SlideShare a Scribd company logo
©2016 SORACOM, INC 1
Let SORACOM help your IoT devices
connect to the Cloud!
Public
Endpoints
SORACOM Beam
SORACOM bridges gap b/w constraint
devices and cloud
SORACOM Funnel
Amazon Kinesis
Family
Microsoft Azure
EventHubs
AWS IoT
Google Cloud
Pub/Sub
• Securely connect to public endpoints → SORACOM Beam
• Send data to cloud services → SORACOM Funnel
• Collect and visualize data on SORACOM → SORACOM Harvest
SORACOM
Harvest
Simple, Low overhead protocols
- TCP / UDP raw socket
- HTTP, MQTT
- LoRaWAN, Sigfox
Secure, Full fledged protocols
- TCP over TLS
- HTTPS, MQTTS
Secure link
SORACOM Air enables
©2016 SORACOM, INC 3
SORACOM Beam: Data Transfer Support
Internet Service
Server A
Server B
Simple, Low overhead protocol
- TCP / UDP raw socket
- HTTP
- MQTT
ISP
MNO
Things Base
station
Transfer with Secure protocol
- HTTPS
- TCP over TLS
- MQTTS
Add metadata
- SIM ID (IMSI)
- Device ID (IMEI)
- Timestamp
Case Study: WHILL
SORACOM Beam to:
- offload authentication
- reduce overhead
Personal Mobility
Device connected w/
SORACOM Air
©2016 SORACOM, INC 7
What if the destination is
a managed cloud service with public API?
©2016 SORACOM, INC 8
1. Configure your cloud resource ID and credentials
2. Send data from your devices
SORACOM Funnel: Cloud Resource Adaptor
Authentication
information
Cloud services
Simple protocol Protocol conversion
Authentication logic
Buffering
Error handling
TCP
UDP
HTTP
SORACOM Funnel
©2016 SORACOM, INC 9
Supported Cloud Adaptors
Amazon Kinesis Stream
Amazon Kinesis Firehose
Azure Event Hubs
TCP
UDP
HTTP
Encryption
Attach
authentication
information
AWS Lambda
Kinesis App
Amazon S3
Amazon
Redshift
Stream Analytics
Power BI
Machine
Learning
Case Study: DyDo
SORACOM Funnel to securely
and easily collect data to
Amazon S3
SORACOM Air connected
Vending Machines
SORACOM Harvest: Data Collection & Visualization
Indexes and stores data from your devices
Data can be retrieved through API and Web console
Adds metadata
- SIM ID (IMSI)
- Device ID (IMEI)
- Timestamp
Simple
Protocol
Indexed time series
data via API / web
console
SORACOM Inventory: Device Management
Devices with Non-Standard
Object Model
User
Device Object
Model Definition
(XML/JSON)< />
HTTP REST
OMA DM
LwM2m
SORACOM Inventory integrates with Beam,
Funnel, Harvest
LwM2M Observe
LwM2M Notify
Public
Endpoints
SORACOM Beam
SORACOM Funnel
Amazon Kinesis
Family
Microsoft Azure
EventHubs
AWS IoT
Google Cloud
Pub/Sub
SORACOM
Harvest
• Remote Measurement Service “GENNECT Remote”
On-demand SSH Tunnel by Inventory command
Customer reference:
SSH
1. HTTP POST
/v1/devices/<deviceId>/14/0/3/execute
2. CoAP
POST /14/0/3
3. Establish SSH tunnel
Admin
SORACOM KryptonK
Secure Provisioning
Steps to connect devices to cloud in general
1. Register device/user
2. Credentials and
configuration
3. Securely copy
credentials and
configuration
4. Authenticate & Connect
Cloud Service
User
Device
Steps to connect devices to cloud
-- For Production --
1. Register device/user
3. Securely copy credentials
and configuration
2. Credentials
and configuration
4. Embed during
manufacturing
process
Batch operations way
before using service
Risk on credentials
breach
Increased cost and
lead time
5. Authenticate and
Connect
SORACOM Krypton
Secure Provisioning for SIM authenticated clients
SORACOM
Krypton
1. SIM authentication
2. Register device on behalf
Two authentication options based on SORACOM Endorse
- Option 1: Connect to endpoint accessible only with SORACOM Air for cellular
- Option 2: Run SIM AKA authentication over any access link incl. WiFi and Ethernet
Cloud ServiceDevice 4. Establish secure link
3. Credentials and
configuration
SORACOM Krypton removes all concerns
-- Zero touch provisioning for Production --
1. Register device/user
3. Securely copy credentials
and configuration
2. Credentials
and configuration
4. Embed during
manufacturing
process
Batch operations way
before using service
Risk on credentials
breach
Increased cost and
lead time
SIM Authentication&
Secure Zero Touch
SORACOM Krypton example scenario
SORACOM
Krypton
1. SIM authentication
2. Automatically register a “Thing”
3. Private Key,
Certificate
Automatic “Thing” registration and bootstrapping for AWS IoT
AWS
IoT
4. Connect with MQTTS by using AWS Device SDK
SORACOM Krypton example scenario
SORACOM
Krypton
SIM authentication Login
