SlideShare a Scribd company logo
1 of 18
Download to read offline
Saturn 2016
Yulian Slobodyan
Serge Haziyev
Internet of Things
Reference Architecture
& Case Studies
“Look deep into nature,
and then
you will understand
everything better.”
~ Albert Einstein
Cognitive
Loop Learn
Operate
ActSense
People
Environment
Things
Cognitive
Loop
Learn
Operate
Act
Sense
Learn
Operate
Sense Act
Cognitive
Loop
People
Environment
Things
Learn Act
Cloud
Actuators
HMIs
Software
Hardware
Sensors
HMIs
Learn
Operate
ActSense
People
& Things
Edge
& Communication
Data
Applications
& Services
Act
Sense
Operate
Manage & Control
Link
Bridge
Interconnect
Contextualize
Ingest
Process
Store
Augment Intelligence
Augment Behavior
Reference Model
People
& Things
Edge
& Communication
Data
Applications
& Services
Environ-
ment
Act World
Actuators
HCI
People
Things
Sense Link Bridge Interco-
nnect
Context-
ualize
Ingest
Process Store
Network
MGNT
Configuration
MGNT
Software
MGNT
Identity &
Access MGNT
Security
MGNT
Inventory
MGNT
Process
MGNT
Data
MGNT
PKI Monitoring Log
MGNT
Alerting
Manage
& Control
Operate
Augment
Intelligence
Augement
Behavior
Sensors
HCI
Software Hardware
WSN Edge
Gateways
IP-
Enabled
Devices
Event
Processing
Batch
Processing
Data
Pipelines
Bus
Wired
Other
Cellular Social
Reporting
Analytics
ML
Search
Appli-
cations
Services M2M
Work-
flows
3rd-party
Events
Batch
LPWAN
Satellite
Fiber
Copper
Time-
series
NoSQL
DFS
RDBMS
Long-
term
Implementation View
People
& Things
Edge
& Communication
Data
Applications
& Services
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
Security
Maintainability
Reliability
High-Availability
Performance
Interoperability
Security
Maintainability
High-Availability
Performance
Security
Maintainability
Configurability
Fault-tolerance
Interoperability
Quality Attributes
Backdoor Accounts
UART Access
Unencrypted Storage
Remote Shell Access
Cleartext Local API
Cleartext Cloud API
Known Vulnerabilities
That Ship With New Devices
People
& Things
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
People & Things: Tactics
Hardware Root of Trust
(TPM/SE/Kerkey/
STSAFE-A)
Trusted Execution
Environment (TEE)
Secure onboarding
and provisioning
process (HSM)
Firmware verification
Physical tampering
detection
Strong encryption
Strong authentication
of interactions (network,
peripherals)
Freezers and fridges monitoring and management solution.
Cloud based services allowing bidirectional communication to hundreds
thousands sensors/actuators for data collection/remote assets
management and analytics.
Designed to scale up to hundreds
thousands devices Operational expenses
optimization
Marketing insights based on
user behavior analytics
Improved supply chain
and logistics
Business Value
Case Study:
Smart Fridges Solution
Cloud Architecture
Raw Storage
(S3)
Staging
Storage
(S3)
Report
(Redsift)
Journal
(Graphite / InfluxDB)
Communication
Servers
Actions
UI
Send
Commands
Device
Configuration
Management
Custom
Implem. CoAP LWM2M CoAP
Mapping
UI
Device /
Master Data
Mappings
Batch
Processing
(Spark)
UI / API
MDM Core
Mapping
Master Data
UI / API
Import /
Export
Dictionaries
& Operations
Device Management
Master Data
Management
Import /
Export
Analytical
Reports
Operational
Reports
Reporting
Platform
Interactive
Journal
(HighCharts)
Data collection,
Reporting Operational / Analytical
Batch
Layer
Speed
Layer
Web
Portal
Streaming &
Enrichment
(Spark)
Event
Broker
(Kafka)
Sensors Hardware
WAN: GSM
Gateway nodes: ARM8
Leaf nodes: ARM Cortex M4
Sensor Network: I C, RF
Sensors: Light, temperature, AC/DC,
camera, weight, other
2
Analytics
Dashboard
DEMO
cratic
IoT
Icons created by Simon Child from Noun Project
User
Contract
Owner
Blockchain
Contract
Sensor
Gateway
Tech
Support
Infrastructure
Providers
Sensors
Owner
Sound Level
Sensors
Real-time
Dashboard
Operational
Analytics
Back to the nature: IoT systems resemble Human as an organism and
Human society as an organization of services and devices
SEI Architectural methods such as ATAM and ADD are well applicable
to IoT domain - Quality Attributes and Tactics help design and
evaluate complex IoT solutions
Security is a significant challenge in IoT adoption, but most vendors
have started realizing it and we will see improvements soon
Summary
Questions

