Product overview
Description
The X-CUBE-AWS Expansion Package consists of a marginally adapted snapshot of the Amazon FreeRTOS™ IoT reference integration demonstration, running on a B-U585I-IOT02A Discovery kit as an end device.
Refer to the readme and to the Getting Started Guide available from GitHub at github.com in the FreeRTOS/iot-reference-stm32u5 project.
X-CUBE-AWS proposes two projects that expose the same functionalities to the user: runtime device provisioning, telemetry, device defender, and over-the-air firmware update. The telemetry data is provided by the variety of environmental and movement sensors featured by the B-U585I-IOT02A Discovery kit.
The first project, NTZ (no-TrustZone®), saves the device credentials and settings in the external NOR flash memory of the B-U585I-IOT02A Discovery kit.
The second project, TF‑M (Trusted Firmware‑M), saves the device credentials and settings encrypted in the TF‑M protected storage. Once provisioned, the security-sensitive data and operations remain in a secure partition, where they are not exposed to the user application. The secure boot process acts as a Root of Trust for the application before launching it. It takes care of the secure firmware update once a new image has been downloaded by the user application.
The B-U585I-IOT02A Discovery kit, which supports Wi‑Fi® connectivity with an on-board MXCHIP module, has passed the FreeRTOS™ qualification process.
-
All features
- Amazon FreeRTOS™ IoT reference integration for the B-U585I-IOT02A Discovery kit
- Wi‑Fi®
- Configurable TCP/IP stack
- TLS encryption
- Firmware update
- AWS IoT Core™ multi-account registration
- AWS IoT Core™ connection, device shadow, jobs, defender
- AWS IoT Core™ OTA firmware update
- Telemetry with on-board environmental and movement sensors
- Command-line interface:
- Device provisioning
- Configuration saving to NVM
- Monitoring of the FreeRTOS™ kernel tasks and their memory usage
- Easy step-in project, without Arm® TrustZone®
- Arm® TrustZone® for Cortex®‑M (TF‑M) enabled project:
- Secure boot
- Private key and secrets storage
- Sensitive operations executed in an isolated environment