Anda di halaman 1dari 12

IoT Poses New Problems for Developers

From security to analytics to testing, developers have their hands full when it comes to the Internet of Things.

EDITORS NOTE IoT GATEWAYS ANALYTICS PROVES TESTING IoT


NEED CLEAR SECURITY KEY TO IoT APPLICATIONS
FRAMEWORK REQUIRES FOCUS,
CARE
EDITORS
NOTE

A Compass for the New World of IoT

As exciting as the Internet of Things world with is how to handle the massive amounts of
HOME
may befrom the promise of autonomous cars data an army of interconnected devices gener-
EDITORS NOTE to the egalitarian idea of a robotic butler in ates. In the second article, software developer
every homethere are still some serious tech- Swathija Raman discusses how IoT devices are
IoT GATEWAYS NEED
CLEAR SECURITY nical challenges that organizations dabbling in changing the way analytics is done and what
FRAMEWORK
the IoT must be aware of. types of insights can be mined from the gath-
ANALYTICS PROVES The protocols of interconnectedness are still ered data.
KEY TO IoT
evolving, and the industry is miles away from a To close, we look at the challenges of testing
TESTING IoT standard. Some devices require a fast and effi- IoT applications. When software gets deployed
APPLICATIONS REQUIRES
cient protocol where reliability isnt important. on components that can fly and accelerate,
FOCUS, CARE
Others prize reliability over speed. The flux testing for safety and trustworthiness takes on
state of IoT protocols has created new chal- new meaning.
lenges for ensuring the security of the devices If youre embarking on the path of IoT devel-
that rely on them. In the first article in this opment, these are some of the key topics youll
handbook, reporter George Lawton discusses want to be informed about. n
the security issues devices may encounter and
how an IoT gateway can be used to plug up
some of those holes. Cameron McKenzie
Another challenge organizations are dealing Editor in Chief, TheServerSide.com

2 IoT POSES NEW PROBLEMS FOR DEVELOPERS


PLANNING

IoT Gateways Need Clear Security Framework

Developers face a host of challenges when automobile. The gateway also provides devel-
HOME
implementing a robust security model for opers with secure I/O access to individual
EDITORS NOTE Internet of Things devices and gateways. Poor devices.
security can lead to denial-of-service attacks, A best practice is to create a security frame-
IoT GATEWAYS NEED
CLEAR SECURITY corporate espionage, theft and brand dam- work that uses public-key cryptography to
FRAMEWORK
age. More serious problems, such as injury or authenticate communication between remote
ANALYTICS PROVES death, might occur with products like auto- devices and gateways, according to Dazi. This
KEY TO IoT
motive software or industrial equipment. For can help prevent the possibility of hackers
TESTING IoT example, the 2009 and 2010 Stuxnet attack gaining access to data from IoT devices. It also
APPLICATIONS REQUIRES
led to destruction of a large number of nuclear can make it more difficult for hackers to send
FOCUS, CARE
centrifuges in Iran. unauthorized control signals to IoT devices or
At the JavaOne Conference in October 2015, use them to launch denial-of-service attacks
Luca Dazi, senior software developer at Euro- on IoT infrastructure.
tech, offered best practices for implementing It is also important to think about imple-
better security into an Internet of Things (IoT) menting IoT software to reduce the risk of
gateway. unauthorized software being side-loaded onto
The IoT gateway is a device in the field a device, Dazi explained. One good approach
responsible for gathering data from sensors and is to employ a framework that uses public-key
communicating with actuators when some- cryptography to certify new software updates
thing needs to be controlled. It can be installed before installation.
in a home, an industrial control system or an Another security step, Dazi said, is to

