Architecture of Industrial IoT December 2, 2016 Marc Nader @mourcous
Branches of IoT IoT Consumer IoT (Wearables, Cars, Smart homes, etc.) Industrial IoT (IIoT) Smart Gateways Wireless Sensor Networks Mesh (Zigbee, Dust, Wifi) LPWAN (LoRa, NB-IOT, Sigfox) Copyright 2015 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 2
The IOT Paradigm How do we get there? HOW? Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 3
IOT Data Flow Site Network Data Center/Cloud IoT Enabler Capture Code Transmit RAN Transport IP, MPLS, etc. Store Analyze Action Big Data / Analytics / Application builders Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 4
IOT Data Flow Within the Site Capture Code Transmit RAN Transport IP, MPLS, etc. Store Analyze Action Sensors IoT nodes Part of Operation Technology (OT); Sensors with analog (0-10V) or digital electrical outputs; Powered by the IOT node or through an external source; The IOT node transforms the electrical signal into data packets; Message Queuing Telemetry Transport (MQTT), Constrained Application Protocol (CoAP) Rugged design; Or Sensors can take form of any IP based protocol. IoT nodes connect one or multiple sensors and translate an analog signal into packets. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 5
Low Power Wide Area (LPWAN) Power usage Bluetooth WiFi Cellular Satellite BTLE ZigBee Z-Wave Dust LPWAN NFC <10m Range >10km Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 6
IOT Data Flow Radio Access Network: Transmitting the M2M chatter Capture Code Transmit Transport Store Analyze Action Sensors IoT nodes IoT Gateways IP Network Collecting data from on a massive scale while preserving the sensor battery life is a challenge; Ferocious competition for the Low Power Wide Area (LPWA) technology dominance; The "LPWAR": lets look at the market alternatives in this area: Sigfox: Global IoT Operator. LoRa: Enable operators and enterprises to create IoT networks 3GPP: NB-IOT, LTE-M, NB-LTE & 5G: Natural evolution of mobile operators. Fixed & Short range Wifi + 3/4G/Fixed Zigbee + 3/4G/Fixed Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 7
Sigfox Privately owned, French. Technology Applications Ultra narrow band 868Mhz - 100Hz (BPSK) 140 messages per unit per day. 1 every 10 minutes. 12 bytes per message 15 km, bi-directional. High battery life (Up to 20 years) Limited bandwidth applications City wide deployments, short message communications Shipping and very active Network as a service model. Cloud based. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 8
LoRa LoRa Alliance, backed by Cisco, IBM,... Technology Applications Star of Stars topology, Encrypted protocol Wideband CDMA: 868Mhz - <500kHz 0.3kbps - 50kbps 15 km High battery life 3 Classes: A: similar to Sigfox. Receiver Initiated Transmission Strategy (RIT) B: scheduled downlink slot, intermittent device sleep. C: always on. Mains Powered. Just getting started. Open ecosystem. But one radio manufacturer: Semtech. City wide deployments with 2 way communications. Open for operators and private companies. 100+ Members Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 9
Narrow Band IOT - NB - IOT 3GPP, Huawei (Neul acquisition) Technology LTE-M - 1.4Mhz (1Mbps/1Mbps) NB LTE-M - 200khz (200kbps/170kbps) One LTE cell can handle 150k LTE-M devices 10 years battery life (200 bytes daily update) Low cost terminal Leverage the LTE network with a software upgrade. LTE-M +15dB link budget (x7 coverage) NB LTE-M +20dB link budget (x10 coverage) Applications Licensed spectrum 3GPP Rel. 13 NB-IOT Coming with LTE-A Pro (4.5G) Mobile operators become IoT operators with a software upgrade.. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 10
Fixed & Short Range IoT Connections Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 11
Fixed or Short Range Wireless Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 12
WiFi / Zigbee / Dust + 3G/4G Technology Local Aggregation of IOT nodes is done through: Wifi Zigbee / 802.15.4 / Dust / Z-Wave Site aggregation is done through 3G/4G or fixed Need external power source for the aggregation Higher throughput Applications High throughput, sending voice/video Real Time or near-rt In home, in plant, on campus. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 13
IOT Data Flow Transmitting the M2M chatter Capture Code Transmit Transport Store Analyze Action Sensors IoT nodes IoT Gateways IP Network Technology decision factor Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 14
Evolutions of Apps Making Sense of Data Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 15
IoT Applications The three layered approach Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 16
IOT Data Flow Gathering, structuring and processing the data Capture Code Transmit Transport Store Analyze Action Sensors IoT nodes IoT Gateways IP Network Input from IOT Gateways (MQTT) Input from IOT Network Server (kafka) Any other input Data modeling and data set definitions Machine Learning, Analytics Data Science for IOT: making sense of massive data and give the machines the ability to take intelligent decisions. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 17
The Challenge of Data in Motion Data at Rest VS Data in Motion Capture Analyse Action t1 t2 Capture rt, nrt Analyse Action Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 18
Hardware/Software Platform Summary Application #1 Node & Sensor Long Range Cellular Application #2 IoT Gateway Fixed IoT Network Platform Node + Sensors Short Range Application #3 Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 19
Hardware/Software Platform Summary Optional Payload Encryption (App developers) MIC, AS128 Encryption (NwkSkey, AppSkey) HTTPS Post, MQTT, Kakka Node & Sensor Long Range Application #1 AS256 IPSec - Cisco Node + Sensors Short Range Cisco LoRa Gateway Ogero Backbone Actility Network Platform Application #2 Application #3 Ogero Network Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 20
Full Network Design Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 21
The IoT Services Framework Data Management Device Management Connectivity Management S E C U R I T Y Application Enterprise Integration Cloud 2 Cloud Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 22
Fog Computing Eliminating the unnecessary chatter on the radio Capture Code Transmit Transport Store Analyze Action Fog Computing Preprocessing of data from sensors saves on transmissions costs. Computing on the IOT gateway (managing different nodes) Bringing some intelligence closer to the edge. Decreased network chatter and cloud storage. Linux IoT nodes, complex computing done local. Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission Cloud Computing 23
Mist Computing Eliminating the unnecessary chatter on the radio Capture Code Transmit Transport Store Analyze Action Mist Computing Fog Bringing some intelligence closer to the edge. Cloud Computing Computing on the IOT node (sensor or actuator) Decreased latency More autonomy Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 24
A Step In the Right Direction Interoperability efforts Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 25
Remember Stuxnet Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 26
The Security Paradigm IOT Gateways (Linux, cheap chips) How about security? Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 27
The End of The Fortress Approach Once the hacker is in, Game Over! Intelligence is distributed and networks are intertwined. The Goal is not to keep out only. Detect, Isolate, Heal Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 28
You are as secure as your weakest link Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 29
The Zero-Trust Network Untrusted Untrusted Trusted 30 Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 30
Proposed IOT Security Framework Per device: Authentication: endpoints should be fingerprinted. Authorization: establishing the cross platform trust relationships. Network Enforced Policy: all elements that route and transport endpoint traffic securely over the infrastructure. Analytics: Data, generated by the IoT devices, is only valuable if the right analytics algorithms or other security intelligence processes are defined to identify the threat. Cisco Securing the Internet of Things: A proposed Frameworks. Google BeyondCorp Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 31
IOT Finally Information Technology IOT Operation Technology Business Outcome System Integration Operation technology & Low Current Radio Access Networking Data Integration, software Data science Copyright 2016 DATACONSULT All rights reserved. No part of this presentation in all its property may be used or reproduced in any form without a written permission 32
Thank you! Marc Nader mnader@dcgroup.com @mourcous