Summary of IoT Sessions at 2015 GSA Silicon Summit – Part I

Introduction:

This two-part article series summarizes the highlights, key points, and take-aways from the IoT tracks at the excellent GSA Silicon Summit, held April 15, 2015 at the Computer History Museum in Mt View, CA.

The Internet of Things (known as “IoT” or for Cisco, Qualcomm and others “IoE”) was the driving theme throughout this superb symposium. GSA says: “the IoT is driving the expectancy for ubiquitous connectivity and universal access to data, immersive technology is changing our expectations on how we interact with the physical and virtual worlds.”

The excellent GSA summit offered two intriguing IoT sessions this year. We review the morning IoT session in this article. Part II will summarize the afternoon IoT session.

The IoT and the Hyper-connected World:

  • Gregg Bartlett, SVP, Product Management Group, GLOBALFOUNDRIES
  • James Stansberry, SVP and GM, IoT Products, Silicon Labs
  • Rahul Patel, SVP and GM, Wireless Connectivity, Broadcom
  • Dr. Martin Scott, SVP and GM, Cryptography Research Division, Rambus

In the leadoff presentation, Gregg Bartlett opined that silicon technology will be an enabler of IoT innovation at the edge node. Areas to be improved include: reduced power consumption, cost, complexity, integration with other components, and security.

Gregg noted that the IoT already exists in many diverse market segments, such as: energy, home automation, healthcare, and factories. He said “the IoT demands continuation of Moore’s law” and offered a processing method called “fully depleted silicon on insulator” (ED-SOI) technology. Bartlett believes that ED-SOI could lead to breakthroughs in power, cost, and integration. “It’s ideal for IoT,” he added.


James Stanberry identified three critical issues for IoT in his talk titled Engineering the IoT:

  • Energy efficiency IoT device uses only 10% of the power of a cell phone yet must operate for 5 to 10 years
  • Connectivity- including WiFi (perhaps a low power version), Zigbee, BlueTooth, Thread (IP v6 addressable end nodes), 3G/LTE cellular, and proprietary wireless. 2.4GHz, 5GHz, and sub-GHz frequencies will all be used. (There’s also PoE and low cost Ethernet in connected cars)
  • Level of integration- an IoT SoC might include: multi-protocol radios, MCU, sensor interface, energy management, non-volatile memory (NVM) and mixed signal control.

Stanberry said we should expect many IoT technology advancements in 2015, including:

  • Dramatic reductions in energy consumption
  • Low power connectivity as standards gain traction, and
  • Introduction of IoT SoCs (this author believes that there will be many types of IoT SoCs, perhaps optimized for industry vertical markets)

Rahul Patel talked about Connecting Everything in Health Care, a vertical market where this author sees tremendous potential and power. Rahul defined three primary IoT markets:

  • Consumer
  • Industrial
  • Health care/medical

Medical includes: Clinical Health, Telemedicine, Biometric, Medical Devices, etc. Patel said that VC funding for connected health increased over 400% in the last four years. Please refer to the chart below.
Growth of medical devices in recent years.Notice that the leading segment for Connected Health VC funding has been big data/analytics and Rahul said that’s likely to continue in the future. He said that the intersection of IoT and big data/analytics would create new opportunities, citing body borne sensors and computing coupled with big data/analytics in the cloud (via software running on a compute server in a cloud resident data center).

IoT device requirements identified were:

  • Data/network security, encryption, authentication
  • Reliable, consistent across operations
  • Interoperability across open standards based devices (this includes minimal protocol stacks as well as the PHY/MAC for connectivity)
  • Compliance with regulatory bodies such as the FDA, NIC, FCC, FTC, etc.

Broadcom aims to be a major IoT player- not just at the end node, but also with analytics and “app ready” software (presumably for the cloud). Their emphasis, of course, will be on connectivity which Rahul said “will drive innovation like never before.” He cited security, reliability, standards driven, and regulatory compliance as key areas for innovation.

Summing up, Rahul said that:

  • The IoT value proposition (presumably for Broadcom) lies in data and wireless connectivity
  • Opportunities will inspire new technologies and business models
  • Creates a new paradigm, “Healthcare in a connected world”
The elements in the IoT end-to-end system.
The elements in the IoT end-to-end system.

During the Question and Answer portion of the panel, Rahul said that the key silicon issue for IoT is the integration of CMOS Non-Volatile Memory (NOT Flash!) with RF functionality. When asked why not Flash, he said, “it doesn’t scale to the small geometries needed for IoT.


Dr. Martin Scott’s talk was titled: Secure Root-of-Trust- Feature Management Provides Foundational Security for the IoT.

Dr. Scott says we don’t even have to wait for the 50B+ connected devices in 2020 to be aware of the huge IoT security problem, which is evident today in unprecedented security breaches at all levels: Data Center, network and “edge,” as well as device “end points.”