AWS Temporary
Credentials
Amazon
Cognito
Kinesis
Video
Stream
Use most reasonable access link for streaming video
Cellular
WiFi
SORACOM Krypton Pricing
• Secure Provisioning request fee
• 1.8 USD / SIM (w/o tax)
• No additional recurring charge if it is only for one time
provisioning
• No additional cost for requests within the same month
as initial provisioning
• Reduced fee for continuous use after the first month
• 0.4 USD / Month / SIM (w/o tax)
Additional cloud integration options enabled by
SORACOM Krypton
Public
Endpoints
Cloud
Services
SORACOM
Air
SORACOM Beam
SORACOM Funnel
Microcontroller
s and Cellular
only devices
Edge gateways
and rich devices
w/ multiple
connectivity
options
SORACOM
Krypton
Zero touch provisioning and
Establish secure link
Light Edge
Architecture
Edge heavy
Architecture
SORACOM LagoonL
Managed Dashboard
《 SORACOM Lagoon 》
SORACOM Lagoon
Managed Dashboard backed by
SORACOM Harvest
Adds metadata
- SIM ID (IMSI)
- Device ID (IMEI)
- Timestamp
Simple
Protocol
IoT
Consumers
SORACOM
Lagoon
Dashboard
IoT Service
Providers
Configure
Steps to create Dashboard(s)
1. Select data source
1. Choose visualization type
that fits data
1. Repeat as many times as
you want!
•Any data sources supported by SORACOM
Harvest can be visualized
Integrated with SORACOM Harvest
3G
LTE
LTE-M
LoRa
Sigfox
Inventory
Data Source SORACOM Harvest SORACOM Lagoon
Alerting
• Sends notification when a threshold is crossed
• Email
• Webhook, etc
• GUI for configuring alert thresholds
Alert
SORACOM Partner Space
Device
Partner
Solution
Partner
Integration
Partner
Applied-Partners more
than 200 companies
Authorized partner
45 companies
Network
Partner
7/17/18 Confidential 30
26 Device Partners 60 Solution Partners
11 Integration
Partners
4 Network
Partners
SPS Authorized Partners (7/4/2018)
SORACOM Certified Devices
Gateways Routers Modules Terminals/Dongles
GPS Trackers Camera and others
©2016 SORACOM, INC 33
SORACOM Air
Advanced topics
• SIMs that SORACOM issues and authenticates
SORACOM SIM plan01s
Existing SORACOM Air SIM case
1. Authentication
Partner
MNO’s HLR
2. Data
session
SORACOM Air SIM plan01s case
SORACOM owned
HLR
1. Authentication
2. Data
Session
SORACOM issues and authenticates
SORACOM SIM plan01s
Customer benefits – More flexible pricing
Ready
Active /
Inactive
Terminated
SIM
Lifecycle
• Reduced cost while SIM is not used
• Added new state `standby` for SIMs not used after activation
Basic fee
0.0 USD
Basic fee
0.0 USD
Basic fee
0.06 USD
Suspended
Rejects connection requests
Basic fee
0.0 USD
Standby
Automatically activated
upon connection request
Basic fee
0.0 USD
Activation fee: 1.8 USD
Test before shipping
When to benefit from Standby state
Automatic activation when
turning them on
SIM status:
Active
SIM status:Standby ->
Active
SIM status:
Standby
Shipment
Maker End users
SORACOM Air Event handler
notifies SIM status updates
Customer benefit – Support for embedded SIMs
MFF2
Smaller
6mm×5mm
Higher resistance to
Severe temperature
Vibration
Humidity
SORACOM delivers SMS to devices upon API call
New feature: Secure SMS API
(Supported only on plan01s as of writing)
Low cost: SORACOM directly delivers SMS. Users do not have to pay MO SMS fee
Secure: Only an authorized API caller can send SMS to devices
(An attacker cannot send SMS to a device even if they got the number)
SORACOM
SMSC
1. POST
/v1/subscribers/<imsi>/send_sms
2. Accepted
3. Delivers SMS
• Put devices into sleep mode and wakes up on demand
• Push configuration information
• Command execution
Use cases for SMS API
Wakeup
!
APN = soracom.io
Connect to
server.example.co
m
ssh
server.example.com
Public
Endpoints
SORACOM Beam
SORACOM Beam, Funnel, Harvest USSD Endpoint
SORACOM Funnel
Amazon Kinesis
Family
Microsoft Azure
EventHubs
AWS IoT
Google Cloud
Pub/Sub
• Bridge to Public HTTPS endpoints → SORACOM Beam
• Send out to cloud services → SORACOM Funnel
• Collect and visualize on SORACOM → SORACOM Harvest
SORACOM
Harvest (Available only
on plan01s)
*{Service Code}*{data string}#
<Service Code>
`901011` ... SORACOM Beam
`901021` ... SORACOM Funnel
`901031` ... SORACOM Harvest
SORACOM
Lagoon
•Example: On-demand, low power telemetry
SMS API & USSD Endpoint
SORACOM
SMSC
1. POST
/v1/subscribers/<imsi>/send_sms
2. SMS
SORACOM
USSD GW
3. USSD
(Location, Sensor data
)
©2016 SORACOM, INC 42
You Create. We Connect.