3 IoT POSES NEW PROBLEMS FOR DEVELOPERS


PLANNING

generate unique passwords for each device. For developers to put in place basic security.
example, developers can prime the key-gener- The basic Kura framework is good at secur-
ation algorithm with the unique media access ing communications between IoT devices
control address to generate different public and and gateways. But there is limited support for
private keys. securely updating and configuring devices from
You need different sources of variants that
HOME
are combined to generate the master password, Use public-key cryptography
Dazi noted. We want to make it more difficult
to authenticate communication
EDITORS NOTE

to retrieve this password [through a] malicious


IoT GATEWAYS NEED between remote devices and
CLEAR SECURITY deed.
FRAMEWORK
Dazi said developers can also take advantage
gateways, recommended Luca
ANALYTICS PROVES of Eclipse Kura and Eurotechs Everyware Soft- Dazi, a developer at Eurotech.
KEY TO IoT
ware Framework (ESF) to implement a solid
TESTING IoT security model for an IoT gateway and device. a cloud application. To address this gap, Euro-
APPLICATIONS REQUIRES
These frameworks make it easier to instate tech open-sourced ESF, which can be used with
FOCUS, CARE
cloud applications that securely communicate Kura. ESF adds support for advanced security,
with IoT devices. Also, ESF includes a model remote access via a virtual private network,
for securely updating configurations and device diagnostics and bundles for specific vertical
applications in the field. applications.
The Eclipse Foundation has baked a number ESF uses the basic Kura security APIs to
of basic security mechanisms into the Eclipse make it easier to write Java applications that
Kura framework. It also provides an abstraction ensure the integrity and security of new soft-
layer to allow developers to create basic appli- ware bundles. A security manager component
cation logic that can be deployed across differ- can check for environmental integrity, ensur-
ent hardware models for devices and gateways. ing that no one has tampered with files before
According to Dazi, Kura makes it easier for Java theyre run. ESF enforces runtime policies to

4 IoT POSES NEW PROBLEMS FOR DEVELOPERS


PLANNING

deny execution of particular services or the devices in the field, you dont want to update
import and export of specific packages. This them one after the other, and you dont want to
makes it harder for hackers to access the ser- update them all at once, Dazi said. With batch
vice and retrieve the master password. operations, you can set a batch job in the cloud,
Another good strategy is to use a cloud ser- and the cloud solution will work through the
vice to simplify the update and management batches until the job is complete.
HOME
of remote devices. If you have thousands of George Lawton
EDITORS NOTE

IoT GATEWAYS NEED


CLEAR SECURITY
FRAMEWORK

ANALYTICS PROVES
KEY TO IoT

TESTING IoT
APPLICATIONS REQUIRES
FOCUS, CARE

5 IoT POSES NEW PROBLEMS FOR DEVELOPERS


INTERPRETING

Analytics Proves Key to IoT

The wealth of conclusions and extrapola- TCP/IP can be used by desktop applications to
HOME
tions that can be obtained by sifting through deliver data back to a central host. Server-side
EDITORS NOTE Internet of Things data demands that analytics software makes reporting even easier, as ana-
be tightly integrated into all IoT applications lytics software can be plugged right into the
IoT GATEWAYS NEED
CLEAR SECURITY and devices. Web server or applications server, grabbing
FRAMEWORK
The basic principles of analysis apply equally metrics and triggering alerts in real time.
ANALYTICS PROVES well to a world of drones, embedded devices These types of luxuries do not exist in the
KEY TO IoT
and driverless cars as they do to business world of embedded and IoT devices. Whether
TESTING IoT applications running on an enterprise server. its a driverless car being tested in the Arizona
APPLICATIONS REQUIRES
The only differences, and they are potentially desert or an autonomous marine robot collect-
FOCUS, CARE
game-changing, are the scope of the data that ing scientific data in the middle of the ocean,
can be obtained and the significance of the the availability of reliable networks is nascent.
conclusions that can be extrapolated from it. Even when reliable networks are available, they
IoT analytics can be broken down into the lack the bandwidth necessary to upload all of
following main points: the information they acquire.
Therefore, new strategies for metrics report-
Report. Reporting data is fairly straightforward ing need to be employed. Data is typically pri-
in a controlled environment, where server-side oritized. So when network latency is high, only
software is running locally or an application the most critical pieces of data are uploaded.
is running on a users desktop. Reliable net- When latency improves, secondary priority
work protocols like User Datagram Protocol or data is reported. Only when an IoT device

