Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Loading in …3
×
1 of 41

How to build IoT solution using cloud infrastructure?

3

Share

Download to read offline

This presentation introduce to use AWS IoT shadow from embedded and mobile perspective.This presentation was presented on Netvision 2016 conference. Example source code is available on GitHub links available inside.

Video with this presenattion at https://www.youtube.com/watch?v=owz4kcwXahE

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

How to build IoT solution using cloud infrastructure?

  1. 1. piotr.krol@3mdeb.com http://3mdeb.com http://lmgtfy.com/?q=3mdeb
  2. 2. rafal.korszun@kleder.co http://kleder.co
  3. 3. •Sensors Sensor channel MCU IoT Hubs/Transceivers IoT Hub channel
  4. 4. Credits to Michael Schloh von Bennewitz: https://fosdem.org/2016/schedule/event/deviot19/
  5. 5. •Scalability Security Readiness Interoperability
  6. 6. IoT HTTP/2 protocol IoT HTTP protocol IoT MQTT protocol
  7. 7. PHP - Amazon CognitoAWS IAM
  8. 8. Amazon CognitoAWS IAM Xamarin iOS
  9. 9. Credits https://aws.amazon.com/iot/how-it-works/
  10. 10. AWS IoT Alarm board IoT MQTT protocol Armed Status Light Window sensor Alarm Status Light
  11. 11. AWS IoT IoT shadow IoT policy IoT certificate IoT hardware board Amazon Cognito mobile client AWS IAM
  12. 12. MainActivity Run App CognitoCachingCredentialsProvider New() AWSIotDataClient New() setEndpoint() getThingShadow()
  13. 13. contact@3mdeb.com
  14. 14. https://github.com/3mdeb/aws-iot-mqtt-pubsub https://github.com/rafalkorszun/awsIotExample http://kleder.co http://3mdeb.com

Editor's Notes

  • Sensors
    Accelerometers/Gyroscopes
    Temp/Humidity/Pressure
    Level/Range
    Other (ie. radiation, IR)
    Sensor channel
    Wired - I2C, SPI, CAN, Ethernet
    Wireless - Bluetooth, WiFi, 3G/4G
    MCU (ARM Cortex-M, AVR)
    IoT Hubs/Transceivers
    Mainstream - Raspberry Pi (1, 2 and 3), Arduino
    Industry ready - TI CC3200, BeagleBone Black (IT AM3358)
    Custom hardware depending on client requirements
    IoT Hub channel
    Ethernet
    3G/4G
    LoRa

