You are on page 1of 11

white paper

The Intel® IoT Platform


Architecture Specification White Paper
Internet of Things (IoT)

Reference Architecture for IoT Infrastructure


As the Internet of Things (IoT)
By 2020, it is expected that more than 50 billion devices will be connected to the
gains momentum, there is a
need for a suite of connected cloud and each other1 in what is commonly called the Internet of Things (IoT).
products and services that have Before this can become a reality, solution providers must recognize and tackle
awareness of each other and their the complexity of IoT solutions to ensure secure, scalable, and interoperable IoT
surroundings. To help satisfy this deployments.
need, Intel defined and released
the Intel® IoT Platform, which Along these lines, Intel, working with its ecosystem partners, defined a system
includes reference architectures architecture specification (SAS) for connecting nearly any type of device to the
and a portfolio of products
cloud, whether it has native Internet connectivity or not, as shown in Figure 1. The
from Intel and the ecosystem.
To guide the development and specification is intended to help developers, OEMs, independent software vendors
deployment of IoT solutions, (ISVs), and communications service providers (CSPs) develop and deploy IoT solu-
Intel has defined reference tions in keeping with five key tenets:
architectures for the IoT, which
addresses requirements for •S
 ervices to monetize the •A
 nalytics infrastructure to provide
data and device security, device IoT infrastructure customer value
discovery, provisioning and Data and device management Real-time, insightful, and secure data
management, data normalization,
analytics, and services. These
from things to cloud analytics from things to cloud
reference architectures are •S
 eamless data ingestion and device •A
 utomated discovery and provisioning
designed for two different use
cases: one for connecting legacy
control to improve interoperability of edge devices to ease deployment
infrastructure —“Connecting the Broad protocol normalization support Device setup from box to cloud in
Unconnected,” and another for with real-time, closed-loop control minutes
building infrastructure —“Smart systems
and Connected Things”. This
white paper discusses both • World-class security to deliver the
reference architectures and requisite data and device protection
associated products from Intel. Robust hardware and software-level
protection

Things

Third-Party
Cloud
Network Cloud
Security Management API Libraries, Gateway Devices
APIs, SDK

Network
Security Management API Libraries, Infrastructure Batch & Stream Storage Servers
No Internet Connectivity APIs, SDK Analytics

