Organizer 1: Wale Shakiru Bakare, ICANN- European At-Large Organization (EURALO)
Organizer 2: Olivier Crepin-Leblond, EURALO / ICANN / ISOC UK England
Organizer 3: Andrei Kolesnikov, ICANN - EUROPEAN At-Large Organization (EURALO)
Organizer 4: Bastiaan Goslings, AMS-IX
Speaker 1: Maarten Botterman, Technical Community, Western European and Others Group (WEOG)
Speaker 2: Olivier Crepin-Leblond, Technical Community, Western European and Others Group (WEOG)
Speaker 3: Andrei Kolesnikov, Technical Community, Eastern European Group
Speaker 4: Bastiaan Goslings, Private Sector, Western European and Others Group (WEOG)
Round Table - 60 Min
Each of the speakers has been chosen to reflect their professional background, expertise in the topic on IoT governance. In addition, each speaker holds a distinct perspective of IoT governance primarily due to their professionalism, as well as backgrounds, areas, and geography. That will help galvanize the discussion during the session, gravitate discussion towards wider viewpoints. All the speakers will be initially given 5 minutes to present their views through a coordinated set of questions and answers with the moderator, to ensure the audience is brought up to speed with the discussion on the subject. Following that, the onsite moderator will ensure that speakers are given an opportunity to answer in a balanced manner.
This workshop aims to gather a variety of stakeholders to raise awareness of the importance of the multi-stakeholder dialogue, as new the technologies emerging and the hyper-connectedness of things to the internet debate take front burner. The governance discussion, although, has in involved stakeholders who are primarily engaged and used with traditional systems, as well as the nation states. The governance challenge is becoming multi-faceted, which requires more participation for, effective, agile and robust policy discussion as the new technologies are impacting more on our socio-economic activities, geopolitics as well. That said, this workshop will endeavor to get participation from the civil society, academic, industry players, the legal and technical representative from the governments to the discussion. The main focus of this workshop is to bring in the new dimension, perspective to governance as the challenge becomes hydra-headed, in the era Internet-of-Things (IoT). Also, we seek to engage with workshop participants for diverse interventions, especially the remote attendees via the social platform and breakout discussion will follow with the onsite participants and the organizers.
Agenda: - The session will begin with an introduction and background on the topic by the moderator, Dr. Olivier Crepin-Leyblond. Dr. Olivier will develop the discussions and discuss the format of the roundtable - 5 mins. - Next 3 speakers will provide brief introductory remarks intended to provide context on the topic in order to frame the roundtable discussion (15 minutes) * Andrei Kolesnikov - 5mins * Maarten Botterman ( Dynamic Coalition on Internet of Things Chair, as the DC IoT representative) - 5mins * Bastiaan Goslings - 5mins - Following the opening remarks, the moderator will facilitate the roundtable conversation with the speakers and resource personnel touching on the following topics - 25mins Issues the session will focus on are as follow: - The IoT (small and big) data parsing, building behavior models, ethics, and future risks to the privacy of individuals using the internet. - Critical infrastructure: the bikes vs. nuclear plants. How do we manage critical systems, objects? That, however, might instigate a hypothetical question - do we really want to connect everything to the Internet? - Security - discuss new mechanisms. - IP-less communications: all-IP-based is not a religion, but business approach. What conditions are there for no need to all-IP-based devices? - The proprietary protocols and war of standards: the reconciliation of the International Organization for Standardization (ISO) versus the Internet technical ecosystem’s technical development and standards-setting otherwise known as the Request for Comments (RFC). In that regard, the integration of new protocols must still need to enkindle the RFC and/or other standards. - Online moderator, Wale Bakare will have 7mins to present questions from online attendees. * Speakers will have 6mins to answer questions from the online participants - The site moderator will have 2mins to round-up discussion and close the session.
The expertise and well rich knowledge of the panelists are sought carefully prior to their participation in the workshop. After their initial intervention, the onsite moderator will actively seek to gather feedback and questions from the audience to ensure that participation in the discussion is as broad as possible and questions or concerns from the audience are addressed. The governance challenge is becoming multi-faceted, which requires more participation for, effective, agile and robust policy discussion as the new technologies are impacting more on our socio-economic activities, geopolitics as well. That said, this workshop will endeavor to get participation from the civil society, academic, industry players, the legal and technical representative from the governments to the discussion. The main focus of this workshop is to bring in the new dimension, perspective to governance as the challenge becomes hydra-headed, in the era Internet-of-Things (IoT). The below items will be ensured for an effective workshop discussion: * Enough workshop materials will be made available and shared time ahead of the workshop discussion and reading materials will be produced for the session highlighting major parts of the debate on the governance challenge and Internet-of-Things. * Organizers will moderate an online discussion through blog posts and social media in the weeks leading to the event for public input and questions that inspire particular interest. * PowerPoint summarizing key points of the panel’s intervention will be projected to facilitate conversations with members of the audience whose native language is not English.
