Brussels / 31 January & 1 February 2015


Adding advance Connectivity and Security to an embedded project

Tizen-meta as a security and Connectivity layers for Yocto

More and more embedded projects require support for advance connectivity. With it, comes the requirement to enforce a better security as well as private data protection. Using the layer model of Yocto, we show how we can extract from a complex project such as Tizen, advance connectivity and security and apply it to any embedded project.

The Internet of Things (IoT) is growing fast and opens large opportunities to embedded Linux. Unfortunately traditional embedded Linux has been weak when it comes to security and complex connectivity enabling. Tizen which has been developed as a Linux base OS for connected object (phone, TV, car) is on the other side very well equipped in that area. We will start by explaining what is Tizen architecture and how it provides Security and Connectivity facilities on top of a base Linux. We will then show how Yocto and Tizen-meta can be used to create embedded devices which benefit from several years of work done by the Tizen community. In particular we will review : - the mandatory access control enabling in an embedded device - the enforcement of good behavior by applications - resource access control - connectivity layers - HTML5 App enabling. - multi user mode enabling.


Photo of Dominig ar Foll Dominig ar Foll