More Related Content

What's hot

Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...IBM Analytics
 
IoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyIoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyAjeet Singh
 
Artificial Intelligence & IOT
Artificial Intelligence & IOTArtificial Intelligence & IOT
Artificial Intelligence & IOTAkber Khan
 
Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAjeet Singh
 
INTERNET OF THINGS - IOT world
INTERNET OF THINGS - IOT worldINTERNET OF THINGS - IOT world
INTERNET OF THINGS - IOT worldGaurav
 
The Internet of Things: Connecting the Future
The Internet of Things: Connecting the FutureThe Internet of Things: Connecting the Future
The Internet of Things: Connecting the FutureSunil Jagani
 
TZ Limited - IoT (Internet of Things) technology overview
TZ Limited - IoT (Internet of Things) technology overviewTZ Limited - IoT (Internet of Things) technology overview
TZ Limited - IoT (Internet of Things) technology overviewAndrew Bain
 
IoT & Blockchain: Use Case Overview
IoT & Blockchain: Use Case Overview IoT & Blockchain: Use Case Overview
IoT & Blockchain: Use Case Overview Kaleido Insights
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsNagarro
 
How iot is changing construction
How iot is changing construction How iot is changing construction
How iot is changing construction Vish Nandlall
 
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17] Knowledge Management and the Internet of Things - Katrina PughAIIM International
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!Ajeet Singh
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointDr. Mazlan Abbas
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsKate Carruthers
 

What's hot (19)

Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...Jen Q. Public: How analytics is impacting government, education and public sa...
Jen Q. Public: How analytics is impacting government, education and public sa...
 
IoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is KeyIoT Can Revolutionize Healthcare, But Security Is Key
IoT Can Revolutionize Healthcare, But Security Is Key
 
IoT
IoT  IoT
IoT
 
Artificial Intelligence & IOT
Artificial Intelligence & IOTArtificial Intelligence & IOT
Artificial Intelligence & IOT
 
Are You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of ThreatsAre You Safe in IOT? - Know About Different Types of Threats
Are You Safe in IOT? - Know About Different Types of Threats
 
INTERNET OF THINGS - IOT world
INTERNET OF THINGS - IOT worldINTERNET OF THINGS - IOT world
INTERNET OF THINGS - IOT world
 
The Internet of Things: Connecting the Future
The Internet of Things: Connecting the FutureThe Internet of Things: Connecting the Future
The Internet of Things: Connecting the Future
 
TZ Limited - IoT (Internet of Things) technology overview
TZ Limited - IoT (Internet of Things) technology overviewTZ Limited - IoT (Internet of Things) technology overview
TZ Limited - IoT (Internet of Things) technology overview
 
IoT & Blockchain: Use Case Overview
IoT & Blockchain: Use Case Overview IoT & Blockchain: Use Case Overview
IoT & Blockchain: Use Case Overview
 
Vision on the city of future
Vision on the city of futureVision on the city of future
Vision on the city of future
 
IOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of ThingsIOT 101 - A primer on Internet of Things
IOT 101 - A primer on Internet of Things
 
How iot is changing construction
How iot is changing construction How iot is changing construction
How iot is changing construction
 
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh[AIIM17]  Knowledge Management and the Internet of Things - Katrina Pugh
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
 
The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!The Next Big Thing In Mobile App Development – Trends 2019!
The Next Big Thing In Mobile App Development – Trends 2019!
 
Blockchain and AI
Blockchain and AIBlockchain and AI
Blockchain and AI
 
AI and Blockchain
AI and BlockchainAI and Blockchain
AI and Blockchain
 
Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022Top Technology Trends in IoT for 2022
Top Technology Trends in IoT for 2022
 
Internet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping PointInternet of Things (IOT) - The Tipping Point
Internet of Things (IOT) - The Tipping Point
 
Internet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business ModelsInternet of things: New Technology and its Impact on Business Models
Internet of things: New Technology and its Impact on Business Models
 

Similar to Slides Saturn-final

Internet of things | Research Directions in Green IoT and Case Studies
Internet of things | Research Directions in Green IoT and Case StudiesInternet of things | Research Directions in Green IoT and Case Studies
Internet of things | Research Directions in Green IoT and Case StudiesPraveen Hanchinal
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarBosnia Agile
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPayamBarnaghi
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012Arpan Pal
 