The Internet-of-Things (IoT) evolution includes a broad range of industries, including the automotive, finance, consumer electronic devices, retail services, manufacturing, agriculture and other sectors important for sustainable development of the humanity. Central to the solutions and deployments of IoT is unified communication. The unified communication relies heavily on the all-IP-based scheme for end-to-end delivery of IoT solutions. All-IP-Based Deployment: what about the Internet architecture evolution? All things Internet rely on implementation and deployment as a set of unified protocols, numbering and addressing. In context, what are the roles of numbering and naming in an IoT environment? Security and Privacy: in the enterprise sector, for example, businesses are not only keen about the understanding of the adoption of Internet-of-Things (IoT), neither the implementation, but concerns are focused on the security of business processes, privacy, and continual business operation. Two major elements are, however, the fulcrum to the IoT as, its adoption and implementation accelerate globally – securing consumer’s devices and data, the end-product present challenges of certain degrees. At that end, in front-burner of discussion - what approaches to protecting the devices (objects) and best practices are suitable for managing the IoT end-product (big data)? According to Vodafone barometer, 2016 – 30% of businesses said they were changing or restricting the scope of IoT project to limit security risks. While 18% of businesses said that concern about security breaches is a potential barrier to wider adoption of IoT in their organization. Unsurprisingly, the 75% of businesses the organization had security discussion with considering security risks as fact of life. Would a new approach change the mindset about security? More importantly, as IoT adoption increases, in context do we really need the arduous process of designing for security, that can reinvigorate resilience, withstand the test of time in the event of attacks or threats? Autonomous Software Applications: a proprietary home automation controller or home router, for example, for a burglar alarm system, lighting system, temperature system all, intra-communication with other components like sensors and actuators by reading and writing data to the controller which, in turn, relay to these systems. In the light of that, there are risks concerning the autonomous software characteristics; un-schedulability and priority invasion at the time of updates. The time in-between when an update is unscheduled to happen by the home router and when a system is intended to report an action. What are approaches needing to help limit the impact of the software update issues? The danger of reading wrong data to the systems? Nevertheless, we are facing new challenges as we continue innovating, adopting, and implementing the new technologies like the IoT systems. Leveraging that, the multistakeholder approach, should and/or will continuously engage the new entrants, be reframed, as well as aligned with the emerging governance challenges for, optimal and effective dialogue. Workshop Focus: - Internet Governance: This workshop will analyze emerging issues of Internet governance, as the Internet-of-things emerging fully. The new scheme for people’s online privacy, models and mechanisms for accessing individual’s data. What role would GDPR play? - Internet Architecture: How do we ensure the emergence of an internet infrastructure that supports further roll-out and integration of IoT devices in a sustainable way? Example, the Internet protocol version 6 (IPv6) adoption, deployment over the nearly depleted Internet protocol version 4 (IPv4). - The connection of IOT systems to the public internet: security of critical infrastructure vs. perception of what internet of things is. In fact, most of the people start thinking about a smart house. Which is a small fraction of IOT? - Autonomous systems running on batteries: CPU power vs lifecycle. Support full IP stack on a single battery for 10 years? Not yet there... - IP-less communications: up to 90% of all IOT devices currently are not IP based, especially in manufacturing, sensors networks, medicine, smart city management, utility metering and monitoring - The dogma of mobile operators (sell more SIM cards): expectations of NB-IOT as a silver bullet. Right to the head of mobile telecom. - Risk of proprietary protocols and war standards. ISO vs RFC, history repeats itself? - Risk of governmental overcontrol; - What happens to the data generated by IoT? Stays within national border? At what conditions and under what kind of regulations it crosses the border? - Sensitive private data gained from IOT big data patterns.
The moderators, both on-site and online will work hand-in-hand and plan the session ahead of time. That will include the arrangement of teleconferencing systems, testing of devices and by ensuring their workability. The online moderator will coordinate online participation, initiate the discussions of the topic prior to the opening of the session. In addition, the online moderator will be administering the online participants, drive engagement and educate participants about the topic via popular social media such as Twitter hashtags, Facebook page etc. Before the commencement of the session, the online moderator will inform and educate the remote participants the session's code of conducts, ethical behaviors. And methodologies for commenting and asking questions. Managing online participation involves passing of microphone to the remote participants orderly, during questions and answers time. During the workshop session, the online moderator will facilitate online discussions, raise important issues from the online participants, note their questions and ensure speakers respond to the questions raised accordingly.
Reference Document: https://www.iot-dynamic-coalition.org/