Category Archives: Resources

Ready to wear sensor hubs


Majeed Ahmad explores the latest sensor hub offerings for wearable devices.  


By Majeed Ahmad

Atmel has beefed up its sensor hub offerings for wearable devices with SAM D20 Cortex M0+ microcontroller core to add more functionality and further lower the power bar for battery-operated devices. The SAM D20 MCUs offer ultra-low power through a patented power-saving technique called “Event System” that allows peripherals to communicate directly with each other without involving the CPU.

Atmel is part of the group of chipmakers that use low-power MCUs for sensor management as opposed to incorporating low-power core within the application processor. According to market research firm IHS Technology, Atmel is the leading sensor hub device supplier with 32 percent market share.

Sensor hubs are semiconductor devices that carry out sensor processing tasks — like sensor fusion and sensor calibration — through an array of software algorithms and subsequently transform sensor data into app-ready information for smartphones, tablets and wearable devices. Sensor hubs combine inputs from multiple sensors and sensor types including motion sensors — such as accelerometers, magnetometers and gyroscopes — and environmental sensors that provide light level, color, temperature, pressure, humidity, and many other inputs.

Atmel has supplied MCU-centric sensor hub solutions for a number of smartphones. Take China’s fourth largest smartphone maker, Coolpad, which has been using Atmel’s low-power MCU to offload sensor management tasks from handset’s main processor. However, while still busy in supplying sensor hub chips for smartphones and tablets, Atmel is looking at the next sensor-laden frontier: wearable devices.

SAM D20 Evaluation Kit

SAM D20 Evaluation Kit

Wearable devices are becoming the epitome of always-on sensor systems as they mirror and enhance cool smartphone apps like location and transport, activity and gesture monitoring, and voice command operation in far more portable manner. At the same time, however, always-on sensor ecosystem within connected wearables requires sensor hubs to interpret and combine multiple types of sensing—motion, sound and face—to enable context, motion and gesture solutions for devices like smartwatch.

Sensor hubs within wearable environment should be able to manage robust context awareness, motion detection, and gesture recognition demands. Wearable application developers are going to write all kinds of apps such as tap-to-walk and optical gesture. And, for sensor hubs, that means a lot more processing work and a requirement for greater accuracy.

So, the low-power demand is crucial in wearable devices given that sensor hubs would have to process a lot more sensor data at a lot lower power budget compared to smartphones and tablets. That’s why Atmel is pushing the power envelope for connected wearables through SAM D20 Cortex M0+ cores that offload the application processor from sensor-related tasks.

LifeQ’s sensor module for connected wearables.

LifeQ’s sensor module for connected wearables

The SAM D20 devices have two software-selectable sleep modes: idle and standby. In idle mode, the CPU is stopped while all other functions can be kept running. In standby mode, all clocks and functions are stopped except those selected to continue running.

Moreover, SAM D20 microcontroller supports SleepWalking, a feature that allows the peripheral to wake up from sleep based on predefined conditions. It allows the CPU to wake up only when needed — for instance, when a threshold is crossed or a result is ready.

The SAM D20 Cortex M0+ core offers the peripheral flexibility through a serial communication module (SERCOM) that is fully software-configurable to handle I2C, USART/UART and SPI communications. Furthermore, it offers memory densities ranging from 16KB to 256KB to give designers the option to determine how much memory they will require in sleep mode to achieve better power efficiency.

Atmel’s sensor hub solutions support Android and Windows operating systems as well as real-time operating system (RTOS) software. The San Jose–based chipmaker has also partnered with sensor fusion software and application providers including Hillcrest Labs and Sensor Platforms. In fact, Hillcrest is providing sensor hub software for China’s Coolpad, which is using Atmel’s low-power MCU for sensor data management.

The company has also signed partnership deals with major sensor manufacturers — including Bosch, Intersil, Kionix, Memsic and Sensirion — to streamline and accelerate design process for OEMs and ensure quick and seamless product integration.

Atmel-Sensor-Hub-Software-from-Hillcrest-Labs-Block-Diagram

Atmel Sensor Hub Software from Hillcrest Labs


 

This post has been republished with permission from SemiWiki.com, where Majeed Ahmad is a featured blogger. It first appeared there on February 4, 2015.  Majeed Ahmad is author of books Smartphone: Mobile Revolution at the Crossroads of Communications, Computing and Consumer Electronics and The Next Web of 50 Billion Devices: Mobile Internet’s Past, Present and Future. Majeed has a background in Engineering MS, former EE Times Editor in Chief (Asia), Writer for EC Magazine, Author of SmartPhone, Nokia’s SMART Phone.

 

These 20+ everyday objects have gone from mundane to magical


The wizarding world of Harry Potter won’t be the only place you’ll find enchanted objects. 


According to MIT Media Lab researcher David Rose, the term “enchanted object” is used to describe any everyday object with extraordinary functions.

“We are now standing at the precipice of the next transformative development: the Internet of Things. Soon, connected technology will be embedded in hundreds of everyday objects we already use: our cars, wallets, watches, umbrellas, even our trash cans. These objects will respond to our needs, come to know us, and learn to think on our behalf.”

enchantedobjectsposter

Entitled “Enchanted Objects: Design, Human Desire, and the Internet of Things,” Rose’s latest book depicts the blueprint for a better (or shall we say ‘smarter’) future, where efficient solutions come hand in hand with technology that delights our senses. Not only are these innovative things fun and alluring, they may hold the key to better satisfying our needs and improving our lives.

“The big lesson here for companies is that they need to embrace and start designing for this world of enchanted objects,” Rose said in a recent BI:Tech interview. “It will mean a key change for how we interact with technology, and it’s a great opportunity for all of these traditional product companies.”

As we prepare for this embedded future where microcontrollers will give once-ordinary objects super “powers,” we’ve decided to explore some of the items currently in existence today. From a pill bottle that can alert you when you’ve skipped your medication to an umbrella that says whether it’ll rain, these gadgets provide us with a glimpse into smarter society — one where fairy tale enchantment becomes a reality.

And, with this state of ambience ever so close, our friends at element14 are challenging hobbyists, designers and engineers alike to add some magic and mystic back into the realm of everyday objects using the new Atmel | SMART SAMA5D4 Xplained Ultra, Arduino Yún (ATmega32U4) and Arduino Uno (ATmega328), among several other kits.

