A fast, secure, reliable, and resilient data transfer framework for pervasive IoT applications

Author(s):  
Raffaele Montella ◽  
Mario Ruggieri ◽  
Sokol Kosta
Sensors ◽  
2019 ◽  
Vol 19 (2) ◽  
pp. 327 ◽  
Author(s):  
Subhan Ullah ◽  
Lucio Marcenaro ◽  
Bernhard Rinner

Smart cameras are key sensors in Internet of Things (IoT) applications and often capture highly sensitive information. Therefore, security and privacy protection is a key concern. This paper introduces a lightweight security approach for smart camera IoT applications based on elliptic-curve (EC) signcryption that performs data signing and encryption in a single step. We deploy signcryption to efficiently protect sensitive data onboard the cameras and secure the data transfer from multiple cameras to multiple monitoring devices. Our multi-sender/multi-receiver approach provides integrity, authenticity, and confidentiality of data with decryption fairness for multiple receivers throughout the entire lifetime of the data. It further provides public verifiability and forward secrecy of data. Our certificateless multi-receiver aggregate-signcryption protection has been implemented for a smart camera IoT scenario, and the runtime and communication effort has been compared with single-sender/single-receiver and multi-sender/single-receiver setups.


Author(s):  
Manoj Devare

The industrial IoT marching towards the digital twin and the broad spectrum of applications need the specialized low power protocols for communication and data transfer. This chapter provides a comprehensive discussion on the challenges, opportunities, use cases, platforms, and protocols for the deployment of low power protocols in the context of IoT applications. Moreover, discussion extends to the various custom techniques for energy saving in the communication of sensors to hardware, hardware to Cloud, and deferred data pushing in edge computing. The traditional wireless data transfer and communication protocols are suitable in case of the hardware platforms connected with seamless power supply. However, there is need of low power protocols 6LoWPAN, LoRaWAN, Sub 1, ZigBee, BLE, NFC, and other telecommunication protocols across several IoT applications. The SBCs and micro-controllers are not always equipped with these protocol-enabled hardware. This chapter addresses the suitable hardware and combination with low energy options as per the budget, range, and specifications.


Author(s):  
Muhammad Rehan Yahya ◽  
Ning Wu ◽  
Zain Anwar Ali

The evolution of internet of things (IoT) applications, cloud computing, smart cities, and 4G/5G wireless communication systems have significantly increased the demands for on chip processing. Network on chip (NoC) is a viable alternative that can provide higher processing and bandwidth for increasing demands. NoC offers better performance and more flexibility with lower communication latency and higher throughput. However, use of NoC-based IoT devices have raised concerns on security and reliability of integrated chips (IC), which is used in almost every application. IoT devices share data that becomes vulnerable to attack and can be compromised during the data transfer. Keeping in view these security challenges, a detailed survey is presented that covers the security issues and challenges focusing on NoCs along with proposed countermeasures to secure on-chip communication. This study includes on-chip security issues for electrical as well as optical on-chip interconnects.


2019 ◽  
Vol 2019 ◽  
pp. 1-8
Author(s):  
Vipin Balyan ◽  
Davinder S. Saini ◽  
Bhasker Gupta

The 3GPP standards have presented the LTE-M as one of the main technologies to provide services to Internet of Things (IoT). The IoT applications are usually short-lived applications like smart sensing, surveillance systems for home or businesses, and data uploading applications like metering. In this paper, the proposed architecture of the base station has a LTE interface which assigns resource blocks (RBs) and another 3G interface which is equipped with orthogonal variable spreading factor (OVSF) codes. The IoT devices deployed ubiquitously leads to massive machine type communication, which leads to burst traffic on current cellular services. The IoT devices when assigned large resources will reduce the radio efficiency. The work in this paper assigns OVSF codes available on 3G interface to the IoT devices. The LTE resources are used for IoT devices in case of emergency or when resources of 3G interface are 100% utilized. This will solve the problem of both small data transfer and connectivity requirement of IoT devices. The IoT applications are event-driven and time-bound also, and the resources are also reserved for these applications in the proposed work. The simulations and results show that proposed work increases both network efficiency and capacity.


Author(s):  
G. Uganya ◽  
Radhika ◽  
N. Vijayaraj

The Internet of Things (IoT) is a series of recording devices, mechanical and automated machines, documents, creatures, or individuals that have one of the user identifiers and the ability to substitute information over a network without requiring human-to-human connections. The IoT technology is used in different applications to transfer information between two or more stations or devices using actuators/sensors. The IoT has many fields of application, including smart home, healthcare, transport and logistics, and industry. Each application gives highlights and important and explicit administrations. This paper provides an overview of IoT applications, discussing their current problems and potential challenges. In addition, it focuses on issues and challenges that arise for future IoT systems including enormous scaling, planning and needs, generating information and big data, strength, frankness, resource management, privacy, and security. The secure data transformation is more problematic in ongoing research. So, this survey presents security attacks and different security mechanisms involved in IoT applications including authentication, encryption, blockchain, and trust management. Blockchain with IoT applications provides good secure data transfer compared to other security mechanisms. So, this survey mainly concentrates on the blockchain with IoT applications and its latest issues. The objective of this paper is to analyze the issues and challenges of IoT applications, eight research topics in existing systems, security attacks and their countermeasures, and different security mechanisms confronting the IoT.


Author(s):  
DADMEHR RAHBARI ◽  
MOHSEN NICKRAY

In today’s world, the internet of things (IoT) is developing rapidly. Wireless sensor network (WSN) as an infrastructure of IoT has limitations in the processing power, storage, and delay for data transfer to cloud. The large volume of generated data and their transmission between WSNs and cloud are serious challenges. Fog computing (FC) as an extension of cloud to the edge of the network reduces latency and traffic; thus, it is very useful in IoT applications such as healthcare applications, wearables, intelligent transportation systems, and smart cities. Resource allocation and task scheduling are the NP-hard issues in FC. Each application includes several modules that require resources to run. Fog devices (FDs) have the ability to run resource management algorithms because of their proximity to sensors and cloud as well as the proper processing power. In this paper, we review the scheduling strategies and parameters as well as providing a greedy knapsack-based scheduling (GKS) algorithm for allocating resources appropriately to modules in fog network. Our proposed method was simulated in iFogsim as a standard simulator for FC. The results show that the energy consumption, execution cost, and sensor lifetime in GKS are better than those of the first-come-first-served (FCFS), concurrent, and delay-priority algorithms.


Sign in / Sign up

Export Citation Format

Share Document