The Evolution of the IoT Broker

The IoT Broker

The concept of a cloud broker has changed and we now instead call it the Hybrid Cloud. Where the customer, partner or the organization we are a part of has multiple cloud solutions deployed, and the goal is the create a simple management structure. Why would you want to create a simple management structure? The more you manage, the thinner your IT staff gets, the more likely that human error will get your company.

(IoT Impact Infographic Source: McKinsey)

One of the things that I see in the near term is the rise of IoT Brokers. I know, I was a dreamer when it came to the reality of cloud brokers. We, in this case, we mean the broader cloud market, were not ready for the concept yet. We are nearing the time when an IoT broker is going to be a significant value. I feel like it is time to start the initial design conversation around what would an IoT broker bring to the table that we don’t already have.

First off, the concept of IoT broker is similar to cloud broker, providing standardized services to businesses.

  1. Standardized gateway services for all IoT Devices. One of the things that slowed the evolution of email systems in the 1990’s was the reality of LCD. SMTP was the lowest common denominator for most email systems. But how they implemented that standard forced the user and the user’s email system to adapt. The concept of LCD for data always has to be the least amount of data in a pure form that the user needs to solve their problem.
  2. Standardized data collection service and structure for supporting storage regardless of where it is (cloud, on-premise or hybrid)
  3. The standardized device deployment provides a structure that includes the ability to automatically update IoT devices for new security, protocols, and data capture changes. Standardized deployment and management of IoT devices would generate the ability to add support for an IoT mesh network system.

Those three things are my 1.0 IoT Broker solution. The starting point of the overall solution. The first thing is the standardized data and device gateway. Simply put, the major cloud providers globally are all considering or have an IoT gateway deployed. The value proposition of the IoT Broker will be the ability to bridge or span multiple IoT gateways in building your IoT solutions in-house. The simple example within an IoT Broker model would be video surveillance. Each system deployed by businesses has different inputs and outputs. But connected to a standardized IoT gateway all the business’ on the street can share surveillance feeds. It reduces the cost of security for every business that shares the surveillance. You don’t need a camera covering the alley if the business next to you already has one.

IoT camera

The standardization of data collection is an interesting problem. Today IoT devices produce ~110 zettabytes of data annually. Data standardization allows for several things to be handled at the IoT Broker level, the easy button being if there is no motion in the security video don’t share it. The more complex application of the standardized data gateway allows hierarchical viewing of information. Not managed hierarchies rather who see’s what data as a structure within the organization. I don’t care how many times the surveillance drone scans the grounds of the building in a day. I do, based on the motion detected at 12:21 want to see the footage from that drone in the air at that time.

Finally, the standardize deployment system allows the organization to deploy, update and manage devices more effectively. Standardized deployment of IoT devices expands on the already existing concepts within Mobile Device Management to support the concepts of device update, device removal, and device reprogramming.

One last thing that the IoT Broker will allow is the broader deployment of an IoT concept I call mesh networking. Where any one device connects to the mesh and announces the services, it provides. Such as I have a cellular data connection, or I have a satellite up link. These services would then exist within the IoT device mesh. It then allows the IoT broker to offer a more resilient IoT infrastructure that supports managed communication for the IoT devices.

I realize that the three concepts I am proposing exist in part today. The rise of the first company to pull them all together is going to be interesting!

By Scott Andersen

Alex Vakulov
Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and organizations these days. It revolves around taking important data hostage and demanding money, usually hard-to-trace cryptocurrency ...
The all-new Stellar Repair for MS SQL – an Efficient Tool to Fix SQL Database Corruption
Efficient Tool to Fix SQL Database Corruption SQL database corruption is not uncommon. There are many reasons for SQL database corruption, such as virus infection, bugs in the SQL Server, errors during updates, abrupt system ...
Mitigation Security
Data scraping solutions When people hear the term data scraping, their first thought is often about how companies use this technology for competitive reasons – specifically to pull publicly-available data from millions of websites in ...
Gilad David Maayan
Azure Storage Pricing Introduction to Azure Storage Services Azure Storage is a set of cloud storage services provided by Microsoft as part of the Azure public cloud. It offers highly scalable object storage, file systems ...
Adam Cole
Mitigating Regulatory Risk Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators and Value-Added Resellers (VARs) have been the emergence of cloud, telephony and Unified Communications (UC) technologies such as ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.