Internet of Things: Module 2: System Architectures
Internet of Things: Module 2: System Architectures
Things
Module 2: System Architectures
Table of Contents
IoT Architecture Overview...................................................................................................................... 2
Layers of IoT ............................................................................................................................................... 3
IoT-Oriented Protocols............................................................................................................................ 5
Mesh Networks ...................................................................................................................................... 7
Zigbee Applications .............................................................................................................................. 8
Digi XBee 3 Zigbee Technology ......................................................................................................... 8
Bluetooth® Classic ............................................................................................................................... 10
Bluetooth® Low Energy (LE) .............................................................................................................. 10
Databases ..................................................................................................................................................14
Security ....................................................................................................................................................... 15
What is Security by Design? .................................................................................................................. 17
Why do we need IoT Security by Design? .......................................................................................... 18
The three keys to a secure-by-design IoT architecture ................................................................. 18
Your defense-in-depth strategy .......................................................................................................... 19
Securing data on its way to the cloud ................................................................................................. 19
IoT security concerns ............................................................................................................................. 20
Managing the security lifecycle of IoT devices ............................................................................... 20
IoT Architecture Overview
⚫ The concept of IoT was first proposed by MIT in 1999. The early IoT was a network
based on RFID technology and devices. It combined objects with the Internet
using the agreed communication protocols to implement intelligent
identification and management of objects and realize interconnection and
information sharing.
⚫ IoT serves as a network that enables information sensing devices, such as QR
code scanners, RFID, infrared sensors, global positioning systems, and laser
scanners, to connect any item with the Internet for information exchange and
communications based on agreed protocols. As such, IoT can facilitate
intelligent identification, location, tracking, monitoring, and management (ITU).
⚫ IoT is an Internet where all things are interconnected. This sentence has two
meanings. First, the core and foundation of the IoT is still the Internet. IoT is an
extended network based on the Internet. Second, the IoT connects any thing at
the user end for information exchange and communication (Baidu Baike).
• The plant or environment is the physical system with which the IoT system
interacts. We will use these two terms interchangeably.
• A set of devices form the leaves of the network. A node may include sensors and/
or actuators, processors, and memory. Each node has a network interface. A node
may or may not run the Internet Protocol.
• Hubs provide first-level connectivity between the nodes and the rest of the
network. Hubs are typically run IP.
• Fog processors perform operations on local sets of nodes and hubs. Keeping some
servers nearer the nodes reduces latency. However, fog devices may not have as
much compute power as cloud servers. Fog devices also introduce system
management issues.
• Cloud servers provide computational services for the IoT system. Databases store
data and computational results. The cloud may provide a variety of services that
mediate between nodes and users.
Layers of IoT
Protocols Concepts
Several protocols are used for data services in IoT systems. Communication protocols may
not provide sufficient abstraction for many applications. IoT systems need multi-hop, end-
to-end communication.
They also may exhibit complex relationships between data sources and sinks. Higher-level
protocols can provide services that model more closely the needs of IoT systems.
Given the heterogeneous and long-lived nature of most IoT systems, standards are often
used rather than custom protocols. Several different protocols have been proposed and, to
varying degrees, used for IoT systems.
The user space has not yet converged on a single standard for IoT communication services.
Given the prevalence of event-oriented models in IoT systems, a protocol should support
event-style communication. The HTTP protocol uses a request/response design pattern. A
client issues a request for a hypertext object; the server then replies with the object in
response.
A publish/subscribe protocol requires less coupling between the client and server as. The
server, known as a publisher, classifies messages into categories. Clients subscribe to the
categories of interest to them.
IoT-Oriented Protocols
We can divide protocols into two major categories: those that are tied to a specific physical
layer and those that are not. Generally speaking, protocols that rely on a specific physical
layer do not use the Internet Protocol, while protocols that are physical layer agnostic do
use IP.
Zigbee is based on the IEEE 802.15.4 PHY and MAC standards. 802.15.4 operates in three
bands: 868 MHz, 915 MHz, and 2.4 GHz. It delivers bit rates from 20 to 250 kbps, depending
on the frequency band.
The Zigbee NWK layer sits on top of the 802.15.4 MAC layer and provides data and
management services. The APL layer includes three sections: the application support
sublayer, the Zigbee Device Objects layer, and the application framework.
Zigbee provides two types of network security models: a centralized security network can
be started only by a Zigbee coordinator/trust center; distributed security networks do not
have a central trust center.