The Internet of Things: Tutorial for students
The Internet of Things: Tutorial for studentsThe Internet of Things: Tutorial for students
The Internet of Things: Tutorial for studentsDaeyoung Kim
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptxfanah4
 
Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesSai Srinivas Mittapalli
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)Virendra Thakur
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaCisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaAreaNetworking.it
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Den Reymer
 
Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Den Reymer
 
IoT_building block_new.docx
IoT_building block_new.docxIoT_building block_new.docx
IoT_building block_new.docxutpola
 
iot module 1 ppt.pptx
iot module 1 ppt.pptxiot module 1 ppt.pptx
iot module 1 ppt.pptxShreeDevi42
 
iot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfiot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfShreeDevi42
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An OverviewKnoldus Inc.
 

Similar to Slides Saturn-final (20)

Internet of things | Research Directions in Green IoT and Case Studies
Internet of things | Research Directions in Green IoT and Case StudiesInternet of things | Research Directions in Green IoT and Case Studies
Internet of things | Research Directions in Green IoT and Case Studies
 
Are you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana SeliškarAre you ready for IoT disruption? by Ana Seliškar
Are you ready for IoT disruption? by Ana Seliškar
 
Physical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City ApplicationsPhysical-Cyber-Social Data Analytics & Smart City Applications
Physical-Cyber-Social Data Analytics & Smart City Applications
 
Arpan pal u world2012
Arpan pal u world2012Arpan pal u world2012
Arpan pal u world2012
 
The Internet of Things: Tutorial for students
The Internet of Things: Tutorial for studentsThe Internet of Things: Tutorial for students
The Internet of Things: Tutorial for students
 
IoT.pptx
IoT.pptxIoT.pptx
IoT.pptx
 
Ai presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart citiesAi presentation on using of Artificial intelligence in smart cities
Ai presentation on using of Artificial intelligence in smart cities
 
FUTURE OF IOT
FUTURE OF IOTFUTURE OF IOT
FUTURE OF IOT
 
Internet of Things (IoT)
Internet of Things (IoT)Internet of Things (IoT)
Internet of Things (IoT)
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete IntuitivaCisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
 
Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017Gartner TOP 10 Strategic Technology Trends 2017
Gartner TOP 10 Strategic Technology Trends 2017
 
Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018Gartner Top 10 Strategy Technology Trends 2018
Gartner Top 10 Strategy Technology Trends 2018
 
IoT
IoTIoT
IoT
 
IoT_building block_new.docx
IoT_building block_new.docxIoT_building block_new.docx
IoT_building block_new.docx
 
iot module 1 ppt.pptx
iot module 1 ppt.pptxiot module 1 ppt.pptx
iot module 1 ppt.pptx
 
iot module 1 ppt (3).pdf
iot module 1 ppt (3).pdfiot module 1 ppt (3).pdf
iot module 1 ppt (3).pdf
 
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
 
IoT
IoTIoT
IoT
 
IOT Model An Overview
IOT Model An OverviewIOT Model An Overview
IOT Model An Overview
 

More from Yulian Slobodyan

Containerization - The DevOps Revolution
Containerization - The DevOps RevolutionContainerization - The DevOps Revolution
Containerization - The DevOps RevolutionYulian Slobodyan
 
Mono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationMono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationYulian Slobodyan
 
Security Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesSecurity Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesYulian Slobodyan
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsYulian Slobodyan
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Yulian Slobodyan
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsYulian Slobodyan
 
StreamInsight Breakthrough
StreamInsight BreakthroughStreamInsight Breakthrough
StreamInsight BreakthroughYulian Slobodyan
 

More from Yulian Slobodyan (11)

Containerization - The DevOps Revolution
Containerization - The DevOps RevolutionContainerization - The DevOps Revolution
Containerization - The DevOps Revolution
 
IoT, Demystified
IoT, DemystifiedIoT, Demystified
IoT, Demystified
 
Amazon Cloud Overview
Amazon Cloud OverviewAmazon Cloud Overview
Amazon Cloud Overview
 
Mono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR ImplementationMono - Alternative .NET CLR Implementation
Mono - Alternative .NET CLR Implementation
 
Security Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security IssuesSecurity Training: #4 Development: Typical Security Issues
Security Training: #4 Development: Typical Security Issues
 
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and ToolsSecurity Training: #3 Threat Modelling - Practices and Tools
Security Training: #3 Threat Modelling - Practices and Tools
 
Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?Security Training: #1 What Actually a Security Is?
Security Training: #1 What Actually a Security Is?
 
