Sensory swarms of an IoT can be wirelessly interconnected to interact with the edge of a cloud, and offer an unprecedented ability to monitor and act on a range of evolving physical quantities. The Swarm leverages the paradigm of independent, cross-niche and heterogeneous devices that can cooperate with each other in order to execute tasks synergistically. The Swarm architecture is device-oriented, focused on machine-to-machine communications. The Heterogeneous Broker is responsible for dynamically recruiting resources from the cloud; allowing information aggregation to make or aid decisions; and then to dynamically recruit actuation resources. In this talk we will describe our experience implementing and deploying the heterogeneous broker developed by USP in partnership with UC Berkeley. An special focus will be given to the 96Boards program.

Read more

At this BoF we are going to discuss what an IoT toolchain should look like from a user perspective

Read more

The TI SimpleLink CC32xx family of MCUs provides an SoC and supporting SDK which completely offloads the WiFi stack onto an integrated network coprocessor. The SimpleLink SDK currently has no explicit support for the Zephyr IoT OS, but is designed to be portable. A native IP stack for Zephyr is currently under development, which includes an experimental IP offload option. This session reviews the challenges of integrating a vendor TCP/IP offload engine into an existing OS IP stack in general, and in particular, evaluates options for integrating the TI SimpleLink WiFi stack into Zephyr.

Read more

Scripting languages is hot emerging topic in IoT. They allow easy learnability and rapid prototyping and further benefits (like production use) as they evolve. This session compares approaches of MicroPython and JerryScript/Zephyr.js projects and gives status update on their Zephyr RTOS ports.

Read more

An important base for security is the beginning of the boot process. It is necessary to be able to verify signatures before upgrading images. This session will discuss the mcuboot project, the efforts to port this to Zephyr, and the functionality available. It will include a small demo of its functionality.

Read more

This is a discussion on various methods put forward to reduce the size of Linux kernel and user space binaries to make them suitable for small IoT applications, ranging from low hanging fruits to more daring approaches. Results from on-going work will also be presented.

Read more

In composing RTOS-based images to run on embedded systems, there are number of different issues that come into play that are different from building a root fs for Linux. Issues such as how third-party libraries and code link with the OS, how we pull down the code, etc. Additionally, such systems may also need to support the creation of filesystem-based images. There are several options that exist today (“newt" - a tool from the Apache Mynewt project in the Apache Software Foundation; “yotta" - from ARM mbed; the Yocto Project; and more). This session will discuss required features, compare and contrast project approaches, and potential additions and changes that are needed in this space.

Read more

For connected embedded systems we can broadly consider security across four different areas: Security within a cloud application/platform. Lifecycle security for large deployments of embedded devices. Communication security between internet connected systems. Local device security implemented within end nodes. Each connected end node needs to support aspects of lifecycle, communication and device security according to application needs. It is not scalable (or secure or productive) to start from scratch, implementing all of these aspects for each development. It is also not a good idea to implement static, closed, proprietary security systems which rely more on “security by obscurity” than on thorough, continuous and open validation of security implementations. Developers need comprehensive and flexible SW security frameworks with strong links to MCU HW security features that enable them to efficiently implement, validate and deploy “right sized” security solutions. This session will discuss the solutions that are available today, how to reason effectively about application security requirements and opportunities to evolve embedded security solutions in the future.

Read more

**Title: IoT Zephyr** Overview of IoT Zephyr **Bio** Geoff Thorpe heads up security within the Microcontroller group of NXP, where the intersection of device security and network security gives him a headache commonly known as “IoT”. His early experience with security topics was very software-centric, as a long-standing member of the OpenSSL team and a contributor to related open source projects. After many years veering off into semiconductors and hardware architecture, his software-bias has been domesticated to some extent but not eradicated.

Read more

SoC Vendors, board vendors, software middle layers, scripting languages, etc all need to have access to system configuration information (pin muxes, what sensors are on a system, what amount of memory, flash, etc, etc). We need a means to convey this in a vendor neutral mechanism but also one that is friendly for Cortex-M/constrained footprint devices. This session will be to discuss the topic, how its done today, what kinda tooling might exist from different vendors, what we could utilize (device tree) and what issues that creates.

Read more
Page 1 of 212