Nodes can join either type of network and adapt to the type of network they have joined.
Networks are formed by either coordinators or routers after scanning to select an available
channel.
Coordinators form centralized security networks, while routers form distributed security
networks. Network steering is the name for the process by which a node joins a network.
After identifying an open network, the node associates with that network and receives a
network key.
Version 3.0 builds on the existing Zigbee standard but unifies the market-specific
application profiles to allow all devices to be wirelessly connected in the same network,
irrespective of their market designation and function.
Connecting Zigbee 3.0 networks to the IP domain opens up monitoring and control from
devices such as smartphones and tablets on a LAN or WAN, including the Internet, and
brings the true Internet of Things to fruition.
• Low latency
Zigbee 3.0 provides enhanced network security. There are two methods of security that give
rise to two types of network:
• Centralized security: This method employs a coordinator/trust center that forms the
network and manages the allocation of network and link security keys to joining
nodes.
Nodes adopt whichever security method is used by the network they join. Zigbee 3.0
supports the increasing scale and complexity of wireless networks, and copes with large
local networks of greater than 250 nodes.
Zigbee also handles the dynamic behavior of these networks (with nodes appearing,
disappearing and re-appearing in the network) and allows orphaned nodes, which result
from the loss of a parent, to re-join the network via a different parent. The self-healing
nature of Zigbee Mesh networks also allows nodes to drop out of the network without any
disruption to internal routing.
The backward compatibility of Zigbee 3.0 means that applications already developed under
the Zigbee Light Link 1.0 or Home Automation 1.2 profile are ready for Zigbee 3.0. The Smart
Energy profile is also compatible with Zigbee 3.0 at the functional level, but Smart Energy
has additional security requirements that are only addressed within the profile.
Zigbee’s Over-The-Air (OTA) upgrade feature for software updates during device operation
ensures that applications on devices already deployed in the field can be seamlessly
migrated to Zigbee 3.0. OTA upgrade is an optional functionality that manufacturers are
encouraged to support in their Zigbee products.
Mesh Networks
Mesh networks are decentralized in nature; each node is capable of self-discovery on the
network. Also, as nodes leave the network, the mesh topology allows the nodes to
reconfigure routing paths based on the new network structure. The characteristics of mesh
topology and ad-hoc routing provide greater stability in changing conditions or failure at
single nodes.
Zigbee Applications
Zigbee enables broad-based deployment of wireless networks with low-cost, low-power
solutions. It provides the ability to run for years on inexpensive batteries for a host of
monitoring and control applications. Smart energy/smart grid, AMR (Automatic Meter
Reading), lighting controls, building automation systems, tank monitoring, HVAC control,
medical devices and fleet applications are just some of the many spaces where Zigbee
technology is making significant advancements.
Bluetooth Low Energy (BLE)] is a part of the Bluetooth standard designed for low-power
operation such as devices powered from coin cell batteries.
A BLE device can work as a transmitter, receiver, or both the Bluetooth Classic protocol
stack.
The link layer provides an advertising service; devices can scan to identify nodes and
networks.
Devices can act as gateways to the Internet based on network address translation. The BLE
protocol is stateful. BLE includes a number of optimizations to reduce power consumption.
LoRa is designed for wide-area IoT applications with a base station covering hundreds of
square kilometers. It is designed to support a network topology with gateways for end
devices, with gateways organized into their own star network. Data rates range from 0.3 to
50 kbps.
MQTT provides three levels of quality of service: at most once provides best-effort service,
at least once assures delivery but may incur duplicates, and exactly once ensures the
message is delivered without duplication.
Bluetooth® Classic
The Bluetooth Classic radio, also referred to as Bluetooth Basic Rate/Enhanced Data Rate
(BR/EDR), is a low power radio that streams data over 79 channels in the 2.4GHz unlicensed
industrial, scientific, and medical (ISM) frequency band. Supporting point-to-point device
communication, Bluetooth Classic is mainly used to enable wireless audio streaming and has
become the standard radio protocol behind wireless speakers, headphones, and in-car
entertainment systems. The Bluetooth Classic radio also enables data transfer applications,
including mobile printing.
The Bluetooth Low Energy (LE) radio is designed for very low power operation. Transmitting
data over 40 channels in the 2.4GHz unlicensed ISM frequency band, the Bluetooth LE radio
provides developers a tremendous amount of flexibility to build products that meet the
unique connectivity requirements of their market.
