Loading…
ELC + ABS has ended

Sign up or log in to bookmark your favorites and sync them to your phone or calendar.

IoT [clear filter]
Monday, March 23
 

10:30am

The Open Interconnect Consortium (OIC) Security Model and Vision - Ned Smith, Intel
The emerging Internet-of-Things presents a complex and challenging environment for security. This is an artifact of low-cost, highly-constrained devices that are also connected. It is further complicated by cyber-physical nature of IoT applications that can have immediate physical-world consequences. The Open Interconnect Consortium is developing a scalable, interoperable security standard that anticipates use of devices with improved security capabilities. This talk focuses on the near-term roadmap for OIC security: interfaces, protocols, and objects. It also provides a conceptual explanation of OIC resource model, bootstrap, provisioning and lifecycle. Ned will highlight the OIC vision for IoT security, and identify several gaps and challenges yet to be addressed.

Speakers
NS

Ned Smith

Principal Security Architect, Intel
Ned Smith is an active contributor to the Open Connectivity Foundation (OCF) and chairs the Security, Privacy and Identity working group in the IPSO Alliance. He has several publications on topics that include trusted computing, full disk encryption, virtualization of trusted computing... Read More →


Monday March 23, 2015 10:30am - 11:20am
Ballroom Salon 5/6

2:00pm

IoTivity and Embedded Linux Support - Kishen Maloor, Intel
IoTivity is a new collaborative project, hosted at the Linux Foundation and sponsored by the Open Interconnect Consortium. Its goal is to facilitate interconnections across the billions of "things" to be on the Internet in coming years. A majority of these "things" would be low-power embedded devices. To satisfy their connectivity needs, IoTivity must support a variety of transmission media, such as WiFi, Bluetooth, Bluetooth LE, 6LoWPAN over 805.15.4, etc. This session will present an overview of IoTivity's current support for the Yocto Linux environment on embedded platforms, and how it allows us to be flexible for multiple purposes. It will also present how a developer can enable IoTivity on Yocto and make modifications.

Speakers
avatar for Kishen Maloor

Kishen Maloor

Senior Software Engineer, Intel Corporation
Kishen Maloor is a Senior Software Engineer at the Intel Open Source Technology Center. He is currently the architect, lead developer and maintainer of the IoTivity-Constrained project for embedded IoT based on standards by the Open Connectivity Foundation (OCF). He has a diverse... Read More →


Monday March 23, 2015 2:00pm - 2:50pm
Ballroom Salon 5/6

3:00pm

The OpenDOF Project - An Open Distributed Object Framework For The IoT - Bryant Eastham, Panasonic
The OpenDOF Project provides a secure, open-source framework for easily building distributed, interoperable systems that include devices, gateways, and cloud services for the Internet of Things. With a consistent, flexible object model these systems include data collection as well as remote control.

This presentation will briefly discuss the history of the project, which has been incubated inside Panasonic for the past 10 years. The architecture, security and object model will be covered using examples in Java, C, and C#.

Finally, we will show a live demonstration of the technology using audience participation against a cloud server, and share open-source SDKs and temporary cloud accounts with the audience.

Monday March 23, 2015 3:00pm - 3:50pm
Ballroom Salon 5/6

4:20pm

Ready-Made Recipes to Add Security and Data - Dominig ar Foll, Intel
The Internet of Things (IoT) is growing fast and opens large opportunities to embedded Linux. Unfortunately traditional embedded Linux has been weak when it comes to security, private data protection and complex connectivities enabling. Importing Tizen security and connectivity models with Yocto layers enable to benefit from a long experience based on Mobiles, TV and Automotives. We will start by explaining what is Tizen architecture and how it provides Security and Connectivity facilities on top of a base Linux. We will then show how Yocto and Tizen-meta can be used to create embedded devices which benefit from several years of work done by the Tizen community. In particular we will review : - the mandatory access control enabling in an embedded device - the enforcement of good behavior by applications - resource access control - connectivity layers - Adding Apps after image creation.

Speakers
avatar for Dominig ar Foll

Dominig ar Foll

Lead Software Architect, Intel Open Source
Dominig Ar Foll (Dominique Le Foll) holds a Master degree in Computer Science from the French School ESAT in Paris. He started as a research engineer for ten years before joining the Telecom Industry. Dominig has also won several patents in Europe, US and Asia. He currently works... Read More →


Monday March 23, 2015 4:20pm - 5:10pm
Ballroom Salon 5/6

5:20pm

Getting Started with AllJoyn - Ivan R. Judson, Microsoft
AllJoyn is a M2M and M2H api layer that runs over multiple transports and enables not only standard IoT scenarios like command and control and telemetry, but also smarter M2M interactions -- coordinated responses of a home to an activity or stimulus. In this presentation, Ivan Judson, will give an in depth view of AllJoyn -- already shipping as part of the Linino embedded Linux distribution and present in an increasing number of consumer devices. He will show not only what AllJoyn is, but how to get started working with AllJoyn to build the IoT on the embedded linux platform.

Speakers
avatar for Ivan Judson

Ivan Judson

Engineer, Microsoft
Ivan R. Judson is a Senior Engineer in the Partner Catalyst team at Microsoft. While at Argonne National Laboratory he built high performance computing systems, large format projection displays, and advanced collaborative workspaces. At Montana State University he taught undergraduate... Read More →


Monday March 23, 2015 5:20pm - 6:10pm
Ballroom Salon 5/6
 
Tuesday, March 24
 

9:00am

A Scalable, Cloud-based Device Reprogramming Architecture - James Simister, Panasonic
Device reprogramming includes such things as general updates to the software, bug fixes, enhancements, or adding functionality to the device. Reprogramming platforms require the ability to scale resources, to provide quick response times, and to maintain data security. Maintaining a permanent infrastructure is expensive, particularly when you consider that these reprogramming events are infrequent over the life to the device. This presentation shows a platform based on Panasonic's IoT platform, but includes guidelines and techniques that are generally applicable.

