Networking the Cloud for IoT – Pt. 1: IoT and the Government

NJVC Platform as a Service to Include Google Geospatial Services for NCOIC Geospatial Community Cloud Project in Support of Disaster Relief Efforts

By G C Network | July 9, 2013

CHANTILLY, Va., July 9, 2013 — NJVC® was selected by Network Centric Operations Industry Consortium (NCOIC) to provide the platform as a service (PaaS) element of a cloud-computing-based humanitarian assistance…

Fathers of Clouds – A Tribute

By G C Network | June 14, 2013

(A guest post from Mr. Ray Holloman, NJVC Digital Communications Manager ) For more than half a century, cloud computing has changed names more often than a Hollywood starlet. Utility…

CNBC Closing Bell: Bob Gourley on NSA Leaker

By G C Network | June 13, 2013

This is clearly off topic, but I couldn’t help myself!  Please take a moment to view this CNBC video where my good friend Bob Gourley addresses this important event. Good…

Guest Blog: Sequestration and the Cloud

By G C Network | May 30, 2013

(This post was provided by Praveen Asthana, Chief Marketing Office of Gravitant, a cloud service brokerage and management company) Sequestration burst out of obscurity and entered our household vocabulary in…

Join Me at the Gartner IT Infrastructure & Operations Management Summit

By G C Network | May 22, 2013

Please  join me at the Gartner IT Infrastructure & Operations Management Summit in Orlando, Florida, June 18-20, 2013, where my session topic will be “Cloud Service Integration: Increasing Business Value…

Five Years of Cloud Musings!!

By G C Network | May 14, 2013

https://kevinljackson.blogspot.com/2008/05/hello-world-april-18-2008.html  “Sunday, April 18, 2008 Hello World ! – April 18, 2008 I’ve been toying with the idea of doing a blog for about six months now. Initially I didn’t…

Global Interoperability Consortium’s Cloud Computing Project Detailed at NATO Conference

By G C Network | April 30, 2013

PRESS RELEASEApril 30, 2013, 2:30 p.m. ET Eric Vollmecke of the Network Centric Operations Industry Consortium reports  the proliferation of geospatial information will pose problems for disaster  responders and describes…

IBM Debate Series – What’s Next in IT?

By G C Network | April 25, 2013

Next week I will be participating in the inaugural session of What’s Next in IT Debate Series, a  new program of authentic debates and conversations on key technology topics. Sponsored…

Lisbon Bound: NATO Network Enabled Capability Conference 2013

By G C Network | April 21, 2013

This week I will have the honor of attending the 2013 NNEC Conference  at the Corinthia Hotel in Lisbon, Portugal. The NNEC conference is an annual event which has been sponsored by HQ…

Demystifying PaaS for Federal Government

By G C Network | April 2, 2013

Join us on April 16, 2013 at 1 PM EDT to remove the mystery surrounding Platform-as-a-Service (PaaS) for Federal Government https://attendee.gotowebinar.com/register/8966264786104832512 The PaaS market is plagued with confusion, and agencies…

 
Dwight Bues & Kevin Jackson

This is Part 1 of a three part series that addresses the need for a systems engineering approach to IoT and cloud network design:
The “Internet of Things” depends on the “Cloud” for the processing and storage of data. The Cloud’s backbone, however, is the network. This logic train reveals the importance of professional rigor and solid System Engineering (SE) of the network.
Imagine a sea of sensors, put out in the field by multiple independent vendors. Complying with specifications only in an informal sense, these sensors are sending Terabytes of data to the cloud. The availability of this data to anyone globally is impressive enough. But even more amazing is the fact that anyone in the world can also develop an application or a powerful API to filter out the “nuggets” of valuable information.
This is why businesses everywhere are investing heavily into IoT’s promise. It also drives a real expectation that IoT will deliver cognition, an ability to acquire knowledge and understanding through “thought, experience, and the senses” to the Cloud. Dr. Dennis Curry, of Konica/Minolta, even hinted that “Cognition” at the IoT level is actually possible. As stated in his white paper Genius of Things, “…the real promise of the IoT [is] its potential to deliver such a leap of insight about the world around us. Only when this becomes a reality will we understand the true genius made possible by connecting many things together.”
IoT and the Government
Stuart Ravens of Ovum, in his White Paper, Understanding the IoT Opportunity: An Industry Perspective, postulated that a smart streetlight could send status updates to a central facility. If the streetlight failed, it would cause a work order to be generated, and if there were no replacements in stock, a Purchase Order to procure a replacement part could be automatically produced, and an install date, scheduled. Metrics could be generated on failure rates which could pre-position replacement parts or pre-schedule fix dates. While we recognize the “Nirvana” aspect of this “Smart Cities” technology, there are many pitfalls. This single item is likely one of thousands of items for which Municipal governments must accept maintenance responsibility for, singling out one item for maintenance is probably not a good idea. Other municipal government consumable procurements could include: Chlorine and Fluorine gas (and filters) for fresh water treatment, Ferric Sulfate for removing nitrates from effluent water recovered during sewage treatment, diesel fuel for backup generators, also gravel and asphalt for pavement repair. At some level, a multi-disciplined Engineering team needs to be employed to tease out the most important  needs.
To do this, a Concept of Operations (CONOPS) development process is leveraged to gather all of the varieties of goods that the government purchases into one procurement document. These items can then be prioritized by cost, operational values and other factors to address temporal response levels, public safety implications and maybe even political sensitivities. Only then could one even start to determine what would be bought, how, and by whom. This may be a simplistic example, but many Plant Managers could verify that this holistic approach is necessary to prevent the inevitable “whack-a-mole” effect that happens when cost is unilaterally driven down in one area, only to have it pop up in another. Ravens further states, “Most public sector organizations lack the skills and expertise to design public IoT infrastructures, placing greater reliance, and importance, on vendors… This model is inappropriate for cash-strapped public sector organizations, which as yet are unsure of the business case for IoT.”