Security Management API Libraries,


Internet Connectivity APIs, SDK

Figure 1. End-to-End IoT Solution from Things to Network to Cloud


Architecture Specification White Paper 2

Table of Contents Intel Reference Architecture data shared between smart things and
Overview the cloud. Version 2.0 describes meth-
Reference Architecture for ods to overcome these issues.
IoT Infrastructure . . . . . . . . . . . . . . . . 1 The Intel® system architecture
specification (SAS) is a reference Moreover, version 2.0 is a future-
Intel Reference Architecture architecture for IoT, with two versions looking reference architecture.
Overview . . . . . . . . . . . . . . . . . . . . . . . . 2 that co-exist and were designed to It facilitates the convergence of
IoT Value Proposition . . . . . . . . . . . . 2 evolve as specifications for open and operational technology (OT) and
scalable solutions. The two versions information technology (IT) for
IoT Challenges . . . . . . . . . . . . . . . . . . 3
represent concurrent reference seamless cyber-physical systems using
Intel Leadership in IoT . . . . . . . . . . . 3 architectures to address different Universal Smart Objects (USO), which
Intel IoT Reference Architecture. . . 3 partner infrastructure maturity are IPSO-Alliance.org compatible. One
levels, and to separate urgent and global map provides IoT resources
Data Flow Example . . . . . . . . . . . . 4
future-proofing needs. As horizontal with a USO type and type members
End-to-End IoT. . . . . . . . . . . . . . . . . 5 architectures, both versions were that have a global unique ID (GUID),
Communications and designed with the same principles used and can be registered and discovered
Connectivity Layer . . . . . . . . . . . . . 6 by leading cloud providers and tested with Intel Contract Broker (iCB), which
for massive loads across a range of IoT is compatible with CoRE Resource
Data Layer with Analytics. . . . . . . 6 standards and business verticals. Directory from IETF.org.
Management Layer . . . . . . . . . . . . . 8
Available under a non-disclosure
The specification is future-proofed
Control Layer . . . . . . . . . . . . . . . . . . 8 agreement (NDA), the reference
through the use of modular planes
Security Layer . . . . . . . . . . . . . . . . . 9 architecture versions are intended
and flows for reuse across application
to accelerate partner products,
Intel Building Blocks . . . . . . . . . . . . 10 containers, virtual machines (VM), and
requirements, and feedback.
network functions virtualization (NFV)
Summary . . . . . . . . . . . . . . . . . . . . . . . 11
as developed by ETSI.org. Likewise,
Version 1.0 The Intel® IoT Platform
Resources . . . . . . . . . . . . . . . . . . . . . . 11 solution lifetimes are extended
Reference Architecture for Connecting
with support for software-defined
the Unconnected
networking (SDN) per the Open
The Intel SAS version 1.0 specifies Networking Foundation (ONF) and
how solution developers and system other reference architectures that make
integrators can use an IoT gateway to it easier to manage large networks
securely connect and manage legacy of disparate hardware and software
devices that were not originally built with resources.
intelligence or Internet connectivity.
IoT Value Proposition
Version 2.0 The Intel® IoT Platform
Reference Architecture for Smart and Companies and organizations have
Connected Things been collecting and storing data for
years, but now new data analytics
Intel SAS version 2.0 specifies how to
technologies enable more productive
integrate a variety of smart and con-
use of this data by transforming it into
nected things, ranging from battery-
information that can increase system
powered through to ultra-high perfor-
throughput, improve efficiency,
mance devices, which are being built
reduce downtime, and enhance
today with intelligence and connectivity
customer experiences. When this data
already integrated. In some of these
is analyzed in detail using advanced
configurations, an IoT gateway is not
tools available on the market, it is
needed. However, these smart devices
possible to find patterns and extract
may lack the security, manageability, or
meaning that ultimately lead to
integration capabilities necessary for
smarter decision making.
real-time, closed-loop control of the
Architecture Specification White Paper 3

The IoT will deliver the infrastructure Intel Leadership in IoT The business layer utilizes the
required to achieve this by making application layer to access other layers
Intel has a proven history of
it easier to collect, analyze, and act in the solution. The vertical security
transforming vertically fragmented,
on data generated by a wide array layer on the right side of Figure 2
inefficient, and proprietary markets
of endpoint devices. This is done secures all layers, which is critical for
into well-organized, horizontally
by providing the data and device satisfying the world-class security tenet
scalable, and open markets (as best
connectivity, security, interoperability, mentioned previously. The following
demonstrated with the PC, laptop,
and analytics capabilities that enable section describes the data flow through
workstation, server, and storage
greater productivity. this layered architectural framework,
markets). Today, Intel is working
and subsequent sections cover all the
to make the IoT more open and
IoT Challenges architectural layers in more detail.
cohesive by leading the creation of
Before the full benefits of the IoT two important consortia to promote
can be realized, the industry must a standards-based and inclusive

Developer Enabling Layer (APIs, SDKs, Dev Tools)


address some challenges facing end IoT development environment. The Business Layer
customers and solution providers Industrial Internet Consortium (IIC) and
alike. Data security and privacy must the Open Interconnect Consortium
be omnipresent at every endpoint (OIC) were created to address the Application Layer
and throughout the network and myriad of challenges that could limit
cloud to protect devices and users’ growth of the IoT, including data and

