Professional Documents
Culture Documents
AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach 1st Edition Syed Rehan full chapter instant download
AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach 1st Edition Syed Rehan full chapter instant download
AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach 1st Edition Syed Rehan full chapter instant download
https://ebookmass.com/product/aws-iot-with-edge-ml-and-
cybersecurity-a-hands-on-approach-1st-edition-syed-rehan-2/
https://ebookmass.com/product/building-enterprise-iot-solutions-
with-eclipse-iot-technologies-an-open-source-approach-to-edge-
computing-1st-edition-frederic-desbiens/
https://ebookmass.com/product/building-enterprise-iot-solutions-
with-eclipse-iot-technologies-an-open-source-approach-to-edge-
computing-1st-edition-frederic-desbiens-2/
https://ebookmass.com/product/programming-for-game-design-a-
hands-on-guide-with-godot-1st-edition-wang/
Programming for Game Design: A Hands-On Guide with
Godot 1st Edition Wallace Wang
https://ebookmass.com/product/programming-for-game-design-a-
hands-on-guide-with-godot-1st-edition-wallace-wang/
https://ebookmass.com/product/programming-for-game-design-a-
hands-on-guide-with-godot-1st-edition-wallace-wang-2/
https://ebookmass.com/product/aws-cookbook-recipes-for-success-
on-aws-1st-edition-john-culkin/
https://ebookmass.com/product/avr-workshop-a-hands-on-
introduction-with-60-projects-not-genuine-pdf-1st-edition-john-
boxall/
https://ebookmass.com/product/the-virtual-sales-handbook-a-hands-
on-approach-to-engaging-customers-mante-kvedare/
AWS IoT With
Edge ML and
Cybersecurity
A Hands-On Approach
—
Syed Rehan
Foreword by Yasser Alsaied
VP of AWS IoT
AWS IoT With Edge ML
and Cybersecurity
A Hands-On Approach
Syed Rehan
Foreword by Yasser Alsaied VP of AWS IoT
AWS IoT With Edge ML and Cybersecurity: A Hands-On Approach
Syed Rehan
Stalybridge, UK
Introduction�����������������������������������������������������������������������������������������������������������xvii
Foreword����������������������������������������������������������������������������������������������������������������xix
v
Table of Contents
Chapter 4: Digital Twin with AWS IoT Device Shadow and Basic Ingest Routing���� 67
Harnessing Basic Ingest with AWS IoT Rules for Data Routing��������������������������������������������������� 68
Understanding Basic Ingest in AWS IoT�������������������������������������������������������������������������������������� 68
Digital Twin Using Device Shadow���������������������������������������������������������������������������������������������� 73
Understanding AWS IoT Device Shadow and Its States��������������������������������������������������������� 73
vi
Table of Contents
vii
Table of Contents
viii
Table of Contents
ix
Table of Contents
Best Practices for Auditing and Remediation with AWS IoT Device Defender�������������������������� 322
Integrating AWS IoT Device Defender with AWS Security Hub�������������������������������������������������� 326
What Is AWS Security Hub��������������������������������������������������������������������������������������������������� 327
Integrate AWS IoT Device Defender with AWS Security Hub����������������������������������������������� 328
Clean Up������������������������������������������������������������������������������������������������������������������������������������ 332
What You Have Learned������������������������������������������������������������������������������������������������������������ 332
Summary���������������������������������������������������������������������������������������������������������������������������������� 334
Index��������������������������������������������������������������������������������������������������������������������� 337
x
About the Author
Syed Rehan has established himself as a luminary in the
world of cloud technologies during his career spanning over
18 years in the fields of development, IoT, and cybersecurity.
Having joined AWS in 2017, Syed has been at the forefront
of their initiatives, consistently driving innovation and
contributing to the platform’s evolution. His rich portfolio
includes numerous insightful blogs, workshops, and
authoritative whitepapers for AWS, showcasing his deep
expertise and thought leadership in the industry.
Syed has graced the stage as a speaker at AWS re:Invent
and numerous global conferences, shedding light on the rapidly evolving landscapes of
cybersecurity, IoT, and cloud technologies.
