fi
dence in reliability

• This standard will not reduce any existing system reliability.

• Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation.

• Not applicable.
Economic Feasibility
For a project to be authorized, it shall be able to show economic feasibility (so far as can
reasonably be estimated) for its intended applications. At a minimum, the proposed project shall
show:
15
• Known cost factors, reliable data

• This project will not introduce any new costs, rather will help in reducing
the cost of connected application deployment and maintenance.

• Reasonable cost for performance

• The benefit of security assessment will outweigh the cost of
assessment.

• Consideration of installation costs

• Not applicable.
Questions & Suggestions
16

Más contenido relacionado

La actualidad más candente

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?Sameer Ahmed
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AIPaul O'Hagan
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTINGMosin A
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud ComputingAnuveshSachdeva1
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsChetan Kumar S
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupHaidee McMahon
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSsuthi
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Tyrone Systems
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Samir Bounab
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Fastly
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...Intellipaat
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingCygnet Infotech
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journeyChetan Kumar S
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?Fastly
 

La actualidad más candente (20)

What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?What is Edge Computing and Why does it matter in IoT?
What is Edge Computing and Why does it matter in IoT?
 
Edge Computing & AI
Edge Computing & AIEdge Computing & AI
Edge Computing & AI
 
fog&Edge computing
fog&Edge computingfog&Edge computing
fog&Edge computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
Edge Computing and Cloud Computing
Edge Computing and Cloud ComputingEdge Computing and Cloud Computing
Edge Computing and Cloud Computing
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Edge computing
Edge computingEdge computing
Edge computing
 
Augmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platformsAugmented Reality: On a new powerful mobile computing platforms
Augmented Reality: On a new powerful mobile computing platforms
 
Edge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetupEdge Computing and 5G - SDN/NFV London meetup
Edge Computing and 5G - SDN/NFV London meetup
 
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGSTHE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
THE ROLE OF EDGE COMPUTING IN INTERNET OF THINGS
 
Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019Five Trends in IoT and Edge Computing to Track in 2019
Five Trends in IoT and Edge Computing to Track in 2019
 
The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Edge Computing : future of IoT ?
Edge Computing : future of IoT ? Edge Computing : future of IoT ?
Edge Computing : future of IoT ?
 
Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?Altitude NY 2018: What's next in edge computing?
Altitude NY 2018: What's next in edge computing?
 
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
How Edge Computing Works | What is Edge Computing | Edge Computing Benefits |...
 
Edge computing -by ChandraShekhar
Edge computing -by ChandraShekharEdge computing -by ChandraShekhar
Edge computing -by ChandraShekhar
 
Demystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud ComputingDemystify Edge Computing Vs. Cloud Computing
Demystify Edge Computing Vs. Cloud Computing
 
How to start your IOT journey
How to start your IOT journeyHow to start your IOT journey
How to start your IOT journey
 
What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 

Similar a IoT Security Assessment - IEEE PAR Proposal

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityCableLabs
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSGabriel Paredes Loza
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAndy Taylor
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdfRupesh930637
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsEurotech
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTRAJESHWARI M
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryAbner Germanow
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DividePriyanka Aash
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesAhmed Banafa
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsAgence du Numérique (AdN)
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfKbNguyen1
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析Onward Security
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 SecurityDuncan Purves
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesThe IOT Academy
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateBrandon Height
 

Similar a IoT Security Assessment - IEEE PAR Proposal (20)

Technology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT SecurityTechnology & Policy Interaction Panel at Inform[ED] IoT Security
Technology & Policy Interaction Panel at Inform[ED] IoT Security
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
Securing the IoT Value Chain with AWS
Securing the IoT Value Chain with AWSSecuring the IoT Value Chain with AWS
Securing the IoT Value Chain with AWS
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Internet of things chapter2.pdf
Internet of things chapter2.pdfInternet of things chapter2.pdf
Internet of things chapter2.pdf
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
From IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity DivideFrom IT to IoT: Bridging the Growing Cybersecurity Divide
From IT to IoT: Bridging the Growing Cybersecurity Divide
 
IoT Standardization and Implementation Challenges
IoT Standardization and Implementation ChallengesIoT Standardization and Implementation Challenges
IoT Standardization and Implementation Challenges
 
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy Systems
 
The-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdfThe-5-Cs-plus-1-of-IoT.pdf
The-5-Cs-plus-1-of-IoT.pdf
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
 
UCT IoT Deployment and Challenges
UCT IoT Deployment and ChallengesUCT IoT Deployment and Challenges
UCT IoT Deployment and Challenges
 
Zuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-updateZuniga-Privacy-ECSG-update
Zuniga-Privacy-ECSG-update
 

Más de Syam Madanapalli

IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingSyam Madanapalli
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsSyam Madanapalli
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTSyam Madanapalli
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsSyam Madanapalli
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected WorldSyam Madanapalli
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsSyam Madanapalli
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceSyam Madanapalli
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart CitiesSyam Madanapalli
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School StudentsSyam Madanapalli
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliSyam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliSyam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015Syam Madanapalli
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesSyam Madanapalli
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchSyam Madanapalli
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of governmentSyam Madanapalli
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning SystemSyam Madanapalli
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSyam Madanapalli
 