More Related Content

Similar to Let soracom help your IoT devices connect to the cloud!

Soracom iot handsonworkshop_canada_uploads
Soracom iot handsonworkshop_canada_uploadsSoracom iot handsonworkshop_canada_uploads
Soracom iot handsonworkshop_canada_uploads
Soracom Global, Inc.
 
Soracom iot hands-on workshop in Montreal
Soracom iot hands-on workshop in MontrealSoracom iot hands-on workshop in Montreal
Soracom iot hands-on workshop in Montreal
Soracom Global, Inc.
 
Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018
Soracom Global, Inc.
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
SORACOM,INC
 
Soracom services for smart cities and homes feb2018
Soracom services for smart cities and homes feb2018Soracom services for smart cities and homes feb2018
Soracom services for smart cities and homes feb2018
Soracom Global, Inc.
 
Sigfox Makers Tour - Copenhagen
Sigfox Makers Tour - CopenhagenSigfox Makers Tour - Copenhagen
Sigfox Makers Tour - Copenhagen
Nicolas Lesconnec
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
JT IoT
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Julien Vermillard
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
Samsung Open Source Group
 
OMNITRACKER Core Components
OMNITRACKER Core ComponentsOMNITRACKER Core Components
OMNITRACKER Core ComponentsMichael Dobner
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdf
DimitrisLogothetis10
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
Digicomp Academy AG
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
Soracom Global, Inc.
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagement
Axiros
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Benjamin Cabé
 
API WORLD 2017: Simple Devices x Smart APIs
API WORLD 2017: Simple Devices x Smart APIsAPI WORLD 2017: Simple Devices x Smart APIs
API WORLD 2017: Simple Devices x Smart APIs
Soracom Global, Inc.
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
tawi123
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
SORACOM,INC
 
Open web device as the reference feature phone
Open web device as the reference feature phoneOpen web device as the reference feature phone
Open web device as the reference feature phone
Miguel Schneider
 
SORACOM-Global Hands-on Series: SORACOM Harvest
SORACOM-Global Hands-on Series: SORACOM HarvestSORACOM-Global Hands-on Series: SORACOM Harvest
SORACOM-Global Hands-on Series: SORACOM Harvest
SORACOM
 

Similar to Let soracom help your IoT devices connect to the cloud! (20)