“The Internet of Things may hit a roadblock: namely, the lack of secure communications between objects and individuals could lead to a situation in which data is being shared without explicit consent and exploited for malicious purposes,” element14 adds. “Therefore any Internet of Things challenge we will undertake in the future will have a security aspect: we will want to see that appropriate security measures have been built into the solutions. Bonus points will be given for clear demonstrations of this in the finished project.”

They couldn’t be more correct. When the world around us becomes increasingly more connected, each and every thing will also need to be secure. Without security, there is no way to trust that the authenticity of things and integrity of its data. Due to the drive for bigger data, the cloud and smart communicating, things are becoming ambient; and, because those things all require security, security itself is becoming ambient as well. Fortunately, as Atmel’s resident security expert Bill Boldt explains, there’s an easy way to spread protection to each of the nodes: CryptoAuthentication.

These so-called enchanted objects are broken down into six caterogies, each based upon human desires. The segments include omniscience (the desire to know all), telepathy (the desire for human connection), safekeeping (the desire to protect), immortality (the desire to be healthy), teleportation (the desire to move effortlessly) and expression (the desire to make).

Like Arthur C. Clarke once said, “Any sufficiently advanced technology is indistinguishable from magic.”

Vitality GlowCap

the-vitality-glowcap-reminds-you-to-take-your-medications-by-lighting-up-making-chirping-sounds-and-eventually-sending-you-a-text-message-you-can-share-your-medication-data-with-a-remote-loved-one-a-professional-caregiver-and-your-pharmacy

Always seem to forget to take that pill in the morning or before bed? This smart cap will remind you to take your medications by lighting up, making chirping sounds, and eventually sending you a text message. You can share your medication data with a remote loved one, a professional caregiver, and even your pharmacy. No more calling to refill those prescriptions!

The Ambient Umbrella

the-ambient-umbrella-has-a-handle-that-will-glow-if-snow-or-rain-is-in-the-forecast-reminding-you-to-grab-it-on-your-way-out-the-door

What if your umbrella had a handle that would glow if snow or rain was in the forecast? You’ll never forget to grab it on your way out the door again!

Google Latitude Doorbell

the-google-latitude-doorbell-created-at-the-mit-media-lab-chimes-a-tune-when-a-family-member-is-approaching-the-house-each-family-member-has-their-own-tune.jpg

Created at the MIT Media Lab, the Google Latitude Doorbell chimes a tune when a family member is approaching the house. Each family member has their own tune. Have some fun with it: Imagine setting it to play “Master of the House” from Les Misérables as you approached the door, or the Jaws theme song for your mother-in-law.

The Ambient Orb

the-ambient-orb-tracks-real-time-data-for-the-stock-market-pollen-count-traffic-congestion-and-more-and-glows-specific-colors-to-let-you-know-if-the-data-looks-good-or-bad

When you think of David Rose and ambient object, this “magical” orb is often times the first thing that pops into mind. This device tracks real-time data for the stock market, pollen count, traffic congestion, and more, and glows specific colors to let you know if the data looks good or bad.

SunSprite

sunsprite-is-a-small-clip-that-measures-the-amount-of-bright-light-you-take-in-during-the-day-in-order-to-help-you-improve-your-energy-levels-sleep-cycle-mood-and-more.jpg

Feel like you’re walking on sunshine? This small will let you know whether you’re actually taking in enough bright light during your day, in order to help you improve your energy levels, sleep cycle, mood, and so much more.

Energy Joule

the-energy-joule-tracks-energy-prices-by-glowing-red-if-prices-are-high-yellow-if-prices-are-average-and-green-if-prices-are-low

Let’s face it, energy bills are the worst — especially those living in extremely cold climates in the winter and warm in the summer. To better help you save a buck or two, the Energy Joule can track energy costs by glowing red if prices are high, yellow if prices are average, and green if prices are low.

The Facebook Coffee Table

CoffeeTable

‘Like!’ This innovation is bringing coffee talk into the digital era. The incredibly social-savvy table listens to your conversations and displays photos from your Facebook page whenever they are appropriate to the conversation. Think Mark Zuckerberg meets Minority Report.

MemoMi

memomi-is-a-mirror-that-records-the-outfits-you-try-on-so-you-can-compare-them-and-decide-what-to-buy-or-wear.jpg

Never quite sure as to which outfit to buy? Ladies, you’re in luck. This smart mirror records the outfits you try on, so you can compare them and decide what to buy or wear. Never have to go back and forth again.

Amazon Trash Can

the-amazon-trash-can-created-at-the-mit-media-lab-scans-any-objects-youre-throwing-away-and-automatically-re-orders-them-from-amazon.jpg

Forget to replace the toilet paper? Run out of milk? Need laundry detergent? This trash can can now scans any object you’re disposing and automatically reorder it from Amazon.

Pandora Chair

the-pandora-chair-created-at-the-mit-media-lab-plays-different-music-based-on-your-level-of-incline-if-youre-sitting-upright-the-chair-will-play-upbeat-music-if-youre-leaning-back-it-will-play-something-peaceful.jpg

This gives a whole new meaning to ‘musical chairs!’ The Pandora Chair is designed to play music based on your level of incline. Envision the possibilities: Sit back, relax and enjoy the tunes of the caribbean. Or, sit upright, intensely focus on your work while listening to some “Eye of the Tiger.”

Vessyl

vessyl-is-a-smart-cup-that-identifies-what-kind-of-liquid-youre-drinking-and-lets-you-know-how-many-calories-and-how-much-sugar-fat-protein-sodium-and-caffeine-are-in-that-drink.jpg

As our days get too busy, it can quickly become too difficult to manage our liquid intake. Luckily, a smart cup can do that for you — it knows what kind of fluid you’re drinking and track how many calories and how much sugar, fat, protein, sodium, and caffeine are in that beverage.

The Skype Cabinet

the-skype-cabinet-created-at-the-mit-media-lab-allows-you-to-simply-open-a-wooden-door-and-connect-to-a-friend-or-loved-one-via-skype-a-proximity-sensor-allows-the-cabinet-to-glow-when-a-friend-is-available.jpg

Tired of always having to grab the computer, flip it open and sign into Skype? Thanks to this project from MIT Media Lab, all you have to do is simply open a wooden door to telconnect with a friend or loved one. No more setup, bad lighting, or those irritating headphones.

