© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation 06.06.2006 Niklas Salmela Supervisor:

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Networks & Components Discuss the components required for successful communications Explain the purpose of communications software Identify various sending.
Prepared By Naieem Khan & Ummiya Rahman Presentation On.
Applicability of Instant Messaging in the Military Command and Control Systems Author: Juha Vermaja Superviser: Jorma Jormakka Instructor: Marko Luoma,
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
Module CSY3021 Network Planning and Programming RD-CSY /09 1.
Remote Viewing Setup DVR & IP Video Devices
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Presented by Serge Kpan LTEC Network Systems Administration 1.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Wi-Fi Structures.
Router Configuration for Home Security: Forward your Ports Presenter: Steve Harris SCTE Director Advanced Network Technologies Program Development.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Networking Components Chad Benedict – LTEC
NetComm Wireless Transparent Bridge Mode Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
Networking Components
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
Router. Introduction A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
1 NAT Network Address Translation Motivation for NAT To solve the insufficient problem of IP addresses IPv6 –All software and hardware need to be updated.
Common Devices Used In Computer Networks
Portable SSH Brian Minton EKU, Dept. of Technology, CEN/CET)‏
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
Network Components and their functions By Travis Halsell LTEC 4550 – 020.
CONFIDENTIAL 1. 2 Designing the Intelligent Energy Gateway 2009 CONFIDENTIAL.
Secure Wireless Home Networks Area 2 SIR Presentation Nov. 18, 2004 Dean Steichen Br. 8.
Basic Network Gear Created by Alex Schatz. Hub A hub is a very basic internetworking device. Hubs connect multiple machines together and allow them to.
A Pervasive Architectural Framework for Providing Remote Medical Treatment Author:D. Vassis, P. Belsis, C.Skourlas,G.Pantziou 1.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Components of wireless LAN & Its connection to the Internet
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Network Components By Kagan Strayer. Network Components This presentation will cover various network components and their functions. The components that.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
Welcome to Early Bird Class
Introduction to Computing Slides By ADEELA MUSTAFA.
Networking Components William Isakson LTEC 4550 October 7, 2012 Module 3.
Networking Components Assignment 3 Corbin Watkins.
DCS230 Centralized or Decentralized Data Transfer Prof. Nalini Venkatasubramanian -Myung Guk Lee -YunHo Huh -Abhinav.
Chapter 1-4 Home Networking. Introduction Setting up a home network is probably one of the first networks that the student sets up. This is an exciting.
Industrial Security Router LAN/WAN-Router (IE-SR-2GT-LAN) LAN/UMTS/3G-Router (IE-SR-2GT-UMTS-3G)
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NUR IZZATI BINTI AHMED AZMAN TSK 1.
Model: DS-600 5x 10/100/1000Mbps Ethernet Port Centralized WLAN management and Access Point Discovery Manages up to 50 APs with access setting control.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Networks and Security Great Demo
MUHAMAD FAIZ NUR BIN ROSLI TSK2 TSS 3293 Wireless Network security.
WIRELESS GATEWAYS FOR HOME USE AND ENTERPRISE USE NOR HANANI BINTI SAHARUDIN TSK 1.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
FIREWALLS By k.shivakumar 08k81f0025. CONTENTS Introduction. What is firewall? Hardware vs. software firewalls. Working of a software firewalls. Firewall.
INTERNET PROTOCOL TELEVISION (IP-TV)
Fundamentals of Information Systems, Sixth Edition
Understanding Programming Mobile Web
Configure Instruction
Instructor Materials Chapter 6: VLANs
CONNECTING TO THE INTERNET
INTERNET PROTOCOL TELEVISION (IP-TV)
Routing and Switching Essentials v6.0
* Essential Network Security Book Slides.
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

© Siemens 2006 All Rights Reserved 1 Challenges and Limitations in a Back-End Controlled SmartHome Thesis Work Presentation Niklas Salmela Supervisor: Prof. Jorma Virtamo Instructor: M.Sc. Heikki Loukojärvi

© Siemens 2006 All Rights Reserved 2 Contents  Introduction  What is a Smart House?  Back-end controlled SmartHome  Challenges  Conclusions

© Siemens 2006 All Rights Reserved 3 Introduction  New Internet based services are appearing (VoD, IPTV, VoIP, etc.)  Peoples need for security is rising  Researches show that the interest for “Smart Houses” is increasing  A ”normal” Smart House contain mostly functionalities which address home security and home automation  In a back-end controlled SmartHome there can further be included Internet based services

© Siemens 2006 All Rights Reserved 4 What is a Smart House?  There is not a single definition of a Smart House  A “smart device” does not make a Smart House  Interaction between smart devices is common in most of the definitions of a Smart House  Common services in Smart Houses:  Home Automation  Home Control  Home Security  Home Surveillance  Usually controlled by external keypads or touch screens, in some cases by a PC in the house

© Siemens 2006 All Rights Reserved 5 What is a Smart House? (cont.)  The local commands may be transmitted with any appropriate protocol, either wirelessly or by wires  For home automation KNX is the most used standard, another (simple) one is X10 power line communication  For home security RF communication is popular

© Siemens 2006 All Rights Reserved 6 Back-end controlled SmartHome  A back-end controlled SmartHome is a Smart House that is connected to the Internet  To get full functionality the connection should be an always on, broadband connection  All the functionalities of an ordinary Smart House stay the same  In the basic case no further services are introduced, the added value comes from the remote access

© Siemens 2006 All Rights Reserved 7 Back-end controlled SmartHome (cont.)  Back-end servers allow remote control and monitoring of the SmartHome  Possible with any Internet capable device (mobile phone, PDA, PC, STB, etc.)

© Siemens 2006 All Rights Reserved 8 Back-end controlled SmartHome (cont.)  The use of the SmartHome via the back-end is through a portal page, which contains the different services available at the moment  The look & feel should be the same regardless of the device used to access  Restricted version for mobile phones without browsers

© Siemens 2006 All Rights Reserved 9 Challenges  Some devices in the home might generate high amounts of network traffic, e.g. a network camera  The current situation with broadband speeds do not allow for this  Until the connection speeds change, we have to change the behavior of the cameras  By changing the compression level  By limiting the frames per second

© Siemens 2006 All Rights Reserved 10 Challenges (cont.)  Making the SmartHome back-end controlled => SmartHome must be accessible from the Internet  The gateway performs a port mapping, e.g.  The requests to the gateways WAN IP on port 1234 will be forwarded to the security  The requests to the gateways WAN IP on port 4321 will be forwarded to the surveillance Security Camera Gateway (NAT) Private IP Addresses Public IP Addresses Home Internet

© Siemens 2006 All Rights Reserved 11 Challenges (cont.)  Port mapping creates security issues as we cannot know who accesses the equipment. Especially critical in security and surveillance services  The equipment has password protection in itself, but is this enough?  Weak/default passwords a real hazard  The access must be restricted  Requires not yet common features from the gateway  Source IP filtering in the port mapping => devices behind the NAT only accessible from a single (or a set of) IP address(es)  The use of VPN in the connection between the back-end and the home. Secure, but requires much from the Back- end and from the home gateway (e.g. VPN and VLAN)

© Siemens 2006 All Rights Reserved 12 Conclusions  The services can already be implemented  The bandwidth will not be a problem much longer, speeds are constantly increasing  Biggest problems are in making the connections secure  Between the home and back-end  Between the user and back-end  No single solution is yet decided  Much depends on the future of home gateways

© Siemens 2006 All Rights Reserved 13 Questions? Thank you!