Greta
Last updated
Last updated
Gateway 1. An entrance or passage that may be closed by a gate. 2. A structure for enclosing such an opening or entrance. 3. Any passage by or point at which a region may be entered. 4. Software or hardware that links two computer networks.
Gateways are “Traffic controllers” that bridge data generation to support a range of connectivity protocols and satisfy complex management. Gateways are also called middleware development devices because they are found "in the middle" of an IoT solution. They can filter and aggregate data, secure remote management, save temporal data, have cloud connectivity and device interconnectivity.
Important Gateways of the World
The architecture of an Intel gateway consists in 4 basic layers with their correspondant suplayeers. At the bottom we have an Intel Board and Modules (Intel Quark SoC, Intel Atom SoC, Intel Core SoC). Above this layer we have a Wind River Linux Operating System. Above this Operating System layer we have the modules that make a gateway a data controller solution. In this layer we have hardware (discrete TPM and Secure Boot), Run-Time Environment which could be Lua, Java, Python or OSGi, Manageability with Wind River Helix Device, OMA DM, TR-069, and web configuration. There we have too a security layer that has enabled OpenSSL, iptables, encrypted storage, DM-Crypt and an IPsec VPN.
Gateways give developers the flexibility to create and deploy innovative, cost-effective and secure Internet of Things solutions for a wide array of business segments.
Connectivity is critical to generating intelligence. Without connectivity, there is no either Smart or Internet in the IoT.
Can:
Reduce the cost of backend cloud
Reduce latency, actions executed immediately
Prefer having data locally than in the cloud
Protocol Consolidation
Edge to Cloud Connectivity
Remote I/O
Scalability
Support for multiple protocols
Application Software
Buildings: Adaptive analytics can improve the accuracy and performance of systems used to monitor and manage energy consumption, climate control, lighting, mechanical equipment and security. Energy: Devices can adjust the speed and blade pitch of wind turbines to improve efficiency and reduce wear. Transportation: Smart control systems can tell trains to slow down based on a variety of constantly changing external data inputs, such as weather, topography, location, distance from destination, track conditions, or car-to-car communication indicating another train is ahead.
Review the following gateways models
1.1 Intel DK50, DK100, DK200, DK300.
1.2 Dell Edge Gateway 5000.
1.3 Advantech UTX-3115.
List the Communications and Connectivity found in the above gateways
What are the Operating Systems supported by different the gateways?
Definition
Is a customizable middleware development environment that provides security, connectivity, rich networking options, and device management. It simplifies the development, integration, and deployment for the Internet of Things.
Extract value and transform your business
Intelligent gateways provides a smooth interface between devices and the cloud
Extend legacy systems with intelligent gateways
Compute capacity powers growth
Gateways enable new capabilities
Ensure connectivity with gateways
Remotely manage and troubleshoot devices
More connectivity requires greater security
Trust your network, trust your data
Transform your business today
Architecture
Differences
Operating Systems
Intel® IoT Gateways offer a choice of Intel® processors for different application needs, support for multiple operating systems (Wind River and Ubuntu Linux, Microsoft Windows* 10, etc.), and robust device management capabilities.
Intel® IoT Gateways are the result of Intel’s collaboration with McAfee and Wind River. By providing pre-integrated, pre-validated hardware and software building blocks, the gateways connect legacy and new systems, and enable seamless and secure data flow between edge devices and the cloud.
Security McAffee
What is Wind River®?
World leader in embedded software for intelligent connected systems.
Delivers the technology and expertise that enables the innovation and deployment of safe, secure, and reliable intelligent systems.
Products of Wind River
Portfolio of software solutions for harnessing intelligence
to drive innovation and business transformation.
Developers and device manufacturers can create the safe,
secure, and reliable intelligent systems that make up IoT.
Also, move the data generated by these systems–from
the secure and managed devices, through the gateway,
across the critical network infrastructure, and up into the cloud.
Wind River Helix: The Software Foundation for the Internet of Things
Operating Systems
Network Infrastructure
Gateways
Edge Management
Simulation
Open Networks
Devices: The “things” in the Internet of Things. By 2020, these data generators and gatherers will number 26 billon, all connected to the Internet and providing businesses with endless data from which to analyze and extract value and meaning. Gateways: “Traffic controllers” bridge data generation to support an ever-broadening range of connectivity protocols and satisfy complex management. Networks: This complex interconnected infrastructure for delivering data to every corner of industry and enterprise networks must be optimized for maximum agility, scalability, flexibility, and security. Cloud: Comprising public, private, and hybrid forms, this off-premise storage faces a daunting surge in analytic, security, and reliability challenges to keep pace with the uptime demands of critical infrastructure and trusted systems designed to leverage IoT.