While initially known for its device communications capabilities, Bluetooth LE is now also
widely used as a device positioning technology to address the increasing demand for high
accuracy indoor location services. Initially supporting simple presence and proximity
capabilities, Bluetooth LE now supports Bluetooth® Direction Finding and soon, high-
accuracy distance measurement.
MQTT is based on a publish/subscribe model. A message is given a retention attribute when
it is published; messages with QoS designations of at least once or exactly once should set
the retention flag.
A new subscriber to the topic will receive the last publication on that topic. When setting up
a connection, a client can provide a will to the server to specify a message to be published
if the client is unexpectedly disconnected. Messages are classified using topic strings similar
to hierarchical file names.
The set of topics is organized into a topic tree. Topic names follow the names of the nodes
in the topic tree path, with node names separated by “/”. Subscribers can use wildcards in
the topic string: ‘+’ denotes a wildcard match at one level of the topic tree; “#” denotes a
match at any number of levels of the topic tree.
REST is widely used for Web services and has received some use as an IoT service model.
REST is a design pattern for stateless HTTP transfers. It exposes directory-structured form
resource indicators. REST can be used to transfer XML or JSON data. Clients access
resources using GET, PUT, POST, and DELETE methods.
REST collections. The system is divided into a data plane for messages and a control plane
for allocation to servers known as routers; data plane servers are known as forwarders. The
routers balance consistency and uniformity of data using a consistent hashing algorithm.
A message life cycle includes several steps. When a publisher sends a message, it is written
to storage. The subscribers receive the message, and the publisher receives an
acknowledgment. Subscribers acknowledge the message to Google Cloud Pub/Sub.
The message is deleted from storage once at least one subscriber for each subscription has
acknowledged the message. The system monitors itself to detect and mitigate service
problems.
Amazon Web Services (AWS) IoT is a managed cloud service for IoT devices, which are
termed things. A thing shadow is a cloud model of a thing. A rule engine transforms
messages based on rules and routes the results to AWS services. The message broker is
based on MQTT. A Thing Registry assigns unique identity to things.
Microsoft Azure (https://azure.microsoft.com/en-us/services/iot-hub/) provides IoT-
oriented services. Its Service Fabric is a middleware communication system that supports
microservices running on a cluster.
A microservice may be either stateless or stateful. It also provides a container model for
applications; a container provides an isolated environment but relies on the operating
system, in contrast to a virtual machine which runs underneath the operating system. It
provides databases using both structured and unstructured approaches. It also provides
APIs for artificial intelligence services.
Databases
Databases are used for both short-term and long-term storage. Applications may rely on
databases to retrieve data over a time window for analysis. Some use cases may require
archival storage of values. Unstructured databases, known as noSQL, are used in many IoT
systems.
A noSQL database does not have a schema. Simple noSQL databases represent data as key-
value pairs, but other representations are possible. The lack of a schema allows quick
deployment but may cause maintenance problems.
Time-series data possesses structure that may require special handling to provide proper
database performance. Time series are sometimes stored as blobs in relational databases
to allow specialized algorithms.
Dynamic time warping (DTW) is widely used to search over time-series data. DTW was
originally used to compare waveforms for speech processing. Correlation provides a direct
comparison of two waveforms. By warping one waveform, non-exact matches can be
found. Dynamic programming can be used to find the minimum warp match between two-
time series; a limit on maximum warping is typically applied to avoid obviously bad matches.
Very efficient algorithms have been developed to provide high-speed search.
Among other techniques, these algorithms abandon a warp computation early when partial
results exceed a given bound. Fast DTW algorithms have been used to search very large
databases
Security
The Internet of Things (IoT), including the Industrial Internet (IIoT), refers not only to the
connectivity of systems and devices but to the related applications and services that
provide monitoring and control of complex systems and services.
The application domain spans a wide range of industries, from health to industrial control
and from transportation to surveillance systems. Its expansion and growth incorporate
several technologies and disciplines, such as electronics, embedded networks, hybrid
systems, and control.
The inclusion of information technology (IT) as well as operational technologies (OT) creates
a challenge for the development of systems and services that are technologically
interdisciplinary.
The resulting challenges to integrate these technologies in new design methodologies for
robust and effective IoT systems and services are significant.
Currently, even the terminology used by different stakeholders presents challenges and
inconsistencies to the common understanding of properties and goals of IoT infrastructure
and applications.
Security is a system property; the system can be only as secure as its weakest component.
Security features are provided by components at several layers in the IoT stack: devices,
physical networks, and middleware.
