connected processors and flowcloud ip: integrating and ...... · real-time analytics will give...

17
www.imgtec.com Kevin McDermott Director of IoT Marketing Connected Processors and FlowCloud IP: Integrating and Securing end-to-end IoT

Upload: nguyentuyen

Post on 09-May-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

www.imgtec.com

Kevin McDermott

Director of IoT Marketing

Connected Processors and FlowCloud IP: Integrating and Securing end-to-end IoT

© Imagination Technologies Confidential 2

IoT is not a market

Understanding the nature of business

Changing the relationships: from product supplier -> service provider

Real-time analytics will give fundamental understanding and insight

The real opportunity for IoT is that it

enables the transformation of a product

focused business into a service business.

But will dramatically affect many markets and segments

© Imagination Technologies Confidential 3

Connected devices

Cloud connectivity allows

Aggregate data analysis

Real-time analysis

Reconfigure sensor nodes

Management of devices

Local analytics

Smart devices that monitor and control locally

Collect and assemble data into informational points of value

Device management includes revisions and updates to analytics process and policy

Data becomes Information with local analytics

© Imagination Technologies Confidential 4

Connected Processors IoT node devices with local processing and connectivity

Collect and Analyze Data

Device Control & Response

MIPS Sensor

Control

PowerVR

GPU

MIPS MIPS MIPS

Ensigma

RPU Control

Control

Sensor Sensor

PowerVR

Video

Sensors: - Accelerometers

- Gyroscopes

- digital compasses

- inertial modules

- pressure sensors

- microphones

- temperature sensors

- touch sensors

- EEG/ECG

- Pulse

- Temperature

- Blood Pressure

- Glucose

- etc.

Control: - Motor

- Actuators

- Switches

- Gauges

- Valves

- etc.

Communications: - Bluetooth, BTLE

- Cellular 2G/3G, LTE

- WiFi

- ZigBee/Thread

- Wireline

- Powerline

- etc.

Processing: - Sensor data

- Protocol stack

- User Interface

- Data analytics

- Power management

- Security

- etc.

Cloud: - Device management

- Data analytics

- Data Aggregation

- Services

-etc.

Control MIPS

Application

MIPS

Ensigma

MIPS

Sensor System

Functions

Virtualization

© Imagination Technologies Confidential 5

IoT Integration starts with sensors Sensor algorithms key for local analytics

“With a feature set tailored for wearables

and IoT end nodes, ARTIK 1 is a mobile

workhorse.”, Samsung Electronics Co.,

Ltd. IoT World, May 2015

MIPS M5100

Sensor hubs for accelerometers,

gyroscopes, pressure sensors,

and others

MIPS PIC32

9-Axis sensors

Accelerometer/Magnetometer

and Gyroscope

MIPS microAptiv 250MHz

MIPS microAptiv 80MHz

9-Axis motion sensor

© Imagination Technologies Confidential 6

IPv6

IoT Device Protocol Stack Simplified view of key layers

oneM2M (Common Service Layer)

PHY Layer

DataLink

Transport

Network

Application

Bluetooth 4.2 LE

WiFi 802.11ah

WiFi 802.11n 802.11ac

6LoWPan

UDP TCP

Application #1 Application #2 Application #n

HTTP CoAP

Standards

Software Layer

Hardware Layer

IEEE 802.15.4

LTE

DTLS TLS

OMA LWM2M

Thread

LTE Cat (0)

“Insert additional IoT standards for your application or industry here …………”

© Imagination Technologies Confidential 7

Device centric approach

Device management tasks

Registration

Authentication

Security

Notifications

Updates

Remote control

© Imagination Technologies Confidential 8

Continuity from development to deployment Covers devices to cloud for communication and control

