Billions of connected gadgets (gadgets, sensor units, computers as well as phones) ought to have the ability to connect with each other despite manufacturer, operating system, chipset or physical transport.
The open-source IoTivity framework gives provisions for seamless device-to-device connection throughout varied physical media, transports and application layers. This framework is vital for the variety of IoT devices – already in the billions and it is continuously growing.
Industry standards for securing the fast-growing Internet of Things field have witnessed rapid growth in recent years. That has brought about issues concerning paralysis as potential think makers evaluate the qualities of contending criteria, or choose one IoT security standard, just to discover their product separated from other prospective ecosystem partners that went with a various requirement.
The IoTivity architectural objective is to develop a new standard through which billions of wired and wireless devices will be connected to every other and to the internet. The objective is a durable and extensible architecture that benefits smart and thin devices.
Uniform and easy to use APIs
Support for multiple connectivity types
Extensible to support proprietary protocols
IoTivity is accessed via Resource Identifier
Composed of properties
Operations performed: CRUD + N
Flexible to use existing resource models or create new with ease.
IoTivity implements OIC Security in the “Secure Resource Manager.” Each IoTivity Device stack includes a “Secure Resource Manager,” which has two primary functions:
In steady state operation, the SRM filters Resources requests, granting or denying them based on configurable policy.
SRM also manages security-related materials, such as determining device provisioning status, maintaining credentials, loading and storing access control lists, etc.
SRM is provisioned and configured via OIC resources which have specific properties. For example, a credential is provisioned by porting an “/oic/sec/cred” resource.
At a high level, Secure Resource Manager (SRM) has two roles:
Request Filtering, and
Secure Virtual Resource Management.
When performing this role, SRM receives a request (e.g. GET, PUT, etc.) from Connectivity Abstraction layer, and either:
Grants the request (e.g. a read by an authorized Subject)
Denies the request (e.g. a write by a un-authorized Subject)
Responds to the request directly (e.g. write to a Secure Virtual Resource such as an Access Control List (ACL))
Secure Virtual Resource Management
When performing this role, the SRM manages a database of Secure Virtual Resources, keeping them in memory and persisting them across restarts.
Cloud, Alexa, and Google Home Integration
Our cloud solution includes the following elements:
AWS Cloud Server Setup – This involves development environment created to support continuous build process so that incremental progress can be seen. It also involves setting security policies to avoid hacks from attackers.
Cloud Server software setup – This entails setting development environment to enable us to compile, deploy the code as part of the cloud.
Cloud Database Setup – MongoDB is the preferred choice. This involves scalable database designing, enabling client app to perform CRUD plus N queries.
Development of cloud application exposing CoAP communication hooks to interface with Wifi – enabled devices.
This application will provide:
Secure, Reliable collection, storage, analysis and publishing of M2M and IoT data
Rules – engine, processing alerts
Collects data from devices over CoAP
Data pulling on demand
An interface to share data to be consumed by other application:
Securing communication with latest encryption algorithms (SHA – 2)
Development of the cloud module, interfacing Amazon Alexa, Google Home messages
Setup/Implementation of the middle layer interconnecting Alexa and clouds
Faststream Technologies IoTivity Services and Offerings
IoTivity Services, which are built on the IoTivity base code, supplies a typical set of performances to application advancement. IoTivity services and solutions are developed to offer simple, scalable accessibility to sources and applications and are totally managed on their own.
We offer IoTivity services each with its own unique functionalities:
Protocol Plugin Manager
Soft Sensor manager
Our complete IoTivity Framework:
Hardware: CPU, MCU, Desktop, Mobile, SBC
OS: Many including GNU/Linux, Yocto, Android or bare metal…
C API: Data transmission (flash footprint ~128KiB-)- Resource Model / Serialization (CBOR) Connectivity Abstraction: CoAP, Local IP Network, BT, BLE…
Discovery (UDP, Multicast), Security (DTLS/TLS)