6 IoT POSES NEW PROBLEMS FOR DEVELOPERS


INTERPRETING

returns home will data with tertiary and qua- much data and too many endpoints coming
ternary priority be uploaded to the servers. in, said Sean Bowen, CEO of Push Technology
This, of course, presents problems. Real- Ltd., a London-based company that develops
time reporting is often not possible with IoT software to improve the performance of Web
devices. When there is a delay in reporting, and mobile apps.
there will be a delay in aggregation and analy- As a result, new strategies are being
HOME
sis. That postpones software adjustments and employed in the aggregation and processing
EDITORS NOTE bug fixes, not to mention the stress it places of IoT data. NoSQL databases that have looser
on staff as their work schedules are dictated by transactional requirements but much bet-
IoT GATEWAYS NEED
CLEAR SECURITY the unpredictable reporting schedule of devices ter synchronization and storage capabilities
FRAMEWORK
running live in the field. There is no ques- are often a better choice for data storage and
ANALYTICS PROVES tion that IoT devices require an entirely new retrieval than traditional relational database
KEY TO IoT
approach to data reporting and how organiza- management systems. Processing the large
TESTING IoT tions respond to that data. blocks of data that IoT applications collect is
APPLICATIONS REQUIRES
often a task better suited to a Hadoop cluster,
FOCUS, CARE
Aggregate. The whole purpose of many IoT a technology that was originally developed to
devices is to send data back to their home base help index the Internet, as opposed to standard
about how theyre functioning and what theyre query calls against a database.
experiencing. The amount of data that an army
of IoT devices might report back to a cloud Analyze. Tools that present aggregated data in a
server could easily overwhelm a relational data- way that makes it easy to understand are para-
base. Even if a traditional database system was mount. Presenting meaningful data in graph-
sufficient for storing that information, query- based structures or on dashboards that can
ing or mining such giant clusters of data would be customized will always be a best practice,
be a frustratingly slow process. regardless of whether server-side or IoT data is
Were seeing a trend where there is just too being analyzed.

7 IoT POSES NEW PROBLEMS FOR DEVELOPERS


INTERPRETING

The big difference with IoT analysis is that to conclusions about the data being analyzed
the tools being used must be compatible with will always remain a largely human endeavor.
the underlying data aggregation tools. That
means using analytics tools that work with Extrapolate. The truly exciting parts of IoT
technologies such as Hadoop, cloud data ware- analytics are the extrapolation opportunities.
houses, Amazon Web Services-based big data Serendipity abounds, as information gathered
HOME
tools and various NoSQL databases. Many from one application may inspire the develop-
EDITORS NOTE organizations will need to move away from ment of a new or unrelated technology.
what theyve used in the past and acquire new For example, Facebook check-ins were origi-
IoT GATEWAYS NEED
CLEAR SECURITY tools that can process their data effectively. nally designed to help users share information
FRAMEWORK
about where they were and what they were
ANALYTICS PROVES Conclude. Analytics doesnt end at analysis. If doing. That data is now helping users figure
KEY TO IoT
anything, the most important part only starts out when the lines are longest at their favorite
TESTING IoT there. After all, the whole point is to look at Starbucks or the local DMV. The exciting part
APPLICATIONS REQUIRES
your data and come to meaningful conclusions of IoT analytics is the potential to discover
FOCUS, CARE
about your systems. Analysis tools help in this unknown treasure in the data.
regard, and data mining tools that reveal trends
or hidden correlations are vital to helping an With the right analytics tools and the abil-
organization come to conclusions and make ity to report, aggregate, analyze, conclude and
decisions about how to update, change, adjust extrapolate, IoT opportunities abound.
and improve a system. But, in the end, coming Swathija Raman