Soracom iot handsonworkshop_canada_uploads
Soracom iot handsonworkshop_canada_uploadsSoracom iot handsonworkshop_canada_uploads
Soracom iot handsonworkshop_canada_uploads
 
Soracom iot hands-on workshop in Montreal
Soracom iot hands-on workshop in MontrealSoracom iot hands-on workshop in Montreal
Soracom iot hands-on workshop in Montreal
 
Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018Kenta Yasukawa - IoT World 2018
Kenta Yasukawa - IoT World 2018
 
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real worldRakuten Tech Conference 2017 | SORACOM and IoT in the real world
Rakuten Tech Conference 2017 | SORACOM and IoT in the real world
 
Soracom services for smart cities and homes feb2018
Soracom services for smart cities and homes feb2018Soracom services for smart cities and homes feb2018
Soracom services for smart cities and homes feb2018
 
Sigfox Makers Tour - Copenhagen
Sigfox Makers Tour - CopenhagenSigfox Makers Tour - Copenhagen
Sigfox Makers Tour - Copenhagen
 
Creating a smarter world with eSIM
Creating a smarter world with eSIMCreating a smarter world with eSIM
Creating a smarter world with eSIM
 
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
Iot Conference Berlin M2M,IoT, device management: one protocol to rule them all?
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
OMNITRACKER Core Components
OMNITRACKER Core ComponentsOMNITRACKER Core Components
OMNITRACKER Core Components
 
Camara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdfCamara Application Programming Interface (API) Overview.pdf
Camara Application Programming Interface (API) Overview.pdf
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
From eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the ManufacturingFrom eSIMs to iSIMs: It’s Inside the Manufacturing
From eSIMs to iSIMs: It’s Inside the Manufacturing
 
Axiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagementAxiros tr069-smartmicrogrid-devicemanagement
Axiros tr069-smartmicrogrid-devicemanagement
 
Building the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetupBuilding the Internet of Things with Eclipse IoT - IoTBE meetup
Building the Internet of Things with Eclipse IoT - IoTBE meetup
 
API WORLD 2017: Simple Devices x Smart APIs
API WORLD 2017: Simple Devices x Smart APIsAPI WORLD 2017: Simple Devices x Smart APIs
API WORLD 2017: Simple Devices x Smart APIs
 
Introduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & GatewaysIntroduction to SMS, MMS, Modems & Gateways
Introduction to SMS, MMS, Modems & Gateways
 
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
FiSH 2017 (Fukuoka International Startup Hub)| SORACOM The secure, scalable, ...
 
Open web device as the reference feature phone
Open web device as the reference feature phoneOpen web device as the reference feature phone
Open web device as the reference feature phone
 
SORACOM-Global Hands-on Series: SORACOM Harvest
SORACOM-Global Hands-on Series: SORACOM HarvestSORACOM-Global Hands-on Series: SORACOM Harvest
SORACOM-Global Hands-on Series: SORACOM Harvest
 

Recently uploaded

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Let soracom help your IoT devices connect to the cloud!

