scholarly journals Compact Extensible Authentication Protocol for the Internet of Things: Enabling Scalable and Efficient Security Commissioning

2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Marcin Piotr Pawlowski ◽  
Antonio J. Jara ◽  
Maciej J. Ogorzalek

Internet of Things security is one of the most challenging parts of the domain. Combining strong cryptography and lifelong security with highly constrained devices under conditions of limited energy consumption and no maintenance time is extremely difficult task. This paper presents an approach that combines authentication and bootstrapping protocol (TEPANOM) with Extensible Authentication Protocol (EAP) framework optimized for the IEEE 802.15.4 networks. The solution achieves significant reduction of network resource usage. Additionally, by application of EAP header compacting approach, further network usage savings have been reached. The EAP-TEPANOM solution has achieved substantial reduction of 42% in the number of transferred packets and 35% reduction of the transferred data. By application of EAP header compaction, it has been possible to achieve up to 80% smaller EAP header. That comprises further reduction of transferred data for 3.84% for the EAP-TEPANOM method and 10% for the EAP-TLS-ECDSA based methods. The results have placed the EAP-TEPANOM method as one of the most lightweight EAP methods from ones that have been tested throughout this research, making it feasible for large scale deployments scenarios of IoT.

2018 ◽  
Vol 7 (3.12) ◽  
pp. 545
Author(s):  
Risabh Mishra ◽  
M Safa ◽  
Aditya Anand

Recent advances in wireless communication technologies and automobile industry have triggered a significant research interest in the field of Internet of Vehicles over the past few years.The advanced period of the Internet of Things is guiding the development of conventional Vehicular Networks to the Internet of Vehicles.In the days of Internet connectivity there is need to be in safe and problem-free environment.The Internet of Vehicles (IoV) is normally a mixing of three networks: an inter-vehicleNetwork, an intra-vehicle network, and a vehicle to vehicle network.Based on  idea of three networks combining into one, we define  Internet of Vehicles as a large-scale distributed system to wireless communication and information exchange between vehicle2X (X: vehicle, road, human and internet).It is a combined   network for supporting intelligent traffic management, intelligent dynamic information service, and intelligent vehicle control, representation of an application of the Internet of Things (IoT) technology for intelligent transportation system (ITS).  


2014 ◽  
Vol 2014 ◽  
pp. 1-15 ◽  
Author(s):  
Kwang-il Hwang ◽  
Sung-wook Nam

In order to construct a successful Internet of things (IoT), reliable network construction and maintenance in a sensor domain should be supported. However, IEEE 802.15.4, which is the most representative wireless standard for IoT, still has problems in constructing a large-scale sensor network, such as beacon collision. To overcome some problems in IEEE 802.15.4, the 15.4e task group proposed various different modes of operation. Particularly, the IEEE 802.15.4e deterministic and synchronous multichannel extension (DSME) mode presents a novel scheduling model to solve beacon collision problems. However, the DSME model specified in the 15.4e draft does not present a concrete design model but a conceptual abstract model. Therefore, in this paper we introduce a DSME beacon scheduling model and present a concrete design model. Furthermore, validity and performance of DSME are evaluated through experiments. Based on experiment results, we analyze the problems and limitations of DSME, present solutions step by step, and finally propose an enhanced DSME beacon scheduling model. Through additional experiments, we prove the performance superiority of enhanced DSME.


2012 ◽  
Vol 2012 ◽  
pp. 1-11 ◽  
Author(s):  
Federica Paganelli ◽  
David Parlanti

Current trends towards the Future Internet are envisaging the conception of novel services endowed with context-aware and autonomic capabilities to improve end users’ quality of life. The Internet of Things paradigm is expected to contribute towards this ambitious vision by proposing models and mechanisms enabling the creation of networks of “smart things” on a large scale. It is widely recognized that efficient mechanisms for discovering available resources and capabilities are required to realize such vision. The contribution of this work consists in a novel discovery service for the Internet of Things. The proposed solution adopts a peer-to-peer approach for guaranteeing scalability, robustness, and easy maintenance of the overall system. While most existing peer-to-peer discovery services proposed for the IoT support solely exact match queries on a single attribute (i.e., the object identifier), our solution can handle multiattribute and range queries. We defined a layered approach by distinguishing three main aspects: multiattribute indexing, range query support, peer-to-peer routing. We chose to adopt an over-DHT indexing scheme to guarantee ease of design and implementation principles. We report on the implementation of a Proof of Concept in a dangerous goods monitoring scenario, and, finally, we discuss test results for structural properties and query performance evaluation.


