The Internet of Things on AWS – Official Blog

Category: Technical How-to

Containerize your IOT application with AWS IOT Analytics

Overview In an earlier blog post about IoT Analytics, we discussed how AWS IoT Analytics enables you to collect, visualize, process, query and store large amounts of time series data generated from your connected devices. In this blog post, I will show how you can use your custom application to interact with AWS IoT Analytics. […]

Connect your devices to AWS IoT using LoRaWAN

4/15/21 AWS IoT Editorial Team Update:  Since the time of this blog post, we have announced AWS IoT Core for LoRaWAN. AWS IoT Core for LoRaWAN is a fully-managed feature that allows you to connect and manage wireless devices that use LoRaWAN connectivity with the AWS Cloud. Using AWS IoT Core for LoRaWAN, enterprises can setup […]

Configuring Cognito User Pools to Communicate with AWS IoT Core

AWS IoT Core supports certificate-based mutual authentication, custom authorizers, and Amazon Cognito Identity as way to authenticate requests to the AWS IoT device gateway. Amazon Cognito User Pools was made generally available last year. It allows customers to easily add user sign up and sign in to mobile and web apps. You can use Cognito […]

Detect anomalies on connected devices using AWS IoT Device Defender

We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]

How AWS IoT Core is Helping Customers Navigate the Upcoming Distrust of Symantec Certificate Authorities

NOTE: This blog post describes important public key infrastructure (PKI) issues related to browser and mobile application connectivity to AWS IoT Core. For information about public key certificates and TLS, see Chain of Trust and Certificate Authorities in High Performance Browser Networking. Overview Google, Apple, and Mozilla have announced that, starting October, 2018, they will […]

Ensure Secure Communication with AWS IoT Core Using the Certificate Vending Machine Reference Application

X.509 certificates are used to ensure secure communication between IoT devices and AWS IoT Core. Devices use these certificates to connect to AWS IoT Core using TLS mutual authentication. AWS IoT Core uses TLS mutual authentication to encrypt data as it moves between AWS IoT Core and other devices or other AWS services. A X.509 certificate […]

Using Chainer Neural Network Framework with AWS Greengrass ML Inference

Starting today, Greengrass ML inference includes a pre-built Chainer package for all devices powered by Intel Atom, NVIDIA Jetson TX2, and Raspberry Pi. So, you don’t have to build and configure the ML framework for your devices from scratch. With this launch, we now provide pre-built packages for three popular machine learning frameworks including TensorFlow, […]

How to Implement MQTT with TLS Client Authentication on Port 443 from Client Devices (Python)

Application Layer Protocol Negotiation (ALPN) is an extension to TLS that enables clients connecting to a TLS server to pass an extra parameter, known as a ProtocolNameList. The ProtocolNameList is a preference-ordered list of the application protocols that the client would like to use to communicate. AWS IoT Core now allows you to connect devices […]

Developing Amazon FreeRTOS with Texas Instruments’ Code Composer Studio Version 8

Update: This issue was patched in Amazon FreeRTOS version 1.2.4 to overcome the out-of-the-box experience challenges.  The root cause will be fixed in the upcoming Texas Instruments compiler release.   Last month, Texas Instruments (TI) launched Code Composer Studio (CCS) version 8, which includes the TI MCU compiler version 18.1.1. The Amazon FreeRTOS project for […]