The Internet of Things on AWS – Official Blog

Category: Technical How-to

Detect anomalies on connected devices using AWS IoT Device Defender

We often see security breaches depicted in media and popular culture. In the HBO series Silicon Valley, a compromised refrigerator is used by hacker Gilfoyle to run a malicious piece of software. The reality of connected devices isn’t very different from this fictitious scenario. The compromised refrigerator can send consumer data to unauthorized endpoints. Connected […]

How AWS IoT Core is Helping Customers Navigate the Upcoming Distrust of Symantec Certificate Authorities

NOTE: This blog post describes important public key infrastructure (PKI) issues related to browser and mobile application connectivity to AWS IoT Core. For information about public key certificates and TLS, see Chain of Trust and Certificate Authorities in High Performance Browser Networking. Overview Google, Apple, and Mozilla have announced that, starting October, 2018, they will […]

Using Chainer Neural Network Framework with AWS Greengrass ML Inference

Starting today, Greengrass ML inference includes a pre-built Chainer package for all devices powered by Intel Atom, NVIDIA Jetson TX2, and Raspberry Pi. So, you don’t have to build and configure the ML framework for your devices from scratch. With this launch, we now provide pre-built packages for three popular machine learning frameworks including TensorFlow, […]

How to Implement MQTT with TLS Client Authentication on Port 443 from Client Devices (Python)

Update: AWS IoT Core has simplified the connection process—devices no longer need to implement the Transport Layer Security (TLS) Application Layer Protocol Negotiation (ALPN) extension to determine authentication type and protocol. This means that client devices can connect to AWS IoT Core with MQTT over port 443 without implementing ALPN. For additional details, please refer […]

Setting Up Just-in-Time Provisioning with AWS IoT Core

In an earlier blog post about just-in-time registration of device certificates, we discussed how just-in-time registration (JITR) can be used to activate device certificates and attach policies to the certificates immediately after the device is auto-registered. JITR triggers a registration event. You must create an AWS IoT Core rule to listen for the registration event […]

Using AWS IoT Device Management in a Retail Scenario to Process Order Requests

In this blog post, we will simulate a common business scenario to show you how to use the group policy feature in AWS IoT Device Management. Specifically, we will describe: How to create a hierarchical group structure and assign your IoT devices to different groups. How to publish messages to different IoT devices based on […]

MQTT with TLS client authentication on port 443: Why it is useful and how it works

The AWS IoT Core service now allows you to connect devices using MQTT with TLS client authentication on port 443.  Previously this combination of protocol and authentication mechanism was only supported on port 8883.  So what’s the big deal? Read on to learn more about how this feature makes it easier to connect your devices […]

Advancing Maintenance Maturity of Distributed IoT Applications with AWS Greengrass and AWS Step Functions

Shane Baldacchino is a Solutions Architect at Amazon Web Services. Customers have been asking how compute at the edge can be coupled with AWS services to advance maintenance maturity in their organization. In this blog post, we will examine maintenance maturity through the lens of something very common: elevators. We will show how you can […]

Deploy Fleets Easily with AWS IoT Device Management Services

Introduction The Internet of Things (IoT) offers the potential for data acquisition and digital interaction in areas previously inaccessible at an unprecedented scale. The magnitude of this opportunity affects individuals, organizations, and governments in many different ways. In manufacturing, for example, many makers of existing products are racing to integrate connected features into their offerings […]