Next Step in Enterprise IoT


Next Step in Enterprise IoT

Virtualize Edge Gateways

Introduction

The Internet of Things (IoT) is here and companies are starting to invest heavily in it to be the first in their industry to drive digital transformation. IoT-enabled solutions cover a wide array of business applications and use cases, powered by the ability to connect millions of devices to the Internet and take autonomous actions based on the information they generate. With this enormous potential, it is no wonder organizations are embracing IoT to bridge their physical and digital worlds.

Market Size

IoT gateways are at a very critical point within IoT systems. According to Gartner, “90% of IoT data will go through gateways”. More specific forecasting comes from Research and Markets: 

IoT gateway revenue will grows to $12.64B by 2022;
The annual market size increase on IoT gateway will be around 14.7% in average till 2021.

Challenges with the Convergence of OT & IT on the Gateway

While the potential of IoT can only be realized by connecting the physical and digital worlds, it also mandates the convergence of information technology (IT) and operational technology (OT).

Security is a Big Concern

Many IoT devices, sensors and gateways are placed on open fields, fenced or non-fenced from the public. There could be some cases where these devices are put in house, but they are definitely not well physically protected as servers and storage in data centers or clouds. On the other hand, quite a big part of IoT devices are connected directly or indirectly via gateways backward to data centers or clouds in a wireless fashion, e.g. WiFi and mobile networks. So physically, there are more attacking interfaces exposed to the air.

Specifically, on gateways, communication interfaces upward to the Internet and downward to IoT devices are generally reachable for applications at the same time. That means malwares cracking from one side could possibly reach the other side quite easily.

Due to historical reasons, most industrial devices and communication protocols created before the Internet era with very limited security mindset in design and implementation. Now when they are connecting to the Internet, security issues could show up as a major risk concerning enterprise customers.

In fact, multiple severe security accidents happened yearly on different things, including but not limited to cars, cities, factories, trains, grids etc.

The Whole Stack is quite Fragmented

On either business or technology, specifically hardware, OS, application architectures, it is very difficult to create collaboration and integration based on fragmented stacks on the Edge.

On hardware platform level, multiple CPU architectures are used widely: mostly ARM based CPUs on low and mid ends; even some MCU chips (e.g. Atmel) are used in very low power scenarios. In some traditional cases of industrial automation, MIPS or special SoC chips are common too. At the high end, x86 based CPUs are used in gateways (e.g. Intel Atom) and some industrial PCs (e.g. Intel Xeon D).

On OS level, mostly various distributions of Linux or real-time OS are used, QNX, Windows CE, Windows IoT Core, VxWorks etc.

On Application level, all kinds of coding languages and run time are leveraged, Java, Python, JavaScript, C/C++, .Net, Assembly etc. 

Fragmentation status on the business side puts flexibility to IoT developers definitely, while it surely adds more complexity on building up a compatible OS image for that application and framework. Considering how to manage the life cycle of applications on IoT gateways, different App plus OS bundles definitely put more pressure on heterogeneous physical gateways for different purposes.

In fact, most IoT systems in enterprise customer side are silos, or vertical systems on things and edges (devices, sensors and gateways), although they could well connect backward to data centers and clouds. It’s not easy to migrate edge computing workloads within the edge layer in such a fragmented situation.

Consolidation and Multiple Tenancy is Impractical

Generally, just native OS or container on bare metal is used on the gateway, with no or very limited consolidation and isolation.

With long-term lifecycle of IoT devices, it is natural to see that gradually old and new IoT devices co-exist in same venues and they demand for different gateways to pass through data and instructions in the same way. In some enterprise IoT cases, like factories, grids, cities and vehicles, spaces are limited and there comes stronger expectation to save spaces, CAPEX/OPEX for similar functions of gateways.

For example, in case of smart factories, there could be industrial robots from 8-10 vendors and everyone leverage their own gateways to connect robots back to data centers or clouds. For factories, they want to save spaces but have to ensure data security and isolation of applications from different vendors. If the factories have their own custom code on gateways, it is also necessary to isolate the custom code from any vendor code. 

Another case is in connected vehicles, there are multiple ECUs (Electronic Control Units, like small-size computers) controlling all components in vehicles. Generally Head Unit (or Transmission Control Unit, TCU) is most vulnerable to be hacked because that is the external interface for vehicles to provide media entertainment (called infotainment) and connect outbound to the Internet and other vehicles or infrastructure. Customers want to isolate the Head Unit from other ECUs for control subsystems safely, while consolidate more physical ECUs into a smaller number and spare more spaces for passengers.

Overlapped Scope & Lack of Trust

Moreover, an obvious overlap on the Edge from both OT and IT organizations and a serious lack of trust for each other, only exacerbates these problems. Both sides want to control the gateway in the Edge, but neither has enough domain knowledge and skillset to achieve completely and independently. The impact of these two organizations operating separately not only poses a serious security risk but also slows down innovation, risking an enterprise to lose its competitive edge.

VMware’s Solution to Virtualize Edge Gateways

VMware proposes a new way to manage enterprise IoT gateways with virtualization. Our mission is to build a unified platform on gateways in IoT systems, to provide software defined edge computing with strong isolation, enhanced security and multiple tenancy.

