Professional Documents
Culture Documents
Björn Ekelund
Ericsson Research
Björn Ekelund | Public | © Ericsson AB 2014 | 2014-11-19 | Page 1
KEY TECHNOLOGIES FOR IOT
Wireless connectivity
Capillary networking
Distributed cloud
Security and integrity
Security Internet
technology technology
Resource
Wireless
efficient
technology
computing
Moore’s law
Source: Gartner 2014
Applications
App Enablement
Today
Connectivity
Per-problem solutions Transformation
Per-industry solutions Devices
Generic device solutions
Proprietary IT solutions Application Enablement
Cloud
Standards and Open Source
~1Mbps
Range
802.11ah
Bluetooth Long Range
~1kbps
~10bps
Multi-hop
communication
Device-to-device
communication
Ultra-dense deployments
Ultra-reliable
Inter-vehicular / vehicular-to-road Spectrum toolbox
communication
communication
Machine
Licensed
communication
Controlled sharing
Data Center
IEEE 802.11ah
Mobile Core
Backend Usage
• Buildings
• Homes
• Vehicles
• Sites
Capillary Capillary
Capillary
Networks Network Function Cloud
GWs
Auto-Configuration, GBA Security, Dynamic Middleware, Dynamic GW Selection, Data & Storage
CALVIN
Network
Computer
Robust
High
performance
Low latency
Flexible
Local
Dangerous
Fuzzy borders IoT allows remote attackers to do a lot of damage.
Unstoppable
It will happen regardless what the government does
Ubiquitous
Critical Critical Infrastructure can’t avoid IoT even if they try
Infrastructure/
IoT Concerns Emergency
Preparedness
Unpredictable
We don’t know what new attack vectors IoT will create
Security Afterthought
In the push to get things to the market, security often
not considered initially