{"id":27023,"date":"2019-05-23T15:01:52","date_gmt":"2019-05-23T20:01:52","guid":{"rendered":"https:\/\/centricconsulting.com\/?p=27023"},"modified":"2021-12-15T00:16:14","modified_gmt":"2021-12-15T05:16:14","slug":"aws-and-the-internet-of-things-unveiling-the-mystery","status":"publish","type":"post","link":"https:\/\/centricconsulting.com\/blog\/aws-and-the-internet-of-things-unveiling-the-mystery\/","title":{"rendered":"AWS and the Internet of Things: Unveiling the Mystery"},"content":{"rendered":"
The Internet of Things (IoT) comes up during regular technical conversations now more than ever. Kevin Ashton first defined the IoT in 1999, during his \u201cInternet of Things\u201d presentation, in which he described the IoT as a network of objects connected to the internet.<\/p>\n
Today, when you think about the IoT, what types of things do you imagine? How often do you say, \u201cAlexa, turn on the lights?\u201d Alternatively, how many Tesla vehicles do you notice on the road? Do you adjust your Nest thermostat from your phone?<\/p>\n
These devices belong to the IoT.<\/strong><\/p>\n IoT devices\u00a0<\/span>have web-enabled capabilities with embedded processors, sensors, and communication hardware enabling everything to connect to the Internet, send messages<\/span>,<\/span>\u00a0and collect and exchange data.<\/span>\u00a0<\/span><\/p>\n First, w<\/span>e need\u00a0<\/span>access\u00a0<\/span>to\u00a0<\/span>the\u00a0<\/span>internet<\/span>.\u00a0<\/span>Then,\u00a0<\/span>w<\/span>e can<\/span>\u00a0<\/span>transfer<\/span>\u00a0<\/span>data by cell phones<\/span>,\u00a0<\/span>WiFi<\/span>, Bluetooth, ZigBee, Z-Wave<\/span>,<\/span>\u00a0<\/span>and more<\/span>! Basically<\/span>,<\/span>\u00a0t<\/span>he\u00a0<\/span>type\u00a0<\/span>of device<\/span>\u00a0<\/span>is not as important as the ability to connect to the internet<\/span>\u00a0or cloud services<\/span>.<\/span>\u00a0<\/span>\u00a0<\/span><\/p>\n The adoption of the IoT\u00a0continues\u00a0it\u2019s\u00a0rapid\u00a0increase\u00a0in healthcare,\u00a0financial services,\u00a0manufacturing, retail,\u00a0and automotive\u00a0industries.\u00a0<\/strong><\/p>\n The d<\/span>emand for\u00a0<\/span>IoT\u00a0<\/span>services and\u00a0<\/span>solution<\/span>s<\/span>\u00a0to leverage\u00a0<\/span>data is also growing. There is so much data to collect and analyze<\/span>.<\/span>\u00a0<\/span>W<\/span>e\u00a0<\/span>need<\/span>\u00a0to think about\u00a0<\/span>the\u00a0<\/span>IoT together with Big Data<\/a>.<\/span><\/b>\u00a0There is no limitation in\u00a0<\/span>the\u00a0<\/span>number of devices\u00a0<\/span>we<\/span>\u00a0connect<\/span>\u00a0to the network and\u00a0<\/span>no limitation on<\/span>\u00a0<\/span>the\u00a0<\/span>volume of data<\/span>\u00a0<\/span>we\u00a0<\/span>can\u00a0<\/span>produce<\/span>.<\/span>\u00a0<\/span>The\u00a0<\/span>sky is the limit<\/span>!<\/span>\u00a0<\/span><\/p>\n The\u00a0<\/span>IoT encourages companies to rethink their business and IT strategies. There are\u00a0<\/span>a few\u00a0<\/span>quick<\/span>,\u00a0<\/span>vital benefits\u00a0<\/span>we<\/span>\u00a0<\/span>cannot\u00a0<\/span>ignor<\/span>e<\/span>\u00a0<\/span>such as<\/span>\u00a0monitor<\/span>ing<\/span>\u00a0business processes, improv<\/span>ing<\/span>\u00a0business strategies, improv<\/span>ing<\/span>\u00a0customer experience, improv<\/span>ing<\/span>\u00a0company operation, mak<\/span>ing<\/span>\u00a0a better business decision,\u00a0<\/span>and\u00a0<\/span>optimiz<\/span>ing<\/span>\u00a0costs<\/span>.