  • 1. ©2016 SORACOM, INC 1 Let SORACOM help your IoT devices connect to the Cloud!
  • 2. Public Endpoints SORACOM Beam SORACOM bridges gap b/w constraint devices and cloud SORACOM Funnel Amazon Kinesis Family Microsoft Azure EventHubs AWS IoT Google Cloud Pub/Sub • Securely connect to public endpoints → SORACOM Beam • Send data to cloud services → SORACOM Funnel • Collect and visualize data on SORACOM → SORACOM Harvest SORACOM Harvest Simple, Low overhead protocols - TCP / UDP raw socket - HTTP, MQTT - LoRaWAN, Sigfox Secure, Full fledged protocols - TCP over TLS - HTTPS, MQTTS Secure link SORACOM Air enables
  • 3. ©2016 SORACOM, INC 3 SORACOM Beam: Data Transfer Support Internet Service Server A Server B Simple, Low overhead protocol - TCP / UDP raw socket - HTTP - MQTT ISP MNO Things Base station Transfer with Secure protocol - HTTPS - TCP over TLS - MQTTS Add metadata - SIM ID (IMSI) - Device ID (IMEI) - Timestamp
  • 4.
  • 5. Case Study: WHILL SORACOM Beam to: - offload authentication - reduce overhead Personal Mobility Device connected w/ SORACOM Air
  • 6.
  • 7. ©2016 SORACOM, INC 7 What if the destination is a managed cloud service with public API?
  • 8. ©2016 SORACOM, INC 8 1. Configure your cloud resource ID and credentials 2. Send data from your devices SORACOM Funnel: Cloud Resource Adaptor Authentication information Cloud services Simple protocol Protocol conversion Authentication logic Buffering Error handling TCP UDP HTTP SORACOM Funnel
  • 9. ©2016 SORACOM, INC 9 Supported Cloud Adaptors Amazon Kinesis Stream Amazon Kinesis Firehose Azure Event Hubs TCP UDP HTTP Encryption Attach authentication information AWS Lambda Kinesis App Amazon S3 Amazon Redshift Stream Analytics Power BI Machine Learning
  • 10. Case Study: DyDo SORACOM Funnel to securely and easily collect data to Amazon S3 SORACOM Air connected Vending Machines
  • 11. SORACOM Harvest: Data Collection & Visualization Indexes and stores data from your devices Data can be retrieved through API and Web console Adds metadata - SIM ID (IMSI) - Device ID (IMEI) - Timestamp Simple Protocol Indexed time series data via API / web console
  • 12. SORACOM Inventory: Device Management Devices with Non-Standard Object Model User Device Object Model Definition (XML/JSON)< /> HTTP REST OMA DM LwM2m
  • 13. SORACOM Inventory integrates with Beam, Funnel, Harvest LwM2M Observe LwM2M Notify Public Endpoints SORACOM Beam SORACOM Funnel Amazon Kinesis Family Microsoft Azure EventHubs AWS IoT Google Cloud Pub/Sub SORACOM Harvest
  • 14. • Remote Measurement Service “GENNECT Remote” On-demand SSH Tunnel by Inventory command Customer reference: SSH 1. HTTP POST /v1/devices/<deviceId>/14/0/3/execute 2. CoAP POST /14/0/3 3. Establish SSH tunnel Admin
  • 16. Steps to connect devices to cloud in general 1. Register device/user 2. Credentials and configuration 3. Securely copy credentials and configuration 4. Authenticate & Connect Cloud Service User Device
  • 17. Steps to connect devices to cloud -- For Production -- 1. Register device/user 3. Securely copy credentials and configuration 2. Credentials and configuration 4. Embed during manufacturing process Batch operations way before using service Risk on credentials breach Increased cost and lead time 5. Authenticate and Connect
  • 18. SORACOM Krypton Secure Provisioning for SIM authenticated clients SORACOM Krypton 1. SIM authentication 2. Register device on behalf Two authentication options based on SORACOM Endorse - Option 1: Connect to endpoint accessible only with SORACOM Air for cellular - Option 2: Run SIM AKA authentication over any access link incl. WiFi and Ethernet Cloud ServiceDevice 4. Establish secure link 3. Credentials and configuration
  • 19. SORACOM Krypton removes all concerns -- Zero touch provisioning for Production -- 1. Register device/user 3. Securely copy credentials and configuration 2. Credentials and configuration 4. Embed during manufacturing process Batch operations way before using service Risk on credentials breach Increased cost and lead time SIM Authentication& Secure Zero Touch
  • 20. SORACOM Krypton example scenario SORACOM Krypton 1. SIM authentication 2. Automatically register a “Thing” 3. Private Key, Certificate Automatic “Thing” registration and bootstrapping for AWS IoT AWS IoT 4. Connect with MQTTS by using AWS Device SDK