Más de Syam Madanapalli (20)

IoT, Careers, and Skills
IoT, Careers, and SkillsIoT, Careers, and Skills
IoT, Careers, and Skills
 
IEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof ComputingIEEE P1931.1, The Roof Computing
IEEE P1931.1, The Roof Computing
 
Embracing the VUCA
Embracing the VUCAEmbracing the VUCA
Embracing the VUCA
 
Water Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School KidsWater Distribution Management - A Design by High School Kids
Water Distribution Management - A Design by High School Kids
 
Child Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoTChild Safety - A Design by Kids using IoT
Child Safety - A Design by Kids using IoT
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Realizing the Potential of Connected World
Realizing the Potential of Connected WorldRealizing the Potential of Connected World
Realizing the Potential of Connected World
 
The Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & AnalyticsThe Impact of IoT on Cloud Computing, Big Data & Analytics
The Impact of IoT on Cloud Computing, Big Data & Analytics
 
Building Smart Cities with Everything as a Service
Building Smart Cities with Everything as a ServiceBuilding Smart Cities with Everything as a Service
Building Smart Cities with Everything as a Service
 
Innovating the Smart Cities
Innovating the Smart CitiesInnovating the Smart Cities
Innovating the Smart Cities
 
IoT Primer for High School Students
IoT Primer for High School StudentsIoT Primer for High School Students
IoT Primer for High School Students
 
IoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam MadanapalliIoT for a Better World by Syam Madanapalli
IoT for a Better World by Syam Madanapalli
 
Internet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam MadanapalliInternet of Things, Innovation and India by Syam Madanapalli
Internet of Things, Innovation and India by Syam Madanapalli
 
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
How to Build an IoT Startup - Syam @IEEE TENSYMP 2015
 
IoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and OpportunitiesIoT - Make in India: Challenges and Opportunities
IoT - Make in India: Challenges and Opportunities
 
iRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a SwitchiRam Innovation - Automate Your Home With Just a Switch
iRam Innovation - Automate Your Home With Just a Switch
 
India, Internet of things and the role of government
India, Internet of things and the role of governmentIndia, Internet of things and the role of government
India, Internet of things and the role of government
 
The internet of things
The internet of thingsThe internet of things
The internet of things
 
Next Generation Emergency Warning System
Next Generation Emergency Warning SystemNext Generation Emergency Warning System
Next Generation Emergency Warning System
 
Smart Grid With I Pv6 For India
Smart Grid With I Pv6 For IndiaSmart Grid With I Pv6 For India
Smart Grid With I Pv6 For India
 

Último

Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...SUHANI PANDEY
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...SUHANI PANDEY
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdfMatthew Sinclair
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceDelhi Call girls
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...SUHANI PANDEY
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查ydyuyu
 

Último (20)

Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
Yerawada ] Independent Escorts in Pune - Book 8005736733 Call Girls Available...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 

