Embedded Computing Design March 2014
Total Page:16
File Type:pdf, Size:1020Kb
March 2014 VOLUME 12 #2 embedded-computing.com Special Internet of Things Issue PG. 25 M2M Connectivity: Using NOR and NAND flash memory The Smart & in M2M applications Connected Lifestyle pg. 10 The Smart & Connected Home Network The Smart & Connected City CLOUD The Smart & Connected Automobile PLUS Software Research RTOS in the cloud era: Review Revolution or Designing cool, evolution? energy-efficient pg. 14 mobile devices pg. 9 Industrial ARM® Single Board Computers High-Performance Graphics with Industrial I/O and Expansion -40° to +85°C Operating Temperature Designed for demanding applications and long- term availability, WinSystems’ SBC35-C398 single board computers feature Freescale i.MX 6 industrial application processors with options for expansion and customization. Features • ARM Cortex™-A9 Processors; Quad, Dual, or Single Core • Multiple Graphics Interfaces • Wide Range DC or PoE Power Input • Gigabit Ethernet with IEEE-1588™ • USB 2.0 Ports and USB On-The-Go • Dual FlexCAN Ports • Multiple Storage Options • Mini-PCIe and IO60 Expansion • Linux and Android™ Supported Call 817-274-7553 Ask about our product evaluation program. Learn more at www.WinSystems.com/ARME 715 Stadium Drive • Arlington, Texas 76011 Phone 817-274-7553 • FAX 817-548-1358 E-mail [email protected] WinSystems® is a registered trademark of WinSystems, Inc. Freescale and the Freescale logo are trademarks of Freescale Semiconductor, Inc., Reg. U.S. Pat. & Tm. Off . Scan this tag to Android is a trademark of Google Inc. The Android robot is reproduced from work read more about created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. our ARM SBCs. MARCH 2014 VOLUME 12 #2 embedded-computing.com |@embedded_mag | opsy.st/ECDLinkedIn The Smart & Connected Lifestyle Departments The Smart & Connected Home Tracking Trends 5 Rory Dear, Technical Contributor IoT security concerns Network IoT Insider The Smart & Connected City 7 Brandon Lewis, Assistant Managing Editor M2M protocols for the IoT rollout CLOUD The Smart & DIY Corner Connected Automobile 8 Monique DeVoe, Managing Editor Doing the IoT and wearables yourself Research Review 10 9 Monique DeVoe, Managing Editor Cover graphic courtesy of Micron Technology Designing cool, energy-efficient mobile devices Silicon Editor’s Web 32 Choice 34 Wire Using NOR and NAND flash memory in 10 M2M applications Special Features By Dan Craig, Micron Technology Internet of Things Companie to See Software 31 Resources 33 at EE Live! RTOS in the cloud era: Revolution or evolution? 14 By Curt Schwaderer, Editorial Director App exclusive Content Strategies Download the Embedded Computing Design app: Distributed cloud storage infrastructure advances iTunes: itun.es/iS67MQ 22 with x86 architecture By Kahlye Lee, Silvercor Kindle Fire: opsy.st/kindlefireamaz Internet of Things M2M and embedded processing save lives in Positive Train Control IoT Gateway By Thomas Catalino, Critical Link, LLC 25 Q&A with Guido Jouret, Cisco 7 rules for designing wearable devices IoT Networks By Kevin Kitagawa, Imagination Technologies 27 Q&A with Douglas Gourlay, Arista Networks Securely connecting IoT devices with Real-Time IoT Edge Operating Systems 29 Q&A with Rajeev Kumar, Freescale Q&A with John Blevins, LynuxWorks IoT Insights Q&As with ARM, Intel, and Wind River 4 Embedded Computing Design | March 2014 TRACKING TRENDS IoT security concerns By Rory Dear, Technical Contributor [email protected] The latest buzzword for the naturally increasing connectivity of The ramifications of such device exploitations can quickly today’s electronic devices, the Internet of Things (IoT), postu- become devastating in critical embedded systems, though I lates an “always on” interconnected communication future. In hope the severity of these realizations will push the industry to the U.S. today there are more IoT devices than people, more address this critical issue. than 100 million more, in fact! With so much focus on what’s right about this approach, it would be foolish to ignore what Recently in the UK a BBC news article brought widespread could go very, very wrong. guffawing with the headline “Fridge sends spam e-mails” (pun intended), but it has usefully raised awareness. The spam adver- Applications span from those where Internet connectivity is an tiser is perhaps the most obvious antagonist, looking to hijack obvious step with an equally obvious benefit, such as a smart any available medium as a proxy to spam e-mail accounts – or TV that streams content on-demand or a remote device that perhaps even directly, an Internet-enabled e-whiteboard would controls central heating, to more visionary applications, such