Saturn 2016 Internet of Things Reference Architecture & Case Studies Yulian Slobodyan Serge Haziyev
“Look deep into nature, and then you will understand everything better.” ~ Albert Einstein
Cognitive Loop Learn Sense Act Operate
Cognitive Loop Learn Learn Act People Sense Act Environment Things Sense Operate Operate
Cognitive Loop Learn Cloud Learn Act People Sense Act Environment Sensors Actuators HMIs Things HMIs Operate Software Hardware
Reference Model People Edge Applications Data & Things & Communication & Services Act Link Contextualize Augment Intelligence Sense Bridge Ingest Augment Behavior Operate Interconnect Process Store Manage & Control
Implementation View People Edge Applications Data & Things & Communication & Services Act World Sense Link Bridge Context- Process Store Augment Interco- ualize Intelligence nnect ML Reporting Actuators People Sensors WSN Edge Event Time- Cellular Social Gateways Processing series Bus HC I Environ- HC I Analytics Search LPWAN NoSQL 3rd-party ment IP- Batch Enabled Processing Devices Augement Satellite DFS Wired Ingest Behavior Things Data Appli- Work- Pipelines Fiber RDBMS cations flows Other Events Operate Copper Long- Batch Services M2M term Software Hardware Manage & Control Network Configuration Software Identity & Security Inventory Process Data PKI Monitoring Log Alerting MGNT MGNT MGNT Access MGNT MGNT MGNT MGNT MGNT MGNT
Quality Attributes People Edge Applications Data & Things & Communication & Services Security Security Security Security Maintainability Maintainability Maintainability Maintainability Reliability Reliability High-Availability Configurability Durability & Resilience High-Availability Performance Fault-tolerance Power efficiency Performance Interoperability Invisibility Interoperability
Known Vulnerabilities That Ship With New Devices Cleartext Local API Unencrypted Storage Backdoor Accounts Cleartext Cloud API Remote Shell Access UART Access
People & Things: Tactics People & Things Security Hardware Root of Trust Secure onboarding Trusted Execution (TPM/SE/Kerkey/ and provisioning Environment (TEE) STSAFE-A) process (HSM) Maintainability Strong authentication Reliability Firmware verification Strong encryption of interactions (network, peripherals) Durability & Resilience Power efficiency Physical tampering detection Invisibility
Case Study: Smart Fridges Solution Designed to scale up to hundreds Business Value thousands devices Operational expenses optimization Freezers and fridges monitoring and management solution. Marketing insights based on Cloud based services allowing bidirectional communication to hundreds user behavior analytics thousands sensors/actuators for data collection/remote assets Improved supply chain management and analytics. and logistics
Cloud Architecture Master Data Import / Device Management Management Export Actions Mapping UI / API UI / API UI UI Device Import / Configuration MDM Core Export Management Device / Send Master Data Mapping Commands Mappings Master Data Dictionaries & Operations Custom CoAP LWM2M CoAP Implem. Batch Analytical Batch Layer Staging Reports Processing Report Storage Reporting (Spark) (Redsift) (S3) Platform Streaming & Operational Event Enrichment Reports Broker (Spark) (Kafka) Communication Journal Interactive Web Speed (Graphite / InfluxDB) Journal Servers Portal Layer (HighCharts) Raw Storage (S3) Data collection, Reporting Operational / Analytical
Sensors Hardware WAN: GSM Gateway nodes: ARM8 Leaf nodes: ARM Cortex M4 2 Sensor Network: I C, RF Sensors: Light, temperature, AC/DC, camera, weight, other
Analytics Dashboard
DEMO cratic IoT
Real-time Operational Dashboard Analytics Tech Support Blockchain Sensor Infrastructure User Contract Gateway Providers Contract Sound Level Sensors Owner Sensors Owner Icons created by Simon Child from Noun Project
Summary Back to the nature: IoT systems resemble Human as an organism and Human society as an organization of services and devices SEI Architectural methods such as ATAM and ADD are well applicable to IoT domain - Quality Attributes and Tactics help design and evaluate complex IoT solutions Security is a significant challenge in IoT adoption, but most vendors have started realizing it and we will see improvements soon
Questions
Recommend
More recommend