Presently, Syed serves as a Senior Global Cybersecurity Specialist in the AWS IoT Core
Security Foundation team. His collaborative spirit has been reflected in his instrumental
role within the product teams in launching pivotal services such as AWS IoT Device
Defender and AWS IoT Greengrass.
Syed’s trailblazing journey is marked with several firsts. He was among the initial
cohort of specialist solution architects for AWS IoT in EMEA; he also earned the honor of
being the first specialist Solution Architect for Amazon Connect.
Syed’s legacy in AWS and the cloud domain is a blend of vast experience, innovation,
unwavering passion, and leadership, a legacy that continues to inspire and guide the
next generation of tech enthusiasts.
Connect with him on LinkedIn: www.linkedin.com/in/iamsyed/.
xi
About the Technical Reviewer
Ali Benfattoum is a Product Manager for AWS IoT at
Amazon Web Services. With over 15 years of experience in
IoT and smart cities, Ali brings his technical expertise to
design and build innovative products and enable and help
customers to accelerate their IoT and smart cities projects.
Ali also holds an Executive MBA, giving him the ability to
zoom out and help customers and partners at a strategic
level.
xiii
Acknowledgments
First and foremost, I want to express my deepest gratitude to my mother, my father, my
loving wife Shajna, and my precious daughters Maryam and Zahra; your unwavering
patience and support while I was immersed in this project meant more to me than
words can express. The countless hours and weekends I dedicated to this book were
made possible because of your understanding and encouragement. I couldn’t have
achieved this without you by my side. From the bottom of my heart, thank you, I love you
all dearly.
A special thank you to Yasser Alsaied, the VP of AWS IoT, truly one of the most
genuine and humble leaders I’ve had the privilege to work with. My gratitude also
extends to Ali Benfattoum for his pivotal role as a reviewer and supporter, ensuring this
book offers insightful and practical value to all AWS IoT enthusiasts and practitioners.
Your collective wisdom and support have been instrumental.
I would also like to express my sincere appreciation to the dedicated team at Apress.
Your commitment and meticulousness have been invaluable in bringing this vision to
reality.
To you, the reader, who chose to embark on this journey with me through the pages
of this book, I extend my heartfelt gratitude. Your quest for knowledge and your trust in
this work as a guide are deeply appreciated. It’s my sincere hope that this book serves as
a valuable resource to you, enlightening your path and enriching your understanding.
Here’s to your continued success and growth.
xv
Introduction
In the world of rapidly evolving technologies, the Internet of Things (IoT) and cloud
computing have become the symbol of innovation and efficiency. This book is designed
to cater for all experience levels with a comprehensive guide to the AWS IoT ecosystem,
valuable insights, and hands-on experiences.
xvii
Introduction
with a spotlight on image classification through a deep learning algorithm with a neural
network model of 50 layers, ResNet-50, expanding the horizons of what IoT devices can
perceive and achieve.
You will have the opportunity to acquaint yourself with the Zero Trust model, the
ML Detect, and understanding the data analytics and business intelligence through
Amazon’s QuickSight and Timestream data.
Hope you have a warm and wonderful journey into AWS cloud services.
xviii
Foreword
In our modern digital landscape, the inevitability of technological progression is clear;
the real challenge lies in navigating its intricacies. At first, “AWS IoT and ML” appears
to dive deep into the technical nuances. Yet, as pages turn, it emerges as a lighthouse,
illuminating the convergence of IoT’s vast potential with the analytical prowess of
machine learning, all housed within the AWS ecosystem.
Syed Rehan unravels this intricate tapestry with the clarity of a seasoned expert and
the passion of a dedicated educator. He positions AWS IoT and machine learning not
as mere tools but as fundamental pillars propelling digital transformation. Beyond the
codes and configurations, this book resonates with a profound truth: embedded within
these technologies are solutions to tangible, real-world challenges that, when unlocked,
can catalyze transformative progress.