Security Layer
private information as data travels device security, interoperability, and Control Layer
from things to cloud. Solution provider scalability.
fragmentation in many vertical market
Intel’s success in this effort is closely Management Layer
segments has resulted in vertical,
linked with the more than 250 members
purpose-built solutions that inhibit
of the Intel® IoT Solutions Alliance, one
interoperability, thereby impeding the Data
of the world’s most recognized and Analytics
flow of data across vertical domains. Layer
trusted technology ecosystems. These
The integration of information
members offer software and hardware
technology (IT) and operational Communications and
solutions that are fundamental to
technology (OT) infrastructure is Connectivity Layer
building IoT infrastructure. No single
vital in order to capture all the data
company can do this alone, which
and analyze all contextually relevant Figure 2. Layered Architecture Enables
is why it is extremely important to Secure, End-to-End Solutions
information in the company or
enable a large number of vendors
organization in real time.
through open standards and platforms.
The concept of ubiquitous device Intel and its ecosystem embrace this
connectivity to the Internet is still principle, which gives end users greater
in its infancy, with 85 percent of vendor choice and potentially lower
devices yet to be connected. 2 IoT costs from increased competition.
investment justification is hampered
by underutilized data, leading to ROI Intel IoT Reference Architecture
calculations that fail to account for the
The developer community can use
full potential of IoT (e.g., IT and OT cost
Intel’s IoT reference architecture to
savings, new and adjacent revenue
bring intelligence to endpoint things
generation). Interoperability and
by enabling edge analytics, leading
standards are unavailable or globally
standards compliance, and direct-
fragmented, which slows down decision
connect cloud control. The architecture,
making and IoT adoption.
shown in Figure 2, is layered, where
This Intel SAS was developed to the white blocks are user layers, the
address these challenges, and in dark blue blocks are the major runtime
doing so, will help accelerate growth layers, and the light blue layer is for
of the IoT. developers.
Architecture Specification White Paper 4

Wi-Fi + LP Wi-Fi On-Premise or Off-Premise Data Center or Cloud


Bluetooth* + BTLE
3G/4G/LTE (GPRS) 10
Advanced Data Analytics
Zigbee*, Zwave*
6LoWPAN*
4’

Vertical IoT Apps


WiHART*
Ethernet
Sensor D A RFID Remote Stream Batch Business
PM A

Control Analytics Analytics Logic


Third-Party & Rules
Actuator C S M Cloud

9
Data & Metadata

Services
1 Orchestration 11
Sensor D D Secure Processing Storage
PM A

PM A

Service Brokers

Sensor S M S M

IT/Business Systems
8 APIs, API
Network 4 Libraries, SDK
Infrastructure
Thing Security, Attestation & Management

2 3

D L B Security Management Asset Info, Policies Business


Sensor & Metadata Portal
P MA

A S M 2’
Actuator
C Data Center Management & Security
(Monitoring, Auto-scaling, Logging, Eventing)
7 6 5

C Actuation & Control S Security & Attestation Data Flow: MQTT, HTTPS, WebSockets*, XMPP, CoAP, REST, AMQP, DDS, et al.
A Analytics & Machine Learning (Real-Time) M Thing/Device Management Security & Management Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al.

L APIs & API Libraries B 3rd Party Business & Application Agent Actuation & Control Flow: MQTT, CoAP, XMPP, AMQP, DDS, et al.
Storage D Data Ingestion and Processing

PMA Protocol Manager & Adapter (formally UPAL) Intelligent Thing (MCU/GW)

Figure 3. Data Flow for Devices without Native Internet Connectivity

Data Flow
Figure 3 depicts a typical industrial data 4. The data center, which may include 6. The endpoint sensor devices convert
flow through Intel’s IoT reference archi- an on-premise or Fog perimeter, digital signals to analog using a
tecture to illustrate how devices without is configured for low latency to digital-to-analog converter (DAC).
native Internet connectivity can be intel- provide real-time responses to
ligently controlled by the cloud. the gateways via HTTPS Get/ 7. Actuators and motors respond to
Post or (4’ in figure) Fog can the new analog input.
1. Endpoint sensor devices convert
alternatively respond directly to
analog signals to digital using an 8. The data center transports and
endpoint sensor devices. Fog is the
analog-to-digital converter (ADC). ingests sensor data for device
edge-cloud area (near 4 in figure),
security and management.
2. The gateways collect data from which is tuned for low latency
endpoint sensors or (2’ in figure) with near-real-time query and 9. The data center forwards other
multiple sensing devices can analytics for on-premises value, data to runtime operations.
alternatively connect directly to unlike the central cloud tuned for
high bandwidth and batch mode, 10. The data center also forwards data
the data center via the Internet.
eventually providing deep data to data analytics applications.
3. The gateways prepare, reduce, and insights for things-to-Fog, end-to-
11. Data analytics applications
aggregate data. Gateways may also end, real-time operations.
evaluate big data and generate
include, as an example, a web server,
5. The gateways forward responses analysis and operational reports.
which forwards data to the cloud via
HTTPS Post to Internetwork using (control commands) to the endpoint
the MQTT protocol. sensor/actuation devices.
Architecture Specification White Paper 5