A unified view of IoT system security architectures has not yet emerged. Some, but not all
processors for low-power operation, provide security features such as encryption
accelerators and root of trust.
The National Security Agency has developed families of lightweight block ciphers: SIMON
targets hardware implementations, and SPECK is intended for software implementations
developed a low-power implementation of SIMON. Several networks provide security
features.
Bluetooth Low Energy provides a Simple Secure Pairing protocol to protect against passive
eavesdropping. It also provides address randomization. As discussed above, Zigbee
provides two network security models: centralized and distributed.
LoRa provides unique network keys, unique application keys, and device-specific keys.
MQTT does not specifically require encryption, but it can be used with several different
security standards. MQTT and the NIST Framework for Improving Critical Infrastructure
Cybersecurity [Oas14B] describe the relationship between MQTT and the NIST
Cybersecurity Framework.
Security by design is a methodology that ensures security is a crucial objective at all stages
of product creation and deployment.
It addresses the challenge that, in many historic hardware deployments and instances of IoT
design, security considerations were often included late in the design and prototyping
phase.
The result?
This approach has led to serious security breaches in the past, as IoT security can not easily
be retrofitted.
Key examples are unsecured devices that enable attackers to breach an otherwise secure
system or large numbers of connected devices that cannot be upgraded to deal with
emerging threats.
Why do we need IoT Security by Design?
Security procedures and standards do not govern IoT products. Connected devices are
sometimes lacking security measures, and in some cases, were not meant to be connected
to other systems or applications in the first place.
As the security architect for IoT solutions, you'll have to define a strategy for hardware,
applications, communication layers, and storage that fits your organization's security
requirements.
#1. The Thales Security by Design approach ensures that IoT security is considered at the
beginning of project design. A successful security architecture ensures that devices are
protected in the right location and at the right level to meet the needs of each
implementation.
You list your threats, vulnerabilities, and the probability of an attack happening, and what
the impact of that attack would be.
#2. Thales' security by design strategy continues with implementing a solid foundation of
trusted digital device IDs and credentials, securely stored in the roots of devices, during
manufacturing. Trusted credentials defend against device cloning, data tampering, theft, or
misuse.
#3. For extra sensitive IoT applications, including automotive, healthcare, and smart grids,
Thales recommends storing IDs and credentials in a tamper-resistant Secure Element to
protect physical and digital access.
Security-by-design is the foundation of any secure IoT deployment. Pre-embedded IDs and
encryption keys are essential elements for secure data encryption, the digital signature of
messages, and the over-the-air device and security updates.
Security by design means thinking like an attacker, and in return, layering defenses in a way
designed to protect data and devices even in the event of a breach.
These multiple defensive measures, known as the in-depth defense principle, mean that
should make one layer fall to an attacker, other mechanisms remain in place to mitigate
potential damage done.
Protecting each part of an IoT deployment – the devices, the gateways and connections,
and the cloud layer and users – with these layered defenses gives your network the best
cybersecurity architecture.
Protecting a single device isn't enough: security by design needs to take the holistic view of
what happens when that device is attached to a network.
Pre-embedded keys and credentials are crucial for simplified data enrollment in IoT cloud
platforms.
Keys and credentials ensure that IoT devices are authentic and recognized by legitimate
partners as trustworthy.
Essentially, this means external platforms immediately recognize devices, and trust is quickly
established for future data exchange.
Besides, Thales uses robust encryption technology to protect data integrity and ensure that
only authorized devices and apps can access data through secure digital signature schemes.
Once the data has reached external platforms, it should also be protected.
99% of organizations surveyed for the 2020 Thales Data Threat Report expressed concerns
relating to IoT security. It's much more than what we measured in our 2017 survey.
In particular:
It also assumes that no device or network is 100% secure and that at some stage, a
connected device or system could be successfully attacked.
• End-to-end encryption for all communication between IoT devices, machines, and back-
office systems.
• Protecting data at rest, both from unauthorized access and from being altered.
• Use strong authentication and identity management for all interactions with IoT devices
and data.
Managing the lifecycle of security components across the device and cloud spectrum
to minimize attack surface is critical to a robust and long-term digital security strategy, and
it is often overlooked.
Security is not a one-off activity but an evolving part of the IoT ecosystem that should
support IoT deployments' lifecycle in:
IoT Security lifecycle management solutions must facilitate updates remotely and execute
them across large-scale device fleets to avoid time-consuming and costly services in the
field.
- End of Module 2 -