be the ideal place to force perhaps illicit advertising 24/7 in a as intelligent refrigerators or Internet-enabled pacemakers family home. that enable hospitals to monitor outpatients without physical attendance. Internet-enabled home automation, particularly involving access control and CCTV, would be hugely attractive for per- By placing increasing trust in machines, especially those inter- haps more traditional criminality, with a new “smart” edge. acting with each other, the consequences of exploitation rise Even without a specific security setup, the integrated webcam substantially. Computer viruses have for years varied in destruc- increasingly found in smart televisions would be very inter- tivity, from rendering a home desktop PC unusable to tempo- esting viewing to a whole host of candidates. rarily bringing down entire financial systems; but with the IoT we are handing technology the power to cause much more An additional angle bandied about is the potential for govern- damage – systemic and even physical. mental exploitation: Another recent UK press article reports the app game Angry Birds has been exploited by UK and U.S. There are two layers to the security concern. First is the ability security agencies to gain personal information. Intriguingly, sales for unscrupulous code to gain control and negatively affect of Nineteen Eighty-Four, the Orwellian social dystopian vision operation. The device itself is unlikely to have a sophisticated soared 7,000 percent following the 2013 mass surveillance leaks. encryption capability, or perhaps it does but isn’t enabled by default – wireless-enabled printers, whilst supporting WPA I wonder if a progressively paranoid public will take increasing encryption, are almost exclusively left unprotected by slothful interest in the potential of IoT devices to enable authoritarian consumers. In apartment blocks, increasingly unprotected privacy invasions, perhaps by the previously mentioned smart wireless printers are “hacked” to send amusing images to their TV or smart glasses, enabling a live view into an individual’s life. unwitting owners, though of course this is but the most minor example of a potential IoT security lapse. Whilst unlikely in the Western world, historically less demo- cratic governments have taken a very keen interest in what The second layer is the “trusty” wireless router, which is effec- literature its citizens are reading. Already Internet-enabled, tively directly connected to any local IoT device and is famous could a compromised e-book reveal anti-government reading for its pervious security. Firmware updates are designed to habits that land you in very hot water? Could your monitored patch security vulnerabilities, but manufacturers have little smartphone betraying your location at an undesirable event financial incentive to provide this ongoing service without a via GPS risk similar? workable funded security upgrade model. Where benevolent manufacturers do oblige, it’s rare these can be pushed and rely Perhaps I’m getting a little ahead of myself, or maybe these are on a consumer checking a website speculatively for updates. concerns for other countries, not ours. What is true today is the If no ill effects have been noted, why would they? If it’s been entire chain of devices must be secure, and it is the manufac- compromised – it’s probably too late! turer’s ongoing responsibility to ensure that is so. www.embedded-computing.com 5 AdvertiserAdvertiser Information Index 15 ACCES I/O Products, Inc. – USB embedded ECD Editorial/Production Staff I/O solutions Curt Schwaderer, Editorial Director Rory Dear, Technical Contributor 33 AdaCore Technologies – GNAT Pro and [email protected] [email protected] SPARK Pro Monique DeVoe, Managing Editor David Diomede, Creative Services Director 36 AMD – Technology with a human touch [email protected] [email protected] Brandon Lewis, Assistant Managing Editor 35 American Portwell Technology – Portwell [email protected] empowers intelligent solutions 13 Anaren – Connect your embedded application Sales Group to millions of Bluetooth SMART Ready phones 3 Annapolis Micro Systems, Inc. – Tom Varcie, Senior Account Manager Asia-Pacific Sales WILDSTAR OpenVPX ecosystem [email protected] Elvi Lee, Account Manager Rebecca Barker, Strategic Account Manager [email protected] 24 ATP Electronics – Industrial-grade DRAM and [email protected] Regional Sales Managers flash products Eric Henry, Strategic Account Manager Barbara Quinlan, Southwest 11 COMMELL Systems Corporation – Intel 4th [email protected] [email protected] generation Core SBC Ann Jesse, Strategic Account Manager Denis Seger, Southern California [email protected] 33 Dolphin Interconnect Solutions