  • R1 - Accountability and Data OwnershipA traditional data center of an organization is under complete control of that organization. The organization logically and physically protects the data it owns. An organization that chooses to use a public cloud for hosting its business service loses control of its data. This poses critical security risks that the organization needs to carefully consider and mitigate. (Pankaj, Vinay) One must ensure about the guarantee of recovering Data: Once the data entrusted to a third operator, what are the guarantees that you will recover your information? What about the backups performed by the operator of Cloud? (Ludovic)R2 - User Identity FederationIt is very important for the enterprises to keep control over user identities as they move services and applications to the different cloud providers. Rather than letting cloud providers create multiple islands of identities that become too complex to manage down the line. Users should be uniquely identifiable with a federated authentication (e.g. SAML) that works across the cloud providers. User experience is enhanced when he/she does not manage multiple userids and credentials. This allows easier back-end data integrations between cloud provides. (Vinay, Pankaj)R3 - Regulatory Compliance- Complex to Demonstrate regulatory compliance. Data that is perceived to be secure in one country may not be perceived secure in another due to different regulatory laws across countries or regions. For eg., European Union has very strict privacy laws and hence data stored in US may not comply with those EU laws. (Shankar, Ove)R4 - Business Continuity and ResiliencyBusiness Continuity is an activity an IT organization performs to ensure that the business can be conducted in a disaster situation. In case of an organization that uses cloud, the responsibility of business continuity gets delegated to the cloud provider. This creates a risk to the organization of not having appropriate business continuity. (Pankaj, Shankar). About Service Continuity and QoS, one have to ensure about the contractual solutions proposed by the Operator of Cloud, and the Service Level Agreement as well. (Ludovic)R5 - User Privacy and Secondary Usage of DataUser's personal data gets stored in the cloud as users start using social web sites. Most of the social sites are vague about how they will handle users personal data. Additionally most of the social sites go with the default share all (least restrictive) setup for the user. E.g. via LinkedIn, Twitter, Facebook it is very easy to deduct personal details of the users (Vinay) - Need to ensure with your cloud providers what data can or cannot be used by them for secondary purposes. It includes data that can be mined directly from user data by providers or indirectly based on user behavior (clicks, incoming outgoing URLs etc.). Many social application providers mine user data for secondary usage e.g. directed advertising. No wonder when many of us use their personal gmail/hotmail or yahoo account to tell a friend your vacation plans and immediately you start seeing advertisements on hotels/flights near your destination. (Vinay, Ove)R6 - Service and Data IntegrationOrganizations must be sure that their proprietary data is adequately protected as it is transferred between the end user and the cloud data center. While interception of data in transit should be of concern to every organization, the risk is much greater for organizations utilizing a cloud computing model, where data is transmitted over the Internet. Unsecured data is susceptible to interception and compromise during transmission. (Shankar, Ove)R7 - Multi Tenancy and Physical SecurityMulti-tenancy in cloud means sharing of resources and services among multiple clients(CPU, networking, storage/databases, application stack). It increases dependence on logical segregation and other controls to ensure that one tenant deliberately or inadvertently can not interfere with the security ( confidentiality, integrity, availability) of the other tenants. (Vinay, Pankaj)R8 - Incidence Analysis and Forensic SupportIn the event of a security incident, applications and services hosted at a cloud provider are difficult to investigate as logging may be distributed across multiple hosts and data centers which could be located in various countries and hence governed by different laws. Also, along with log files, data belonging to multiple customers may be co-located on the same hardware and storage devices and hence a concern for law enforcing agencies for forensic recovery. (Shankar, Ove)R9 - Infrastructure SecurityAll infrastructure must be hardened and configured securely, and the hardening/configuration baselines should be based on Industry Best Practices. Applications, systems and networks must be architected and configured with tiering and security zones, and access must be configured to only allow required network and application protocols. Administrative access must be role-based, and granted on a need-to-know basis. Regular risk assessments must be done, preferably by an independent party. A policy and process must be in place for patching/security updates, and can based on risk/threat assessments of new security issues. (Ove, Shankar)Although the fine details of the items above must be regarded as highly sensitive information, it is reasonable to expect a customer to want to see at least the high-level details. The Provider must be willing to provide this.
    R10 - Non Production Environment ExposureAn IT organization that develops software applications internally employs a set of non-production environments for design, development, and test activities. The non-production environments are generally not secured to the same extent as the production environment. If an organization uses a cloud provider for such non-production environment, then there is a high risk of unauthorized access, information modification, and information theft. (Pankaj, Ove)
  • Główne ulepszenia i zalety HTTP/2
    Jedno połączenie. Do załadowania strony internetowej używane jest tylko jedno połączenie z serwerem, które jest aktywne tak długo jak długo jest otwarta strona internetowa. To zmniejsza liczbę żądań potrzebnych do utworzenia wielu połączeń TCP.
    Multipleksowanie (multiplexing). Wielokrotne zapytania mogą być obsługiwane w tym samym czasie i zakresie. W wersji HTTP/1.1, przesył danych jest kolejkowany. Oznacza to, że przeciążona strona strona w HTTP/2 ładuje się normalnie.
    Push z serwera. Dodatkowe informacje mogą być wysyłane do klienta z poziomu serwera.
    Priorytetyzacja. Zapytania są priorytetyzowane i szybciej obsługiwane przez serwer. Nadawana jest kolejność w jakiej pobierane są z serwera różne zasoby, na przykład arkusze stylów CSS, kod Java Script lub obrazy. Dzięki temu najważniejsze elementy związane z wyświetleniem się strony są wysyłane wcześniej, aby zmniejszyć opóźnienia i sprawić, że użytkownik komfortowo wyświetla tresci.
    Binarność. Sprawia, że HTTP/2 jest łatwiej analizowany przez serwer – jest bardziej zwarty i mniej podatne na błędy. Nie jest potrzebny dodatkowy czas na tłumaczenie informacji z tekstu do pliku binarnego, który jest językiem ojczystym komputera.
    Kompresja nagłówków. HTTP/2 wykorzystuje kompresję HPACK, dzięki czemu zmniejsza obciążenie i ilość danych przesyłanych przez sieć.
    Według serwisu Can I use, protokół HTTP/2 obsługiwany jest przez 75,63% przeglądarek używanych przez użytkowników w Polsce i 67,89% na całym świecie.
  • Na tym slajdzie sie zamieniamy :
    Ty mowisz o desired
  • ×