AWS IoT Core のアイコン

AWS IoT Core Specialized2015年〜

A managed service for securely connecting IoT devices to the cloud and processing messages

What It Does

AWS IoT Core is a managed service that securely connects billions of IoT devices to the AWS cloud and processes messages between devices and the cloud. It supports MQTT, HTTPS, and WebSocket protocols, and provides device authentication, message routing, and device shadow (state management) capabilities.

Use Cases

Used for smart home device management, factory equipment monitoring, vehicle telematics, agricultural IoT sensor data collection, and healthcare device monitoring.

Everyday Analogy

Think of it like a telephone switchboard. It accepts calls (messages) from numerous phones (devices) and connects them to the right party (AWS services). It also handles call encryption (TLS) and caller verification (device authentication).

What Is IoT Core?

AWS IoT Core is the foundational service for IoT applications. When a device publishes a message using the MQTT protocol, IoT Core's rule engine automatically executes actions based on the message content, such as saving to DynamoDB, invoking Lambda, or storing in S3.

Device Shadows and the Rule Engine

A device shadow is a virtual representation that manages a device's current state and desired state in JSON. Even when a device is offline, you can check its state and change settings through the shadow. The rule engine filters and transforms messages using SQL-like syntax and routes them to over 20 AWS services. For organizing the concepts and techniques behind device shadows and the rule engine, reference books (Amazon) are handy.

Getting Started

Create a 'Thing' in the IoT Core console and issue an X.509 certificate to place on the device. Set up a policy to configure the device's connect, publish, and subscribe permissions. Use the MQTT test client to verify message sending and receiving, then create rules to automate message processing.

Things to Watch Out For

  • Device certificate management is critical. Certificate leaks pose a security risk, so issue unique certificates per device
  • Billed based on message count. Be mindful of costs with high-frequency messages from a large number of devices
共有するXB!