This work surpasses a mere introduction to AWS IoT or ML. It serves as a compass,
guiding its readers from abstract ideas to tangible executions – from setting up an AWS
account to harnessing the power of AWS IoT. Syed’s meticulous progression from basic
AWS CLI commands to nuanced telemetry data handling using MQTT is a testament to
his mastery.
Digital transformation, as explored here, is more than the introduction of new tools
or platforms. It demands a recalibration of an enterprise’s foundational elements, a
rethinking of business strategies, and the evolution of systems, all while engaging and
enlightening its stakeholders. Such comprehensive transformation, reflecting both top-
down and grassroots perspectives, echoes the depth and structure of this book.
What stands out distinctly is the book’s harmonized focus on both IoT and ML. The
depth and breadth of topics – from AWS IoT Greengrass and AWS IoT SiteWise to
leveraging Amazon QuickSight for BI and drawing ML inferences – underscore its
holistic approach. Syed’s work is not just informative; it’s an invitation – to question, to
innovate, and, most importantly, to act.
Prepare to embark on an immersive journey. It promises to be a tapestry of technical
depth interwoven with enlightening insights. Beyond being a guide, it represents a call to
shift paradigms, urging readers to embrace the future’s digital promise.
Yasser Alsaied, VP of AWS IoT
September 2023
xix
CHAPTER 1
1
© Syed Rehan 2023
S. Rehan, AWS IoT With Edge ML and Cybersecurity, https://doi.org/10.1007/979-8-8688-0011-5_1
Chapter 1 Setting Up Your AWS IoT Development Environment
Device Software
There are software options available for running on devices, such as FreeRTOS, which
is an open source real-time operating system designed for constrained devices like
microcontroller units (MCUs). FreeRTOS allows devices to connect seamlessly with AWS
IoT, providing a flexible and cost-effective solution for IoT deployments.
In addition to FreeRTOS, there is an add-on module called AWS IoT ExpressLink
developed by silicon vendors. This module is specifically designed to accelerate the
onboarding process for customers into the AWS IoT environment. It streamlines the
initial setup and configuration, allowing customers to quickly and efficiently connect
their devices to AWS IoT.
2
Chapter 1 Setting Up Your AWS IoT Development Environment
These software options, including FreeRTOS and AWS IoT ExpressLink, play a vital
role in simplifying the device connectivity and integration process, enabling customers
to establish a secure and reliable connection with AWS IoT services.
3
Chapter 1 Setting Up Your AWS IoT Development Environment
These AWS edge and IIoT services empower organizations to extend their
capabilities to the edge, enabling local processing, analytics, and communication. By
leveraging these services, businesses can enhance their operational efficiency, reduce
latency, and gain valuable insights from their edge devices and connected factories.
• AWS IoT Device Defender: Working hand in hand with IoT Core,
this security service plays a crucial role in auditing, validating,
and enforcing rules on connected devices. It leverages machine
learning capabilities to enhance device security. If you have a fleet of
connected devices, this service is essential for monitoring their status
effectively.
4
Another random document with
no related content on Scribd:
If there are any legal disputes or claims between members of the
staff of the British agent, both plaintiff and defendant are referred by
him to the Courts of Justice in India. If the British agent or any
member of his staff has a dispute with the Afghan subjects of the
Amir, such cases are usually decided in the Courts of Kabul, under
the law of that country. Complications of a very serious political
character are invariably referred to the Governments of India and
Afghanistan for arrangement between themselves.
The British agent puts his diary and also the private letters of the
whole of his staff into one package, which he hands to the Amir’s
Postmaster-General at Kabul, taking a receipt for their delivery under
seal; from the Amir’s post-office they are sent down to Peshawar,
where the Amir’s postmaster is given a discharge for their surrender
to the political agent at Peshawar. In the same manner the packages
of letters, which are delivered by the British political agent at
Peshawar to the Amir’s postmaster at that place, are forwarded to
the British agent at Kabul by the Amir’s Postmaster-General, who
also takes a voucher for their safe and proper condition. The
services and duties of the Amir’s political agent with the Viceroy of
India, who, together with his staff, is a Mahommedan subject of the
Amir, are nearly the same as those of the British agent at Kabul,
except that the term and time of his office is not limited and depends
entirely on the pleasure of the Amir. Besides the political agent, the
Amir has various commercial agents in India as well as in England,
the most important of these having been Sir Acquin Martin, Mr. T. B.