2018 ◽  
Vol 33 (6) ◽  
pp. 749-767 ◽  
Author(s):  
Seppo Leminen ◽  
Mervi Rajahonka ◽  
Mika Westerlund ◽  
Robert Wendelin

Purpose This study aims to understand their emergence and types of business models in the Internet of Things (IoT) ecosystems. Design/methodology/approach The paper builds upon a systematic literature review of IoT ecosystems and business models to construct a conceptual framework on IoT business models, and uses qualitative research methods to analyze seven industry cases. Findings The study identifies four types of IoT business models: value chain efficiency, industry collaboration, horizontal market and platform. Moreover, it discusses three evolutionary paths of new business model emergence: opening up the ecosystem for industry collaboration, replicating the solution in multiple services and return to closed ecosystem as technology matures. Research limitations/implications Identifying business models in rapidly evolving fields such as the IoT based on a small number of case studies may result in biased findings compared to large-scale surveys and globally distributed samples. However, it provides more thorough interpretations. Practical implications The study provides a framework for analyzing the types and emergence of IoT business models, and forwards the concept of “value design” as an ecosystem business model. Originality/value This paper identifies four archetypical IoT business models based on a novel framework that is independent of any specific industry, and argues that IoT business models follow an evolutionary path from closed to open, and reversely to closed ecosystems, and the value created in the networks of organizations and things will be shareable value rather than exchange value.


2012 ◽  
Vol 197 ◽  
pp. 649-655
Author(s):  
Jian Hua Liu ◽  
Wei Qin Tong

Internet of things applications using RFID sensors are a challenging task due to the limited capacity of batteries. Thus, energy efficient updating and maintenance have become more critical design with RFID sensor network. This paper is dedicated to combine energy harvesting and maintenance, sensor network, and resource discovery to develop a rechargeable sensor energy maintenance scheme. To deal with key sensor nodes and low energy path maintenance, the proposed approach consists of the following:(1)key point energy maintenance for RFID sensor through multi-path similarity analysis;(2)path energy maintenance for RFID sink through energy resource discovery. Use case application and simulation results show that the proposed methods reduce key sensor nodes energy maintenance time and energy maintenance path length for sensor nodes energy updating and maintenance.


2013 ◽  
Vol 765-767 ◽  
pp. 1726-1729
Author(s):  
Yan Bing Liu ◽  
Wen Jing Ren

Security and privacy is always the most important issues by the public in the Internet of Things. The core problems are associated with the diversifying of the Internet towards an Internet of things, and the different requirements to the security level for application. Therefore, this paper is to put forward an authentication model and protocol to cope with the problem. The protocol is adopted with attribute-based encryption to replace the traditional identity-based encryption (IBE), and then make formalization analysis to the security of the protocol by using BAN logic.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 57192-57203 ◽  
Author(s):  
Yanhua He ◽  
Sunxuan Zhang ◽  
Liangrui Tang ◽  
Yun Ren

Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1971 ◽  
Author(s):  
Sangrez Khan ◽  
Ahmad Naseem Alvi ◽  
Muhammad Awais Javed ◽  
Byeong-hee Roh ◽  
Jehad Ali

Internet of Things (IoT) is a promising technology that uses wireless sensor networks to enable data collection, monitoring, and transmission from the physical devices to the Internet. Due to its potential large scale usage, efficient routing and Medium Access Control (MAC) techniques are vital to meet various application requirements. Most of the IoT applications need low data rate and low powered wireless transmissions and IEEE 802.15.4 standard is mostly used in this regard which offers superframe structure at the MAC layer. However, for IoT applications where nodes have adaptive data traffic, the standard has some limitations such as bandwidth wastage and latency. In this paper, a new superframe structure is proposed that is backward compatible with the existing parameters of the standard. The proposed superframe overcomes limitations of the standard by fine-tuning its superframe structure and squeezing the size of its contention-free slots. Thus, the proposed superframe adjusts its duty cycle according to the traffic requirements and accommodates more nodes in a superframe structure. The analytical results show that our proposed superframe structure has almost 50% less delay, accommodate more nodes and has better link utilization in a superframe as compared to the IEEE 802.15.4 standard.


2013 ◽  
Vol 278-280 ◽  
pp. 2012-2015
Author(s):  
Lian Shi Lin ◽  
Qing Hu ◽  
Yu Ping Qui

The Internet of things is a massive electronic equipment with internet interconnection of large scale virtual networks, including RFID, sensor and actuator electronic devices by the internet interconnection. In order to solve internet of things architecture intelligent refrigerator key technologies, The paper had discussed the internet of things architecture intelligent refrigerator definition, characteristic as well as reference architecture, focused on analysis intelligent refrigerator information space definition, information quantification method and mobile platform equipment internet of things key technology main problems and corresponding solution ways.


2012 ◽  
Vol 263-266 ◽  
pp. 3125-3129
Author(s):  
Li Ping Du ◽  
Ying Li ◽  
Guan Ning Xu ◽  
Fei Duan

The rapid development of internet of things puts forward urgent needs for security. The security system must be studied to adapt to the characteristics of the internet of things. The micro- certificate based security system for internet of things takes full account of the security characteristics of things, and uses the symmetric cryptographic algorithms and security chip technology. This security system can meet the security requirements for large-scale sensor’s authentication, signification and encryption/decryption in internet of things, and improve the security performance of internet of things greatly.


Sign in / Sign up

Export Citation Format

Share Document