SlideShare a Scribd company logo
Saturn 2016
Yulian Slobodyan
Serge Haziyev
Internet of Things
Reference Architecture
& Case Studies
“Look deep into nature,
and then
you will understand
everything better.”
~ Albert Einstein
Cognitive
Loop Learn
Operate
ActSense
People
Environment
Things
Cognitive
Loop
Learn
Operate
Act
Sense
Learn
Operate
Sense Act
Cognitive
Loop
People
Environment
Things
Learn Act
Cloud
Actuators
HMIs
Software
Hardware
Sensors
HMIs
Learn
Operate
ActSense
People
& Things
Edge
& Communication
Data
Applications
& Services
Act
Sense
Operate
Manage & Control
Link
Bridge
Interconnect
Contextualize
Ingest
Process
Store
Augment Intelligence
Augment Behavior
Reference Model
People
& Things
Edge
& Communication
Data
Applications
& Services
Environ-
ment
Act World
Actuators
HCI
People
Things
Sense Link Bridge Interco-
nnect
Context-
ualize
Ingest
Process Store
Network
MGNT
Configuration
MGNT
Software
MGNT
Identity &
Access MGNT
Security
MGNT
Inventory
MGNT
Process
MGNT
Data
MGNT
PKI Monitoring Log
MGNT
Alerting
Manage
& Control
Operate
Augment
Intelligence
Augement
Behavior
Sensors
HCI
Software Hardware
WSN Edge
Gateways
IP-
Enabled
Devices
Event
Processing
Batch
Processing
Data
Pipelines
Bus
Wired
Other
Cellular Social
Reporting
Analytics
ML
Search
Appli-
cations
Services M2M
Work-
flows
3rd-party
Events
Batch
LPWAN
Satellite
Fiber
Copper
Time-
series
NoSQL
DFS
RDBMS
Long-
term
Implementation View
People
& Things
Edge
& Communication
Data
Applications
& Services
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
Security
Maintainability
Reliability
High-Availability
Performance
Interoperability
Security
Maintainability
High-Availability
Performance
Security
Maintainability
Configurability
Fault-tolerance
Interoperability
Quality Attributes
Backdoor Accounts
UART Access
Unencrypted Storage
Remote Shell Access
Cleartext Local API
Cleartext Cloud API
Known Vulnerabilities
That Ship With New Devices
People
& Things
Security
Maintainability
Reliability
Durability & Resilience
Power efficiency
Invisibility
People & Things: Tactics
Hardware Root of Trust
(TPM/SE/Kerkey/
STSAFE-A)
Trusted Execution
Environment (TEE)
Secure onboarding
and provisioning
process (HSM)
Firmware verification
Physical tampering
detection
Strong encryption
Strong authentication
of interactions (network,
peripherals)
Freezers and fridges monitoring and management solution.
Cloud based services allowing bidirectional communication to hundreds
thousands sensors/actuators for data collection/remote assets
management and analytics.
Designed to scale up to hundreds
thousands devices Operational expenses
optimization
Marketing insights based on
user behavior analytics
Improved supply chain
and logistics
Business Value
Case Study:
Smart Fridges Solution
Cloud Architecture
Raw Storage
(S3)
Staging
Storage
(S3)
Report
(Redsift)
Journal
(Graphite / InfluxDB)
Communication
Servers
Actions
UI
Send
Commands
Device
Configuration
Management
Custom
Implem. CoAP LWM2M CoAP
Mapping
UI
Device /
Master Data
Mappings
Batch
Processing
(Spark)
UI / API
MDM Core
Mapping
Master Data
UI / API
Import /
Export
Dictionaries
& Operations
Device Management
Master Data
Management
Import /
Export
Analytical
Reports
Operational
Reports
Reporting
Platform
Interactive
Journal
(HighCharts)
Data collection,
Reporting Operational / Analytical
Batch
Layer
Speed
Layer
Web
Portal
Streaming &
Enrichment
(Spark)
Event
Broker
(Kafka)
Sensors Hardware
WAN: GSM
Gateway nodes: ARM8
Leaf nodes: ARM Cortex M4
Sensor Network: I C, RF
Sensors: Light, temperature, AC/DC,
camera, weight, other
2
Analytics
Dashboard
DEMO
cratic
IoT
Icons created by Simon Child from Noun Project
User
Contract
Owner
Blockchain
Contract
Sensor
Gateway
Tech
Support
Infrastructure
Providers
Sensors
Owner
Sound Level
Sensors
Real-time
Dashboard
Operational
Analytics
Back to the nature: IoT systems resemble Human as an organism and
Human society as an organization of services and devices
SEI Architectural methods such as ATAM and ADD are well applicable
to IoT domain - Quality Attributes and Tactics help design and
evaluate complex IoT solutions
Security is a significant challenge in IoT adoption, but most vendors
have started realizing it and we will see improvements soon
Summary
Questions

