Security in the Internet of Things: A Survey on Application Layer Protocols

Author(s):  
Lavinia Nastase
Author(s):  
Liangming Cai ◽  
Jingrong Le ◽  
Xuxin Ruan ◽  
Min Du

This paper presents an OSA patient interactive monitoring system based on the Internet of Things (IoT) framework. This system allows OSA patients to get timely rescue when they are sleepy outside. Because the Beidou position marker has an interactive function, it can reduce the anxiety of the patient while waiting for the rescue. At the same time, if a friend helps the OSA patients to call the doctor, the friend can also report the patient's condition in time. This system uses the popular IoT framework. At the bottom is the data acquisition layer, which uses wearable sensors to collect vital signs from patients, with a focus on ECG and SpO2 signals. The middle layer is the network layer that transmits the collected physiological signals to the Beidou indicator using the Bluetooth Low Energy (BLE) protocol. The top layer is the application layer, and the application layer uses the mature rescue interactive platform of Beidou. Since the GPS indicator has not included the communication satellite, So it has no SMS function. OSA patients can only passively wait for a rescue. Moreover, due to the lack of satellites in Asia and the insufficient density of the ground-enhanced system, the positioning error of OSA patients is large. The Beidou system developed by China itself, the main coverage of the satellite is in Asia, and is equipped with a high-density ground-based augmentation system. Therefore, the Beidou model improves the positioning accuracy and is equipped with a special communication satellite, which increases the short message interaction function. Therefore, patients can report disease progression in time while waiting for a rescue. After our simulation test, the effectiveness of the OSA patient rescue monitoring system based on the Internet of Things framework and the positioning accuracy of OSA patients have been greatly improved. Especially when OSA patients work outdoors, the cell phone base station signal coverage is relatively weak. The satellite signal is well covered, plus the SMS function of the Beidou indicator. Therefore, the system can be used to provide timely patient progress and provide data support for the medical rescue team to provide a more accurate rescue plan. After a comparative trial, the rescue rate of OSA patients using the detection device of this system was increased by 15 percentage points compared with the rescue rate using only GPS satellite phones.


The internet of things is turning into an appealing framework worldview to acknowledge inter-connections throughout corporeal, digital as well as communal gaps. Through the connections amid the IoT, safety concerns befall important, along with it is huge to set up improved resolutions for safety protections. The IoT apparition of unlock data sharing is expert through using cloud registering concepts. Since IoT is depends on the web, safety concerns of internet will similarly emerge in IoT as well as IoT enclose three layers for example perception, transportation and application layers. The safety concerns, modernism along with solution recognized by the application layer are conversed about in this Paper. The principle focal point of this examination work is on Data Security Protection procedure for application layer


Proceedings ◽  
2019 ◽  
Vol 31 (1) ◽  
pp. 85 ◽  
Author(s):  
Aurora Macías ◽  
Elena Navarro ◽  
Pascual González

The Internet of things (IoT) is characterized by billions of heterogeneous, distributed, and intelligent objects—both from the digital and the physical worlds—running applications and services. Objects are connected through heterogeneous platforms providing support for the collection and management of data that need to be understood. Since IoT systems are composed by a variety of objects and services, a key aspect for engineering them is their architecture. The new paradigm called Internet of people (IoP) is not unaware of this need. In IoP, humans play an important role so that design considering aspects as context becomes critical for making the most of these applications. This work presents a context-aware, serverless, microservice-based, and cloud-centric framework for the Internet of things and people (IoT-P) applications that extends the three-layer classic IoT reference architecture. It integrates most of the aspects considered by the architecture of IoT solutions emerging from different perspectives, being also domain independent. This work focuses on the application paradigm of IoT neglected by most proposals. This framework, combined with a previous work, offers a higher separation of concerns (SoC) degree than other proposals, by splitting the application layer into different sublayers or subsystems based on their responsibilities and tracing atomic components to serverless microservices, to facilitate the design, development, and deployment of IoT-P applications. An IoT-P application in the healthcare domain is presented to illustrate how this framework can be put into practice.


2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Lianhong Ding ◽  
Yifan Chen ◽  
Juntao Li

The Internet of Things (IoT), a network of objects, has been regarded as the next revolution for the global information industry after the Internet. With IoT, many intelligent applications can be accomplished or improved. This paper presents a framework for dangerous goods management in container yard using IoT technology. The framework consists of three layers: perceptual layer, transport layer, and application layer. It offers an infrastructure for management and data analysis and utilization. According to the features of dangerous goods, the framework can be enhanced for container information forecast, container gate-in and gate-out management, environment parameters monitoring, and fire control as well. In order to verify our method, a prototype system is developed, which shows good performance. With our method, safe operation of dangerous goods in container yard can be accomplished.


2019 ◽  
Author(s):  
Arthur Brito Cosmi ◽  
Vinicius F. S. Mota

With the growth of devices connected to the Internet, several application layer protocols specific for the Internet of Things (IoT) appear every day. This high number of protocols bring doubts to developers about what to use in their projects. This work aims to assist developers in the decision making in their IoT projects. This work presents a qualitative analysis of the MQTT, MQTT-SN, CoAP and AMQP protocols. In a qualitative way, we analyzed thedomains of application and requirements of the applications to map the protocol choice. After that, the MQTT and CoAP protocols were analyzed using devices with low processing and memory capabilities. Results show that MQTT outperforms CoAP when there are several other devices accessing the same access point.


Author(s):  
Adeleh Jafar Gholi Beik ◽  
Mohammad Ebrahim Shiri Ahmad Abadib ◽  
Afshin Rezakhani

Today, due to increasing dependence on the internet, the tendency to make smart and the Internet of things (IoT), has risen. Also, detecting attacks, and malicious activity as well as anomalies on the internet networks, and preventing them from different layers is a necessity. In this method, a new hybrid model of IWC clustering and Random Forest methods are introduced to identify normal and abnormal conditions. It also shows unauthorized access and attacks to different layers of the Internet of Things, especially the application layer. The IWC is a clustering and improved model of the k-means method. After being tested, evaluated, and compared with previous methods, the proposed model indicates that identifying anomalies in, its data has been efficient and useful. Unlabeled data from the Intel data set IBRL is used to cluster its input data. The NSL-KDD data set is also used in the proposed method to select the best classification and identify attacks on the network.


Proceedings ◽  
2019 ◽  
Vol 31 (1) ◽  
pp. 49 ◽  
Author(s):  
Mónica Martí ◽  
Carlos Garcia-Rubio ◽  
Celeste Campo

The fast growth of the Internet of Things (IoT) has made this technology one of the most promising paradigms of recent years. Wireless Sensor Networks (WSNs) are one of the most important challenges of the Internet of things. These networks are made up of devices with limited processing power, memory, and energy. The constrained nature of WSNs makes it necessary to have specific restricted protocols to work in these environments. In this paper, we present an energy consumption and network traffic study of the main IoT application layer protocols, the Constrained Application Protocol (CoAP), and the version of Message Queue Telemetry Transport (MQTT) for sensor networks (MQTT_SN). The simulations presented evaluate the performance of these protocols with different network configurations.


Sign in / Sign up

Export Citation Format

Share Document