Session Descriptions

Sessions Descriptions

 

Managing the Complexities of IoT
Jim Morrish, Founding Partner, Transforma Insights

Much of the focus of IoT to date has been on relatively simple projects that generate a return relatively quickly. But more complex projects and more mission-critical projects can be more impactful in terms of process efficiency, value proposition, and industry transformation. In this presentation, Jim will present findings from the analysis of hundreds of IoT case studies, including analyses of different dimensions of complexity and market impact. He will explore two case studies in detail, highlighting how different profiles of complexity drive different profiles of skills required on solution design and implementation teams. Jim will include recommendations for how end users should best approach the opportunities presented by IoT.


Next Generation of IoT Communication
Ulrich Graf, Senior Engineer Industry 4.0 & Industrial IoT, Huawei Technologies 

IoT Communication, especially IIoT communication, is machine to machine communication, which is quite different from the human to human centric communication that the existing Internet was originally designed for. Privacy and security is one of the major concerns of IoT communication, as most of the communication will not be monitored or controlled by a human being. High precision services are very essential in some of the IoT system where any interruption of the service will cause serious and non-affordable damages. And last but not least, the interoperability among various IoT networks/systems remains a challenge. This presentation will contribute some initial thoughts and concepts trying to tackle the aforementioned challenges.


Autonomy Beyond the Car 
Dr. Stan Schneider, CEO, Real-Time Innovations (RTI)

Robocars will make life better and more efficient. But autonomous vehicles (AVs) that do everything drivers can do are still years or even decades away. And since operation with nobody in the car is critical for economic viability, we need a way to help the AV with “corner cases”. The best way to enable AVs sooner is to use human operators to suggest strategies when the vehicle gets stuck.  That requires vehicle fleets to have control rooms. This session will examine the potential and challenge of practical teleoperation, including combining assistance strategies, control-center design, cloud computing, and 5G connectivity.  It will also consider the architecture required to connect in-vehicle control and remote oversight. These systems should not be designed independently. AVs need a consistent architecture for the vehicle, control center, and cloud.


Over-the-Air Silicon Updates for Programmable SOC's        
Kai Hackbarth, Business Owner Industrial, Bosch.IO
Dr. Stan Schneider, CEO, Real-Time Innovations (RTI)     

Traditional Over the Air (OTA) updates are known for delivering updates to only the system software. This presentation will introduce a secure methodology to now also update the functionality of the system hardware via the Rollouts service from the Bosch IoT Suite and RTI software. Using Xilinx Adaptable technology in conjunction with a secure cloud-based system from Bosch.IO, hardware updates can be instantaneously provided via RTI’s Connext Drive to all nodes in today’s connected vehicle. Connext Drive provides the connectivity framework, proven in operation and working closely with industry-standard organizations, such as AUTOSAR and ROS, to develop automotive frameworks and platforms that leverage the DDS standard. The presentation will conclude with a demonstration of this OTA Silicon methodology.


Mitigating Wildfire Risk with Edge Computing and Energy Adaptive Networks
Michael Enescu, Founding CEO and Technology Evangelist, Energy Adaptive Networks  

Recent wildfires in Australia and California have recharged the debate about fire management, terrestrial ecosystem complexity and dynamical control in the wake of irreversible climate change. With a widening gap between utilities locked in aging, proprietary ecosystems, unable to deploy modern technologies based on shared, trusted, open systems, several IoT opportunities emerge. Energy adaptive networks OpenOPF (Optimal Power Flow), is a first step towards a series of new IoT technologies targeted at solving robustness trade-offs in the wake of catastrophic disasters that could be prevented at scale.


How to Successfully Navigate Security Guidelines Worldwide       
Jim Carver, Senior Manager Business Development, PSA Certified, Arm 

With each hack the security concerns surrounding IoT intensify. This has caused governmental institutions to act and provide IoT security guidelines and regulations to better protect their region. With many regulations and security standards being established it can be a challenge to decipher each standard to ensure worldwide compliance. In this talk we will discuss the evolution of government standards and how a standardized set of security requirements can speed time-to-security and protect devices and services that depend on their data. We’ll touch on the PSA Certified program, which includes a framework for securing devices and an accompanying multi-level security assurance scheme. The scheme has a concise set of security questions combined with lab evaluation, that builds on years of investment in IoT security and neatly aligns with new guidelines and regulations. This allows device manufacturers to ensure IoT security best practice, covering the needs of multiple regions and successfully unlocking the ability to enhance businesses models with trusted data.


How to Secure the Internet of Things (IoT) with Blockchain
Dr. Xinxin Fan, Head of Cryptography, IoTeX

Internet of Things (IoT) and blockchain are two technologies that are gaining popularity since their creation. While the IoT is transforming business processes and consumer behaviors, blockchain promises a number of salient features, such as decentralization, immutability, transparency, etc., which have great potential for tackling the security challenges faced by the IoT systems. This presentation will first talk about the IoT security challenges and the key features provided by blockchain, followed by the description of the blockchain reference architecture (https://www.trusted-iot.org/businesses) developed by Trusted IoT Alliance (TIoTA). With the reference architecture in place, the focus will shift to integration of blockchain technologies into the IoT data lifecycle and discuss how to enhance its security with blockchain. The presentation will wrap up by identifying some challenges when merging the IoT and blockchain.