TrakDot

trakdot-is-a-luggage-tracker-that-you-place-inside-your-suitcase-you-can-then-see-the-location-of-your-luggage-by-using-the-trakdot-app-which-connects-to-the-tracking-device.jpg

NOTHING, we repeat NOTHING is worse than losing your luggage while traveling. This smart luggage tracker can slide right inside your suitcase and inform you of its whereabouts using its companion app, which connects to the tracking device.

Energy Clock

Clock

Are the culprit in your household’s excessive energy consumption? This innovative clock shares real-time feedback on the amount of energy your home is using. It learns your consumption habits, then offers some subtle feedback on how you’re tracking against yourself.

Goji Smart Lock

20130603114032-Side_image

As we inch closer to a Jetsons-like future, of course there will be smart locks! Easily lock and unlock your door with your smartphone, after snapping pictures of visitors at your door and automatically sending real-time picture alerts to your device.

Nabaztag

Nabaztag-rabbit-an-internet-rabbit

Yes, this is exactly what it looks like: a WiFi-enabled rabbit. Unlike Peter Cottontail, this device tells you the time, a recap of the week, RSS news feeds, a report on the air quality or traffic, an MP3 alarm clock, a weather forecast, a stock ticker, and even e-mail alerts.

Good Night Lamp

tmp566261011321978880

In essence, the Good Night Lamp is a physical social network. The lamps, which come in a set of two, work in unison. Turning on the larger one not only emits light but triggers on the little one as well. This connectivity allows you to keep in touch with people all over the world without having to pick up the phone.

Tagg Dog Collar

pet_tracker

Tagg is a GPS device that attaches to the collar of your dog. The system enables pet owners to define a safe zone around there home and instantly receive text and email alerts when the pet leaves that zone. What’s more, the wearable also monitors their activity and fitness by measuring the amount of activity in their day.

Mimo Baby Shirt

20131216-restdevices_mimo-0334-copy

Boston-based startup Rest Devices has developed a smart baby onesie for parents. Founded by a group of former MIT students, Mimo monitors the respiration, skin temperature, body position, sleeping and activity levels of infants. Meaning, those with newborns will soon no longer have to worry about getting up and frequently checking on the baby throughout the night, instead only when necessary.

Nest Thermostat

nest-thermostat-auto-away

The Nest Thermostat doesn’t need to be programmed, and is equipped to learn and remember your temperature habits. Meaning, the device turns itself down when you’re away to help save energy and can change the temperature from anywhere using your smartphone, tablet or laptop.

HAPI Fork

specs-5forks

The smart fork, which was introduced at last year’s CES, uses electronic sensors to monitor your eating habits. Designed by HAPILABS, the ARM Cortex-M0 embedded utensil tracks the number of bites, intake speed as well as notifies you to step away from the dinner plate. This information is then uploaded via USB or Bluetooth to an online dashboard to analyze your progress.

Narrative Camera

camera_narrative-clip-teardown-02

The future for anyone who wants to tell their own story has never looked brighter. That is because of the Atmel | SMART SAM9G25 powered Narrative Clip — a tiny, automatic 5-megapixel camera paired with an app that offers users access to a “photographic memory” which is both searchable and shareable. Clip it onto your shirt and let it snap away, recording all your daily activities in 30-second increments.

Feeling inspired? Head over to element14’s official contest page here to get started. The grand prize winner will receive a trip to World Maker Faire 2015 in New York.

An open-source PLC to control the Internet of Things


Controllino is the first software open-source, Arduino-compatible PLC. 


Designed by the SG-Tronic team, the Controllino is an open-source programmable logic controller (PLC) built around Atmel’s ATmega328 and ATmega2560 microcontrollers (MCUs). Recently funded on Kickstarter, the Arduino-compatible PLC allows Makers to produce and control their next Internet of Things project, ranging from industrial to home automation applications.

photo-1024x768

“When I was at electronic school, I would have loved Arduino. But back then, microcontroller programming wasn’t that easy. When I became aware of Arduino, I thought… What a great idea for young people and those who are not hardcore microcontroller programmers,” creator Marco Riedesser explained. “The only problem with Arduino is [that] when you don’t really know so much about electronic hardware, driving more than a LED can become difficult. And using an Arduino board in a professional project or even a product that you want to sell is quasi impossible if you want to get certification.”

Now fully UL and CE-certified, Makers can begin creating and actually shipping gadgets such as drones, home appliances, or any other electronic project that comes to mind. The Atmel powered PLC is currently being presented in three models: Mini, Maxi and Mega.

“I had to repair the coffee machine for my brother-in-law. I thought it would be easy to use Arduino but there was nothing on the market that could handle switching high voltage and high current. So I thought I had to come forward with a product,” Riedesser revealed to TechCrunch earlier this year.

automatic-input-voltage-range-selection

All Controllino PLCs are equipped with an internal RTC using SPI, which can be switched on/off and allow for the use of SPI for other purposes via pin header. With built-in processor contact, Makers have a direct link to a number of boards (like Arduino). All pins are also 4000V ESD protected. What’s more, both the Controllino Maxi and Mega let users select between internal RTC and Ethernet using SPI, as well as turn it off so they can use the SPI for other purposes via pin header.

