1,681 research outputs found
Security for the Industrial IoT: The Case for Information-Centric Networking
Industrial production plants traditionally include sensors for monitoring or
documenting processes, and actuators for enabling corrective actions in cases
of misconfigurations, failures, or dangerous events. With the advent of the
IoT, embedded controllers link these `things' to local networks that often are
of low power wireless kind, and are interconnected via gateways to some cloud
from the global Internet. Inter-networked sensors and actuators in the
industrial IoT form a critical subsystem while frequently operating under harsh
conditions. It is currently under debate how to approach inter-networking of
critical industrial components in a safe and secure manner.
In this paper, we analyze the potentials of ICN for providing a secure and
robust networking solution for constrained controllers in industrial safety
systems. We showcase hazardous gas sensing in widespread industrial
environments, such as refineries, and compare with IP-based approaches such as
CoAP and MQTT. Our findings indicate that the content-centric security model,
as well as enhanced DoS resistance are important arguments for deploying
Information Centric Networking in a safety-critical industrial IoT. Evaluation
of the crypto efforts on the RIOT operating system for content security reveal
its feasibility for common deployment scenarios.Comment: To be published at IEEE WF-IoT 201
A survey of communication protocols for internet of things and related challenges of fog and cloud computing integration
The fast increment in the number of IoT (Internet of Things) devices is accelerating the research on new solutions to make cloud services scalable. In this context, the novel concept of fog computing as well as the combined fog-to-cloud computing paradigm is becoming essential to decentralize the cloud, while bringing the services closer to the end-system. This article surveys e application layer communication protocols to fulfill the IoT communication requirements, and their potential for implementation in fog- and cloud-based IoT systems. To this end, the article first briefly presents potential protocol candidates, including request-reply and publish-subscribe protocols. After that, the article surveys these protocols based on their main characteristics, as well as the main performance issues, including latency, energy consumption, and network throughput. These findings are thereafter used to place the protocols in each segment of the system (IoT, fog, cloud), and thus opens up the discussion on their choice, interoperability, and wider system integration. The survey is expected to be useful to system architects and protocol designers when choosing the communication protocols in an integrated IoT-to-fog-to-cloud system architecture.Peer ReviewedPostprint (author's final draft
Semantic Gateway as a Service architecture for IoT Interoperability
The Internet of Things (IoT) is set to occupy a substantial component of
future Internet. The IoT connects sensors and devices that record physical
observations to applications and services of the Internet. As a successor to
technologies such as RFID and Wireless Sensor Networks (WSN), the IoT has
stumbled into vertical silos of proprietary systems, providing little or no
interoperability with similar systems. As the IoT represents future state of
the Internet, an intelligent and scalable architecture is required to provide
connectivity between these silos, enabling discovery of physical sensors and
interpretation of messages between things. This paper proposes a gateway and
Semantic Web enabled IoT architecture to provide interoperability between
systems using established communication and data standards. The Semantic
Gateway as Service (SGS) allows translation between messaging protocols such as
XMPP, CoAP and MQTT via a multi-protocol proxy architecture. Utilization of
broadly accepted specifications such as W3C's Semantic Sensor Network (SSN)
ontology for semantic annotations of sensor data provide semantic
interoperability between messages and support semantic reasoning to obtain
higher-level actionable knowledge from low-level sensor data.Comment: 16 page
Contributions to Securing Software Updates in IoT
The Internet of Things (IoT) is a large network of connected devices. In IoT, devices can communicate with each other or back-end systems to transfer data or perform assigned tasks. Communication protocols used in IoT depend on target applications but usually require low bandwidth. On the other hand, IoT devices are constrained, having limited resources, including memory, power, and computational resources. Considering these limitations in IoT environments, it is difficult to implement best security practices. Consequently, network attacks can threaten devices or the data they transfer. Thus it is crucial to react quickly to emerging vulnerabilities. These vulnerabilities should be mitigated by firmware updates or other necessary updates securely. Since IoT devices usually connect to the network wirelessly, such updates can be performed Over-The-Air (OTA). This dissertation presents contributions to enable secure OTA software updates in IoT. In order to perform secure updates, vulnerabilities must first be identified and assessed. In this dissertation, first, we present our contribution to designing a maturity model for vulnerability handling. Next, we analyze and compare common communication protocols and security practices regarding energy consumption. Finally, we describe our designed lightweight protocol for OTA updates targeting constrained IoT devices. IoT devices and back-end systems often use incompatible protocols that are unable to interoperate securely. This dissertation also includes our contribution to designing a secure protocol translator for IoT. This translation is performed inside a Trusted Execution Environment (TEE) with TLS interception. This dissertation also contains our contribution to key management and key distribution in IoT networks. In performing secure software updates, the IoT devices can be grouped since the updates target a large number of devices. Thus, prior to deploying updates, a group key needs to be established among group members. In this dissertation, we present our designed secure group key establishment scheme. Symmetric key cryptography can help to save IoT device resources at the cost of increased key management complexity. This trade-off can be improved by integrating IoT networks with cloud computing and Software Defined Networking (SDN).In this dissertation, we use SDN in cloud networks to provision symmetric keys efficiently and securely. These pieces together help software developers and maintainers identify vulnerabilities, provision secret keys, and perform lightweight secure OTA updates. Furthermore, they help devices and systems with incompatible protocols to be able to interoperate
Efficient energy management for the internet of things in smart cities
The drastic increase in urbanization over the past few years requires sustainable, efficient, and smart solutions for transportation, governance, environment, quality of life, and so on. The Internet of Things offers many sophisticated and ubiquitous applications for smart cities. The energy demand of IoT applications is increased, while IoT devices continue to grow in both numbers and requirements. Therefore, smart city solutions must have the ability to efficiently utilize energy and handle the associated challenges. Energy management is considered as a key paradigm for the realization of complex energy systems in smart cities. In this article, we present a brief overview of energy management and challenges in smart cities. We then provide a unifying framework for energy-efficient optimization and scheduling of IoT-based smart cities. We also discuss the energy harvesting in smart cities, which is a promising solution for extending the lifetime of low-power devices and its related challenges. We detail two case studies. The first one targets energy-efficient scheduling in smart homes, and the second covers wireless power transfer for IoT devices in smart cities. Simulation results for the case studies demonstrate the tremendous impact of energy-efficient scheduling optimization and wireless power transfer on the performance of IoT in smart cities
Challenges of Internet of Things and Big Data Integration
The Internet of Things anticipates the conjunction of physical gadgets to the
In-ternet and their access to wireless sensor data which makes it expedient to
restrain the physical world. Big Data convergence has put multifarious new
opportunities ahead of business ventures to get into a new market or enhance
their operations in the current market. considering the existing techniques and
technologies, it is probably safe to say that the best solution is to use big
data tools to provide an analytical solution to the Internet of Things. Based
on the current technology deployment and adoption trends, it is envisioned that
the Internet of Things is the technology of the future, while to-day's
real-world devices can provide real and valuable analytics, and people in the
real world use many IoT devices. Despite all the advertisements that companies
offer in connection with the Internet of Things, you as a liable consumer, have
the right to be suspicious about IoT advertise-ments. The primary question is:
What is the promise of the Internet of things con-cerning reality and what are
the prospects for the future.Comment: Proceedings of the International Conference on International
Conference on Emerging Technologies in Computing 2018 (iCETiC '18), 23rd
-24th August, 2018, at London Metropolitan University, London, UK, Published
by Springer-Verla
- …