<\/span>\u00a0<\/span><\/p>\n When\u00a0I\u00a0think about\u00a0the\u00a0IoT system,\u00a0I\u00a0think\u00a0about three main\u00a0data\u00a0blocks:\u00a0\u00a0<\/strong><\/p>\n AWS IoT<\/a> offers\u00a0<\/span>a\u00a0<\/span>managed cloud platform that interacts with Amazon\u00a0<\/span>B<\/span>ig\u00a0<\/span>D<\/span>ata services like<\/span>\u00a0Kinesis<\/a>, DynamoDB<\/a>, Machine Learning<\/span>,<\/span>\u00a0and<\/span>\u00a0computer<\/span>\u00a0services like<\/span>\u00a0Lambda<\/a>.<\/span>\u00a0<\/span>With A<\/span>WS\u00a0<\/span>IoT<\/span>,<\/span>\u00a0devices\u00a0<\/span>can\u00a0<\/span>communicate securely with other devices and application<\/span>s<\/span>. <\/span><\/p>\n AWS IoT services\u00a0support\u00a0billions of devices and trillions of messages that\u00a0route\u00a0to\u00a0other AWS services.\u00a0If you are on AWS\u00a0already,\u00a0you\u00a0see\u00a0the\u00a0AWS IoT concept\u00a0is\u00a0quite user-friendly.\u00a0<\/strong><\/p>\n AWS Io<\/span>T offers control services and data services. One of\u00a0<\/span>the\u00a0<\/span>control services<\/span>\u00a0<\/span>AWS IoT\u00a0Core\u00a0<\/span>provides<\/span>\u00a0<\/span>is\u00a0<\/span>connectivity and messagin<\/span>g<\/span>.\u00a0<\/span>D<\/span>evices connect\u00a0<\/span>to IoT S<\/span>ervices\u00a0<\/span>by HTTPS<\/span>,<\/span>\u00a0<\/span>MQTT, and<\/span>\u00a0<\/span>MQTT over WebSocket protocols. AWS IoT\u00a0<\/span>M<\/span>essage\u00a0<\/span>B<\/span>roker is\u00a0<\/span>the\u00a0<\/span>core embedded service enabling message exchang<\/span>e for future analytics<\/span>.<\/span>\u00a0<\/span><\/p>\n AWS IoT provides high IoT Security standards. AWS\u00a0<\/span>implement<\/span>s<\/span>\u00a0multiple authorizations, authentication<\/span>s<\/span>, and encryption security levels to ensure data integrity.\u00a0<\/span><\/p>\n AWS IoT device<\/span>s<\/span>\u00a0for HTTPS communication use<\/span>\u00a0<\/span>X.509<\/span>\u00a0certificates, where\u00a0<\/span>the\u00a0<\/span>mobile application may use Amazon Cogito<\/span>\u00a0Ide<\/span>ntities<\/span>\u00a0and fina<\/span>l<\/span>ly\u00a0<\/span>w<\/span>eb<\/span>,<\/span>\u00a0and desktop application may<\/span>\u00a0<\/span>use I<\/span>AM<\/span>\u00a0<\/span>or\u00a0<\/span>federated\u00a0<\/span>identities<\/span>\u00a0for\u00a0<\/span>authentication.\u00a0<\/span>Next<\/span>, we must\u00a0<\/span>develop\u00a0<\/span>polic<\/span>i<\/span>es autho<\/span>rizing\u00a0<\/span>what\u00a0<\/span>authenticated<\/span>\u00a0<\/span>identity<\/span>\u00a0can do<\/span>.\u00a0<\/span><\/p>\n Most policies\u00a0we use\u00a0include\u00a0a\u00a0combination of AWS IoT policies and IAM policies.\u00a0<\/strong><\/p>\n Most\u00a0<\/span>of us<\/span>\u00a0<\/span>prefer the\u00a0<\/span>IoT\u00a0<\/span>for its<\/span>\u00a0serverless architecture. At first<\/span>, start-ups embraced<\/span>\u00a0serverless architecture<\/span>, but now\u00a0<\/span>the<\/span>\u00a0new ways of designing\u00a0<\/span>system<\/span>How Does the IoT Work?<\/h2>\n
IoT\u00a0Impact<\/h2>\n
\n
Cloud\u00a0Platform<\/h2>\n
Serverless\u00a0Architecture<\/h2>\n