Skip to main content

CPS / IoT Devices

The CPS (Cyber-Physical Systems) page manages your fleet of IoT devices, industrial control systems, and edge sensors. AuroraSOC uniquely integrates IT security with OT/IoT security, treating physical devices as first-class security assets.

Device Fleet Overview

Device Table

The CPS device inventory displays:

ColumnDescription
Device IDUnique identifier (UUID)
NameHuman-readable device name
FamilyDevice family (ESP32-S3, nRF52840, STM32F429)
Firmware StackOperating environment (Zephyr, Embassy-rs, Ada SPARK)
LocationPhysical deployment location
ZoneNetwork security zone
AttestationStatus badge: Verified ✅ / Failed ❌ / Pending ⏳
Last SeenLast telemetry timestamp
StatusOnline / Offline / Alert

Device Families

AuroraSOC supports three firmware platforms:

PlatformMCURTOS/FrameworkUse CaseLanguage
ESP32-S3Xtensa LX7Zephyr RTOSEdge AI inference, WiFi sensorC
nRF52840ARM Cortex-M4Embassy-rsBLE scanning, USB sentinelRust
STM32F429ARM Cortex-M4Ada SPARKSafety-critical relay controlAda

Device Detail View

Telemetry Panel

Real-time sensor data from the device:

  • Temperature — Ambient and core temperature readings
  • Vibration — Accelerometer data for tamper detection
  • Network Activity — Packet counts, connection metrics
  • Battery — Power level (for battery-powered devices)

Attestation Panel

Firmware integrity verification using ECDSA P-256:

Attestation Failures

A failed attestation could indicate firmware tampering, supply chain compromise, or device replacement. Failed attestations automatically generate Critical severity alerts and notify the CPS Security agent.

Alert Correlation Panel

Physical-cyber correlation types detected:

Correlation TypeExample
PHYSICAL_TAMPERVibration spike + authentication failure
FIRMWARE_MISMATCHHash doesn't match expected version
ANOMALOUS_TELEMETRYSensor readings outside normal baseline
COMMUNICATION_ANOMALYUnexpected network traffic patterns
LOCATION_ANOMALYDevice communicating from unexpected location

Firmware Inventory

The firmware inventory sub-page tracks:

  • Firmware versions deployed per device family
  • Version distribution across the fleet
  • Update compliance (how many devices are on the latest version)
  • Attestation success rate by firmware version

OT Protocol Support

AuroraSOC monitors industrial protocols:

  • Modbus TCP/RTU — PLC communication monitoring
  • DNP3 — SCADA protocol analysis
  • BACnet — Building automation monitoring
  • OPC UA — Industrial data exchange

The CPS Security agent can query these protocols via the QueryOTProtocol tool to detect anomalies.

Adding New Devices

Devices are auto-discovered when they first connect to the MQTT broker:

  1. Device connects to mqtt://mosquitto:1883 with TLS client certificate
  2. Publishes to aurora/sensors/{device_id}/telemetry
  3. MQTT Consumer bridge receives the message
  4. Device auto-registered in PostgreSQL with metadata
  5. Appears in the CPS device table within seconds

For pre-registration, use the API:

curl -X POST /api/v1/cps/devices \
-H "Authorization: Bearer $TOKEN" \
-d '{
"name": "Factory Floor Sensor 01",
"family": "ESP32_S3",
"firmware_stack": "ZEPHYR",
"location": "Building A, Floor 2",
"zone": "OT-Zone-1"
}'