More Related Content

PPTX
Platinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
PPT
Internet of things
PDF
10 technology trends that will shape security industry 2018
PPTX
iot building automation
PDF
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
PPTX
BetaGroup - Tech Trends in 2017, a snap shot by BetaGroup
PDF
BITCOIN MACHINES & INTELLIGENT AGENTS
PPTX
Internet of Things
Platinum Sponsorship Keynote: Driving Innovation with Artificial Intelligence
Internet of things
10 technology trends that will shape security industry 2018
iot building automation
Deployment of Smart Spaces in the Internet of Things: Overview of Design Chal...
BetaGroup - Tech Trends in 2017, a snap shot by BetaGroup
BITCOIN MACHINES & INTELLIGENT AGENTS
Internet of Things

What's hot (19)

PDF
Jen Q. Public: How analytics is impacting government, education and public sa...
PPTX
IoT Can Revolutionize Healthcare, But Security Is Key
PPTX
PDF
Artificial Intelligence & IOT
PPTX
Are You Safe in IOT? - Know About Different Types of Threats
PPTX
INTERNET OF THINGS - IOT world
PPT
The Internet of Things: Connecting the Future
PDF
TZ Limited - IoT (Internet of Things) technology overview
PDF
IoT & Blockchain: Use Case Overview
PDF
Vision on the city of future
PDF
IOT 101 - A primer on Internet of Things
PDF
How iot is changing construction
PPTX
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
PPTX
The Next Big Thing In Mobile App Development – Trends 2019!
PPTX
Blockchain and AI
PDF
AI and Blockchain
PDF
Top Technology Trends in IoT for 2022
PPTX
Internet of Things (IOT) - The Tipping Point
PDF
Internet of things: New Technology and its Impact on Business Models
Jen Q. Public: How analytics is impacting government, education and public sa...
IoT Can Revolutionize Healthcare, But Security Is Key
Artificial Intelligence & IOT
Are You Safe in IOT? - Know About Different Types of Threats
INTERNET OF THINGS - IOT world
The Internet of Things: Connecting the Future
TZ Limited - IoT (Internet of Things) technology overview
IoT & Blockchain: Use Case Overview
Vision on the city of future
IOT 101 - A primer on Internet of Things
How iot is changing construction
[AIIM17] Knowledge Management and the Internet of Things - Katrina Pugh
The Next Big Thing In Mobile App Development – Trends 2019!
Blockchain and AI
AI and Blockchain
Top Technology Trends in IoT for 2022
Internet of Things (IOT) - The Tipping Point
Internet of things: New Technology and its Impact on Business Models
Ad

Similar to Slides Saturn-final (20)

PPTX
nnnnnnnnnnnn7777777777777777777777777777777.pptx
PDF
Internet of things | Research Directions in Green IoT and Case Studies
PDF
Are you ready for IoT disruption? by Ana Seliškar
PPT
Physical-Cyber-Social Data Analytics & Smart City Applications
PPTX
Arpan pal u world2012
PDF
The Internet of Things: Tutorial for students
PPTX
IoT.pptx
PPTX
Ai presentation on using of Artificial intelligence in smart cities
PDF
FUTURE OF IOT
PPTX
Internet of Things (IoT)
PPTX
DSS and Security Intelligence @IBM_Connect_2014_April
PDF
Applications Architecture ZBrains Role.pdf
PDF
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
PDF
Gartner TOP 10 Strategic Technology Trends 2017
PDF
Gartner Top 10 Strategy Technology Trends 2018
DOCX
IoT_building block_new.docx
PPTX
iot module 1 ppt.pptx
PDF
iot module 1 ppt (3).pdf
PDF
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
nnnnnnnnnnnn7777777777777777777777777777777.pptx
Internet of things | Research Directions in Green IoT and Case Studies
Are you ready for IoT disruption? by Ana Seliškar
Physical-Cyber-Social Data Analytics & Smart City Applications
Arpan pal u world2012
The Internet of Things: Tutorial for students
IoT.pptx
Ai presentation on using of Artificial intelligence in smart cities
FUTURE OF IOT
Internet of Things (IoT)
DSS and Security Intelligence @IBM_Connect_2014_April
Applications Architecture ZBrains Role.pdf
CisCon 2017 - La Nuova era del Networking – La Rete Intuitiva
Gartner TOP 10 Strategic Technology Trends 2017
Gartner Top 10 Strategy Technology Trends 2018
IoT_building block_new.docx
iot module 1 ppt.pptx
iot module 1 ppt (3).pdf
EENA2019: Track2 session1 _Improving coordinated response with cloud-based so...
Ad

More from Yulian Slobodyan (11)