Speakers
avatar for James Simister

James Simister

Director of Consulting Services, Panasonic
James Simister graduated from the University of Utah with a Bachelor of Science in Computer Science . His professional career in software engineering spans a number of areas of computing, including networking, security, systems architecture, embedded devices, cloud computing, library... Read More →


Tuesday March 24, 2015 9:00am - 9:50am
Ballroom Salon 5/6

10:00am

Building IoT systems with openHAB - Matt Porter, Konsulko
openHAB is an open source IoT and home automation framework. In this session, Matt Porter will present the architecture of openHAB with attention to the current feature set and what is involved to extend it for new IoT applications. Matt will present several detailed examples of sensors and controls that are deployed using openHAB, standard protocol bindings, and low cost community boards.

Speakers
avatar for Matt Porter

Matt Porter

CTO, Konsulko Group
Matt Porter has been a Linux user for over 25 years and is the CTO of Konsulko Group. At Konsulko, he works on design and development of embedded systems incorporating a variety of FOSS components. He enjoys contributing to many projects such as the Linux kernel and OpenEmbedded... Read More →


Tuesday March 24, 2015 10:00am - 10:50am
Ballroom Salon 5/6

11:20am

Security Architecture in the IOT Age - Stephen Arnold, VCT Labs
Modern embedded Linux systems are now normally networked into a larger system, taking advantage of Linux's strength in networking. Unfortunately, embedded engineers all too often fail to spend enough time understanding and mitigating security risks faced by networked devices; recent CVE summaries for popular Linux home routers provide some glaring examples of insufficient attention to security. Today it is critical that embedded engineers increase their attention to security while developing products, rather than merely reacting to specific exploits discovered after release. A good starting point is to learn and apply security architecture best practices that have been documented over the years by system architects/engineers using a modern "system of systems" approach and the latest NIST standards, guidance, and risk management framework.

Speakers
avatar for Stephen Arnold

Stephen Arnold

Principal Scientist, VCT Labs, Inc.
Steve is Principal Scientist at VCT Labs, and is also an open source developer (Gentoo / Yocto) and engineering consultant, educator/mentor, mainly into open source hardware, software, development/process solutions, embedded-to-server, cybersecurity, education/training, business... Read More →


Tuesday March 24, 2015 11:20am - 12:10pm
Ballroom Salon 5/6

3:25pm

Linux for Microcontrollers: From Marginal to Mainstream - Vitaly Wool, Softprise Consulting OU
The story of a DRAM-less Linux-operated microcontroller delivered at ELC a year ago, which came as a surprise for many, wouldn't be that surprising now. However, there are some important updates to share: moving to mainline-aligned 3.x baseline, compiling out VM-specific code, optimizing kernel XIP, and the last but not the least, starting to use picoTCP kernel networking stack.

Some size and performance benchmarks will also be presented, along with the Linux demo on the DRAM-less microcontroller board.

Speakers
VW

Vitaly Wool

Staff Consultant, Interstate Labs / Konsulko Group
Vitaly Wool, Senior Developer and Linux enthusiast, graduated M.Sc. in Computer Science from St. Petersburg State Univ. in 2002, worked for starters with real-time OSes as VxWorks and RTEMS mostly for PowerPC platforms. Vitaly moved to Moscow in 2003 where he started to work on embedded... Read More →


Tuesday March 24, 2015 3:25pm - 4:15pm
Ballroom Salon 5/6

4:25pm

Sigrok: Adventures in Integrating a Power-Measurement Device - Bartosz Golaszewski, BayLibre
Sigrok is a young and dynamically developing project aiming at creating a portable, cross-platform, Free/Libre/Open-Source signal analysis software suite that supports various device types (e.g. logic analyzers, oscilloscopes, and many more). ACME (Another Cute Measurement Equipment) by BayLibre is an initiave for an Open-Source Power Measurement Standard Solution. Sigrok has been chosen as ACME's user-space interface and has been since integrated with the project. After a brief introduction to ACME, this presentation will focus on the practical approach we took when implementing the libsigrok driver for ACME. We'll cover Sigrok's general architecture, usage of the API and its features and pitfalls, and some advices on how other companies can easily integrate their own products with sigrok - all this from a sigrok-newcomer's point-of-view.

Speakers
avatar for Bartosz Golaszewski

Bartosz Golaszewski

Embedded Linux Engineer, BayLibre
Bartosz Golaszewski has over 8 years of engineering experience in the embedded systems domain ranging from low-level, real-time operating systems, through the linux kernel to user-space programs and libraries. He has worked on international projects in a broad range of fields: bleeding... Read More →


Tuesday March 24, 2015 4:25pm - 5:15pm
Ballroom Salon 5/6

5:25pm

Real Time Linux Scheduling Performance Comparison - Vince Bridgers, Altera
Real-time scheduling performance can be critical for particular applications. It’s very important to know the application’s performance requirements and to know if the real-time characteristics of Real Time Linux can meet those requirements. This presentation goes through a specific example of forming a characteristic workload, specifying the way the workload is generated, developing methods for collecting quantitative data for comparison, collecting the data and comparing the results. After seeing this presentation, a developer will be able to perform the same steps in order to have confidence that real-time Linux can meet their specific performance requirements. 

Speakers

Tuesday March 24, 2015 5:25pm - 6:15pm
Ballroom Salon 5/6