End-to-End IoT On-Premise MQTT, HTTPS CaAP, REST, Cloud


XMPP, DSS, etc.
The major software components Sensor Enterprise
and interfaces in Intel’s IoT reference Sensor Sensor Data Agent Cloud Data
Service Bus
Cloud
Hub Handler Ingestion Analytics
architecture for connecting devices Actuator (Including Software Software
PMA)
without native Internet connectivity are Edge
Analytics
shown in Figure 4. The components DB Agent OPS DB
Sensor
are grouped by on-premises and Service
Orchestration
cloud. The on-premises components Security
Agent
Cloud Security Software
Management
Actuator
are located on endpoint devices and Config DB
gateways, as described in Table 1. The Management Device Configuration
Sensor Firmware/ Agent Management
cloud components are responsible Software Management

for data ingestion from the endpoint Gateway Agents

device, data storage, data analysis, Gateway Software Cloud Software


Cloud Software
service orchestration, and security
Open Source Management Software in the Cloud
management, as indicated in Table 2. Third-Party Vendor

Figure 4. Software Components and Interfaces for Intel’s IoT Reference Architecture

COMPONENT SOFTWARE TYPE FUNCTIONALITY INTERFACES

Sensor Hardware and firmware for intelligent Gathers sensory information like Connects to the gateway or sensor
things temperature, pressure, vibration, hub via wired (e.g., I2C, GPIO, SPI) or
energy, etc. wireless (e.g., BTLE, ZigBee*, USB)

Actuator Same as above Performs actuation (e.g., turn on LED). Same as above

Sensor Hub Hardware and firmware Connects to sensors and actuators, Same as above
and aggregates data.

Sensor Handler Middleware Interfaces with sensors using device Communicates via API calls to
drivers or API libraries (e.g., Protocol sensor libraries (or PMA) or directly
Abstraction or Mapping Layer (PMA) to device drivers (in the absence of
APIs). APIs).

Local Database Third-party or open-source software Locally stores sensor data, logging Uses REST, ODBC, JDBC, etc. on
or configuring information from the SQL, JSON, streaming, time and
cloud. spatial data.

Data Agent Software Gathers and formats data (for the Communicates with the sensor
cloud) from the different sensors handler via API calls to sensor
and controls actuators based on libraries (or PMA) or directly to
commands from the cloud. device drivers (in the absence of
APIs). Communicates with the cloud
via different protocols, like MQTT,
REST, etc.

Edge Analytics Software Learns actionable data in local context Communicates with major device-
Agent and near real time. to-device and device-to-cloud API
for rules on data streams, their
alerts, and local processing

Security Agent Software and middleware Handles security primitives for Communicates with the security
gateways and sensors/actuators, management software component
including authentication keys and in the cloud.
certificates.

Management Software and middleware Handles manageability primitives Communicates with the device
Agent for gateways and sensors/actuators, management software component
including provisioning, error handling, in the cloud.
alerting, and eventing.

Table 1. Description of On-Premises Software Components


Architecture Specification White Paper 6

COMPONENT DESCRIPTION INTERFACES

Cloud Data Ingestion Interacts with the edge data agent and ingests data Communicates with the data agent via different
Software coming from edge devices, making it available to other protocols, like MQTT, REST, DDS, etc., and publishes
cloud software via the Enterprise Service Bus (ESB). to ESB.

Cloud Security Interacts with the edge security agent in the edge, and Communicates with the edge security agent and
Management Software configures and controls security primitives of on- configuration database.
premise equipment.

Cloud Device Interacts with the edge management agent in the edge, Communicates with the edge device management
Management software and configures and controls manageability primitives agent and configuration database.
of on-premise equipment.

Enterprise Service Bus Assists in the design and implementation of Supports cloud analytics and service orchestration
communications between mutually interacting software, and can subscribe to data from the ESB.
software applications.