The versatile device works in altitudes up to 2,000m above sea level, in temperatures ranging between 5°C to 55°C, and in maximum relative humidity 80% for temperatures up to 31°C decreasing linearly to 50% relative humidity at 55°C. Each Controllino features an automatic input voltage range selection. This internal function changes voltage dividers ratio on the processor input, and enables the use of one input for analog and digital and for 12V or 24V input voltage range without user action. In addition, the Controllino’s main supply voltage fluctuates up to ±10% of the nominal voltage

e3ea5b4bf1a713af6f0f90899c84d908_large

Key Mini specs:

  • MCU: ATmega328 MCU
  • RTC
  • Clock speed: 16 MHz
  • 1x RS232 interface
  • 1x SPI interface
  • 6x relay outputs (230V/6A)
  • 8x digital outputs (2A @12V or 24V)
  • 8x analog/digital inputs
  • 10A input current max

8cb6d192e0aa469906eeb2b889ec8146_large

Key Maxi specs:

  • MCU: ATmega2560
  • RTC
  • Clock speed: 16 MHz
  • Ethernet connection
  • 2x RS232 interface
  • 1x RS485 interface
  • 1x I2C interface
  • 1x SPI interface
  • 10x relay outputs (230V/6A)
  • 12x digital outputs ( 2A @12V or 24V)
  • 12x analog/digital inputs
  • 20A input current max

00abfb9840ea9be26fcda783c07e395d_large-1

Key Mega specs:

  • MCU: ATmega2560 MCU
  • RTC
  • Clock speed: 16 MHz
  • Ethernet connection
  • 2x RS232 interface
  • 1x RS485 interface
  • 1x I2C interface
  • 1x SPI interface
  • 16x relay outputs (230V/6A)
  • 24x analog/digital inputs
  • 12x digital outputs – high side switch (2A @12V or 24V)
  • 12x digital outputs – half-bridge (2A @12V or 24V)
  • 20A input current max

Interested in learning more? You can check out Controllino’s official page here. Those wishing to purchase the Mini, Maxi and Mega can now do so for € 119.00, € 199.00 and € 269.00, respectively.

What’s ahead this year in digital insecurity?


Here’s a closer look at the top 10 cyber security predictions for 2015.


In 2014 worries about security went from a simple “meh” to “WTF!” Not only did high-profile attacks get sensational media coverage, but those incidents led to a pivotal judicial ruling that corporations can be sued for data breaches. And as hard as it is to believe, 2015 will only get worse because attack surfaces are expanding as mobile BYOD policies overtake enterprises, cloud services spread, and a growing number of IoT networks get rolled out. Add m-commerce, e-banking, and mobile payments to the questionable tradition of lax credit card security infrastructure in the U.S. and you get a perfect storm for cybercrime.

In fact, 92% of attacks across the range of segments come from nine basic sources (seen in the diagram below), according to Verizon. More numerous and sophisticated cyber crimes are anticipated for this year and beyond.

z1

 1. More companies to get “Sony’d”

2014 saw the release of highly-evolved threats from criminals that in the past only came from governments, electronic armies and defense firms. A wide-range of targets included organizations in retail, entertainment, finance, healthcare, industrial, military, among countless other industries. As a repeat offender, Sony is now the cyber-victim poster child, and the term “Sony’d” has become a verb meaning digital security incompetence. Perhaps Sony’s motto should be changed from “make.believe.” to “make.believe.security.” Just saying!

Prior to 2014, companies on a wholesale basis tended to simply deny cyber vulnerabilities. However, a string of higher profile data breaches — such as Sony, Heartbleed, Poodle, Shellshock, Russian Cyber-vor, Home Depot, Target, PF Chang’s, eBay, etc. — have changed all of that. Denial is dead, but confusion and about what to do is rampant.

2. Embedded insecurity rising

Computing naturally segregates into embedded systems and humans sitting in front of screens.  Embedded systems are processor-based subsystems that are “embedded” into other machines or bigger systems.  Examples are routers, industrial controls, avionics, automotive engine and in-cabin systems, medical diagnostics, white goods, consumer electronics, smart weapons, and countless others.  Embedded security was not a big deal until the IoT emerged, which will lead to billions of smart, communicating nodes.  15 to more than 20 billion IoT nodes are being forecast by 2020, which will create a gigantic attack platform and make security paramount.

IoT Installed

A recent study by HP revealed that 70% of interconnected (IoT) devices have serious vulnerabilities to attacks. The devices they investigated consisted of “things” like cloud-connected TVs, smart thermostats and electronic door locks.

“The current state of Internet of Things security seems to take all the vulnerabilities from existing spaces — network security, application security, mobile security and Internet-connected devices — and combine them into a new, even more insecure space, which is troubling,” HP’s Daniel Miessler stated.

Issues HP identified ranged from weak passwords, to lack of encryption, to poor interfaces, to troubling firmware, to unencrypted updating protocols. Other notable findings included:

  • 60% of devices were subject to weak credentials
  • 90% collected personal data
  • 80% did not use passwords or used very weak passwords
  • 70% of cloud connected mobile devices allowed access to user accounts
  • 70% of devices were unencrypted

Investigators at the Black Hat Conference demonstrated serious security flaws in home automation systems. At DEFCON, investigators hacked NFC-based payment systems showing that passwords and account data was vulnerable. They also revealed that the doors of a Tesla car could be hacked to open while in motion. Nice! Other attacks were exploited on smart TVs, Boxee TV devices, smartphone biometric systems, routers, IP cameras, smart meters, healthcare devices, SCADA (supervisory, control and data acquisition) devices, engine control units, and some wearables. Even simple USB firmware was proven to be highly vulnerable… “Bad USB.”

These are just the tip of the embedded insecurity iceberg. Under the surface is the entire Dark Net which adds even more treacherousness. Security companies like Symmantic have identified home automation as a likely early IoT attack point. That is not surprising because home automation will be an early adopter of IoT technologies, after all. In-house appliances also represent an attractive attack surface as more firmware is contained in smart TVs, set top boxes, white goods, and routers that also communicate. Node-to-node connectivity security extends to industrial settings as well.

Tools like Shodan, which is the Google of embedded systems, make it very easy for hackers to get into the things in the IoT.  CNN recently called Shodan the scariest search engine on the Internet. You can see why since everything that is connected is now accessible. Clearly strong security, including hardware-based crypto elements, is paramount.

 3. More storms from the cloud

z5

It became clear in 2014 that cloud services such as iCloud, GoogleDrive, DropBox and others were rather large targets because they are replete with sensitive data (just ask Jennifer Lawrence). The cloud is starting to look like the technological Typhoid Mary that can spread viruses, malware, ransomware, rootkits, and other bad things around the world. As we know by now, the key to security is how well cryptographic keys are stored.   Heartbleed taught us that, so utilizing new technologies and more secure approaches to maintain and control cryptographic keys will accelerate in 2015 to address endemic cloud exposure. Look for more use of hardware-based key storage.

