Skip to main content

CPS / IoT Devices

The CPS (Cyber-Physical Systems) page manages your fleet of IoT devices, industrial control systems, and edge sensors. AuroraSOC uniquely integrates IT security with OT/IoT security, treating physical devices as first-class security assets.

Device Fleet Overview

Device Table

The CPS device inventory displays:

ColumnDescription
Device IDUnique identifier (UUID)
NameHuman-readable device name
FamilyDevice family (ESP32-S3, nRF52840, STM32F429)
Firmware StackOperating environment (Zephyr, Embassy-rs, Ada SPARK)
LocationPhysical deployment location
ZoneNetwork security zone
AttestationStatus badge: Verified ✅ / Failed ❌ / Pending ⏳
Last SeenLast telemetry timestamp
StatusOnline / Offline / Alert

Device Families

AuroraSOC supports three firmware platforms:

PlatformMCURTOS/FrameworkUse CaseLanguage
ESP32-S3Xtensa LX7Zephyr RTOSEdge AI inference, WiFi sensorC
nRF52840ARM Cortex-M4Embassy-rsBLE scanning, USB sentinelRust
STM32F429ARM Cortex-M4Ada SPARKSafety-critical relay controlAda

Device Detail View

Telemetry Panel

Real-time sensor data from the device:

  • Temperature — Ambient and core temperature readings
  • Vibration — Accelerometer data for tamper detection
  • Network Activity — Packet counts, connection metrics
  • Battery — Power level (for battery-powered devices)

Attestation Panel

Firmware integrity verification using ECDSA P-256. When the optional rust-core profile is enabled, the panel reflects this verification flow:

Attestation Failures

A failed attestation could indicate firmware tampering, supply chain compromise, or device replacement. Failed attestations automatically generate Critical severity alerts and notify the CPS Security agent.

Alert Correlation Panel

Physical-cyber correlation types detected:

Correlation TypeExample
PHYSICAL_TAMPERVibration spike + authentication failure
FIRMWARE_MISMATCHHash doesn't match expected version
ANOMALOUS_TELEMETRYSensor readings outside normal baseline
COMMUNICATION_ANOMALYUnexpected network traffic patterns
LOCATION_ANOMALYDevice communicating from unexpected location

Firmware Inventory

The firmware inventory sub-page tracks:

  • Firmware versions deployed per device family
  • Version distribution across the fleet
  • Update compliance (how many devices are on the latest version)
  • Attestation success rate by firmware version

OT Protocol Support

AuroraSOC monitors industrial protocols:

  • Modbus TCP/RTU — implemented register-query support via QueryOTProtocol
  • DNP3 — adapter hook available (integration pending)
  • S7 — adapter hook available (integration pending)

The CPS Security agent can query these protocols via the QueryOTProtocol tool to detect anomalies, with Modbus as the currently active backend.

Adding New Devices

Devices are auto-discovered when they first connect to the MQTT broker:

  1. Device connects to mqtt://mosquitto:1883 with TLS client certificate
  2. Publishes to aurora/sensors/{device_id}/telemetry
  3. MQTT Consumer bridge receives the message
  4. Device auto-registered in PostgreSQL with metadata
  5. Appears in the CPS device table within seconds

For pre-registration, use the API:

curl -X POST /api/v1/cps/devices \
-H "Authorization: Bearer $TOKEN" \
-d '{
"name": "Factory Floor Sensor 01",
"family": "ESP32_S3",
"firmware_stack": "ZEPHYR",
"location": "Building A, Floor 2",
"zone": "OT-Zone-1"
}'