+ All Categories
Home > Documents > IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security...

IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security...

Date post: 20-May-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
44
IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology Dornbirn, FH Vorarlberg, 27. April 2017 Technikforum IoT
Transcript
Page 1: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG

Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology Dornbirn, FH Vorarlberg, 27. April 2017

Technikforum IoT

Page 2: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

New Sensor Technologies

Intelligent Cameras & Video Analytics

2

CENTER FOR DIGITAL SAFETY & SECURITY

Dependable Systems Engineering

Visual Surveillance & Insight Digital Identity Management

Verification & Validation of Complex Systems

Modelling & Automated Test Case Generation

Runtime Verification Predictive System Health Monitoring

Safety & Security Co-Engineering Security for Industrial Control Systems

Risk Management Security by Design

Cloud Security Cryptography

Cyber Attack Information System (CAIS) Cyber Incident Information Sharing (CIIS)

Cyber Range

Data Science

Machine Learning Scalable Data Analytics

Blockchain Technologies

Physical Layer Security

Wireless M2M Communication 5G & Broadband Technologies Optical Quantum Technologies

Crisis and Disaster Management

IoT Sensor Networks Command & Control Systems

Community Engagement Environmental Management

Smart Sensor Solutions Signal Processing & Pattern Analysis

Situational Awareness & Decision Support

Cyber Security

Highest System Reliability Surveillance and Protection Critical Cyber Infrastructures

• 180+ experts (Master, 1/3 with PhD) 51% Scientists, 39% Engineers • 50% of new employees with international education • 30+ EU running projects

• Community involvements:

• Strategic partnerships:

Digital Market Austria

Page 3: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

07.02.2011

KRITISCHE IOT INFRASTRUKTUREN …

Connected Cars

Industry 4.0

Smart grid eHealth Smart

City Digital

Transport Communication Finance Supply

chain

Energy

Industry 4.0

IoT Communication

Supply Chains

… sind komplexe Netze

… bauen auf virtuelle IT auf

… wir brauchen neue Methoden und neue Werkzeuge um widerstandsfähige Systeme zu bauen

Finance

… sind eng verknüpft mit der echten Welt

Reliable Wireless Communication (5G)

Data Science IoT Cyber Security

Page 4: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

DATA SCIENCE

Page 5: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

5 28.04.2017

DATA SCIENCE

Informatik grosse

Datenmengen Mathematik &

Statistik

Domänen Wissen

Data Science

Data Science ist eine auf Hypothesen basierte Methode um aus sehr grossen Datenmengen Muster zu erkennen

grosse Datenmengen: z.B. BITCOIN Blockchain: • 100te millionen von Knoten • Milliarden von Beziehungen

Page 6: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

6 28.04.2017

DATA SCIENCE METHODOLOGY

Data Processing at Scale Data Interoperability

Statistical Modelling

Machine Learning Deep Neural Networks

User Interface Design

Linked Open Data

Metadata

Page 7: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

7 28.04.2017

Blockchain Digital Insight Platform @ AIT

“Overall, Bitcoin is beginning to feature heavily in many EU law enforcement investigations, accounting for over 40% of all identified criminal-to-criminal payments.” (Quelle: Europol Bericht 2016)

Data Science für “fintech” Markt - Blockchain Führende Analysetechnologie @ AIT

Page 8: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Data Science für Smart Cities

• Web Crawling and Scraping • Large-scale network and server infrastructure • Automatic navigation through linked web sites • Structured data extracted from HTML page • Simultaneous monitoring of multiple platforms

• Data Insight • Visualisierungen • Trendanalysen • Berichte

• Wie ist Einfluss der neuen “Share Economy” auf eine Stadt? • AIT´s Digital Insight Team analysiert öffentliche Internetdaten und macht aus

Daten Informationen und Wissen!

Page 9: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

IoT Industrie 4.0 – Datenbasierte intelligente Wartungsprozesse

reduzierte Verfügbarkeit

ungeplante Ausfälle

längere Nutzungsdauer von Systemteilen

ineffiziente Wartungsprozesse

ineffektive Wartungsarbeiten

fehlende Verknüpfung von Maschinen-, Produkt- und Prozessdaten

unzureichende Datenlage

fehlende automatisierte Prognose von Ausfällen

Prognose von Systemrisiken

Page 10: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Industrie 4.0 – IoT „Predictive Maintenance“ @ AIT

Problemstellung Auswahl Maschinen-, Prozess-

und Produktdaten Installation Sensorik

Visualisierung Kennzahlen Analysen – Feedbackschleifen in die Planung

Page 11: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

RELIABLE WIRELESS COMMUNICATION (5G)

Page 12: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Zuverlässige IoT Kommunikation - Connected Vehicles

S C 2 C C i ti C ti htt // t /

5G node 2 (relay) 5G node 1

(relay)