Operational Database Manages dynamic data end-to-end, allowing real-time Supports cloud analytics and service orchestration
data modifications (add, change or delete). Examples software, and can access the operational database.
include MongoDB* and Hadoop*.

Configuration Database Contains all relevant information about the edge Includes security and management software that can
components and the relationships between those access the configuration database.
components.

Analytics Software Runs big data analysis on the data gathered from edge Can access the operational database and data from
components. the ESB.

Service Orchestration Centrally ensures service level agreements (SLA) Can access the operational database and data from
Software across resource managers workflow and provisioning the ESB.
applications and services

Configuration Centrally ensures on-premises configuration Updates the configuration database.


Management management, including devices and security.

Table 2. Description of Cloud Software Components

Communications and PANs are usually wireless and more the gateways both ingest data and
Connectivity Layer constrained by antenna distance (and execute commands, they are ideal for
sometimes battery life) than LANs. implementing closed-loop control
In support of the IoT tenet of seamless
systems. Gateways unify the broad
data ingestion and device control, Wide area networks (WAN) provide
range of endpoint things characterized
Intel’s IoT reference architecture connectivity for data and control flows
by low cost, low power, purpose-built,
implements broad protocol between the endpoint devices and
limited, and disjoint features.
normalization and closed-loop control the remote data center services. They
systems. A key aspect is enabling may be corporate networks, overlays Data Layer with Analytics
multi-protocol data communication of private networks over the public
between devices at the edge as well as Internet, 4G/5G mobile networks, or The data layer plays a major role in the
between endpoint devices/gateways, even satellite networks. IoT tenet of providing customer value
the network, and the data center. through valuable insights generated
The gateways in the middle of Figure by data analytics and improved
Figure 5 depicts the three types of
5 are the primary on-premises closed-loop control systems. Intel’s
networks involved in this process.
devices of Intel’s IoT reference IoT reference architecture addresses
Proximity networks and local area architecture. They perform protocol this need by allowing analytics to be
networks (PAN/LAN) connect to normalization, ingest data from things, distributed across the cloud, gateways,
sensors, actuators, devices, control and control things based on their own and smart endpoint devices (e.g.,
systems, and assets, which are application software or commands wearables), as shown in Figure 6.
collectively called edge nodes. from the data center or cloud. Since Likewise, control can be distributed
Architecture Specification White Paper 7

Proximity WAN
• Wired/Wireless • Location
• Plug & Play • Embedded SIM
• Optional Data Security • Dynamic Access Add mapping between capability,
• Peer-to-Peer Network Selection communications and protocols
Proximity
802.15.4, 6LoWPAN,
BT-LE, THREAD, ZigBee, Data Center/Cloud
Z-wave, RFID, ...
Intelligent Things HUB • Device Management
• Data Management
1. Cheap/Smart HUB • Analytics
2. Wired/Wireless
HUB
3. Powered/Low Powered/PoE Gateway
4. Headless
5. Plug & Play Edge Device
• Discovery
• Authenticate Wired (RS-232, ...) Access Network
• Pairing (Connection established) USB, BACNET ModBus, IoT WAN
• Update Configuration HUB
Profibus
6. Streaming Fixed (Wi-Fi, Ethernet)
7. Optional Data Security Mobile (2G, 3G, LTE)
8. Peer-to-Peer/Mesh Other (LTE-M, Unlicensed
9. Open/Interoperable access technology, satellite...)

LAN
WLAN 802.11 • Connectivity & Access
Ethernet Management
Gateway • Policy Controls (Deterministic)
• Simple Provisioning,
Management, Usage Reporting
• Secure (TLS, DNS DANE)

Figure 5. Detailed View of Communications

across the cloud and endpoint devices. in industrial applications or wearables sets, which is important for large
Distributing analytics and control in consumer markets. Gateways also transactional applications found in
provides the flexibility to optimize have context for local resolutions, retail and banking. This complements
either time-critical or computation- reserving central clouds for global the vast computation and analytics
intensive applications. analysis. of the billions of local devices, which
would flood central analysis in
Time-critical: The proximity of Central computation: The computing
quantity and local context, and with
gateways allows them to respond power and corporate-wide access to
noisy and aged data.
more quickly than the cloud, which is data in the cloud enables analytics
important for real-time systems found to be performed on larger data

