Slide 1

Slide 1 text

Edge computing

Slide 2

Slide 2 text

What is edge computing? Cloud| Datacenters Edge|Devices Fog| Nodes

Slide 3

Slide 3 text

What is edge computing? Near Edge 100-1000km <5-10ms 1-5 racks MEC Video Surveillance CDN IoT Apps Far Edge 1-100km <1-5ms 5-10 servers vRan AR-VR Gaming User/Customer Edge <1km 40-80μ 1-3 servers SD-WAN Core >1000km 20-50ms Multiple Racks 5G core (HSS/PCRF) cEPC CP AWS Wavelength AWS Outpost AWS Lambda Zones Cloudflare Edge Azure Stack Edge

Slide 4

Slide 4 text

Use case | Gradiant Counter UAS

Slide 5

Slide 5 text

IoT started a trend of lifecycle management, and OS have begun to follow in a way to do safe updates and rollbacks. OS lifecycle improvements Raspberry Pi was launched in 2012, and started the revolution. From there, multiple companies launched new SBC with different capabilities. Powerful boards Right now, the ecosystem is familiar with an external control-plane, and the industry now has years of experience. Control Plane ecosystem Why Now

Slide 6

Slide 6 text

Control plane | Data plane

Slide 7

Slide 7 text

● Raspberry PI was introduced in 2012. ● Compute modules are now normal. ● Nvidia launched Jetson boards where an AI workload can run with a minimal low consumption (7w) ● Tons of IoT projects that help the adoption of new solutions Powerful SBCs

Slide 8

Slide 8 text

● No longer cattles! ● Yocto project ● OTA Updates ○ Rpm-ostree (fedora-iot) ○ Snap (Ubuntu-core) ○ FreeRTOS OS Lifecycle

Slide 9

Slide 9 text

What change for us? HOW WE MANAGE HOW WE DO SECURITY HOW WE BUILD HOW WE SHIP

Slide 10

Slide 10 text

How we build: Decentralized GET /PubKey POST /login POST /data

Slide 11

Slide 11 text

PULL PUSH - Secrets are stored on the Device. - Connection needs to be open or watchdog - LTE-M PSM (Power Saving mode) - Push Notifications - Device needs to have *external access - NAT and other network issues. - By default no sensitive data is on device

Slide 12

Slide 12 text

IPSec CANsec or MACsec TLS or SecOC PGP, SSL, SSH Physical Transport Network Data Link Session Presentation Application 1 4 3 2 5 6 7 TPM- Trusted Platform Module A tamper-resistant secure crypto-processor that can store/limit the use of cryptographic keys, and also it provides a unique RSA key. Protecting data At the edge maybe there is no physical security, so things like having the hard disk encrypted should be always required, what kind of information is stored. Trusting connected devices A connected device needs to be trusted at some point. Having a Secure-boot enabled, and validate what interfaces are enabled, USB, JTAG. At the same stage, things like ROM/EEPROM should be considered vulnerable.

Slide 13

Slide 13 text

What’s Next? Smart Contracts Energy consumption WASM HTTP/3

Slide 14

Slide 14 text

Thanks [email protected] 🐦 eloycoto