Martin noted that all endpoints are not created equal. “Obviously, a refrigerator isn’t analogous to critical national infrastructure such as a power grid or pumping station. Nevertheless, the security of any complex system is defined by its weakest link,” he explained. “Imagine if someone gained unauthorized access to a home WiFi network via a smart refrigerator or washing machine. Once on the network, an attacker could theoretically assume control of a wide range of sensitive devices and systems, including pacemakers, insulin pumps and even connected cars.”

Security at the endpoint should be of paramount concern to IoT device makers, systems integrators and users. If a system relies on software, says Scott, it is inherently hackable. In contrast, a hardware-based approach, such as one offered by Rambus’ CryptoManager, is one of the most secure ways to protect sensitive keys, data and infrastructure.

Of the three levels of security depicted in the graphic below, the highest level is silicon-based security integrated into the IoT endpoint device (as Intel and Freescale claim they’re also doing).

Different approaches to secure IoT endpoints.
Different approaches to secure IoT endpoints.

Dr. Scott made some very important statements regarding the importance of good IoT security:

“It’s important for us to address the inevitable security vulnerabilities that go along with the rapid deployment of smart edge nodes and sensors. According to IDC, 90% of all IT networks will have an IoT-based security breach within two years. To make matters worse, there is fresh motivation for those seeking IoT-related vulnerabilities…”

“Money, greed and the desire for power are some of the usual suspects, although there are also people who are interested in exploiting security vulnerabilities and causing national harm as a way to express an ideology. The good news? Silicon, in the form of a hardware-based root-of-trust, can go a long way in helping to secure the IoT.”

Dr Scott concluded with a very informative slide depicting security in silicon:

The foundation of trusted services is Silicon.

About GSA:

The Global Semiconductor Alliance (GSA) is the voice of the global semiconductor industry with nearly 400 member companies throughout 32 countries and representing over 75% of the industry revenues. GSA provides a neutral environment for semiconductor executives to meet and collaborate on ways to improve efficiencies and address industry wide topics and concerns.

Stay tuned for Part II –MEMS and Sensors, Shaping the Future of the IoT.

Author Alan Weissberger

Comments

6 responses to “Summary of IoT Sessions at 2015 GSA Silicon Summit – Part I”

  1. MP Divakar Avatar
    MP Divakar

    Good summary, thanks Alan. It is interesting to note that there was no mention made about sub-threshold voltage design for low power design in IoT SoC’s.

    Another point that seems to have been missed is the API support for the IoT SoC’s. Atmel for example is working on ‘cloud-ready’ SoC’s with API support for any tag/mote to be integrated into an IoT-cloud quickly.

    1. Alan Weissberger Avatar

      Thx MP. There was little discussion of IoT SoC technical aspects. Only that CMOS NVM was needed and the endpoint device had to use much less power than a cell phone, yet last many years longer.

      Atmel’s PM presentation will be covered in part II. One of the slides was titled: “The IoT Endpoints – A Natural Fit for Atmel MCUs,” but no mention of APIs.
      http://tinyurl.com/n7gggma

  2. Ken Pyle, Managing Editor Avatar

    Excellent overview of a very interesting conference, Alan. Looking forward to part 2.

    Interestingly, why you were at this conference, I was attending the IP Possibilities and a big theme of conversation was the NIST cybersecurity framework and how important it is for operators to start this process and to figure out where the vulnerabilities are in the critical infrastructure. The presentation from Dr. Scott would be valuable for these operators, as it addresses what needs to be done at the endpoints.

    Similarly, the IoT space for health care is exploding and service providers should be in a good position to create the secure networks necessary for the continued growth of this segment.

    1. Alan Weissberger Avatar

      Thx Ken. Many of the speakers talked about layered Security. In the PM IoT session, Atmel had a great diagram of that which I’ll include in Part II. However, the GE speaker didn’t really emphasize the nascent state of security for the Industrial Internet which can’t afford breaches for any critical infrastructure, e.g. a smart grid, electric power plant, water distribution & treatment plant, etc

  3. Basant Khaitan Avatar
    Basant Khaitan

    Alan provides a very informative summary of several key IoT issues. i believe there are no real show-stoppers in regards to key elements of enabling technologies. I am not convinced any breakthroughs are needed for integration of RF or NVMs or Security. What is of essence is to make the entire ecosystem work reliably and provide real solutions for consumers and enterprises. Combination of networked sensors and low cost computing can potentially change lives in both personal and professional sense.

  4. Alan Weissberger Avatar

    Dave Evans of Stringfly (Los Gatos, CA based start-up):
    “Today, almost all connected devices have their own apps. To get anything done, people have to jump from app to app to control disparate devices, creating a disconnected, rather than a seamless and even enjoyable experience. And because each solution must have its own ecosystem, there are no synergies that can be leveraged to bring down costs.”
    …………………………………………………………….
    Stringify’s seed round was led by led by Artis Ventures and OurCrowd, with unnamed other private investors participating. It said the funds will be used to build out the company’s engineering team and ramp up product development.
    http://www.bizjournals.com/sanjose/blog/techflash/2015/04/ciscos-former-crystal-baller-leaves-details-of-his.html

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.