4. Cyber warfare breaks out

eBay, PF Chang’s, Home Depot, Sony, JP Morgan, and Target are well-known names on the cybercrime blotter, and things will just get worse as cyber armies go on the attack. North Korea’s special cyber units, the Syrian Electronic Army, the Iranian Cyber Army (ICA), and Unit 61398 of the People’s Liberation Army of China are high profile examples of cyber-armies that are hostile to Western interests. Every country now seems to have a cyber-army units to conduct asymmetric warfare. (These groups are even adopting logos, with eagles appearing to be a very popular motif.)

z6

Cyber warfare is attractive because government-built malware is cheap, accessible, and covert, and thus highly efficient. Researchers have estimated that 87% of cyber-attacks on companies are state-affiliated, 11% by organized crime, 1% by competitors, and another 1% by former employees. Long story short, cyber war is real and it has already been waged against non-state commercial actors such as Sony. It won’t stop there.

 5. Cybercrime mobilizes

According to security researchers, mobile will become an increasingly attractive target for hackers. Fifteen million mobile devices are infected with malware according to a report by Alcatel-Lucent’s Kindsight Security Labs. Malvertising is rampant on untrusted app stores and ransomware is being attached to virtual currencies. Easily acquired malware generation kits and source code make it extremely easy to target mobile devices. Malicious apps take advantage of the Webkit plugin and gain control over application data which hands credentials, bank account, and email details over to hackers. What’s more, online banking malware is also spreading. 2014 presented ZeuS, which stole data, and VAWTRAK that hit online banking customers in Japan.

Even two-factor authentication measures that banks employ have recently been breached using schemes, such as Operation Emmental. Emmental is the real name of Swiss cheese, which of course is full of holes just like the banking systems’ security mechanisms.  Emmental uses fake mobile apps and Domain Name System (DNS) changers to launch mobile phishing attacks to get at online  banking  accounts and steal identities. Some researchers believe that cybercriminals will increasingly use such sophisticated attacks to make illegal equity front running and short selling scams.

z7

6. Growing electronic payments tantalize attackers

Apple Pay could be a land mine just waiting to explode due to NFC’s susceptibility to hacking. Google Wallet is an example of what can happen when a malicious app is granted NFC privileges making it capable of stealing account information and money. M-commerce schemes like WeChat could be another big potential target.

z8

E-payments are growing and with that so will the attacks on mobile devices using schemes ranging from FakeID to master key. Master key is an exploit kit similar to blackhole exploit kit that specifically targets mobile, where FakeID allows malicious apps to impersonate legitimate apps that allow access to sensitive data without triggering suspicion.

7. Health records represent a cyber-crime gold mine

Electronic Health Records (EHR) are now mandatory in the U.S. and a vast amount of personal data is being collected and stored as never before. Because information is money, thieves will go where the information is (to paraphrase Willie Sutton). Health records are considered higher value in the hacking underground than stolen credit card data. Criminals throughout both the U.S. and UK are now specializing in health record hacking. In fact, the U.S. Identity Theft Resource Center reported 720 major data breaches during 2014 with 42% of those being health records.

8. Targeted attacks increase

Targeted attacks, also known as Advanced Persistent Threats (APTs), are very frightening due to their stealthy nature. The main differences between APTs and traditional cyber-attacks are target selection, silence, and duration of attack. According to research company APTnotes, the number of attacks by year went from 3 in 2010 to 14 in 2012 to 53 in 2014. APT targets are carefully selected, in contrast to traditional attacks that use any available corporate targets. The goal is to get in quietly and stay unnoticed for long periods of time, as seen in the famous APT attack that victimized the networking company Nortel. Chinese spyware was present on Nortel’s systems for almost ten years without being detected and drained the company of valuable intellectual property and other information. Now that’s persistent!

9. Laws and regulations try to play catch up

A number of cyber security laws are being considered in the U.S. including the National Cybersecurity Protection Act of 2014, which advocates the sharing of cybersecurity information with the private sector, provide technical assistance and incident response to companies and federal agencies.   Another one to note is the Federal Information Security Modernization Act of 2014 that is designed to better protect federal agencies from cyber-attacks. A third is the Border Patrol Agent Pay Reform Act of 2013 to recruit and retain cyber professionals who are in high demand. Additionally, there is the Cybersecurity Workforce Assessment Act, which aims to enhance the readiness, capacity, training, recruitment, and retention of the cybersecurity workforce. President Obama stated that wants a 30-day deadline for notices and a revised “Consumer Privacy Bill of Rights.”

One of the more interesting and intelligent recommendations came from the FDA, who issued guidelines for wireless medical device security to ensure hackers could not interfere with things such as implanted pacemakers and defibrillators. This notion was is part stimulated by worry about Dick Cheney’s pacemaker being hacked. In fact countermeasures were installed by on the device by Cheney’s surgeon. More regulation of health data and equipment is expected in 2015.

“Security — or the lack of it — will largely determine the success or failure of widespread adoption of internet-connected devices,” the FTC Commissioner recently shared in an article. The FTC also released a report entitled, “Privacy & Security in a Connected World.”

10. Hardware-based security may change the game

According to respected market researcher Gartner, all roads to the digital future lead through security. At this point, who can really argue with that statement? Manufacturers and service providers are seeing the seriousness of cyber-danger and are starting to integrate security at every connectivity level. Crypto element integrated circuits with hardware-based key storage are starting to be employed for that. Furthermore, these crypto elements are a kind of silver bullet given that they easily and instantly add the strongest type of security possible (i.e. protected hardware-based key storage) to IoT endpoints and embedded systems. This is a powerful concept whose fundamental value is only starting to be recognized.

IoT Node Chart 1

Crypto elements contain cryptographic engines to efficiently handle crypto functions such as hashing, sign-verify, ECDSA, key agreement (e.g.  ECDH), authentication (symmetric or asymmetric), encryption/decryption, message authentication coding (MAC), run crypto algorithms (e.g. elliptic curve cryptography, AES, SHA) and many other functions.

The hardware key storage plus crypto engine combination in a single device makes it simple, ultra-secure, tiny, and inexpensive to add robust security. Recent crypto element products offer ECDH for key agreement and ECDSA for authentication. Adding a device with both of these powerful capabilities to any system with a microprocessor that can run encryption algorithms (such as AES) brings all three pillars of security (confidentiality, data integrity and authentication) into play.