Observing the IoT need from a national level, the U.S. Department of Homeland Security (DHS) recently awarded a contract, “to advance detection capability and security monitoring of networked systems, collectively known as the Internet of Things”.  The National Institute for Occupational Safety and Health (NIOSH) has also issued a Request for Information (RFI) for companies to answer what the IoT can do to support First Responders. In their response, the Center for Data Innovation, determined that there are both first- and second- tier sensors usable to emergency responders.  First-tier sensors could include: network-connected smoke and temperature sensors that could detect the location of a fire in a building, wearable sensors that could track the location/status of emergency response personnel at the scene, and accelerometers that could detect the structural compromise of a hospital building after an earthquake.  Second-tier sensors are detectors that are normally used for other purposes.  Satellites with Infrared cameras, for example, could be used to track wildfires to ensure the safety of ground crews, a customer’s cellphone could be used to detect and locate a car crash, and neighborhood air quality sensors could be used to track the spreading of a fire or toxic spill.  These can be very helpful, but are they secure from being spoofed by a IoT hacker?

In a 1970s episode of Hawaii Five-O, a group of would-be jewel thieves used their knowledge of the Tsunami warning system to fake a warning and evacuate Honolulu.  With this done, they would have been able to break into any jewelry store and freely take what they wanted.  Only when the authorities noticed that the first sign of a tsunami (a drastically receding tide) did not occur as predicted, were they able to find out that the warning was a fake.  While we hope that no one would use the IoT in this manner, such hope is not a prudent governmental policy option.  Governments need to ensure that the IoT used by First Responders is secure enough to prevent risk to property loss and human life.

 

Dwight Bues, of Engility Corp., is a Georgia Tech Computer Engineer with 30+ years’ experience in computer hardware, software, and systems and interface design. He has worked in Power Generation, Communications, RF, Command/Control, and Test Systems. Dwight is a Certified Scrum Master and teaches courses in Architecture, Requirements, and IVV&T. He is also a certified Boating Safety instructor with the Commonwealth of Virginia and the United States Power Squadrons. He is currently working several STEM projects, sponsoring teams for competitions in the Aerospace Industries Association’s (AIA) Team America Rocketry Challenge (TARC) and the Robotics Education and Competition Foundation’s, Vex Skyrise Robotics Challenge.

Kevin L. Jackson is a globally recognized cloud computing expert, a cloud computing and cybersecurity Thought Leader for Dell and IBM and Founder/Author of the award winning “Cloud Musings” blog. Mr. Jackson has also been recognized as a “Top 100 Cybersecurity Influencer and Brand” by Onalytica (2015), a Huffington Post “Top 100 Cloud Computing Experts on Twitter” (2013), a “Top 50 Cloud Computing Blogger for IT Integrators” by CRN (2015) and a “Top 5 Must Read Cloud Blog” by BMC Software (2015). His first book, “GovCloud: Cloud Computing for the Business of Government” was published by Government Training Inc. and released in March 2011. His next publication, “Practical Cloud Security: A Cross Industry View”, will be released by Taylor & Francis in the spring of 2016

 ( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2015)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network