8 IoT POSES NEW PROBLEMS FOR DEVELOPERS


MANAGING

Testing IoT Applications Requires Focus, Care

Because of the vulnerability of network in their ability to communicate with other


HOME
connections and the potential for misuse, devices. More importantly, a network connec-
EDITORS NOTE IoT applications need to be subjected to more tion affects an IoT applications communica-
stringent testing requirements, criteria and tion with a central server that might be waiting
IoT GATEWAYS NEED
CLEAR SECURITY documentation than traditional business soft- to push out an integral update or power down
FRAMEWORK
ware or desktop applications. a device. Testing the reliability and fidelity of
ANALYTICS PROVES Three characteristics make IoT testing dif- devices in connected, disconnected and inter-
KEY TO IoT
ferent from testing traditional computer soft- mittently connected states is an aspect that
TESTING IoT ware: autonomy, connectivity and momentum. cannot be overlooked.
APPLICATIONS REQUIRES
The concept of autonomy is intertwined with Some of the most interesting IoT devices,
FOCUS, CARE
the idea of self-governance. The compelling from flying drones to land robots, move. With
nature of many IoT devices, whether a self- mass and speed comes momentum, and with
driving car or an implanted heart monitor, is momentum comes the potential to damage
the capability to immediately respond to the property and people. When autonomous and
stimuli theyre subjected to. But this ability disconnected devices have the potential for
also demands testing for safety, reliability and real, physical harm, testing standards and pro-
adaptability. cedures need to be brought to an entirely new
The first letter in the IoT acronym implies level.
that a network connection is a given, but for The net effect is that IoT testing regimens
most devices that are live in the field, band- must be much more rigid and pay far greater
width, latency and availability are key factors attention to things like safety, security and

9 IoT POSES NEW PROBLEMS FOR DEVELOPERS


MANAGING

overall trustworthiness. This is a significant Imbico Tech, a consultancy that covers the
departure from the way most modern software banking industry. They not only help to iden-
is developed. tify corner cases you may have missed, but
they usually include documentation standards
that will show that due diligence was followed
SAFETY ASSURANCE just in case there ever is a problem.
HOME
The safety of autonomous devices is a signifi-
EDITORS NOTE cant nonfunctional requirement that presents
another departure from typical testing prac- SECURITY CONCERNS
IoT GATEWAYS NEED
CLEAR SECURITY tices. Developers cant have their contraptions The connectedness of devices makes security
FRAMEWORK
falling from the sky or accelerating uncontrol- a paramount concern whether applications are
ANALYTICS PROVES lably into a crowd of people. online or offline. Online devices that arent
KEY TO IoT
A number of international standards exist properly secured can be easily accessed by the
TESTING IoT that describe how products should be tested outside world.
APPLICATIONS REQUIRES
at the system, hardware and software levels, In February of 2014, the Federal Trade Com-
FOCUS, CARE
along with requirements for documenting mission settled a complaint against electronics
both potentially hazardous events and ways manufacturer TRENDnet for lax security prac-
those events can be mitigated. For example, tices [that] led to the exposure of the private
ISO 26262 is a standard for road vehicles, while lives of hundreds of consumers on the Internet
DO-178C governs software in airborne systems. for public viewing.
And standards can be useful even when they By not paying proper attention to security,
dont apply to your company or product. neighbors could pick up live streams of active
Even if an organization isnt bound by gov- baby monitors and other products, compromis-
ernment regulations to abide by a standard, ing personal privacy and confidentiality. The
they are still great references, said Tyler Ros- connectivity of IoT devices that arent properly
coe, a compliance officer with Toronto-based secured creates a wealth of opportunities for

