SRAM PUF Key Provisioning: Vital to Today's IoT Time: 9:30 – 10:10 Speaker: Pim Tuyls, CEO of Intrinsic ID As the IoT explodes, device makers face pressure to offer device personalization, protection of sensitive assets, and in-field application services. Meeting these needs has been costly because traditional key delivery methods don’t allow for scalability of device-appropriate security. We will show how SRAM PUF-based key provisioning is designed to keep pace with growing demand for generation, distribution and protection of cryptographic keys for IoT applications at use-case-affordable cost. |
IoT Security by Design Time: 10:15 – 10:55 Speaker: Hugo Fiennes, CEO and Founder of Electric Imp IoT security encompasses requirements that are new for many product designers – such as provisioning, authentication, OTA upgrades and link encryption – and weaknesses in any one could potentially be used to compromise the security of the end product. This session takes a multi-dimensional view on Defense-in-Depth, delivered by one of the world's premier experts in connected-device operations. We will explore the many possible attack vectors that product designers need to consider when designing successful IoT devices and nuances of security at all layers. From device, OS, network, and data, to cloud and applications. You’ll leave knowing why security certification is crucial for success and why being the world’s first IoT platform to earn UL cybersecurity certification is important and benefits virtually any IoT implementation. |
IoT Identity: Enabling IoT Services and Security Time: 11:00 – 11:40 Speaker: Rod Schultz, Rubicon Labs Connect a device to a network and you now must think like a service provider. How do you secure and defend your services, yet still grow revenue? How do you protect your brand? Rubicon Labs will discuss how IoT services and security begin with identity. IoT revenue is built on secure delivery and execution of business model logic. Learn how Rubicon’s secure identity service can become the technology foundation for transitioning a company from Capex to Opex revenue generation. |
IOT Security – Power Analysis and AI Time: 11:45 – 12:25 Speaker: Steven Chen, CEO of PFP CyberSecurity We present a security solution based on power analysis and Artificial Intelligence (AI) called Power Fingerprinting (PFP). Current hardware security features focus on protecting chip integrity. PFP protects the applications running on the chip. Power analysis has been used to steal cryptographic keys. PFP, however, uses it for detection, leveraging AI for scalability. PFP can detect intrusions in machine time, enabling remediation within milliseconds, likely before damage can be done. We will look at how PFP technology works, its history, strengths and weaknesses, and its application on real IoT designs, as well as potential chip-level implementations to further reduce cost. |
Platform Level Security for IoT Devices Time: 12:25 – 1:00 Speaker: Bob Waskiewicz, STMicroelectronics An essential requirement for any IoT device is its trustworthiness. In this session, using an example of a secure IoT platform, we’ll explore implementation-techniques for protecting code, over-the-air updates, provisioning and tamper detection, being used in concert to establish a well-fortified platform.      |
IoT End to End - Turn your IoT Sensor Data into Insights using Watson IoT Time: 1:50 – 2:30 Speaker: John Walicki, IBM Real IoT production deployments running at scale are collecting sensor data from hundreds / thousands / millions of devices. The goal is to take business critical actions on the real time data and find insights from stored datasets. Join John Walicki in this session for a fast paced developer journey that follows the IoT sensor data from generation, to edge gateway, to edge analytics, to encryption, to the IBM Bluemix cloud, to Watson IoT Real Time rules/actions, to visualization, to Node-RED processing, to cloud storage, to Data Science Experience, to Apache Spark analysis in Jupyter notebooks, to PixieDust visualization and finally machine learning algorithms. You don't need to be an expert data scientist to look for predictive maintenance insights using Watson IoT. |
LoRa™ enabling low-power, wide-area networks required for IoT applications Time: 2:40 – 3:20 Speaker: Nicolas Fillon, STMicroelectronics LoRa enables long-range communication with advantages over conventional cellular connections, including lower power and cost. Versatile features include multiple communication modes, indoor and outdoor location awareness, and native AES-128 security. This session will give an overview of LoRa technology, examine use cases where LoRa is a good fit and look at a low-cost development kit for prototyping IoT devices with LoRa™ Wireless Low-Power Wide Area Network (LPWAN) connectivity.       |
ThingSpace by Verizon: Delivering on the promise of IoT Time: 3:30 – 4:10 Speaker: Sr. Manager – IoT Embedded Solutions, Verizon Simplifying the design, development and deployment of Internet of Things (IoT) solutions with ThingSpace, a platform designed to give developers the ability to create applications, customers the ability to manage devices and partners the ability to market their services in an open environment as well as a new, dedicated network core with new LTE connectively options for the next-generation of IoT use cases. |
LTE Cellular Connectivity Options for Sensor-to-Cloud applications Time: 4:20 – 5:00 Speaker: Peter Fenn, Technical Marketing Manager, Avnet Global Design Team Today, there are many connectivity options for passing sensor data to cloud-based applications. Choosing the right wireless solution and knowing how to get started with your development can be challenging. This course reviews the latest embedded LTE cellular standards ranging from the low power, low datarate CAT-M1, to the high datarate CAT 4. Trade-offs between power, size, throughput and cost will be explained. You will see how AT&T’s new LTE-M network can be used with ST’s STM32L4 IoT Node Kit to implement a low-cost, sensor-to-cloud solution for remotely deployed edge devices. For higher speed CAT 4 applications, we’ll review and demonstrate a highly versatile, production ready, end-device certified solution, that’s Linux-enabled with support for several ST MEMs sensor solutions.   |