/lm.png
IoT Advisor and Developer helping SMB companies create enterprise-grade solutions.
I provide AGREED VALUE in a DEFINED TIMEFRAME for the FIXED PRICE under CLEAR CONDITIONS.

Exploring the Chain-of-Trust of IoT Device Identity in 45seconds ⏱️

πŸ” The Certificate might seem like proof of identity, but there’s more beneath the surface. πŸ”‘ The Private Key is the cornerstone of this trust; it must remain confidential as it corresponds to the Public Key embedded in the Certificate. β›“This forms the Chain of Trust: The Private Key, securely stored on the device, links to the Public Key within the Certificate. The Certificate provides additional metadata describing the device represented by this key pair.

What are the benefits of using x.509 Certificates over passwords for IoT security?

The beauty of using certificates - Strengthen Your IoT Security! While passwords might have served us in simpler times, the IoT era calls for something more secure and inherently reliable - the x.509 Certificates. Why the Shift to x.509 Certificates? βœ… Built-In Trust: Each certificate is issued by a trusted authority (like AWS). If you trust the issuer, you automatically trust the certificate and the device it represents. That reduces complexity and establishes a direct, verifiable chain of trust.

Migrating Legacy IoT Solutions to AWS: A High-Level Overview

Moving legacy IoT systems to AWS IoT Core can be challenging, especially when devices rely solely on usernames and passwords for authentication. However, there’s a way to make this migration smooth and minimize the corresponding risk. Starting the Migration: Leverage Custom Authorizers: Utilize a custom Authorizer Lambda function of AWS IoT Core to authenticate devices using their existing credentials. This approach allows your devices to communicate with AWS without significant changes.

Understanding the Four Layers of an IoT System 🌐

1️⃣ Devices: These are the “things” in IoT (for example, sensors, cameras, smartwatches, locks, and industrial robots). Those devices collect data and/or perform actions impacting their surroundings. They are the starting point of the IoT data pipeline. 2️⃣ Edge: At this layer, data processing starts closer to the devices. Gateways and edge servers filter, preprocess, and transmit relevant data to reduce latency and optimize bandwidth usage. 3️⃣ Backend: Here lies the IoT brainpower - cloud platforms and backend servers process, analyze, and store data.

New way of enriching MQTT messages using AWS IoT Core 🚨

AWS added propagating attributes - contextual metadata from thing attributes or connection details. What does it mean? Previously, we had to configure and deploy IoT Rule to extract the Client Id and include it into the MQTT Message Payload. I used it during various scenarios as it was a convenient way to enforce the tight security posture of IoT deployment. According to AWS documentation, propagating attributes deliver the same enrichment without executing the IoT Rule.

Granting Permissions to AWS IoT Core for Timestream Database Interaction | IoT Series Part 2

In the second video of our AWS IoT and AWS Timestream series, we focus on granting AWS IoT Core permissions to interact with the Timestream database created in our previous episode. This video guides you through creating an IAM Role with the necessary trust relations and IAM Policies using AWS CDK for Python. By the end of this tutorial, you’ll have a secure setup allowing AWS IoT Core to describe Timestream endpoints and write records to a specific table.