IoT Edge
IoT Cloud

Gateway
Analytics
Staged Data Prepare Comms Channel Visualize Report
Smart Sensor Collect

Sensed-Items Edge Ops Logs Ingest Operations Data


Derived Items
e-State

Sensors Edge Derived Items


Analytics
Monitors
Analytics
Parameters Parameters

Actuators Apply Control Data Comms Channel Control Data

Actuator Settings

Figure 6. Data Layer Supports Distributed Analytics and Control


Architecture Specification White Paper 8

Wi-Fi + LP Wi-Fi
Bluetooth* + BTLE Data Transport Data Ingestion & Persistence & Query
3G/4G/LTE (GPRS) Broker Processing Concurrency
Zigbee*, Zwave*
6LoWPAN*
WiHART*
Ethernet Compute
Data as
RFID Messages
a Service
(DaaS)
Sensor I/O

API Library & API Management


Analytics
Actuator

GW SW Storage
Services
Sensor I/O Metadata Orchestration
Agent Catalog
Actuator Scripts
Linux*

Gateway
Sensor I/O Agent HTTPS

Actuator RTOS Management UI Web Browser

Device Device Cloud Platform REST/Messages

Figure 7. Management Layer Supervises Endpoint Devices

Management Layer
The management layer is important Scripts can be used to write •U
 se cloud-side rules to
for realizing the IoT tenet of applications that use the cloud initiate actions
automated discovery and provisioning platform. Another option is to write
•E
 xtend platform capabilities
of endpoint devices. Intel’s IoT applications somewhere else, using a
using scripts
reference architecture provides REST API to take advantage of platform
manageability functions through the functions. The volume, frequency, •M
 anage devices directly
Device Cloud product, whose scope and destination (e.g., cloud entity) of through its command shell
is shown in Figure 7. The managed device data can be controlled.
•M
 anage organizations, users,
devices are on the left-hand side, and
Device Cloud has the following main and access rights
the cloud platform is on the right-
device management functionality:
hand side. Each managed device has •U
 pload and download files
a management agent that executes •D
 iscover, register, and provision to/from a device
the management in its device and new devices
communicates with the cloud platform Control Layer
•U
 pdate applications and
via messages. The operator manages Intel’s IoT reference architecture
operating systems
endpoint devices via a web-based provides early guidance to separate
user interface. •M
 anage data flows from devices the management layer into a
(i.e., destination and storage policy) management plane and control plane,
Device Cloud is a system for managing
small to very large numbers of •U
 pload or stream data via an with policy and control objects and
connected endpoint devices. Its key ActiveMQ client interface APIs. The control layer can move off-
functions are to securely connect the device and off-premises for cloud or
•S
 top/reboot selected devices remote control, a primary requirement
devices to the cloud, update device
software, and supervise devices. Device •D
 efine and manage events, of software-defined network (SDN)
Cloud can connect to gateways to alarms, and notifications centrally controlled programming.
manage devices that are unconnected.
Architecture Specification White Paper 9

Security Layer software product portfolio to help interoperability with legacy systems
developers deliver interoperable and while providing common interfaces
Robust hardware- and software-
scalable solutions that span every and seamless communication between
level protection are essential for
level of the IoT. endpoint devices, the network, and
ensuring world-class security, which
the cloud.
is a foundational IoT tenet. Security Endpoint device level: Protect device
is more like a process than a product and user identities, ensure device Cloud level: Deliver the necessary
because it depends upon evaluating integrity, and protect operational trust for data centers and multitenant
the threat model for specific use cases and personal data on every device. public cloud environments to unleash
and addressing each possible threat. Each device should guarantee powerful IoT services and analytics while
A layered security approach is highly authentication without jeopardizing protecting data and ensuring privacy.
recommended since it establishes individual privacy and have the ability
multiple defense mechanisms against to automatically self-assess and Comprehensive Security
hackers. resolve any situation.
Security in Intel’s IoT reference Network level: Ensure secure
architecture spans endpoint devices, application, traffic, and data security Edge Device
the network, and the cloud, thus in transit through every type of wired
providing end-to-end protection and wireless network connection.
(Figure 8). Having acquired McAfee, a A new class of intelligent gateway Network
world-leading security company, Intel solutions, developed by McAfee, Cloud
provides a comprehensive security Intel, and Wind River, offers secure
Figure 8. Security at All Levels of IoT