PPTX
Containerization - The DevOps Revolution
PPTX
IoT, Demystified
PPTX
Amazon Cloud Overview
PPTX
Mono - Alternative .NET CLR Implementation
PPTX
Security Training: #4 Development: Typical Security Issues
PPTX
Security Training: #3 Threat Modelling - Practices and Tools
PPTX
Security Training: #1 What Actually a Security Is?
PPTX
Security Training: #2 Cryptography Basics
PPTX
.NET Micro Framework
PPTX
eBiz#3: CEP
PPTX
StreamInsight Breakthrough
Containerization - The DevOps Revolution
IoT, Demystified
Amazon Cloud Overview
Mono - Alternative .NET CLR Implementation
Security Training: #4 Development: Typical Security Issues
Security Training: #3 Threat Modelling - Practices and Tools
Security Training: #1 What Actually a Security Is?
Security Training: #2 Cryptography Basics
.NET Micro Framework
eBiz#3: CEP
StreamInsight Breakthrough

Slides Saturn-final

  • 1. Saturn 2016 Yulian Slobodyan Serge Haziyev Internet of Things Reference Architecture & Case Studies
  • 2. “Look deep into nature, and then you will understand everything better.” ~ Albert Einstein
  • 6. People & Things Edge & Communication Data Applications & Services Act Sense Operate Manage & Control Link Bridge Interconnect Contextualize Ingest Process Store Augment Intelligence Augment Behavior Reference Model
  • 7. People & Things Edge & Communication Data Applications & Services Environ- ment Act World Actuators HCI People Things Sense Link Bridge Interco- nnect Context- ualize Ingest Process Store Network MGNT Configuration MGNT Software MGNT Identity & Access MGNT Security MGNT Inventory MGNT Process MGNT Data MGNT PKI Monitoring Log MGNT Alerting Manage & Control Operate Augment Intelligence Augement Behavior Sensors HCI Software Hardware WSN Edge Gateways IP- Enabled Devices Event Processing Batch Processing Data Pipelines Bus Wired Other Cellular Social Reporting Analytics ML Search Appli- cations Services M2M Work- flows 3rd-party Events Batch LPWAN Satellite Fiber Copper Time- series NoSQL DFS RDBMS Long- term Implementation View
  • 8. People & Things Edge & Communication Data Applications & Services Security Maintainability Reliability Durability & Resilience Power efficiency Invisibility Security Maintainability Reliability High-Availability Performance Interoperability Security Maintainability High-Availability Performance Security Maintainability Configurability Fault-tolerance Interoperability Quality Attributes
  • 9. Backdoor Accounts UART Access Unencrypted Storage Remote Shell Access Cleartext Local API Cleartext Cloud API Known Vulnerabilities That Ship With New Devices
  • 10. People & Things Security Maintainability Reliability Durability & Resilience Power efficiency Invisibility People & Things: Tactics Hardware Root of Trust (TPM/SE/Kerkey/ STSAFE-A) Trusted Execution Environment (TEE) Secure onboarding and provisioning process (HSM) Firmware verification Physical tampering detection Strong encryption Strong authentication of interactions (network, peripherals)
  • 11. Freezers and fridges monitoring and management solution. Cloud based services allowing bidirectional communication to hundreds thousands sensors/actuators for data collection/remote assets management and analytics. Designed to scale up to hundreds thousands devices Operational expenses optimization Marketing insights based on user behavior analytics Improved supply chain and logistics Business Value Case Study: Smart Fridges Solution
  • 12. Cloud Architecture Raw Storage (S3) Staging Storage (S3) Report (Redsift) Journal (Graphite / InfluxDB) Communication Servers Actions UI Send Commands Device Configuration Management Custom Implem. CoAP LWM2M CoAP Mapping UI Device / Master Data Mappings Batch Processing (Spark) UI / API MDM Core Mapping Master Data UI / API Import / Export Dictionaries & Operations Device Management Master Data Management Import / Export Analytical Reports Operational Reports Reporting Platform Interactive Journal (HighCharts) Data collection, Reporting Operational / Analytical Batch Layer Speed Layer Web Portal Streaming & Enrichment (Spark) Event Broker (Kafka)
  • 13. Sensors Hardware WAN: GSM Gateway nodes: ARM8 Leaf nodes: ARM Cortex M4 Sensor Network: I C, RF Sensors: Light, temperature, AC/DC, camera, weight, other 2
  • 16. Icons created by Simon Child from Noun Project User Contract Owner Blockchain Contract Sensor Gateway Tech Support Infrastructure Providers Sensors Owner Sound Level Sensors Real-time Dashboard Operational Analytics
  • 17. Back to the nature: IoT systems resemble Human as an organism and Human society as an organization of services and devices SEI Architectural methods such as ATAM and ADD are well applicable to IoT domain - Quality Attributes and Tactics help design and evaluate complex IoT solutions Security is a significant challenge in IoT adoption, but most vendors have started realizing it and we will see improvements soon Summary