Skip to main content
Entitybits
Industrial Water / Regulatory Compliance

Industrial IoT Telemetry for Regulated Compliance Reporting

Continuous, auditable telemetry from field devices to a compliance dashboard, replacing manual logbooks. MQTT-based field path, batch-validated reporting path, end-to-end TLS with per-device certificate auth.

MQTT QoS-2
Transport
TLS · per-device cert
Device auth
Per reading
Audit trail
Auditable telemetry
End-to-end
Field devices → broker → audit store → compliance dashboard. No silent gaps.
Overview

The system, in plain terms.

A regulated industrial water user operating multiple borehole installations needed continuous, auditable consumption data and periodic reports filed with a national groundwater regulator. The existing manual logbook process was slow, error-prone, and difficult to defend if questioned by the authority.

The client needed a single system that captured field consumption data continuously, stored it reliably, and produced regulator-format reports their compliance team filed each cycle. The system also had to handle frequently intermittent field connectivity and a small number of installations spread across geography.

The challenge

What needed to be solved.

Built a continuous telemetry and reporting platform replacing manual logbooks for regulator-mandated groundwater consumption reporting.

  • Field telemetry needed a transport that survived patchy networks and constrained device hardware. HTTP polling was the wrong shape.
  • The communication path between field devices and the central system needed to be secure end-to-end. Tampering with consumption data would create both compliance and operational risk.
  • Reports follow a specific format and have to reconcile against the raw telemetry. Compliance teams need to trust the report and trace any number on it back to source readings.
  • Operations and compliance teams needed visibility without depending on engineering for every question.
For industrial IoT monitoring tied to regulatory reporting, the architecture needs to be split deliberately.
— From the engagement retrospective
Objectives

What we set out to do.

  1. 01Continuous, telemetry-based monitoring of groundwater consumption across all installations
  2. 02Reliable data delivery from devices in low-bandwidth and intermittent network conditions
  3. 03Secure communication between field devices and the central platform
  4. 04Regulator-format report generation on demand and on schedule
  5. 05Dashboard usable by compliance and operations teams without engineering involvement
Our approach

How we built it.

Field telemetry needed a transport that survived patchy networks and constrained device hardware. HTTP polling was the wrong shape.Built the monitoring layer on MQTT. Devices publish to a broker that buffers and persists messages until the backend acknowledges them; QoS-2 guarantees no readings are silently dropped during outages, which would otherwise create compliance gaps.

The communication path between field devices and the central system needed to be secure end-to-end. Tampering with consumption data would create both compliance and operational risk.Designed a secure communication layer over MQTT with TLS encryption for transport, certificate-based device authentication, and per-device topic namespaces on the broker. Each device has a unique credential, can only publish to its own topic, and is auditable in broker logs.

Reports follow a specific format and have to reconcile against the raw telemetry. Compliance teams need to trust the report and trace any number on it back to source readings.The backend ingests and normalizes telemetry from the broker, runs validation rules against readings, and stores them in a relational store with full audit history. Report generation pulls from this store rather than from live telemetry — a stable, point-in-time view that ties back to specific device readings.

Operations and compliance teams needed visibility without depending on engineering for every question.A React dashboard provides real-time consumption views, historical trends per installation, alerting on anomalies (sudden drops, spikes, device-offline), and self-serve report generation. Role-based access separates the compliance view from the operations view.

End-to-end

Auditable telemetry

Continuous, auditable groundwater consumption monitoring across all installations, replacing manual logbooks

Tech stack

What we used.

RE
React
NO
Node.js
MQ
MQTT (Mosquitto)
TL
TLS
CE
Certificate-based device authentication
PO
PostgreSQL
CU
Custom report generation pipeline
Outcomes

What changed in production.

01

Continuous, auditable groundwater consumption monitoring across all installations, replacing manual logbooks

02

Self-serve regulator-format report generation, replacing a multi-day reconciliation exercise

03

Secure, tamper-resistant data path from field devices to the compliance dashboard

04

Operations team gained visibility into anomalies — device failures, leaks, unusual draw patterns — that the manual logbook process did not surface

What we learned

Lessons from shipping it.

For industrial IoT monitoring tied to regulatory reporting, the architecture needs to be split deliberately. The telemetry path is real-time, MQTT-based, and tolerant of network conditions. The reporting path is batch, validated, and auditable. Mixing the two creates either unreliable telemetry or untrustworthy reports. We have used this same split on subsequent industrial monitoring engagements.

The most valuable feature for the compliance team was not the report generator — it was the audit trail. Being able to point to the exact device, the exact reading, and the exact timestamp behind any number on a regulator filing is what made the system defensible.

Have a similar system to ship?

30-minute scoping call. We'll tell you if your use case is a fit and what shipping it actually looks like.

Start the conversation