10 IoT POSES NEW PROBLEMS FOR DEVELOPERS


MANAGING

computer experts armed with port scanners update the software your IoT device uses,
and lacking personal ethics. said Serge Salerno, a software consultant with
While connectedness presents a host of Leone Consulting. One way to eliminate the
potential dangers, so does a lack of connec- possibility of a defect is to make a given feature
tion. Without connectivity, an autonomous IoT unavailable or at least disable it and make sure
device could be captured, dismantled, hacked someone who wants to use that feature has to
HOME
and reassembled, all without the original man- jump through some hoops to enable it. The
EDITORS NOTE ufacturers knowledge. As a result, its impor- easiest feature to test is the one that doesnt
tant to ensure that devices have some type of exist. Sometimes IoT devices offer advanced
IoT GATEWAYS NEED
CLEAR SECURITY mechanism to recognize a hack. features to users that just dont make sense.
FRAMEWORK
Eliminating a feature that rarely gets used is a
ANALYTICS PROVES great way to eliminate a potential problem with
KEY TO IoT
THE HUMAN ELEMENT it, Salerno said.
TESTING IoT Finally, perhaps one of the biggest threats to As more software developers move into the
APPLICATIONS REQUIRES
the reliability, resilience and security of any world of IoT development, they should take
FOCUS, CARE
system is the human element. Testing cycles into account the unique attributes of IoT
may identify bugs, and software updates devices and the reality that when they go rogue,
may provide valid patches, but none of those they have the potential to do real harm. So
patches will work if a user puts up a firewall before making IoT applications available for
between his or her IoT application and the out- distribution, software developers and quality
side world. assurance managers need to work harder than
In many cases, you only have one chance ever to ensure that their products are safe and
to get it right. You may never get a chance to secure. Cameron McKenzie

11 IoT POSES NEW PROBLEMS FOR DEVELOPERS


ABOUT
THE
AUTHORS
GEORGE LAWTON is a journalist based near San Francisco,
Calif. He has written over 2,000 stories for publications
about computers, communications, knowledge manage-
ment, business, health and other areas that interest him.
Email him at glawton@gmail.com or visit his website.
IoT Poses New Problems for Developers is a
TheServerSide.com e-publication.
HOME CAMERON MCKENZIE is editor in chief of TheServerSide.
Scott Wallask | Editorial Director
EDITORS NOTE
He has more than a dozen years of development experi-
ence, having been a technical trainer and lead consultant Ron Karjian | Managing Editor
IoT GATEWAYS NEED for Perficient Inc. He is the author of several best-selling Moriah Sargent | Associate Managing Editor
CLEAR SECURITY
FRAMEWORK Java books, including What is WebSphere?, Hibernate Jan Stafford | Executive Editor
Made Easy and The SCJA Certification Guide. Email
Bree Matturro | Site Managing Editor
ANALYTICS PROVES
him at cmckenzie@techtarget.com or follow him on Twit-
KEY TO IoT Linda Koury | Director of Online Design
ter: @potemcam.
TESTING IoT Martha Moore | Senior Production Editor
APPLICATIONS REQUIRES
SWATHIJA RAMAN is a senior software developer and solu- Doug Olender | Publisher | dolender@techtarget.com
FOCUS, CARE
tion architectspecializing in customer-facing retail ap- Annie Matthews | Director of Sales
plications with extensive expertise in the international amatthews@techtarget.com

banking sector. A graduate from the University of Madras TechTarget


275 Grove Street, Newton, MA 02466
with a bachelors in technology, Raman started working on www.techtarget.com
applications in automotive and banking domains in India 2016 TechTarget Inc. No part of this publication may be transmitted or re-
and the U.S. until coming to Toronto in 2010. produced in any form or by any means without written permission from the
publisher. TechTarget reprints are available through The YGS Group.
About TechTarget: TechTarget publishes media for information technology
professionals. More than 100 focused websites enable quick access to a deep
store of news, advice and analysis about the technologies, products and pro-
cesses crucial to your job. Our live and virtual events give you direct access to
independent expert commentary and advice. At IT Knowledge Exchange, our
STAY CONNECTED! social community, you can get advice and share solutions with peers and experts.
Follow @TSS_dotcom today. COVER ART: FOTOLIA

12 IoT POSES NEW PROBLEMS FOR DEVELOPERS

Anda mungkin juga menyukai