IP Device SW Bridge Internet Access

Cloud Service Eco

system Big

Data

end-end management and control

Apps builder Device Management Device Communications Dashboards

© Imagination Technologies Confidential 9

Scalability

Load balancer

Handles initial request & dispatches to multiple API servers

DNS entries

Enables the employment of multiple load balancers

Partitioned API design

Enables independent scaling of different API methods, and

allows for multiple, independent databases

Database layers

Employs separation of reads and writes,

Sharding

Splitting records in one table across multiple storage servers

Multiple techniques for scaling cloud activities

© Imagination Technologies Confidential 10

Security and privacy

Security is not added at the end

Starts with the system design objectives

Enhanced over time

new threats identified

use-case expands

IoT attacks and threats

Identified with use-case and application purpose

Evolving requirements

New use-case’s and applications

Enhanced and adapted security

IoT devices require always-on, always-connected, always-protected

Privacy

Rights and access to information

Permissions for data and applications for

reuse, distribution and disclosures

Scope of use and intent of applications

access to information

© Imagination Technologies Confidential 11

System security

Device to server communications

Secured using Transport Layer Security (TLS)

Prevents anyone from being able to intercept your data

Signing according to OAuth specification

Pre-shared secret prevents rogue client from being able to either impersonate your device

Timestamp prevents people from being able to replay captured packets

API require these additional requests (beyond TLS)

Devices have to be registered and logged in with user credentials

OmniShield with hardware and software for multiple secure domains in SoC’s for devices

Service access restricted by device type

OAuth keys and user (role-based) and follows the “Principle of least privilege”

Define rights and privileges for developers, operators and users

© Imagination Technologies Confidential 12

Clo

ud

S

erv

ice

s

Link Layer

IoT Device

Communication

Network

Data

Processing

Data

Analytics

Big Data &

Services

IoT

T

hin

gs

IoT Functions and Protocols Device communications – IoT Things to Cloud services

IPv6

IEEE 802.15.4

AMQP XMPP SNMP

Bluetooth 4.2

Wi-Fi 802.11ah

LTE Cat (0)

Wi-Fi 802.11n 802.11ac

LTE 2/3G Powerline Ethernet

802.3

Storm Kafka RabbitMQ Flume

Hbase MongoDB Cassandra Hadoop

Device

Management

Data

Aggregation Data

Storage

Data

Analytics Business

Services Security

Services

CouchDB

MQTT RESTfulAPI

CoAP

6LoWPan

Scribe Fluentd

MySQL

TR-069 ZigBee

Payment

& Billing

Bluetooth 4.2

DTLS UDP TCP TLS HTTP

Software Layer

Hardware Layer

Cloud Services

© Imagination Technologies Confidential 13

Provisioning & deploying devices Develop, deploy, activate and maintain

Built-in supply chain support

OEM, 3rd party apps, service providers

Back end tools for device

provisioning and permissions

Device Types

Provisioned in FlowCloud

Licensee defined names

Have associated API Key

Can be grouped

Firmware management & over-the-air

updates

Tracking and security for binary images to devices

© Imagination Technologies Confidential 14

IoT project quick start guide

Developer account for on-line resources

Multiple development teams and delegates

Multiple appliances for custom developments

Active developer community & forum

Install getting started app: MakeItFlow

Quickly establish Wi-Fi connection to the board

© Imagination Technologies Confidential 15

Select a development board Or port the open source SDK to any system of your choice

Board Wi-Fire Creator CI20 Price $79 $65

Chip vendor MicroChip Ingenic

CPU MIPS - microAptiv MIPS32 CPU

Wi-Fi b/g b/g/n

GPU - SGX540

OS FreeRTOS Linux (Debian)

© Imagination Technologies Confidential 16

Summary Planning for scale is not just the billions of units:

Adapt and evolve analytics on devices and in the

cloud with MIPS/Ensigma/PowerVR and FlowCloud

Support distributed and tiered developers:

Provide provisions for delegates in supply chain

with FlowCloud development framework

Security end-to-end for IoT:

FlowCloud system security with OmniShield for

secure and trusted devices

www.imgtec.com/flowcloud

www.imgtec.com

Thank you!

Kevin McDermott

Director of IoT Marketing