Devices: Real-time virtualization Connectivity agents Safe & secure operating systems Gateways: Data aggregation and filtering Edge device to cloud connectivity Secure remote management Networks: Infrastructure platforms Orchestration Network services Clouds: Edge management Analytics API management
Abraham to add more data
To be added (links, information) As the IoT grows, so do the security vulnerabilities of the linked objects. With the arrival of IoT several new types of devices are connected to IP networks. -Medical equipment -Buildings -Cameras -Industrial sensors -Many other devices.
All these devices need management Access to transport data securely over the internet.
To be added (links, information)
How can new enterprise implementations secure their data flow?
To be added (links, information) Focuses on protecting critical data. Any data traffic between a device and the cloud (including information transmitted via mobile apps) should be examined to make sure it is secured.
SSL & TLS are protocols that provide data encryption and authentication between applications and servers in scenarios where that data is being sent across an insecure network, such as checking your email. Which is the most famous usage of SSL & TLS? Secure Sockets Layer (SSL) SSL protects data in transit by encrypting it. Transport Layer Security (TLS) SSL's more secure "successor", TLS is the new version of SSL, TLS also encrypts data in transit and requires a handshake between two authorized servers before it shows its contents.
HandshakeIs a sub-protocol used to negotiate session information between the client and the server. The session information consists of a session ID, peer certificates, the cipher spec to be used, the compression algorithm to be used, and a shared secret that is used to generate keys.
EncryptionThese two protocols work on the same level of encryption. The source and the destination must have the correct SSL/TLS certificate in order to do a correct handshake.
In which layer these two protocol are?The OSI model does not work with SSL/TLS. TLS is not in any layer. SSL/TLS uses an underlying transport medium that provides a bidirectional stream of bytes. That would put it somewhere above layer 4. SSL/TLS organizes data as records, that may contain, in particular, handshake messages. Handshake messages look like layer 5. This would put SSL/TLS at layer 6 or 7. What SSL/TLS conveys is "application data", which is, in fact, a bidirectional stream of bytes. Applications that use SSL/TLS really use it as a transport protocol. They then use their own data representation and messages and semantics within that "application data". Therefore, SSL/TLS could not be, in the OSI model, beyond layer 4.
Should I choose TLS or SSL?
What happens if I do not select either one?All of your data traffic and your login information are sent in plain text for anyone to see. There is no guarantee that the server you connect to is not some middle man or interloper. Review Secure Sockets Layer (SSL) Transport Layer Security (TLS).
Discrete Trusted Platform Module (TPM) is a microcontroller that stores encryption keys, passwords and digital certificates. The discrete form is the silicon module was separated from other system elements and communicated with them via a dedicated hardware bus.
Secure BootSecure Boot is a security standard developed by members of the PC industry to help make sure that your PC boots using only software and hardware modules that are trusted by the PC manufacturer. What happens if a new hardware isn’t trusted? How do I edit my PC’s Secure Boot database? How can I add hardware or run software or operating systems that haven’t been trusted by my manufacturer?
PM) based component running in a trusted execution environment (TEE) on the system’s main SoC: On Intel chips, it is the Intel Management Engine (ME) or Converged Security Engine (CSE).
To be added (links, information)
To be added (links, information)
To be added (links, information)
Main differences between NanoSSL, Mosquitto SSL, and WolfSSL.
Practice on Mosquitto SSL
Software development platform. Wind River Rocket (ideal for building sensors, wearables, industrial controllers) & Wind River Pulsar Linux (small, high-performance, Linux ).
Is an instantly accessible software lab that improves team collaboration and makes Internet of Things (IoT) development easier for everyone.
is a ready-made, cloud-based platform for the Internet of Things (IoT). Reduces the complexities of building and rolling out large-scale embedded device networks.
Gateways are a vital means of connecting people, places and things to facilitate commerce and improve our lives.
To be added (links, information) To be structure what are the components, etc e.g.
McAfee Embedded Control maximizes security by dynamically monitoring and managing whitelists. Verify system integrity at the hardware level to protect critical data throughout the device lifecycle.*