WiFi + LP WiFi On-Premise or Off-Premise Data Center or Cloud McAfee


Bluetooth + BTLE McAfee Threat Intelligence
3G/4G/LTE (GPRS) Exchange* (TIE)
Next Generation Firewall Advanced Data Analytics
Zigbee, Zwave
6LoWPAN (NGFW)

Vertical IOT Apps


Wind River Linux*,
WiHART Trusted Analytics Platform
Ethernet
SensorVxWorks*, Wind D
River A Remote Stream Batch Business
RFID
P MA

Intel® Processors Control Analytics Analytics Logic


Rocket*^, Pulsar*^ Third-Party & Rules
Intel® Quark™, Intel® Atom™,
Actuator C S M Cloud
IoT Analytics Software
Intel® Core™ Processors
Intel® Edge Application Data & Metadata
Platform (EAP)^ Services
Wind River
Intel® Orchestration
Intel®
Intelligent Device Platform*
Sensor D D (IDP) Service Gateway
Secure Processing Storage API Management Portal
PMA

PMA

Service Brokers
IoT Analytics Software
Sensor S M S M IT/Business Systems
McAfee APIs, API
Intel Connectivity Ethernet, Network Thing Security,
ePolicyAttestation & Management
Orchestrator*
Libraries, SDK
Intel® HW Security Cellular/WWAN Infrastructure
i.e., EPID, Secure Boot, (ePO)
McAfee
TPM, Intel® Software, Enterprise Security
Guard Extensions, Intel®
D L B McAfee Security Wind Asset Info, Policies Manager*
River Helix*
Management (SIEM)
Business
Trusted Execution Technology
Sensor Device Cloud & Metadata Portal
PMA

Embedded/Inegrity
A S M Control* (MEC) (HDC), App Cloud^,
Actuator Lab Cloud^
Intel and Wind River
C Data Center Management & Security Intel®
Developer Kits, Tools, (Monitoring, Auto-scaling, Logging, Eventing)Product Portfolio
Libraries, SDKs, Docs Intel® Security
Critical Infrastructure
Protection
C Actuation & Control S Security & Attestation
Intel® Security
Data Flow: MQTT, HTTPS, WebSockets, XMPP, CoAP, REST, AMQP, DDS, et al.
Product Portfolio
A Analytics & Machine Learning (Real-Time) M Thing/Device Management Security & Management Flow: MQTT, EPID, OMA-DM, TR-069, REST, et al.

L APIs
The&Intel®
API Libraries B 3rdthat
IoT Platform is a family of products Partyseamlessly
Business & Application Agent
and securely Actuation & Control Flow: MQTT, CoAP, XMPP, AMQP, DDS, et al.
Wind River
connect and manage devices, deliver trusted
Storage D data
Data to the&cloud,
Ingestion and deliver
Processing Product Portfolio
value through analytics.
P MA Protocol Manager & Adapter Intelligent Thing (MCU/GW)
Open Source