2014-Crypto-Security-at-our-Core-Atmel-Has-You-Covered

With security rising in significance as attack platforms increase in size and threats become more sophisticated, it is good to know that solutions are already available to ensure that digital systems are not only smart and connected, but robustly secured by hardware key storage. This could be the one of the biggest stories in security going forward.

11 smart crowdfunding campaigns you may want to back this week


Every Friday, we’re taking a look at some of the smartest, most innovative projects that have launched on Kickstarter and Indiegogo in the last seven days. 


EasyPlug Air

98c17711458c795d445830b680995256_large

This shield enables Makers to wirelessly connect their Arduino in under a minute. inXus interactive is currently seeking $20,000 on Kickstarter.

Akolyt

eghrujypjp7khjnthdlm

This smart sensor plugs right into your car and gathers important data enhancing both safety and convenience. Drust is currently seeking €30,000 on Indiegogo.

Hive

47b1d58d7386b98bc5c832e1904be73d_large

This automation system wants to make smart home devices, security, and entertainment accessible for everyone. Hive is currently seeking $100,000 on Kickstarter.

Safeti

20150121133623-safeti_multi

This personal security device is designed to keep you safe in any situation by tracking your exact location and guiding you through any emergency situation. Safeti is currently seeking $60,000 on Indiegogo.

Qmote

Qmote-Internet-Remote1

Access your smart devices with just a click of this water-resistant remote. Qblinks is currently seeking $20,000 on Kickstarter.

Luna

luna-smart-mattress-in-bed-970x646-c

This mattress cover will make any bed smart, ranging from intelligently managing temperature to tracking your sleep, and integrate with your existing connected home devices. Luna is currently seeking $100,000 on Indiegogo.

EinScan-S

photo-1024x768-1

The EinScan-S aims to serve as the world’s first high-resolution desktop 3D scanner that gives Makers industrial-grade resolutions. The team is currently seeking $50,000 on Kickstarter.

Coolbox

coolbox-toolbox

A complete reinvention of the toolbox, this latest product packs all of the classic storage compartments a handyman would expect — along with several next-gen features. Coolbox, in partnership with Project Copilot, is currently seeking $50,000.

Wishbone

32c1e759f94d842fee018990e2710cfe_large

Read your baby’s temperature with the world’s smallest, easiest-to-use and smartest thermometer. Joywing is currently seeking $20,000 on Kickstarter.

Flicks

Big

This portable boombox projector wants you to bring the party anywhere you go with big-time video and sound. Dashbon is currently seeking $50,000 on Indiegogo.

Glow

63f28cc890e68a6915142a6fe1eca038_large

The world’s first smart headphones glow with laser light while pulsing to the beat of your music or rhythm of your heart. Glow is currently seeking $100,000 on Kickstarter.

Lockitron unveils the $99 Bolt


Lock or unlock your door simply by walking up to it with a phone in your pocket.


Lockitron, one of the first companies to launch a smart home product on Kickstarter way back in 2012, has returned with a new product, Bolt. The sub-$100 connected lock has taken a more user-friendly, less expensive approach to its $300 crowdfunded predecessor. Having ceased delivery of the earlier device, the company will soon ship its original backers the next-gen deadbolt which was designed with eliminating Wi-Fi and improving functionality (better battery life, slimmer form factor and easier installation) in mind.

lockitron-bolt

“In the fall of last year, we came to an impasse for the crowdfunded Lockitron. While ramping up production and nearing shipment to our 10,000th backer, we knew that without significant changes to our existing suppliers we could never make our way through the immense backlog at an acceptable speed,” the company shared in its latest blog post.

The team, led by co-founders Cameron Robertson and Paul Gerhardt, have decided to revert to their original concept of replacing the deadbolt altogether, instead of trying to devise an all-in-one, universal gadget that could fit over most locks. “Basically, as long as we could break the setup down into 20 tiny, doable steps, it didn’t really matter that it required removing the old deadbolt,” Robertson told TechCrunch in a recent interview.

Unlike devices which replace only a portion of a lock and require precise calibration and alignment, Bolt works out of the box without any adjustments or adapters. Installation typically only requires changing six screws and about 10 minutes using the included screwdriver. Thanks to what the team calls “Key Match,” the unit can be adapted to work with the most common keyways, ranging from Schlage and Kwikset five and six-pin variants. In other words, in just about all cases, renters can have Bolt keyed to match their existing lock, granting continued access by those with existing metal keys.

Lock

The kit is comprised of two components: Bolt and Bridge. The Bolt connects to your smartphone via BLE, allowing you to unlock the door as you approach a house, apartment or rental property using its accompanying mobile app. What this means is that you can access your lock from anywhere, so that you can open the door for guests arriving while you’re still at work or pet-sitters stopping by while you’re on vacation. While Bolt serves as a Bluetooth-enabled replacement lock that instantly shares access to friends and family, Bridge plugs into a wall and connects to the web. This gives users the ability to control their lock, send data and log visitors remotely, as well as send a notification when a child unlocks the door from their phone.

It’s no surprise that the lock’s vibrant community is comprised of Makers, developers and engineers, which have demonstrated a number of innovative ways of opening doors using wearable technology. In fact, some Pebble wearers were able to gain entry with merely a fist bump. The company also reveals that Bolt includes a number of popular features as the originally-crowdfunding, megaAVR based Lockitron.

ATmegea

According to its team, the Lockitron Bolt will come in two editions. The preview edition is expected to begin shipping in March, while the production variant of Lockitron Bolt is slated for late spring and will come in varaity of finishes to best match your home’s decor. Interested? Hurry over to  the company’s official page here.

JACK is the first guitar device to stream using Wi-Fi


Designed for guitarists by guitars, this smart adapter lets you leave the wires and cords behind. 


Attention all rockers, your jam session is about to get a whole heck of a lot cooler… and smarter. Typically speaking, guitar “jacks” refer to a style of connector used to link one piece of audio equipment to another. And, while wireless systems for a gig or sesh are nothing new, Scotland-based startup Ingenious Audio is hoping to give in-home and on-stage music recording its biggest breakthrough in the last 50 years.

