Get in Toucharrow

CONTACT US

IoT with IoTivity

Billions of connected gadgets (gadgets, sensor units, computers as well as phones) ought to have the ability to connect with each other despite manufacturer, operating system, chipset, or physical transport through IoTivity Services.

The open-source IoTivity framework gives provisions for seamless device-to-device connections throughout varied physical media, transports, and application layers. This framework is vital for the variety of IoT devices – already in the billions and it is continuously growing.

Industry standards for securing the fast-growing Internet of Things field have witnessed rapid growth in recent years. That has brought about issues concerning paralysis as potential think makers evaluate the qualities of contending criteria, or choose one IoT security standard, just to discover their product separated from other prospective ecosystem partners that went with the various requirements.

The IoTivity architectural objective is to develop a new standard through which billions of wired and wireless devices will be connected to every other and to the internet. The objective is a durable and extensible architecture that benefits smart and thin devices.

 

Why IoTivity?

  • Cross-platform support
  • Uniform and easy to use APIs
  • Open standards
  • Support for multiple connectivity types
  • Extensible to support proprietary protocols

 

Accessing IoT with IoTivity

  • IoTivity is accessed via Resource Identifier
  • Composed of properties
  • Operations performed: CRUD + N
  • Flexible to use existing resource models or create new ones with ease.

 

IoT with IoTivity Implementation

IoTivity implements OIC Security in the “Secure Resource Manager.” Each IoTivity Device stack includes a “Secure Resource Manager,” which has two primary functions:

In steady-state operation, the SRM filters resource requests, granting or denying them based on configurable policy.

  • SRM also manages security-related materials, such as determining device provisioning status, maintaining credentials, loading and storing access control lists, etc.
  • SRM is provisioned and configured via OIC resources that have specific properties. For example, a credential is provisioned by porting an “/oic/sec/cred” resource.

At a high level, Secure Resource Manager (SRM) has two roles:

  • Request Filtering, and
  • Secure Virtual Resource Management.

 

Request Filtering

When performing this role, SRM receives a request (e.g. GET, PUT, etc.) from the Connectivity Abstraction layer, and either:

  • Grants the request (e.g. a read by an authorized Subject)
  • Denies the request (e.g. a write by an un-authorized Subject)
  • Responds to the request directly (e.g. write to a Secure Virtual Resource such as an Access Control List (ACL))

 

Secure Virtual Resource Management

When performing this role, the SRM manages a database of Secure Virtual Resources, keeping them in memory and persisting them across restarts.

IoT with IoTivity

 

Cloud, Alexa, and Google Home Integration

Our cloud solution includes the following elements:

AWS Cloud Server Setup – This involves a development environment created to support the continuous build process so that incremental progress can be seen. It also involves setting security policies to avoid hacks from attackers.

Cloud Server software setup – This entails setting the development environment to enable us to compile, deploy the code as part of the cloud.

Cloud Database Setup – MongoDB is the preferred choice. This involves scalable database designing, enabling the client app to perform CRUD plus N queries.

 

Development of cloud application exposing CoAP communication hooks to interface with Wifi-enabled devices.

This application will provide:

  • Secure, Reliable collection, storage, analysis, and publishing of M2M and IoT data
  • Rules – engine, processing alerts
  • Collects data from devices over CoAP
  • Data pulling on demand
  • An interface to share data to be consumed by other application:
    • Securing communication with the latest encryption algorithms (SHA – 2)
    • Development of the cloud module, interfacing Amazon Alexa, Google Home messages
    • Setup/Implementation of the middle layer interconnecting Alexa and clouds

 

Faststream Technologies IoTivity Services and Offerings

IoTivity Services, which are built on the IoTivity base code, supply a typical set of performances to application advancement. IoTivity services and solutions are developed to offer simple, scalable accessibility to sources and applications and are totally managed on their own.

We offer IoTivity services each with its own unique functionalities:

  • Protocol Plugin Manager
  • Soft Sensor manager
  • Things Manager
  • Notification Manager

 

IoT with IoTivity Stack

Our complete IoTivity Framework:

Hardware: CPU, MCU, Desktop, Mobile, SBC

OS: Many including GNU/Linux, Yocto, Android, or bare metal…

C API: Data transmission (flash footprint ~128KiB-)- Resource Model / Serialization (CBOR)
Connectivity Abstraction: CoAP, Local IP Network, BT, BLE…
Discovery (UDP, Multicast), Security (DTLS/TLS)

C++ API: Object-Oriented (C++11)

More Bindings: JavaScript (IoTivity-node)

+ High-level services: Data/Device Management, Hosting, Encapsulation, Cloud interface