scholarly journals Hash-Chain Based Authentication for IoT Devices and REST Web-Services

Author(s):  
António Pinto ◽  
Ricardo Costa
Keyword(s):  
Author(s):  
Jagdeep Kaur ◽  
Meghna Sharma

The public cloud Amazon Web Service (AWS) provides a wide range of services like computation, networking, analytics, development and management tools, application services, mobile services, and management of Internet-of-Things (IoT) devices. The Amazon Web Services (AWS) IoT is an excellent IoT cloud platform and is exclusively responsible for connecting devices into various fields like healthcare, biology, municipal setup, smart homes, marketing, industrial, agriculture, education, automotive, etc. This chapter highlights many other initiatives promoted by AWS IoT. The main motive of this chapter is to present how AWS IoT works. The chapter starts with the design principles of AWS IoT services. Further, the authors present a detailed description of the AWS IoT components (e.g., Device SDK, Message Broker, Rule Engine, Security and Identity Service, Thing Registry, Thing Shadow, and Thing Shadow Service). The chapter concludes with a description of various challenges faced by AWS IoT and future research directions.


Author(s):  
Михаил Леонтьевич Воскобойников ◽  
Роман Константинович Федоров ◽  
Геннадий Михайлович Ружников

Предложен метод автоматизации активации устройств Интернета вещей на основе классификации геопозиции мобильного устройства. В отличие от других методов пользователь обучает систему активации устройств с помощью примеров и контрпримеров, что значительно снижает требования к квалификации пользователя. Проведено тестирование метода на таких двух устройствах, как шлагбаум и электромеханический замок двери. Полученные результаты тестирования позволяют судить о работоспособности метода и возможности его использования в системах умного дома и города. Most IoT devices provide an application programming interface such as web service that allows controlling these IoT devices over Internet using a mobile phone. Activation of IoT devices is performed according to the status of user behavior. Both user behavior and activation of IoT devices are periodical. An activation of IoT device is often related with a user geolocation which can be defined by sensors of the mobile device. A method for automated activation of IoT devices based on classification of geolocation of mobile device is proposed. The method implements a supervised learning that simplifies automate activation of IoT devices for the end users. Existing methods demand appropriate end user qualification and require long time to automate activation. For indoor geolocation of the mobile device information from Wi-Fi access points and geolocation GPS sensor is utilized. Data of Wi-Fi and GPS sensors is used to form context of a mobile device. Based on context examples of invoking/not invoking web services the spatial areas are formed. When the mobile device context is within the web service invocation area, the web service is invoked and the associated IoT device is activated. To implement the method, an Android application was developed. The method was tested on a training set that contained 100 training examples of calling two web services: opening an electromechanical door lock and opening a barrier. As a result of testing, the accuracy of classifying the context of a mobile device was 98 percent. The results obtained can be used in the development of smart home and smart city systems.


Author(s):  
H J. Shanthi

<p>E-agriculture gives to applying new things to use ICTs in the country, with the main heart on agricultural. ICT in Agriculture provides a wide range of solutions to some farming ideas. The rising field focuses on the development of agricultural and rural advance through improved information and communication. This time, ICT is used as around all information and communication developments including Android mobiles, IOT devices, communication networking devices,  web services; this variety from original Internet-era technologies and sensors to other pre-accessible aids such as  TV, satellites, and radios. This technique continues to evolve in scope as new ICT applications continue to be harnessed in the agriculture industries. It involves the concept, development, design, application, and evaluation of novel ways to use ICTs in the rural domain, with the main focus on cultivation. This includes principles, norms, methods, and apparatus as well as the growth of personality and institutional capacity, and policy hold is all key mechanism of e-agriculture.</p>


Internet of Things (IoT) is a unique domain which works on various aspects, which is blanketed, interconnected and thereby enables the humans to interact with the web services and creates a smarter world. There is severe problem in the unified way for discovering IoT devices and services in the present existing infrastructure. The current device centric approach is not in consistent with the growing network. There is no standard method which allows the user to find IoT devices and services in a single framework. Users looking for services will not be aware of potential services available to satisfy their needs. The proposed concept uses unified service discovery broker based architecture using web services. Broker based architecture allows the different providers to register their devices and services at one place and based on the user query, matchching of suitable device and appropriate service will be done and the service data corresponding to the specific query of the user will be provided by using semantic search. Hence, the user can find in a single framework the registered devices and services separately which will be bound together to process the IoT device data stored on cloud. In future, IoT applications would be deployed in several domains like home automation, smart cities, intelligent transport and e-health. Complex service request made by the user can also be resolved using service composition to get the final result.