Figure 9. Building Blocks for Intel’s IoT Reference Architecture


^Planned technologies for 2015-2016
Architecture Specification White Paper 10

Intel Building Blocks


Intel, McAfee, and Wind River have • Wind River Pulsar* Linux*: Is a • Trusted Analytics Platform:
developed products that serve as IoT small-footprint commercial-grade Provides big data analytics on open-
building blocks that developers can quality binary Linux* OS based on the source Hadoop* and open-source
use to design end-to-end IoT solutions Wind River Linux* distribution that OpenStack* for orchestration with
based on Intel’s IoT reference architec- connects directly to Wind River Helix private cloud or major public cloud
ture. The products, shown in Figure 9, Cloud. providers.
are overlaid in Figure 3 and described
briefly in the following. • Wind River Intelligent Device Cloud
Platform XT*: Simplifies the • McAfee Threat Intelligence
Things development, integration, and Exchange*: Optimizes threat
• Wind River Linux*: Is the leading deployment of IoT gateways prevention by narrowing the gap from
commercial embedded Linux with a customizable middleware malware encounter to containment
platform and the first to bring development environment that from days, weeks, and months down
the advantages of open source provides security, connectivity, rich to milliseconds.
without the risks to companies in all networking options, and device
industries. management. • McAfee Enterprise Security
Manager* (SIEM): Delivers a real-time
• Intel Hardware® Security: Secures • Intel® Connectivity: Supports various understanding of the world outside
the platform at the hardware level types of networks with interface (e.g., threat data, reputation feeds,
with capabilities such as secure boot, devices for Ethernet, cellular, and vulnerability status).
Intel® Trusted Execution Technology, WWAN.
and trusted platform module. • Intel® API Management Portal:
• McAfee Integrity Control*: Streamlines API access and control
• Developer Resources: Reduce design Performs monitoring, management, for organizations and developers.
time with developer kits, tools, and tight security policy enforcement
libraries, SDKs, and documentation. on edge devices. • Wind River Helix App Cloud*:
Provides a cloud-based
• Intel® Processors: Provide unique • McAfee Next-Generation Firewall: development environment for
performance scalability across Intel® Features built-in, active-active building IoT applications.
Quark™ SoC, and Intel® Atom, Intel® clustering that scales to 16 nodes.
Core™, and Intel® Xeon® processor • Wind River Helix Lab Cloud*:
• Intel® Security Critical Infrastructure Includes a cloud-based virtual
families.
Protection: Protects critical end-to- hardware lab for simulating and
• Intel® Quark™ SE SOC for IoT: end infrastructure. testing IoT devices and complex
Contains Intel® Quark™ SE systems.
Network
microcontrollers with pattern
matching technologies that allow • Intel® Service Gateway: Seamlessly
things to learn through pattern connects edge devices to the cloud
recognition and differentiate and secures their data flow.
appropriate responses.
• McAfee ePolicy Orchestrator*: Eases
• Wind River Rocket*: Is a tiny- the administration of distributed
footprint commercial-grade quality devices, helps automate security
real-time operating system that policy control, and simplifies
connects directly to Wind River Helix compliance reporting.
Cloud* and is ideal for 32-bit MCUs,
• Wind River Helix Device Cloud*:
such as those used in small-footprint
Collects and manages data
sensor hubs, wearables, and devices
from devices and machines to
comprising the IoT edge.
raise operational visibility and
intelligence.
White Paper Title Placeholder Here

Secure, Scalable, and Resources also maintain interoperability between


Interoperable IoT solutions new intelligent infrastructure and
Intel® Internet of Things
legacy systems, including sensors and
IoT solution developers and their Solutions Alliance
data center servers.
customers need a secure and reliable Members of the Intel® Internet of
IoT infrastructure, which is why Things Solutions Alliance provide the To learn more about Intel solutions for
Intel has defined key tenets to help hardware, software, firmware, tools, the IoT, visit intel.com/iot.
ensure deployments satisfy critical and systems integration that developers
requirements. Moreover, Intel’s IoT need to take a leading role in IoT.
reference architecture is available
Intel® IoT Gateway Development Kits
to help make IoT deployments more
Intel® IoT Gateway Development Kits
secure, scalable, and interoperable.
enable solution providers to quickly
Developers can obtain the system
develop, prototype, and deploy
architecture specification for the
intelligent gateways. Available for
reference design from their Intel
purchase from several vendors, the kits
representative.

1. IDC* forecast.
2. David McKinney, “Intel Champions Internet of Things Collaborations at IDF Shenzhen,” April 23, 2015, https://blogs.intel.com/iot/2015/04/23/intel-champions-internet-of-things-collaborations-at-idf-shenzhen.
Copyright © 2015, Intel Corporation. All rights reserved. Intel, the Intel logo, Intel Atom, Intel Core, Intel Quark and Xeon are trademarks of Intel Corporation in the United States and/or other countries.

* Other names and brands may be claimed as the property of others. 1115/SL/CMD/PDF Please Recycle 333452-001US

You might also like