Upload
nguyentuyen
View
216
Download
1
Embed Size (px)
Citation preview
www.imgtec.com
Kevin McDermott
Director of IoT Marketing
Connected Processors and FlowCloud IP: Integrating and Securing end-to-end IoT
© Imagination Technologies Confidential 2
IoT is not a market
Understanding the nature of business
Changing the relationships: from product supplier -> service provider
Real-time analytics will give fundamental understanding and insight
The real opportunity for IoT is that it
enables the transformation of a product
focused business into a service business.
But will dramatically affect many markets and segments
© Imagination Technologies Confidential 3
Connected devices
Cloud connectivity allows
Aggregate data analysis
Real-time analysis
Reconfigure sensor nodes
Management of devices
Local analytics
Smart devices that monitor and control locally
Collect and assemble data into informational points of value
Device management includes revisions and updates to analytics process and policy
Data becomes Information with local analytics
© Imagination Technologies Confidential 4
Connected Processors IoT node devices with local processing and connectivity
Collect and Analyze Data
Device Control & Response
MIPS Sensor
Control
PowerVR
GPU
MIPS MIPS MIPS
Ensigma
RPU Control
Control
Sensor Sensor
PowerVR
Video
Sensors: - Accelerometers
- Gyroscopes
- digital compasses
- inertial modules
- pressure sensors
- microphones
- temperature sensors
- touch sensors
- EEG/ECG
- Pulse
- Temperature
- Blood Pressure
- Glucose
- etc.
Control: - Motor
- Actuators
- Switches
- Gauges
- Valves
- etc.
Communications: - Bluetooth, BTLE
- Cellular 2G/3G, LTE
- WiFi
- ZigBee/Thread
- Wireline
- Powerline
- etc.
Processing: - Sensor data
- Protocol stack
- User Interface
- Data analytics
- Power management
- Security
- etc.
Cloud: - Device management
- Data analytics
- Data Aggregation
- Services
-etc.
Control MIPS
Application
MIPS
Ensigma
MIPS
Sensor System
Functions
Virtualization
© Imagination Technologies Confidential 5
IoT Integration starts with sensors Sensor algorithms key for local analytics
“With a feature set tailored for wearables
and IoT end nodes, ARTIK 1 is a mobile
workhorse.”, Samsung Electronics Co.,
Ltd. IoT World, May 2015
MIPS M5100
Sensor hubs for accelerometers,
gyroscopes, pressure sensors,
and others
MIPS PIC32
9-Axis sensors
Accelerometer/Magnetometer
and Gyroscope
MIPS microAptiv 250MHz
MIPS microAptiv 80MHz
9-Axis motion sensor
© Imagination Technologies Confidential 6
IPv6
IoT Device Protocol Stack Simplified view of key layers
oneM2M (Common Service Layer)
PHY Layer
DataLink
Transport
Network
Application
Bluetooth 4.2 LE
WiFi 802.11ah
WiFi 802.11n 802.11ac
6LoWPan
UDP TCP
Application #1 Application #2 Application #n
HTTP CoAP
Standards
Software Layer
Hardware Layer
IEEE 802.15.4
LTE
DTLS TLS
OMA LWM2M
Thread
LTE Cat (0)
“Insert additional IoT standards for your application or industry here …………”
© Imagination Technologies Confidential 7
Device centric approach
Device management tasks
Registration
Authentication
Security
Notifications
Updates
Remote control
© Imagination Technologies Confidential 8
Continuity from development to deployment Covers devices to cloud for communication and control
IP Device SW Bridge Internet Access
Cloud Service Eco
system Big
Data
end-end management and control
Apps builder Device Management Device Communications Dashboards
© Imagination Technologies Confidential 9
Scalability
Load balancer
Handles initial request & dispatches to multiple API servers
DNS entries
Enables the employment of multiple load balancers
Partitioned API design
Enables independent scaling of different API methods, and
allows for multiple, independent databases
Database layers
Employs separation of reads and writes,
Sharding
Splitting records in one table across multiple storage servers
Multiple techniques for scaling cloud activities
© Imagination Technologies Confidential 10
Security and privacy
Security is not added at the end
Starts with the system design objectives
Enhanced over time
new threats identified
use-case expands
IoT attacks and threats
Identified with use-case and application purpose
Evolving requirements
New use-case’s and applications
Enhanced and adapted security
IoT devices require always-on, always-connected, always-protected
Privacy
Rights and access to information
Permissions for data and applications for
reuse, distribution and disclosures
Scope of use and intent of applications
access to information
© Imagination Technologies Confidential 11
System security
Device to server communications
Secured using Transport Layer Security (TLS)
Prevents anyone from being able to intercept your data
Signing according to OAuth specification
Pre-shared secret prevents rogue client from being able to either impersonate your device
Timestamp prevents people from being able to replay captured packets
API require these additional requests (beyond TLS)
Devices have to be registered and logged in with user credentials
OmniShield with hardware and software for multiple secure domains in SoC’s for devices
Service access restricted by device type
OAuth keys and user (role-based) and follows the “Principle of least privilege”
Define rights and privileges for developers, operators and users
© Imagination Technologies Confidential 12
Clo
ud
S
erv
ice
s
Link Layer
IoT Device
Communication
Network
Data
Processing
Data
Analytics
Big Data &
Services
IoT
T
hin
gs
IoT Functions and Protocols Device communications – IoT Things to Cloud services
IPv6
IEEE 802.15.4
AMQP XMPP SNMP
Bluetooth 4.2
Wi-Fi 802.11ah
LTE Cat (0)
Wi-Fi 802.11n 802.11ac
LTE 2/3G Powerline Ethernet
802.3
Storm Kafka RabbitMQ Flume
Hbase MongoDB Cassandra Hadoop
Device
Management
Data
Aggregation Data
Storage
Data
Analytics Business
Services Security
Services
CouchDB
MQTT RESTfulAPI
CoAP
6LoWPan
Scribe Fluentd
MySQL
TR-069 ZigBee
Payment
& Billing
Bluetooth 4.2
DTLS UDP TCP TLS HTTP
Software Layer
Hardware Layer
Cloud Services
© Imagination Technologies Confidential 13
Provisioning & deploying devices Develop, deploy, activate and maintain
Built-in supply chain support
OEM, 3rd party apps, service providers
Back end tools for device
provisioning and permissions
Device Types
Provisioned in FlowCloud
Licensee defined names
Have associated API Key
Can be grouped
Firmware management & over-the-air
updates
Tracking and security for binary images to devices
© Imagination Technologies Confidential 14
IoT project quick start guide
Developer account for on-line resources
Multiple development teams and delegates
Multiple appliances for custom developments
Active developer community & forum
Install getting started app: MakeItFlow
Quickly establish Wi-Fi connection to the board
© Imagination Technologies Confidential 15
Select a development board Or port the open source SDK to any system of your choice
Board Wi-Fire Creator CI20 Price $79 $65
Chip vendor MicroChip Ingenic
CPU MIPS - microAptiv MIPS32 CPU
Wi-Fi b/g b/g/n
GPU - SGX540
OS FreeRTOS Linux (Debian)
© Imagination Technologies Confidential 16
Summary Planning for scale is not just the billions of units:
Adapt and evolve analytics on devices and in the
cloud with MIPS/Ensigma/PowerVR and FlowCloud
Support distributed and tiered developers:
Provide provisions for delegates in supply chain
with FlowCloud development framework
Security end-to-end for IoT:
FlowCloud system security with OmniShield for
secure and trusted devices
www.imgtec.com/flowcloud