The AWS IoT EduKit IoT - An M5Stack with a secure element for AWS Integration

AWS and Microsoft have both been busy demonstrating how their clouds are ideal for fleets of IoT devices.  Both introduced their own sample hardware.  The AWS entry is an M5Stack Core2 ESP32 device that comes with I/O, ports, and a certificate store.  Amazon has a couple relatively straightforward examples including a simple "blinking light" program that reacts to cloud messages with lights and that sends regular messages to cloud topics for processing.

I created the video down below to give a quick overview of the steps that make up that sample.

AWS Branded IoT Device

This is the device.  It is an AWS-enhanced version of the standard M5Stack Core2 component.

The Demo Application

The sample program operates on two paths.
  1. It sends a regular message to AWS via MQTT.  The sample tells you how to view that message in the AWS portal.
  2. The sample then shows you how to use the IOT test client to generate test messages that are sent to the EduKit IoT device.  The device can read messages in a specific format and light up the appropriate onboard LEDs.

The Tutorial Flow

This chart shows the steps you take in the sample.  You start on the left and move right.

Watch the video for an explanation of these steps.


Video

A walkthrough of the steps for integrating the IoT sample program with AWS.

Interesting Links

  • The AWS Device with ATECC608A secure element
    • https://www.amazon.com/dp/B08VGRZYJR
  • AWS IoT EduKit Tutorials
    • https://aws.amazon.com/iot/edukit/
  • The Device Family M5Stack Core2 ESP32. The stack series
    •  https://shop.m5stack.com/collections/stack-series
  • Generic m5stack core tutorial for AWS
    • https://docs.m5stack.com/en/quick_start/core2_for_aws/uiflow



Comments

Popular posts from this blog

Understanding your WSL2 RAM and swap - Changing the default 50%-25%

Installing the RNDIS driver on Windows 11 to use USB Raspberry Pi as network attached

DNS for Azure Point to Site (P2S) VPN - getting the internal IPs