743aa3457184916171b270f291bdeaed_large

The aptly named JACK is the world’s first guitar device to connect to any Wi-Fi-enabled gadget such as a PC, tablet or smartphone. The ARM9-based unit works by wirelessly relaying an electric guitar’s output to an amp without musicians having to worry about radio interference or annoying Bluetooth latency. JACK’s customized system provides best-in-class bandwidth with no compression, and responsive high-resolution audio over a secure long-range connection to an entire lineup of devices. Those looking to wirelessly play some guitar riffs through an amp will need a pair of devices, one plugged into the guitar’s jack and the other connected to the amp.

Measuring just 3.9″ x 1.9″ x 0.78” in size, the 3-ounce device is the perfect tagalong and can easily fit inside any bag, trunk, or pocket for that matter. As its creators note, JACK eliminates the need to ensure a venue has a wireless network already in place or mess around with complicated login credentials at home. Instead, users just plug the adapter into any guitar, amp or pedal, and instantly go wireless. This is because it creates its own encrypted Wi-Fi network with click-to-connect simplicity. JACK not only enables a quick and easy setup at gigs, its wireless capabilities allow for a mess-free home or dorm, and rock out on-the-road by plugging in a set of headphones.

5208df81c4b948f0e1998ef73ef8da24_large

“JACK is the missing link for modern guitarist – everyone today expects anything they buy to be wireless and connectable, whether it’s a camera, phone, media player and they do all their recording, editing and sharing on PCs and phones. JACK bridges that gap. JACK provides studio quality uncompressed 24-bit real time audio. Wireless guitar kits exist today, but to date none have been able to use the high data rate Wi-Fi system. Using Wi-Fi means JACK can connect to the five billion Wi-Fi enabled devices out there,” the team explains.

In fact, JACK’s patent-pending technology is believed to be nearly 13 times quicker than conventional Bluetooth and about three times faster than compressed low-latency Bluetooth. The unit also works with companion software with an iOS, MacOS and Android apps in the works. Once the tunes are in the computer, users have the ability to record, edit, upload, and when complete, share songs to the world.

JACK-The-WiFi-Guitar-Cable-3

Musicians interested in this next-gen, smart device will be happy to learn that team has launched a Kickstarter campaign, where it has already surpassed its £20,000 goal. To learn more or get your jack kit (which will run about $280), head on over to its official page here.

Video: Rob Valiton discusses the future of automotive at CES 2015


The car of the future could have a curved center display with tons of real estate for driver information and entertainment. 


It’s no surprise that automotive technology has emerged as an integral component of our digital lifestyle, as more and more consumers are looking to bring their mobile devices seamlessly into their vehicles. During CES 2015, ARMdevices.net had the chance to catch up with Rob Valiton, Atmel Senior Vice President & General Manager, to discuss the connected car — most notably, the next generation of infotainment user interfaces.

10929927_1014246888592481_347934713395376436_n

With up to a hundred million lines of code, at least 30 MCU-controlled devices — and some with as many as 100 — the vehicle is the ideal application to bring smart, connected devices in the era of the Internet of Things (IoT). Not only will these automobiles be packed with futuristic functionality ranging from navigation and parking assistance to diagnosis and road conditions, they will become much more intuitive and integrated with smartphone-like interfaces. In order to provide this, the car of tomorrow will feature a curved center console display offering a large amount of real estate for information to drivers. And, the newly-announced AvantCar 2.0 will make this possible.

Luckily, the AvantCar 2.0 brings advanced connectivity into the vehicle through an advanced HMI console connected to a concept car highlighting car access, car networking, MCUs, audio-over-Ethernet, MHL support and security technologies. Focusing on user requirements, the fully-functional console concept boasts curved touchscreens using maXTouch touchscreen controllers and XSense flexible touch sensors, as well as Atmel’s QTouch with proximity sensing, and LIN networking for ambient lighting controls.

Internet of Things value creation requires net neutrality


Kaivan Karimi, Atmel VP and GM of Wireless Solutions, explains how neutrality is the only way to bring next-gen service providers to the IoT table.


While it has now become the common understanding of the technology community that the Internet of Things (IoT) will impact every aspect of our lives and create massive value by improving processes and conserving resources, no one has started pointing at specifically how this whole “value creation” will happen, and how will it get managed? When GE talks about the addition of over $17-$30T dollars to the GDP of the world because of IoT, from where does that money come? Is it just because we connect a bunch of gadgets inside our homes to talk to each other? Really?

From my perspective, true IoT value is created through managed services, where a new generation of service providers will come to the table and offer differentiated services that do not exist today. Since everyone can, in one way or another, relate to “in-house IoT,” the best home automation has become the battle ground d’jour. Here’s an old cartoon that I had used a few years back to point at new generation of service providers that soon will be servicing your connected home.

Slide1

In order for this vision to take place, it requires common open systems that can be leveraged by the new generation of service providers, regardless of who initially installed those boxes and gadgets. The same goes for the “connectivity pipes” linking the home to these services providers in the cloud, which also needs to be open for access by these new service providers. In other words, broadband access “pipes” need to become open and shared between the service providers other than the current ISP sitting at the table. This isn’t any different than today one using HuluPlus services to what movies, except instead of HuluPlus pumping content to your television, it will be your new “home automation” service provider monitoring your connected home and smart gadgets to reduce your energy consumption, improve your quality of life, alert you of an appliance malfunction before it happens, in addition to a number of other useful services that’ll surely save you money and improve your quality of life (create value).

In advance of the new service providers coming to the table, current ISP providers decided that they can block and favor certain broadband traffic, over other ones. Those of you who have attended my IDTechEx classes or other conferences know, that for most part, there will be minimal traffic going to the cloud for command and control types of applications. So, it is not about the amount of traffic, but rather pipe owners (ISP providers) wanting a bigger piece of the pie by denying the new services providers equal access. In reality, an open system with the ability for new content and service providers offering new services without asking for permission from ISP gate keepers will enable the innovation that we are and will be experiencing in a bigger way in the future.

Slide2

For this, we need regulatory safeguards to protect against the risk that ISP/broadband providers favoring some Internet traffic over others, and become self appointed gate keepers. At the same time, heavy-handed regulations can stifle innovation in other ways and actually interfere with legitimate network management. Subsequently, there must be a balance and both sides need to come to the table to establish that equilibrium. This requires the U.S. government to force ISP/Broadband providers to play ball. From an IoT perspective, that’s what net neutrality debate is all about.