Security Training: #2 Cryptography Basics
Security Training: #2 Cryptography BasicsSecurity Training: #2 Cryptography Basics
Security Training: #2 Cryptography Basics
 
.NET Micro Framework
.NET Micro Framework.NET Micro Framework
.NET Micro Framework
 
eBiz#3: CEP
eBiz#3: CEPeBiz#3: CEP
eBiz#3: CEP
 
StreamInsight Breakthrough
StreamInsight BreakthroughStreamInsight Breakthrough
StreamInsight Breakthrough
 

Slides Saturn-final

  • 1. Saturn 2016 Yulian Slobodyan Serge Haziyev Internet of Things Reference Architecture & Case Studies
  • 2. “Look deep into nature, and then you will understand everything better.” ~ Albert Einstein
  • 6. People & Things Edge & Communication Data Applications & Services Act Sense Operate Manage & Control Link Bridge Interconnect Contextualize Ingest Process Store Augment Intelligence Augment Behavior Reference Model
  • 7. People & Things Edge & Communication Data Applications & Services Environ- ment Act World Actuators HCI People Things Sense Link Bridge Interco- nnect Context- ualize Ingest Process Store Network MGNT Configuration MGNT Software MGNT Identity & Access MGNT Security MGNT Inventory MGNT Process MGNT Data MGNT PKI Monitoring Log MGNT Alerting Manage & Control Operate Augment Intelligence Augement Behavior Sensors HCI Software Hardware WSN Edge Gateways IP- Enabled Devices Event Processing Batch Processing Data Pipelines Bus Wired Other Cellular Social Reporting Analytics ML Search Appli- cations Services M2M Work- flows 3rd-party Events Batch LPWAN Satellite Fiber Copper Time- series NoSQL DFS RDBMS Long- term Implementation View
  • 8. People & Things Edge & Communication Data Applications & Services Security Maintainability Reliability Durability & Resilience Power efficiency Invisibility Security Maintainability Reliability High-Availability Performance Interoperability Security Maintainability High-Availability Performance Security Maintainability Configurability Fault-tolerance Interoperability Quality Attributes
  • 9. Backdoor Accounts UART Access Unencrypted Storage Remote Shell Access Cleartext Local API Cleartext Cloud API Known Vulnerabilities That Ship With New Devices
  • 10. People & Things Security Maintainability Reliability Durability & Resilience Power efficiency Invisibility People & Things: Tactics Hardware Root of Trust (TPM/SE/Kerkey/ STSAFE-A) Trusted Execution Environment (TEE) Secure onboarding and provisioning process (HSM) Firmware verification Physical tampering detection Strong encryption Strong authentication of interactions (network, peripherals)
  • 11. Freezers and fridges monitoring and management solution. Cloud based services allowing bidirectional communication to hundreds thousands sensors/actuators for data collection/remote assets management and analytics. Designed to scale up to hundreds thousands devices Operational expenses optimization Marketing insights based on user behavior analytics Improved supply chain and logistics Business Value Case Study: Smart Fridges Solution
  • 12. Cloud Architecture Raw Storage (S3) Staging Storage (S3) Report (Redsift) Journal (Graphite / InfluxDB) Communication Servers Actions UI Send Commands Device Configuration Management Custom Implem. CoAP LWM2M CoAP Mapping UI Device / Master Data Mappings Batch Processing (Spark) UI / API MDM Core Mapping Master Data UI / API Import / Export Dictionaries & Operations Device Management Master Data Management Import / Export Analytical Reports Operational Reports Reporting Platform Interactive Journal (HighCharts) Data collection, Reporting Operational / Analytical Batch Layer Speed Layer Web Portal Streaming & Enrichment (Spark) Event Broker (Kafka)
  • 13. Sensors Hardware WAN: GSM Gateway nodes: ARM8 Leaf nodes: ARM Cortex M4 Sensor Network: I C, RF Sensors: Light, temperature, AC/DC, camera, weight, other 2
  • 16. Icons created by Simon Child from Noun Project User Contract Owner Blockchain Contract Sensor Gateway Tech Support Infrastructure Providers Sensors Owner Sound Level Sensors Real-time Dashboard Operational Analytics
  • 17. Back to the nature: IoT systems resemble Human as an organism and Human society as an organization of services and devices SEI Architectural methods such as ATAM and ADD are well applicable to IoT domain - Quality Attributes and Tactics help design and evaluate complex IoT solutions Security is a significant challenge in IoT adoption, but most vendors have started realizing it and we will see improvements soon Summary