IoT Security Assessment - IEEE PAR Proposal

  • 1. Syam Madanapalli | Chair IEEE P1931.1 - The Roof Computing | June 27, 2020 IoT Security Assessment Framework A data driven approach for the businesses 1
  • 2. Complex & uncomprehended The businesses should know • What they are deploying • A checklist for a calculated risk • Potential attack surface • Risk vs bene fi ts IoT Security Constrained Devices Big Scale Tech Illiterates Lack of UI, challenging to design & con fi gure, update, and prone to errors Applications & devices are personal, and involves humans & physical world Variety of devices, protocols, & applications Big Impact Safety & economic risks, loss of privacy and business interruptions 2
  • 3. Typical IoT Network Segments Typical networking technologies and corresponding security protocols 3 Cloud PAN WAN LAN Internet IPSec Tunnel IPSec Tunnel WiFi/ Ethernet BB/LTE/MPLS BLE, 802.15.4, WiFi SSP Edge Router Apps OTAE CoAP/UDP/DTLS/IPv6
  • 4. IoT Security Assessment Framework The proposal The assessment framework standard will provide • A way for the industry to assess IoT applications consisting of IoT devices and Edge • A checklist for devices and edge • Necessary and su ffi cient conditions • A scoring mechanisms • Enable decision making • Data driven analytics for security assessment A set guidelines for the device vendors and application developers A method for evaluating the IoT applications for security needs Self assessment/IEEE certi fi cation 4
  • 5. Existing/Ongoing Standards/Work ... @IEEE-SA • Healthcare Device Security Assurance Working Group (EMB/Stds Com/ HDSecWG) • Standard for Wireless Diabetes Device Security Assurance: Product Security Evaluation Program • This standard de fi nes a framework for a connected electronic product security evaluation program P2621.1 P2733 • Clinical IoT Data and Device Interoperability with TIPPSS (EMB/Stds Com/ Clinical IoT DDI with TIPPSS) • Standard for Clinical Internet of Things (IoT) Data and Device Interoperability with TIPPSS - Trust, Identity, Privacy, Protection, Safety, Security • This standard establishes the framework with TIPPSS principles (Trust, Identity, Privacy, Protection, Safety, Security) for Clinical Internet of Things (IoT) data and device validation and interoperability. 5
  • 6. Existing/Ongoing Standards/Work Outside IEEE • GSMA IoT Security Guidelines and Assessment • Provides recommendations for the secure design, development and deployment of IoT services • OneM2M, IoT Alliance Australia, Trusted Connectivity Alliance GSMA IoTSF • IoT Security Foundation - A not-for-pro fi t organization • Provides advice and framework for IoT Security • Has over 100 members, including ARM, NXP, Microchip, Samsung, Vodafone, Qualcomm 6 ETSI EN 303 645 • IoT Security requirements for Consumer Devices • Under development • A potential candidate to collaborate
  • 7. Other Established Standards/Compliance Guidelines These will in fl uence the development of any new security standards Information technology — Security techniques — Evaluation criteria for IT security ISO/IEC 15408 GDPR Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (Data Protection Directive) HIPAA The Health Insurance Portability and Accountability Act of 1996 PCI DSS Payment Card Industry Data Security Standard 7 IEEE Standard for an Architectural Framework for the Internet of Things IEEE 2413
  • 8. IoT Security Requirements The capabilities of the end devices should be considered for security assessment Characteristic Class 0 Class 1 Class 2 RAM, ROM < 10KB, 100KB ~ 10KB, 100KB ~ 50KB, 250KB Internet No IP CoAP IPv6, HIP Cryptography Over the air Symmetric cryptography PKI based Protection One level up Assisted at one level up Self and services at one level up Interface IoT Services Security Provisioning and Services Security Services Applications Only for trusted environments Battery powered under the Roof Mains powered & standalone devices 8
  • 9. The Need for a New Standard Data driven; Easy to understand and to be used by Business users • Training, scaling, reducing costs and making IoT deployments more secure • Device capabilities based approach • De fi ning Necessary and Su ffi cient conditions • Scoring/grading mechanism • Easy to interpret checklist and summary for for weighing risk vs. bene fi ts and decision making • Data driven approach (applying ML/AI for assessment) • Self assessment/IEEE certi fi cation 9
  • 11. Broad Market Potential A standards project authorized by IEEE 802 shall have a broad market potential. Speci fi cally, it shall have the potential for: 11 • Broad sets of applicability • IoT being adopted almost all business sectors, including residential and government use. And security and privacy is the number one concern while considering an IoT application. Hence the output of this project will have broad set of applicability. • Multiple vendors and numerous users • The number of devices that would be connected to the Internet is estimated to be in tens of billions in the near future. • Balanced costs (LAN versus attached stations) • This project reduces the cost of IoT applications deployment by providing a repeatable approach for security assessment and reduces the need for special skilled personnel.
  • 12. Compatibility IEEE 802 LMSC de fi nes a family of standards. All standards should be in conformance: IEEE Std 802, IEEE 802.1D, and IEEE 802.1Q. If any variances in conformance emerge, they shall be thoroughly disclosed and reviewed with IEEE 802.1 Working Group. In order to demonstrate compatibility with this criterion, the Five Criteria statement must answer the following questions. 12 A. Does the PAR mandate that the standard shall comply with IEEE Std 802, IEEE Std 802.1D and IEEE Std 802.1Q? • No. However, the standard would use the IEEE 802 standards. B. If not, how will the Working Group ensure that the resulting draft standard is compliant, or if not, receives appropriate review from the IEEE 802.1 Working Group? • Not applicable.
  • 13. Distinct Identity Each IEEE 802 standard shall have a distinct identity. To achieve this, each authorized project shall be: 13 • Substantially di ff erent from other IEEE 802 standards • This standard is not related to IEEE 802 standards. • One unique solution per problem (not two solutions to a problem) • There is no standard within IEEE that provides this capability. • Easy for the document reader to select the relevant speci fi cation • Yes, this project will de fi ne an assessment framework for deploying IoT applications based on best practices for security and privacy.
  • 14. Technical Feasibility For a project to be authorized, it shall be able to show its technical feasibility. At a minimum, the proposed project shall show: 14 • Demonstrated system feasibility • Security assessment is typically prerequisite for any connected applications in the enterprise, however the approach is proprietary. • Proven technology, reasonable testing • Not applicable. • Con fi dence in reliability • This standard will not reduce any existing system reliability. • Coexistence of IEEE 802 LMSC wireless standards specifying devices for unlicensed operation. • Not applicable.
  • 15. Economic Feasibility For a project to be authorized, it shall be able to show economic feasibility (so far as can reasonably be estimated) for its intended applications. At a minimum, the proposed project shall show: 15 • Known cost factors, reliable data • This project will not introduce any new costs, rather will help in reducing the cost of connected application deployment and maintenance. • Reasonable cost for performance • The benefit of security assessment will outweigh the cost of assessment. • Consideration of installation costs • Not applicable.