5G node 3 (relay)

5G

Design of reliable communication systems needs an understanding of the underlying radio channel (e.g. V2X) • Radio waves interact with surrounding objects • Missing line-of-sight (LOS) between Tx and Rx • Multipath propagation leading to delay-dispersion and

Doppler-dispersion that changes with time due to mobility

Page 13: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

node 1

node 2

node 3 (relay)

controller 5G gateway

Zuverlässige IoT Kommunikation - Industry 4.0 5G

Small amount of information highest reliability – minimum delay (usec)

Page 14: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

IOT CYBER SECURITY

Page 15: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Die Angriffsfläche für Cyber Attacken nimmt zu z.B. DDOS Angriff, Oktober 2016 „Mirai IoT Botnet“

19 28.04.2017

900 Gbit/s

Sources: http://www.golem.de/news/nach-ddos-attacken-akamai-nimmt-sicherheitsforscher-krebs-vom-netz-1609-123419.html http://www.golem.de/news/hilfe-von-google-brian-krebs-blog-ist-nach-ddos-angriff-wieder-erreichbar-1609-123453.html

Passwort: 12345, password

Journalist Krebs

Google Project Shield

Page 16: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

20 4/28/2017

• Low budget devices • Low processing

capabilities on devices • Huge number of devices • Sensor Communication

(M2M • Sensor-actuator - control

systems (feed-back loops)

• Cyber Physical Systems (CPS)

IOT SAFETY & SECURITY HERAUSFORDERUNGEN

• Limited system resources • Low processing

capabilities • Not part of the value

added assets of a system • Limited Operation and

Maintenance (OAM) – life cycle management

• No or infrequent SW-updates

• Trust on sensor data

IoT Characteristics IoT Device Consequences

• Devices are connected to critical infrastructure

• Complex system behavior

• Large amount of data - Data Science

• Highly reliable wireless communications (5G)

• Communication protocols and platforms

• Standards • Virtual IT (cloud)

System Consequences

Security: CIA Confidentiality, Integrity, Availability

Reliability System resilience

Safety, Privacy Reliability

Page 17: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Safe and Secure Data in the Cloud

AIT´S PORTFOLIO FÜR KRITISCHE IOT INFRASTRUKTUREN

21

Safe & Secure

IoT Systems

Smart Encryption for IoT and

Cloud Systems

Safety and Security by Design for

IoT systems

CAIS Cyber Attack

Information Systems

Skill & Capacity Building by Cyber Ranges

Page 18: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Smart Encryption for Privacy & Security in Cloud based IoT Systems

22 28.04.2017

Internet Development State of the Art

Research @ AIT Develop novel cryptographic solutions which protect

the authenticity and security of data in a very agile way Enable the next generation trustworthy smart

manufacturing services with provably authentic data in all system stages and levels of the hierarchy.

Future IoT Internet Safe & Secure Public Cloud

Challenge: Protect data in cyber physical systems to ensure

authenticity and security from the source (i.e., sensor) to the consumer (i.e., closed-loop controls, business intelligence)

Enable sharing of authentic data over cloud-based infrastructures between multiple stakeholders.

Page 19: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

23 28.04.2017

AUTHENTICITY AND E2E SECURITY IN IOT SYSTEMS

• Strong (public-key) cryptography to protect IoT systems needed.

• Established encryption and authentication protocols from today‘s Internet, e.g., the TLS protocol, cannot be adapted easily to the diversity of the IoT.

asymmetry – resources (gateways – sensors/actuators)

established cryptographic protocols are not light-weight (e.g. need heavy

computations)

• Crypto research @ AIT • Improve and adapt lightweight cryptography to enable real-time

applications for authentic data provisioning • Develop methods for data aggregation over time and keys, and study

potential privacy benefits • Research to which extent data could stay encrypted

Page 20: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Name:

Acc.: PIN:

Name:

Acc.: PIN:

Name:

Acc.: PIN:

Name:

Acc.: PIN:

Name:

Acc.: PIN:

Name: ....

Acc.: .... PIN: ....

#1

#2

#3

#4

#5

Distributed Storage – State-of-the-art

asfjkajalkgjalgkjalkgjal

sdghz

agasd6b46b34

346b4b5sdgdfgvg43z

587olegs346erhsh69

hj673uzto566uhsht5

Simple replication

Page 21: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

#1

#2

#3

#4

#5

46kdgs J40$j5j jkaslj53

ehalk5j 3kl<59f tj3k2l9

82ngkd 940“gld agu90!

aJfw#5 032*ngl afsdgn

6gbaga

fasfa5 hsbc89

Smart Encryption @ AIT Secure Distributed Storage by Shamir´s Secret Sharing

46kdgs J40$j5j jkaslj53

ehalk5j 3kl<59f tj3k2l9

82ngkd 940“gld agu90!

aJfw#5 032*ngl afsdgn

6gbaga

fasfa5 hsbc89

Name: ....