Guthrie and Mr. E. T. Pack. Each of these industrious and excellent
servants of the Amir has suffered the loss of large sums of money
through a very pronounced defect in the Amirs of Afghanistan, which
causes them to forget their obligations so long as there is a frontier
lying between the Government of Kabul and those with whom its
debts have been contracted. Representations remain unanswered
and, apparently, no authority exists which can make the Amir of
Afghanistan redeem his liabilities, although an obvious course awaits
if the Government of India would assent to the attachment of the
subsidy.
major cleveland’s residence in kabul
afghan women
The indoor costume of an Afghan woman is no less picturesque
than that of her lord and master. Even to a plain and awkward
woman it imparts some appearance of grace. The piran extends
from the throat to just above the ankles, with sleeves that reach to
the wrist. It is of cloth of gold, velvet, silk, cashmere or calico, and in
shape not unlike our own Princess robe. Beneath this are the tom-
bons, very similar to the garment worn by men.[43] These may be of
cloth of gold, silk, cashmere or calico; they are finished off at the
ankles by a fringe of diamonds, gold or silver. A round cap, worked
all over with gold thread, so that it looks like gold cloth, is fitted
closely to the back of the head. The hair, parted in the centre, is
done up in tiny braids, which are caught in a black silk embroidered
bag, worn underneath the gold cap, but hanging down the back to
below the waist. Married women wear a fringe of hair, often curled,
on either side of the face. Descending from the top of the head to the
hem of the piran, leaving the face uncovered, is the gracefully-
draped chadar—a large wrapping of finest muslin, filmy gauze, or
delicately tinted chiffon. Black hair is in vogue among the belles of
the harem; if their locks reveal any shade of fairness or show
indications of turning grey the vain creatures, adopting the custom of
their Western sisters, at once dye them. Like all their sex, too, they
delight in jewellery and conspicuous ornaments, and a considerable
portion of their savings is expended upon the purchase of necklaces,
ear-rings and bracelets. All who can afford it wear flowers just above
the right ear, while they also indulge in the use of cosmetics. Paint
and powder, rouge for the lips and the blackening pencil for
eyebrows and eyelashes are the adventitious aids to whatever
natural charms they may possess.
Proud of their prepossessing qualities, the women of Afghanistan
have exploited their charms so much that it was left to Habib Ullah to
impose a check upon the increasing attractiveness of the street
costume of the feminine portion of his subjects. One day, in the
spring of 1903, to the unspeakable dismay of many pretty women
and of all young girls, he issued orders, changing the white burka,
which, although covering the head and figure and leaving a latticed
insertion before the face, was in a measure attractive. Thereafter
these white street robes were to be dyed kharki for Mahommedan
women, red or mustard-yellow for Hindu women and slate colour for
other women. Disobedience of this law was threatened with a fine of
fifty rupees, while its requirements had to be fulfilled within fourteen
days. Unhappily, by this change an attractive feature in the life of the
city has disappeared, the lamentable hues enforced upon the poor
ladies by the Amir’s edict emphasising the dirt and discomfort of the
Kabul streets.
In Afghanistan, as in all Mahommedan countries, the women lead
a very secluded life, seldom venturing into the streets. The
conditions of their married life are unfortunate, since the religion of
the Afghan permits him to possess four wives, while no restrictions
are imposed upon the number of concubines that he may support.
This law in regard to wives is broken at will; and, while plurality of
wives may be conducive to the satisfaction of the husband, it is
unnecessary to say that the practice is not in favour among the
women, who, in this matter, incline their hearts after the customs of
the West. Moreover, women are not the sole companions of their
husbands, for in Afghanistan, as in most Oriental countries, the
small, but comely, boy is the more frequent intimate of their masters.
At Court and in the households of the several princes this
characteristic feature of the East may be observed, the existence of
these boys being accepted by the priests, who themselves indulge in
this most peculiar vice.
a saint’s tomb