Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Resource____________________________________________________Notes____________________________________________________________


https://networklessons.com/cisco/evolving-technologies/iot-standards-and-protocolsIoT network and data standards
https://www.ubuntupit.com/top-15-standard-iot-protocols-that-you-must-know-about/Top 15 IoT protocols
https://www.sam-solutions.com/blog/internet-of-things-iot-protocols-and-
connectivity-options-an-overview/
IoT protocols overview
https://www.avsystem.com/blog/iot-protocols-and-standards/IoT protocols and standards blog




https://objectcomputing.com/products/openddsOpenDDS basic concepts
https://objectcomputing.com/products/opendds/resources#techOpenDDS resources
https://objectcomputing.com/resources/publications/mnb/code-generation-
with-opendds-part-i

OpenDDS code generation - part 1

( OLD )

http://mnb.ociweb.com/mnb/MiddlewareNewsBrief-201007.htmlOpenDDS code generation - part 2




https://www.amazon.com/ELECROW-Raspberry-Learning-Computer-Electronics/dp/
B07W3ZGBQ4/ref=sr_1_3?gclid=Cj0KCQiA9dDwBRC9ARIsABbedBMNELvLfgPAE
K_1fLrvgA4uuzkE3piYQcXBf24LwJDKoApLU8DQiFMaAgRPEALw_wcB&hvadid=
153700809756&hvdev=c&hvlocphy=9002163&hvnetw=g&hvpos=1o1&hvqmt=b&hvrand=18083923115835876406&hvtargid=aud-837858999240%3Akwd-56661256719&hydadcr=18034_9433544&keywords=raspberry+pi+sensor+kit&qid=1578452884&sr=8-3

elecrow-raspberry-pi-sensor-tester-kit-239.pdf

ELECROW CrowPi Raspberry Pi 4B 3B+ Learning Computer Sensor Kit for Learning Coding and Electronics(Basic Kit, RPI Not Included, Black)






https://en.wikipedia.org/wiki/Comparison_of_real-time_operating_systemsComparison of IoT / Real time OS options

https://en.wikipedia.org/wiki/FreeRTOS

https://www.freertos.org/

Free RTOS, MIT license

https://en.wikipedia.org/wiki/Apache_Mynewt

http://mynewt.apache.org/

MyNewt - Apache free RTOS

supports wireless apps

https://en.wikipedia.org/wiki/RTAI

https://www.rtai.org/

RTAI - real time extension of Linux Kernel

supports IA-32, x86-64, PowerPC, ARM and MIPS

https://en.wikipedia.org/wiki/Linux_kernel#Preemption

https://www.kernel.org/

Linux Kernel


...

  1. Exchange — gets messages and puts them in the queues
  2. Message queue — stores messages until they can be safely processed by the client app
  3. Binding — states the relationship between the first and the second components


IoT Identity, Access and Accounting Concepts


Hyperledger White Paper - IoT Identity, Access and Accounting Concepts

https://docs.google.com/document/d/1uURqvzqPEw7WzzH6JhDeg3VNnZhgYgBmM_TqOSejyEQ/edit#heading=h.ieq7eqxzqeyv

iot-Decentralized Access and Management for IoT Devices - White Paper – Smart Phone PoC.docx


The ever-increasing number of IoT devices carries huge security and data vulnerability risk. Technologists are busy developing solutions to protect and guard IoT devices and the data they generate and share, as well as developing trust models to validate not only IoT devices’ data but also the applications providing the end services.

IoT Definition

There are several definitions of Internet of Things (IoT) that vary based on the specific context in which the definition is being used. However, most definitions agree on some key characteristics of IoT including: 

  • A group of physical objects, things, which are connected and accessible via the internet
  •  The “thing” could be a robot in a factory,  a pacemaker attached to a human, or a temperature sensor in a food package. 
  •  Each object has a unique ID and is capable of automatically collecting and sharing data.
  • Some objects are programmable and capable of making certain decisions on their own.

Problem statement - identity, authn, authz, security, reputation

As the number of IoT devices is expected to grow exponentially over the years, managing and protecting these devices and the data they access and generate become more complex and challenging. The challenge spans multiple domains from people accessing services to organizations responsible for authenticating and authorizing access to devices and data. 

The lack of a robust, industry-grade IoT device management scheme leaves devices exposed to identity theft and also leaves data exposed to unauthorized access and manipulation. This issue is further exasperated when dealing with personalized applications and services where issues of identity validation, trust, consent, and attribute sharing are of paramount importance.

At a macro industry level, the proliferation of IoT devices in heterogeneous networks has created a fragmented identity management space. This fragmentation has caused a multiplicity of silos of identity management systems which significantly limit interoperability.


Image Added



Image Added



OpenDDS concepts

https://objectcomputing.com/products/opendds

...