Acc.: .... PIN: ....

Name: ....

Acc.: .... PIN: ....

Decompose message m into shares (𝜎1,...,𝜎𝑛) Every subset of at least 𝑡 shares allows to recover 𝑚 𝑡 − 1 shares do not contain any information about 𝑚

Increased data reliability Support of data sharing in the

cloud No un-secure key-distribution

Page 22: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Safe and Secure Data in the Cloud

26

Safe & Secure

IoT Systems

Smart Encryption for IoT and

Cloud Systems

Safety and Security by Design for

IoT systems

CAIS Cyber Attack

Information Systems

Skill & Capacity Building by Cyber Ranges Secure System

Design of ICS

AIT´S PORTFOLIO FÜR KRITISCHE IOT INFRASTRUKTUREN

Page 23: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

From IT device protection to resilient IoT Systems

27 28.04.2017

Future Internet is a complex IoT network and is intertwined with the real world – Cyber Physical Systems (CPS)

Internet Development State of the Art

Protection of devices

Future Internet Complex IoT network with sensors

and actuators

Resilient network infrastructures (architecture, redundancy,

validation, etc.)

Page 24: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

28

CYBER PHYSICAL SYSTEMS (CPS) COMPLEX SECURITY REQUIREMENTS

Energy network/Industry 4.0 ICT network

NISTIR 7628 Interface Categories and

Security Requirements

Responsibilities Interfaces

Logical Actors

BSI threat catalogue … other threat catalogues

AIT Smart Grid threat catalogue

• Manufacturer • System integrator • Network operator • Service operator • Network planning • Security management • Business management

Page 25: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

MODEL DRIVEN SECURE NETWORK DESIGN

29

A defined cyber security context has to be put in context:

– national security – economical – technical feasibility – …

A common model (common language)

Tools Model driven design &

analyses, reporting, verification, etc.

Dedicated implementations will happen based on different background and business strategies (architecture, processes, different manufacturers, etc.)

we need …. a support to manage the complexity

Systematic approach Method for scenario

management, ensuring open standards,

recommendations

Scenario evaluation

Definition of security requirements

Support of risk management

Verification of security levels

Reports

Open standards (IEC, IEEE, NIST, CEN-

CENELEC-ETSI, ENTS-E, etc.)

Page 26: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Attack / Failure (cause) analysis

Failure / threat mode(s)

Impact (effect) analysis

Failure Attack Step

Attack surface Vulnerability Attacker

Security Safety

• Resilience measures • Incident response procedures, • System architectural measures, • Monitoring measures.

Impact evaluation

Safety requirements

Security requirements

Identify Safety Failure modes

Identify Security Vulnerabilities Attack surfaces Potential Attackers

FMVEA tool support @

AIT

Safety & Security Co-Engineering Failure Modes, Vulnerabilities and Effects Analysis (FMVEA)

30

combined failure and threat modes

Assess Fault/Threat detection Effects Impact

Derive Safety requirements Security requirements

Page 27: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Safe and Secure Data in the Cloud

31

Safe & Secure

IoT Systems

Smart Encryption for IoT and

Cloud Systems

Safety and Security by Design for

IoT systems

CAIS Cyber Attack

Information Systems

Skill & Capacity Building by Cyber Ranges Secure System

Design of ICS

CAIS Cyber Attack Information Systems

Protection from unknown threats

AIT´S PORTFOLIO FÜR KRITISCHE IOT INFRASTRUKTUREN

Page 28: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

32 28.04.2017

Selbstlernende Systeme CAIS Cyber Attack Information System @ AIT Künstliche Intelligenz zur Abwehr von Cyberangriffen

Distributed Anomaly Detection Engine Self-learning and flexible anomaly detection

using data collected across different machines, systems and organizational units.

Firewall Logs

IDS/IPS Logs

Application Server Logs

Performance Logs

unknown attack anatomy Signature-based detection does not work no specification self-learning of “normal behavior

multiple attack vectors looking at isolated systems or single points in a network is not sufficient

Possibility to see stealthy attacks looking for “related” events

Page 29: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Safe and Secure Data in the Cloud

AIT´S SOLUTION PORTFOLIO FOR CRITICAL IOT INFRASTRUCTURES

33

Safe & Secure

IoT Systems

Smart Encryption for IoT and

Cloud Systems

Safety and Security by Design for

IoT systems

CAIS Cyber Attack

Information Systems

Skill & Capacity Building by Cyber Ranges Secure System

Design of ICS

CAIS Cyber Attack Information Systems

Protection from unknown threats

Cyber Range for Skill & Capacity

Building

Page 30: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

CASTLE CYBER SECURITY RANGE @ AIT

34

Enterprise ICT Environments

Simulation specific systems

Physical environment

Connected Cars

Industry 4.0

Smart grid eHealth Smart

City Digital

Transport Social media

Virtual and Simulated Physical

Cyber Security R&D

Security Technology Validation

Training Ethical Hacking

Modelling & Simulation

Test Data Generation

Architecture Scenario Planning

Threat Emulation

Cyber Exercises

Cyber Training

Page 31: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

35

2.