On November 10, 2014, President Barack Obama called on the Federal Communications Commission (FCC) to reclassify broadband Internet access service under Title II of the Communications Act. To decode the language, it means to reclassify broadband as a utility (note that nowadays, in most markets you have choices on whom your electricity service provider can be and are not stuck with just one provider like the old days). When I was at CES a few weeks ago I heard that FCC Chairman Tom Wheeler had announced that his office will vote on an official proposal for net neutrality on February 26th.

“We’re going to circulate it to the commissioners on February 5th and vote on it February 26th,” Wheeler told CEA President Gary Shapiro in a public interview. When Shapiro asked him about Title II, Wheeler talked about the need to find a balance between the allowances for innovation, while incentivizing the ISPs’ continued investment in broadband. In the past, the FCC has also addressed hybrid approaches to this problem.

“We’re going to propose rules that say that no blocking, no throttling, paid prioritization, all that list of issues, and that there is a yardstick against which behavior should be measured,” Wheeler added at CES. “And that yardstick is ‘just and reasonable.’”

Let’s go back to early 2000 and that generation of smartphones on closed platforms, as well as the few apps that were supported. When Apple opened iOS for apps developers, a whole new world of applications were created. After Google opened Android further in 2008, we’ve ended up with over 130,000 applications, with lots of folks hooked on them. In fact, just a few years ago, if you would have asked them about those apps, they would have no idea that they would be hooked on them upon using them. I am not asking that we need over 130,000 service providers at your home, but we definitely need more than the single broadband provider we currently have.

The bottom line is that net neutrality is the only way to open up the existing “closed system,” and to bring a new generation of IoT service providers to the table. This will lead to more choices, which will spur more innovations, which in turn will bring in more service providers. As a result, the cycle of IoT innovation will progress and create tangible value through new service provisions.

Interested in reading more insightful pieces from Kaivan Karimi? You can do so here.

Securing the Internet of Streams


The evolution of IoT is now at a point that it will require a comprehensively redesigned approach to security threats in order to ensure its continuous growth and expansion.


The relentless flow of new product introductions keeps fueling the gargantuan estimates of billions of connected communicating computing devices which is projected to imminently make the Internet of Things ubiquitous within every facet of our lives. The IoT has been portrayed as the key enabler of a smarter world with compelling use cases that cut across a wide array of both personal and industrial ecosystems.

A great description is that the IoT is the global nervous system. This could be a pun, as IoT is increasingly producing troubling headlines. Stories abound, detailing security breaches that sound as if they were taken from a sci-fi movie, from hacked security cameras to a spamming refrigerator.

IoT-Global-Nervous-System

Figure 1 (Source: re-workblog.tumblr.com)

The explosive growth of the IoT coincides with an alarming increase in reported rates of identity theft and hacker attacks on everyday gadgets and appliances. Security researchers have easily established the feasibility of attacks against TVs, cars, security cameras, and medical equipment. There is much more than stolen money on the line if these types of attacks are carried out. The evidence demonstrates that existing security mechanisms are insufficient or ill-suited to address the risks inherent with the ubiquitous deployment of the IoT.

The need for a new original approach

The traditional approach to security, applied to both consumer and business domains, is one of separation – preventing those who are considered bad actors from accessing devices and networks. However, the dynamic topology of the network environments in which IoT applications are deployed largely invalidates the separation approach, making it both impractical and overly rigid. For example, with BYOD (bring-your-own-device), enterprises struggle to apply traditional security schemes to devices that may have been compromised while outside the perimeter firewall.

Many IoT devices self-configure and run autonomously. User interaction is limited to the devices’ operations, and there are no means to change security parameters. These devices rely on the manufacturer to implement security, both in the hardware and the software.

Moreover, manufacturers have to consider the broader ecosystem, not just their own products. For example, recent research has revealed inherent security flaws in USB memory stick controller hardware and firmware. Users must be concerned not only about the safety of the data on the memory stick, but if the memory stick controller itself has somehow been compromised.

To thwart similar issues, IoT device vendors are rushing to upgrade their product portfolios to low-power, high-performance microcontrollers that include firmware upgrade and data encryption mechanisms.

Atmel's IoT Layered Security Solutions

Figure 2 (Source: Atmel’s White Paper: Integrating the Internet of Things)

In the hyper-connected world of IoT, security breaches will gravitate towards the weakest link in the chain. It will become very hard to maintain the confidence that any particular device, user, application or service maintains its integrity; instead, the assumption will be that things will occasionally break for a variety of reasons, over which there is little control and no method for fixing. As a result, IoT will force the adoption of new concepts for the establishment of trust.

A smarter network combined

In the loosely coupled world of IoT, security issues are driving a need for greater collaboration among the vendors participating in the ecosystem, recognizing their respective core competencies. Hardware vendors make devices smarter. Software developers make applications and services smarter. The connective tissue, the global Internet with its myriad of communication transports and protocols, is tasked with carrying the data that powers IoT. This begs the question – can the network be made an enabler of IoT security by becoming smarter in its own right?

Context is essential for identifying and handling security threats and is best understood at the application level, where the intent of information is processed. This points towards a higher-level communication framework for IoT – the Internet of Data Streams. This framework enables apps and services to view things as consumers and producers of data. It allows for descriptive representations of devices’ operational status and real-time detection of their presence or absence.

Elevating the functional value of the Internet, from a medium of communication to a network of data streams for IoT, would be highly beneficial to ease collaboration among the IoT ecosystem participants. The smarter network can provide apps and services with the ability to implement logic that detects things that break or misbehave, flagging them as suspect while ensuring graceful and consistent operation using the redundant resources.

InternetOfThingsHorizontal

For example, a smarter network can detect that a connected sensor stopped functioning (e.g. due to a denial of power attack, possibly triggered through some obscure security loophole) and allow the apps that depend on the sensor to provide uninterrupted service to users. Additionally, a network of data streams can foster a global industry of security-as-a-service solutions, which can, as an example, send real-time security alerts to app administrators and device manufacturers.

The evolution of IoT is now at a point that it will require a comprehensively redesigned approach to security threats in order to ensure its continuous growth and expansion. Addressing the surfaced issues from an ecosystem standpoint calls for apps, services and “things” to explicitly handle communication via a smarter data network, which has the promise of placing IoT in safer hands, courtesy of the Internet of Streams.