Project Asteroid is targeting to virtualize IoT gateways and extend VMware Cloud Foundation (i.e. Software Defined Data Center, mostly vSphere/ESXi and NSX data plane/Edge) stack from clouds in data centers to IoT edge layer, and integrate with Pulse IoT Center solution and third party application frameworks. We call this vision Software Defined Edge Computing (SDEC). With virtualized IoT gateways and SDEC further, we could provide enhanced security, multiple tenancy with VM level and networking isolation, and consolidate spaces for physical gateways in certain circumstances.


In Project Asteroid, we virtualize physical IoT gateways with ESXi, and put NSX data plane daemon and Edge VM atop. We put Liota agent into VMs, and register them back to Pulse IoT Center. Above that, customers could put any IoT application frameworks, e.g. EdgeX Foundry and Eurotech ESF. This is just computing virtualization. Networking virtualization has a little bit variant and we will put that into several reference designs for different user scenarios, with either vSS, vDS or NSX.

If customers demand a very secure gateway with multiple tenancy, we put NSX in place. We separate tenant traffic from management traffic via different physical connections, separate tenant networks on virtual wires via overlay networks, and put a NSX Edge VM in place shared among tenant apps. Device/sensor I/O are pass-through directly to specific tenant app VMs and TPM is enabled by default.

Security Enhanced Stack

It is well known that in IoT world, people concerns a lot on security, but more often, the discussion is around OS and application level topics, like access control, firewall, PKI and encryption. After we virtualize the gateway, we expect to enhance the security situation than physical more, with some additional protection layers.

Below is a high-level security stack with additional value points contributed:

Secure hardware platform with TPM or Secure Boot to resist tamper.
Hypervisor with ESXi to separate VMs.
Network isolation with vSS/NSX to protect intrusion outside
OS access control with enhanced Photon OS to enable authorization policy
Application sandboxing with runtime to provide app level isolation

 

Driver Models for IoT Interfaces

There are hundreds of IoT interfaces and protocols in the industry and it is impossible and unreasonable for ESXi to support all these drivers natively. So we need a smart strategy to handle them well.

Pass Through Mode

We generally prefer pass through mode driver for majority pure IoT interfaces and protocols, considering quite a few of them are not IP based or even not Ethernet, and they are not in the business consideration of a hypervisor. We pass through certain drivers/devices directly to certain app VMs, and that naturally isolate one app end to end from another. Examples are CANBus, ModBus or other RS485 based protocols.

Native Drive

For some other protocols which are used on both north and south bounds, like Wifi and mobile broadband, we provide native drivers.

If in a long term we need a native driver, but it’s too complex to do in a short term, we have an option to put it in pass though firstly as mitigation.

OT/IT Collaboration on Gateways

After IoT gateways are virtualized, the overlapping and trust issue could be resolved as done in data centers. OT organization manages IoT applications and data in gateways, similar to developers in Line of Businesses; and IT team manages infrastructure (computing, storage, networking and security) resources in gateways, as in data centers.

Why Intel CPU Based IoT Gateways is the Best Platform for Virtualization Technology from VMware

Intel is a recognized world leader in personal computer and commercial server markets. To strengthen enterprise capabilities on industrial IoT and edge computing, Intel provides multiple series of CPUs and NIC chips to fulfill this great mission. With the great performance and virtualization features provided by Intel chips, like 64bit, VT-x, VT-d, EPT, TPM support in new Atom and Xeon D series, we could consolidate low-end ARM based gateways into high-end Intel CPU based gateways with security hardening and isolation as in data centers.

VMware is the global leader on enterprise IT infrastructure and mobile device management. With its core expertise in Device Management, Operational Analytics, Security, and Cloud Management, VMware is working with strategic IoT partners to help meet the needs of IoT across things, edge, and platforms. On the gateways, VMware is working with multiple hardware vendors in Intel IoT Solutions Alliance to build an integrated platform in the Edge. As enterprises prepare for the onslaught of upcoming IoT use cases, VMware IoT solutions ensure your business is ready to support them.

Conclusion

Enterprise IoT is extremely hard to scale. Customers have to cobble together different heterogeneous offerings to make their IoT use cases work. 

Project Asteroid brings market proven and mature virtualization technology into the Edge layer of enterprise IoT solutions. We expect to work closely with enterprise IT teams together to build a unified platform on virtualized gateways, and provide multiple tenancy, isolation and enhanced security on edge computing for enterprise IoT customers.

When looking at ways to improve your business with IoT scenarios, some of the most important decisions you’ll make are the vendor and partners to work with. While there are many IoT vendors with conflicting messages, VMware has a clear strategy, a long history of success and trust in your current environment, and a global ecosystem of partners who are experts at managing the “Content plane.” Working together, we can help your business unlock the potential of the IoT so you get a full, end-to-end IoT solution that works for you.

Comments

Popular posts from this blog

Exploration and Practices of Edge Computing: Chapter 1 Preface

Exploration and Practices of Edge Computing: Chapter 2 Build and Installation of Virtualization Equipment

Exploration and Practices of Edge Computing: Chapter 3 Cloud Managing Virtualized Devices