3.

4.

5.

6.

1. 1. Competences of the attackers

2. Competences and processes of the CIOs and his team

3. CIIS-1 communication processes among companies

4. CIIS-2 communication processes between organizations and (sector-specific) CERTs

5. CIIS-3: communication between organizations and cyber security centers

6. National security level

CYBER INCIDENT INFORMATION SHARING (CIIS)

Page 32: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

36

• Integrated Cyber Threat Intelligence (TI) framework to enable organizations to manage and effectively apply TI: • efficient use of information about vulnerabilities, attacks, weaknesses,

exploits etc., to steer internal security management.

• AIT framework offering a TI toolchain utilizing effective approaches for the management of TI information: • selection • interpretation • Application

COLLABORATIVEN INFORMATIONSAUSTAUSCH UM BESSERE LAGEBILDER BEI CYBER ATTACKEN ZU ERHALTEN

• Increased effectiveness by usability of human-computer interaction (HCI)

Page 33: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

INNOVATION @ AIT DSS

Science Creativity

Technology

Implementation capability

System competence

Page 34: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

38 28.04.2017

Mobiles Identitätsmanagement

Schutz kritischer Infrastrukturen

Augmented reality

Innovation @ AIT

Page 35: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

39

International Competence Center for Airport Securtiy, Border Control & Mobile Identity

sichere Prozess

e

Bildverarbeitung

Kameranetze

Biometrie

Vernetzte IT-Systeme

sichere Prozesse

sichere Prozesse

sichere Prozesse

sichere Prozesse

Cyber Security

sichere Behördenprozesse

sichere Prozesse

ASAP FBC

https://youtu.be/nEOoDY2wxpc 17.11.2016

ZiB1 19.4.2017 28 Mio €

programme budget

Page 36: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Mobile ID Smartphone 2.0

40

Contact less finger prints

Face recognition

Passport (optical MRZ, chip RFID)

Number plate recognition

scenes

1

2

3

4

5

https://youtu.be/nEOoDY2wxpc

Mobile Identity AIT Security Technologies

3D Que-Length Detection

3D Vision based Access Control ID Erfassung

Verk.kontrolle

Fallaufnahme

Anwendung x

17.11.2016

ZiB1 19.4.2017

Page 37: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

28.04.2017 41

UNMANNED ARIAL VEHICLE BASED SITUATION AWARENESS Real-time situation awareness for first responders

Page 38: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

42 28.04.2017

Intelligent Vision Systems

3D, high-speed

autonome Systeme

Industrie 4.0 optische Inspektion

Page 39: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

High-Performance 3D dental scanner@AIT

43 28.04.2017

smallest intelligent optical 3D Scan-Sensor of the world

Facts 10 times smaller than existing systems on the market Significantly cheaper for mass production Higher resolution than silicon impressions

Page 40: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

3D Fahrerassistenzsystem für intelligente Straßenbahnen

Bombardier Transportation und AIT setzen neue Maßstäbe beim Thema Sicherheit bei Straßenbahnen

Wissenschafts- preis

ZiB 1 Beitrag 05/2014

Page 41: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Sichere Baumaschinen durch autonome Systeme

46

Liebherr setzt auf AIT Technologie für intelligente Baumaschinen

Page 42: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

47

28.04.2017 ORF Beitrag im ZiB Flash Ausstrahlung 28.11.2016 (17:57)

Page 43: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

SEHEN UND VERSTEHEN – CYBER SECURITY 30. Mai 2017, Sky Stage, Tech Gate Vienna

Programm und Anmeldung: www.ikt.wien

Page 44: IOT UND AKTUELLE TECHNOLOGIETRENDS IN DER FORSCHUNG · 7/2/2011  · the authenticity and security of data in a very agile way Enable the next generation trustworthy smart manufacturing

Helmut Leopold Head of Center for Digital Safety & Security AIT Austrian Institute of Technology GmbH Donau-City-Straße 1 |1220 Wien, Austria [email protected] | www.ait.ac.at

http://www.fhv.at/veranstaltungen/detail/calendar/2017/04/27/event/tx_cal_phpicalendar/technikforum-iot/?no_cache=1&tx_cal_controller%5Bstart_day%5D=18.04.2017&tx_cal_controller%5Bend_day%5D=18.05.2017


Recommended