Keynote Speaker – Vijay Anand
IoT: A Security for the Reliable Data
Vijay Anand is an Technology Director in Aricent and plays an strategic leadership role in R&D by building Middleware Frameworks / stacks / Enablers for Hi-Tech market Segments specfically on Automotive – Connected Car/ Connected MotorBike, Residential – Connected Home and Aerospace – Connected Aircraft (IFED & Avionics Communication Gateway). In this role, he oversees technology direction and innovation for “Consumer, Automotive, Enterprise and Aerospace” market verticals. He does research activities that drive the state-of-art in the design of next generation wireless technologies and along with his group, he builds Software Products (Netsnapper, Multimedia), creates Proof of-concepts, engage with OEM’s/ODM’s/Service Providers/Operators and publish papers in competitive conferences and journals for the research community. He has organized and chaired several technical sessions and gave tutorials on “Mobile Device Architecture: Present and Future”, “Digital Living Network Alliance”, “Fixed Mobile Convergence”, “Connected Car/Home”, “Connected City”, “IoT/IoV” at various International Conferences and symposia – WECON 2016, IoTA 2016, ICCVE 2015, WiSPNET, NTMS, NCC 2010, WPMC, CSI, IEEE Wi-MAX, ICEMC2, AICT & MAP. He is a sought after panellist, keynote speaker, and architect on next generation mobile terminals, Automotive and Consumer Electronic products.
He has been involved in several international Research projects related to Mobile communication, Consumer and Automotive segments. Vijay has 24+ years of experience and has Published, more than 17 Research Papers, 3 International Journals at various Wireless International Conferences – WTS, WWC, WWRF, IMSAA and COMSWARE and engaged academic Institutions for Research Projects. He is the author for the “Best-Paper and Outstanding Paper” award winning articles at IEEE/International conference.
Internet of Things (IoT) is a technology that can connect any devices to the Internet, it will encompass all manners of devices, from resource limited sensor, medical equipment, home automation, smart cities and transport systems as well as any smart devices that are operated by the user’s control. As smart device proliferates, so do risks of attacks. In Black Hat 2014 conference, the fact, “Everything can be hacked.? was reaffirmed, by hackers gathering in Las Vegas challenging the security of the Internet of Things and demonstrated the hacking against main IoT segments like *Connected/Smart Car, Connected/Smart Home and Aircraft*.
What should we take away from the announcements at Black Hat 2014? The IoT is the next giant leap in the Internet revolution as it strengthens its ability to gather, analyse and distribute data that becomes information and knowledge and we are still grappling with the security issues of yesteryear. The Internet of Things has great potential to change our life style. If we are to benefit from the wave of IoT devices, we need to provide the highest level of end-to-end security, all IoT communication channels need to be carefully thought through from a security standpoint, and proper security guidelines must be established and implemented for all connected devices.
IoT devices are often developed with low computing power as most of the tasks do not require much complex systems. Although VPNs are commonly associated with securing communications with Corporate/Business networks, they can be implemented on devices to safeguard machine-to-machine (M2M) communications and help to authenticate devices. By leveraging VPN, end devices communicate through a secure encrypted tunnel, which makes it much more difficult for an attacker to access an IoT device and breach a network. With VPN, a transparent network access is provided to IoT devices in addition to security advantages and it does not require any special hardware or special configurations on the IoT Device itself.
In this Keynote talk, we would present the Innovative product that address the top challenge in IoT by providing end-2-end Data Security along with additional features support like Data traffic optimization and seamless convergence with enabled security. It’s a client/server architecture with own complete management and analytics platform and the “Security” module of this product is an advanced VPN with innovative security features support of different encryption levels. It also provides protection of the data transfer tunnel between clients and server with constantly changing authentication keys: the “virtual fingerprint” and a fully integrated end-to-end firewall solution.
To conclude, Internet of Things is interesting and at the same time it poses threats to the data & the devices. All IoT communication channels & IoT device need to be carefully thought through from a security standpoint. Security should be considered as an important part of almost every IoT deployment.