Fog Computing ◽  
2018 ◽  
pp. 132-141
Author(s):  
Jagdeep Kaur ◽  
Meghna Sharma

The public cloud Amazon Web Service (AWS) provides a wide range of services like computation, networking, analytics, development and management tools, application services, mobile services, and management of Internet-of-Things (IoT) devices. The Amazon Web Services (AWS) IoT is an excellent IoT cloud platform and is exclusively responsible for connecting devices into various fields like healthcare, biology, municipal setup, smart homes, marketing, industrial, agriculture, education, automotive, etc. This chapter highlights many other initiatives promoted by AWS IoT. The main motive of this chapter is to present how AWS IoT works. The chapter starts with the design principles of AWS IoT services. Further, the authors present a detailed description of the AWS IoT components (e.g., Device SDK, Message Broker, Rule Engine, Security and Identity Service, Thing Registry, Thing Shadow, and Thing Shadow Service). The chapter concludes with a description of various challenges faced by AWS IoT and future research directions.


2020 ◽  
Vol 77 ◽  
pp. 04007
Author(s):  
Yuki Yoshida ◽  
Yoshihiro Ito

This paper assesses QoE for a Web service (WebQoE) for the TCP multi-pathization method by SDN by experiments with subjects. The multi-pathization method is one of the QoS controls for IoT networks; it can multi-pathize a TCP connection without any changes of terminals or protocols. The previous work of the authors has evaluated QoS of Web services but has not assessed QoE. This paper assesses QoE of an online map service for the multi-pathization method by experiments with subjects. In the experiment, the authors treat various environments which differs in the amount of load traffic. The obtained results show that WebQoE for the multi-pathization method is always higher than that without the method. Consequently, the paper confirms that the multi-pathization is effective from point of users’ view.


Author(s):  
Manjusha Y ◽  
Prof. Sharada Kori

In this paper, cloud-based services aimed for the connectivity, monitoring, and management of the IoT devices are presented. To set up a network with a large number of devices in the constrained environment can be a challenge. Also, collecting, storing and analyzing data generated from sensors attached to the devices most often requires developing custom-made applications which imply time and cost consumption. Several cloud providers are offering IoT services that unite needed features into full solution offering connectivity between devices and the cloud, processing of data sent from devices and interaction with connected devices through the application. One of them is AWS IoT (Amazon Internet of Things) which is fully scalable, reliable and simple to use. This platform can collect data from a large number of different devices and connect them to endpoints for other tools, allowing a developer to tie received data into the independent application. Other aspects, like security, resource management, integration and centralized management are also covered. In this paper, we will evaluate the performance of the AWS IoT web services by connecting small, single board computers, like Raspberry Pi through different scenarios.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 607
Author(s):  
Mayuresh Sunil Pardeshi ◽  
Ruey-Kai Sheu ◽  
Shyan-Ming Yuan

Authentication is essential for the prevention of various types of attacks in fog/edge computing. Therefore, a novel mode-based hash chain for secure mutual authentication is necessary to address the Internet of Things (IoT) devices’ vulnerability, as there have been several years of growing concerns regarding their security. Therefore, a novel model is designed that is stronger and effective against any kind of unauthorized attack, as IoT devices’ vulnerability is on the rise due to the mass production of IoT devices (embedded processors, camera, sensors, etc.), which ignore the basic security requirements (passwords, secure communication), making them vulnerable and easily accessible. Furthermore, crackable passwords indicate that the security measures taken are insufficient. As per the recent studies, several applications regarding its requirements are the IoT distributed denial of service attack (IDDOS), micro-cloud, secure university, Secure Industry 4.0, secure government, secure country, etc. The problem statement is formulated as the “design and implementation of dynamically interconnecting fog servers and edge devices using the mode-based hash chain for secure mutual authentication protocol”, which is stated to be an NP-complete problem. The hash-chain fog/edge implementation using timestamps, mode-based hash chaining, the zero-knowledge proof property, a distributed database/blockchain, and cryptography techniques can be utilized to establish the connection of smart devices in large numbers securely. The hash-chain fog/edge uses blockchain for identity management only, which is used to store the public keys in distributed ledger form, and all these keys are immutable. In addition, it has no overhead and is highly secure as it performs fewer calculations and requires minimum infrastructure. Therefore, we designed the hash-chain fog/edge (HCFE) protocol, which provides a novel mutual authentication scheme for effective session key agreement (using ZKP properties) with secure protocol communications. The experiment outcomes proved that the hash-chain fog/edge is more efficient at interconnecting various devices and competed favorably in the benchmark comparison.


Sign in / Sign up

Export Citation Format

Share Document