The Internet of Things on AWS – Official Blog

Category: AWS IoT Platform

Provisioning with a bootstrap certificate in AWS IoT Core

One of the core tenets of managing IoT devices is provisioning, which is the process of registering a device on a particular platform or a system. When bootstrapping your devices, it’s important to establish mutual authentication between the device and an Internet of Things (IoT) endpoint to prevent threats like man-in-the-middle attacks. Device certificates are by […]

Read More

How to Install a Face Recognition Model at the Edge with AWS IoT Greengrass

Editor Note: This post is co-authored by Gong Xinyue, one of Global Accounts Solution Architects. You might already know how to use AWS IoT Core and AWS IoT Greengrass for remote device communication and control. With AWS IoT Greengrass Machine Learning (ML) Inference, you can run machine learning models on your local devices without any […]

Read More

Automating Security Remediation Using AWS IoT Device Defender

An IoT solution requires managing a large number of devices, usually hundreds of thousands or millions. When you start to work at a large scale, you need to keep your fleet protected by continuously checking if it is following security best practices. It can be challenging for organizations to audit all devices and automatically remediate […]

Read More

Using AWS IoT Services for Asset Condition Monitoring

The Industrial Internet of Things (IIoT) presents an unparalleled opportunity for every industry to address core business challenges, such as reducing downtime, improving safety, increasing system output, reducing operating costs, and creating innovative services and business models. In this blog post, I will show how you can use AWS IoT services to build an asset […]

Read More

Before Developing Real Devices: Exploring a Business Outcome with Simulated Devices

Realize business outcomes with the IoT Device Simulator, AWS IoT Analytics, Amazon QuickSight, Microsoft Power BI, and Tableau Customers often get wrapped up in slower hardware development cycles before they have real, potential business outcomes identified and agreed upon for their business. This post highlights how customers should consider using simulated devices to explore business […]

Read More

Get Started with the IoT Foundation Series from AWS Training and Certification

The IoT Foundation Series, a new curriculum dedicated to IoT on AWS, is now available online on the AWS Training and Certification website. This curriculum contains self-directed online training classes that are scenario-based and aligned with the library of IoT design patterns called the IoT Atlas and IoT best practices in AWS whitepapers. This curriculum […]

Read More

Provision Devices Globally with AWS IoT

Customers are building globally distributed IoT solutions with AWS IoT. A device that connects to AWS IoT must be provisioned in an AWS Region. However, when devices are shipped globally, you don’t know in which AWS IoT Region the device will connect when it starts operation. In this blog post, I will describe a global […]

Read More

Connect your devices to AWS IoT using LoRaWAN

For many IoT use-cases, sensors only ever need to transmit infrequent and low bit-rate data. These sensors may communicate over large distances and have battery lives spanning in years, which means they are replaced infrequently. A couple of common use-cases would be in Smart Cities (eg. Parking or Waste sensors) and Agriculture (eg. Soil Monitoring […]

Read More

Configuring Cognito User Pools to Communicate with AWS IoT Core

AWS IoT Core supports certificate-based mutual authentication, custom authorizers, and Amazon Cognito Identity as way to authenticate requests to the AWS IoT device gateway. Amazon Cognito User Pools was made generally available last year. It allows customers to easily add user sign up and sign in to mobile and web apps. You can use Cognito […]

Read More

Detect anomalies on connected devices using AWS IoT Device Defender

We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]

Read More