  • 21. SORACOM Krypton example scenario SORACOM Krypton SIM authentication Login AWS Temporary Credentials Amazon Cognito Kinesis Video Stream Use most reasonable access link for streaming video Cellular WiFi
  • 22. SORACOM Krypton Pricing • Secure Provisioning request fee • 1.8 USD / SIM (w/o tax) • No additional recurring charge if it is only for one time provisioning • No additional cost for requests within the same month as initial provisioning • Reduced fee for continuous use after the first month • 0.4 USD / Month / SIM (w/o tax)
  • 23. Additional cloud integration options enabled by SORACOM Krypton Public Endpoints Cloud Services SORACOM Air SORACOM Beam SORACOM Funnel Microcontroller s and Cellular only devices Edge gateways and rich devices w/ multiple connectivity options SORACOM Krypton Zero touch provisioning and Establish secure link Light Edge Architecture Edge heavy Architecture
  • 26. SORACOM Lagoon Managed Dashboard backed by SORACOM Harvest Adds metadata - SIM ID (IMSI) - Device ID (IMEI) - Timestamp Simple Protocol IoT Consumers SORACOM Lagoon Dashboard IoT Service Providers Configure
  • 27. Steps to create Dashboard(s) 1. Select data source 1. Choose visualization type that fits data 1. Repeat as many times as you want!
  • 28. •Any data sources supported by SORACOM Harvest can be visualized Integrated with SORACOM Harvest 3G LTE LTE-M LoRa Sigfox Inventory Data Source SORACOM Harvest SORACOM Lagoon
  • 29. Alerting • Sends notification when a threshold is crossed • Email • Webhook, etc • GUI for configuring alert thresholds Alert
  • 30. SORACOM Partner Space Device Partner Solution Partner Integration Partner Applied-Partners more than 200 companies Authorized partner 45 companies Network Partner 7/17/18 Confidential 30
  • 31. 26 Device Partners 60 Solution Partners 11 Integration Partners 4 Network Partners SPS Authorized Partners (7/4/2018)
  • 32. SORACOM Certified Devices Gateways Routers Modules Terminals/Dongles GPS Trackers Camera and others
  • 33. ©2016 SORACOM, INC 33 SORACOM Air Advanced topics
  • 34. • SIMs that SORACOM issues and authenticates SORACOM SIM plan01s Existing SORACOM Air SIM case 1. Authentication Partner MNO’s HLR 2. Data session SORACOM Air SIM plan01s case SORACOM owned HLR 1. Authentication 2. Data Session SORACOM issues and authenticates SORACOM SIM plan01s
  • 35. Customer benefits – More flexible pricing Ready Active / Inactive Terminated SIM Lifecycle • Reduced cost while SIM is not used • Added new state `standby` for SIMs not used after activation Basic fee 0.0 USD Basic fee 0.0 USD Basic fee 0.06 USD Suspended Rejects connection requests Basic fee 0.0 USD Standby Automatically activated upon connection request Basic fee 0.0 USD Activation fee: 1.8 USD
  • 36. Test before shipping When to benefit from Standby state Automatic activation when turning them on SIM status: Active SIM status:Standby -> Active SIM status: Standby Shipment Maker End users SORACOM Air Event handler notifies SIM status updates
  • 37. Customer benefit – Support for embedded SIMs MFF2 Smaller 6mm×5mm Higher resistance to Severe temperature Vibration Humidity
  • 38. SORACOM delivers SMS to devices upon API call New feature: Secure SMS API (Supported only on plan01s as of writing) Low cost: SORACOM directly delivers SMS. Users do not have to pay MO SMS fee Secure: Only an authorized API caller can send SMS to devices (An attacker cannot send SMS to a device even if they got the number) SORACOM SMSC 1. POST /v1/subscribers/<imsi>/send_sms 2. Accepted 3. Delivers SMS
  • 39. • Put devices into sleep mode and wakes up on demand • Push configuration information • Command execution Use cases for SMS API Wakeup ! APN = soracom.io Connect to server.example.co m ssh server.example.com
  • 40. Public Endpoints SORACOM Beam SORACOM Beam, Funnel, Harvest USSD Endpoint SORACOM Funnel Amazon Kinesis Family Microsoft Azure EventHubs AWS IoT Google Cloud Pub/Sub • Bridge to Public HTTPS endpoints → SORACOM Beam • Send out to cloud services → SORACOM Funnel • Collect and visualize on SORACOM → SORACOM Harvest SORACOM Harvest (Available only on plan01s) *{Service Code}*{data string}# <Service Code> `901011` ... SORACOM Beam `901021` ... SORACOM Funnel `901031` ... SORACOM Harvest SORACOM Lagoon
  • 41. •Example: On-demand, low power telemetry SMS API & USSD Endpoint SORACOM SMSC 1. POST /v1/subscribers/<imsi>/send_sms 2. SMS SORACOM USSD GW 3. USSD (Location, Sensor data )
  • 42. ©2016 SORACOM, INC 42 You Create. We Connect.