Saturn 2016
Yulian SlobodyanSerge Haziyev
Internet of ThingsReference Architecture& Case Studies
Internet of ThingsReference Architecture& Case Studies
“Look deep into nature, and thenyou will understand everything better.”~ Albert Einstein
CognitiveLoop Learn
Operate
ActSense
PeopleEnvironment
Things
CognitiveLoop
Learn
Operate
Act
Sense
Learn
Operate
Sense Act
CognitiveLoop
PeopleEnvironment
Things
Learn Act
Cloud
ActuatorsHMIs
SoftwareHardware
SensorsHMIs
Learn
Operate
ActSense
People& Things
Edge& Communication Data Applications
& Services
Act
Sense
Operate
Manage & Control
Link
Bridge
Interconnect
Contextualize
Ingest
Process
Store
Augment Intelligence
Augment Behavior
Reference Model
People& Things
Edge& Communication Data Applications
& Services
Environ-ment
Act World
Actuators
HC I
People
Things
Sense Link Bridge Interco-nnect
Context-ualize
Ingest
Process Store
Network MGNT
Configuration MGNT
SoftwareMGNT
Identity &Access MGNT
SecurityMGNT
InventoryMGNT
ProcessMGNT
DataMGNT
PKI Monitoring Log MGNT
AlertingManage
& Control
Operate
AugmentIntelligence
AugementBehavior
Sensors
HC I
Software Hardware
WSN EdgeGateways
IP-EnabledDevices
EventProcessing
BatchProcessing
DataPipelines
Bus
Wired
Other
Cellular SocialReporting
Analytics
ML
Search
Appli-cations
Services M2M
Work-flows
3rd-party
Events
Batch
LPWAN
Satellite
Fiber
Copper
Time-series
NoSQL
DFS
RDBMS
Long-term
Implementation View
People& Things
Edge& Communication Data Applications
& Services
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
Security
Maintainability
Reliability
High-Availability
Performance
Interoperability
Security
Maintainability
High-Availability
Performance
Security
Maintainability
Configurability
Fault-tolerance
Interoperability
Quality Attributes
Backdoor Accounts
UART Access
Unencrypted Storage
Remote Shell Access
Cleartext Local API
Cleartext Cloud API
Known VulnerabilitiesThat Ship With New Devices
People& Things
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
People & Things: Tactics
Hardware Root of Trust (TPM/SE/Kerkey/
STSAFE-A)
Trusted Execution Environment (TEE)
Secure onboardingand provisioning
process (HSM)
Firmware verification
Physical tampering detection
Strong encryptionStrong authentication
of interactions (network, peripherals)
Freezers and fridges monitoring and management solution.Cloud based services allowing bidirectional communication to hundreds thousands sensors/actuators for data collection/remote assets management and analytics.
Designed to scale up to hundredsthousands devices Operational expenses
optimizationMarketing insights based onuser behavior analyticsImproved supply chain and logistics
Business Value
Case Study:Smart Fridges Solution
Cloud Architecture
Raw Storage(S3)
Staging Storage
(S3)Report
(Redsift)
Journal(Graphite / InfluxDB)
CommunicationServers
Actions
UI
SendCommands
DeviceConfigurationManagement
CustomImplem. CoAP LWM2M CoAP
Mapping
UI
Device / Master Data
Mappings
BatchProcessing
(Spark)
UI / API
MDM Core
Mapping
Master Data
UI / API
Import /Export
Dictionaries& Operations
Device ManagementMaster DataManagement
Import / Export
AnalyticalReports
OperationalReports
ReportingPlatform
InteractiveJournal
(HighCharts)
Data collection,Reporting Operational / Analytical
BatchLayer
SpeedLayer
WebPortal
Streaming &Enrichment
(Spark)EventBroker(Kafka)
Sensors Hardware
WAN: GSMGateway nodes: ARM8Leaf nodes: ARM Cortex M4Sensor Network: I C, RFSensors: Light, temperature, AC/DC, camera, weight, other
2
AnalyticsDashboard
DEMOcraticIoT
Icons created by Simon Child from Noun Project
User
ContractOwner
BlockchainContract
SensorGateway
TechSupport
InfrastructureProviders
SensorsOwner
Sound LevelSensors
Real-timeDashboard
OperationalAnalytics
Back to the nature: IoT systems resemble Human as an organism and Human society as an organization of services and devicesSEI Architectural methods such as ATAM and ADD are well applicable to IoT domain - Quality Attributes and Tactics help design and evaluate complex IoT solutionsSecurity is a significant challenge in IoT adoption, but most vendors have started realizing it and we will see improvements soon
Summary
Questions