scholarly journals The MI-SDN System to Manage MQTT Data in an Interoperable IoT Wireless Network

Author(s):  
Rajae Tamri, Et. al.

The main challenge for the Internet of Things (IoT) is to ensure interoperability between heterogeneous IoT entities. To support the interaction, intercommunication, and interoperability between these devices several solutions are proposed in the literature. The SDN (Software-defined Network) is one of these solutions to resolve the problem of the heterogeneous network used in IoT. To guarantee network interoperability, the SDN uses a centralized controller, which handles the entire network. The role of end devices in IoT is only forwarding data. The MQTT (Message Queuing Telemetry Transport) protocol is another solution for granting interoperability in IoT. Which is a publish/subscribe based messaging protocol that avoids direct connection between devices by relaying data through a central server called the broker. Combination of these two solutions to manage IoT devices makes it easy to add new devices without touching or changing the existing infrastructure. The new devices only need to communicate with the broker. Moreover, the Controller SDN is responsible for handling networks. Consequently, smart devices added don’t need to be compatible with the others. In this paper, we present the design and the implementation of a new IoT architecture, which is a combination of SDN technology and MQTT protocol. That enables heterogeneous IoT devices to be interoperable and interact without any problems. Our system utilizes the lightweight protocol MQTT with a new mechanism using several slave brokers and one master. The slaves manage the group of the end devices in the wireless IoT network, and the master broker installed in the SDN controller supervises the integral network. The SDN controller uses a multicast system to send MQTTdata across the external wireless network. As a result, that reduces transmission delay between wireless IoT network compared with the using of a standard MQTT.

Author(s):  
Tanweer Alam

In next-generation computing, the role of cloud, internet and smart devices will be capacious. Nowadays we all are familiar with the word smart. This word is used a number of times in our daily life. The Internet of Things (IoT) will produce remarkable different kinds of information from different resources. It can store big data in the cloud. The fog computing acts as an interface between cloud and IoT. The extension of fog in this framework works on physical things under IoT. The IoT devices are called fog nodes, they can have accessed anywhere within the range of the network. The blockchain is a novel approach to record the transactions in a sequence securely. Developing a new blockchains based middleware framework in the architecture of the Internet of Things is one of the critical issues of wireless networking where resolving such an issue would result in constant growth in the use and popularity of IoT. The proposed research creates a framework for providing the middleware framework in the internet of smart devices network for the internet of things using blockchains technology. Our main contribution links a new study that integrates blockchains to the Internet of things and provides communication security to the internet of smart devices.


2021 ◽  
Vol 9 (2) ◽  
Author(s):  
Feroz Khan A.B ◽  
◽  
Anandharaj G ◽  

The smart devices connected on the internet turn to be the internet of things, which connect other objects or devices through unique identifiers with the capability of transferring and receiving the information over the internet. There are numerous applications in different areas such as healthcare, home automation, transportation, military, agriculture, and still so many sectors that incorporate cutting-edge technologies of communication, networking, cloud computing, sensing, and actuation. With this huge increase in the number of connected devices, a strong security mechanism is required to protect the IoT devices. Hence, it is required to focus on the challenges and issues of IoT enabled applications to safeguard the entire network from the outside invasion. This paper discusses some of the challenges in building IoT applications, a detailed study of the existing security protocols, and its issues, and the potential of the IoT.


2020 ◽  
Vol 1 (2) ◽  
pp. 1-12
Author(s):  
Ritu Chauhan ◽  
Gatha Tanwar

The internet of things has brought in innovations in the daily lives of users. The enthusiasm and openness of consumers have fuelled the manufacturers to dish out new devices with more features and better aesthetics. In an attempt to keep up with the competition, the manufacturers are not paying enough attention to cyber security of these smart devices. The gravity of security vulnerabilities is further aggravated due to their connected nature. As a result, a compromised device would not only stop providing the intended service but could also act as a host for malware introduced by an attacker. This study has focused on 10 manufacturers, namely Fitbit, D-Link, Edimax, Ednet, Homematic, Smarter, Osram, Belkin Wemo, Philips Hue, and Withings. The authors studied the security issues which have been raised in the past and the communication protocols used by devices made by these brands. It was found that while security vulnerabilities could be introduced due to lack of attention to details while designing an IoT device, they could also get introduced by the protocol stack and inadequate system configuration. Researchers have iterated that protocols like TCP, UDP, and mDNS have inherent security shortcomings and manufacturers need to be mindful of the fact. Furthermore, if protocols like EAPOL or Zigbee have been used, then the device developers need to be aware of safeguarding the keys and other authentication mechanisms. The authors also analysed the packets captured during setup of 23 devices by the above-mentioned manufacturers. The analysis gave insight into the underlying protocol stack preferred by the manufacturers. In addition, they also used count vectorizer to tokenize the protocols used during device setup and use them to model a multinomial classifier to identify the manufacturers. The intent of this experiment was to determine if a manufacturer could be identified based on the tokenized protocols. The modelled classifier could then be used to drive an algorithm to checklist against possible security vulnerabilities, which are characteristic of the protocols and the manufacturer history. Such an automated system will be instrumental in regular diagnostics of a smart system. The authors then wrapped up this report by suggesting some measures a user can take to protect their local networks and connected devices.


Electronics ◽  
2021 ◽  
Vol 10 (22) ◽  
pp. 2830
Author(s):  
Mitra Pooyandeh ◽  
Insoo Sohn

The network edge is becoming a new solution for reducing latency and saving bandwidth in the Internet of Things (IoT) network. The goal of the network edge is to move computation from cloud servers to the edge of the network near the IoT devices. The network edge, which needs to make smart decisions with a high level of response time, needs intelligence processing based on artificial intelligence (AI). AI is becoming a key component in many edge devices, including cars, drones, robots, and smart IoT devices. This paper describes the role of AI in a network edge. Moreover, this paper elaborates and discusses the optimization methods for an edge network based on AI techniques. Finally, the paper considers the security issue as a major concern and prospective approaches to solving this issue in an edge network.


Sensors ◽  
2019 ◽  
Vol 19 (7) ◽  
pp. 1492 ◽  
Author(s):  
Pantaleone Nespoli ◽  
David Useche Pelaez ◽  
Daniel Díaz López ◽  
Félix Gómez Mármol

The Internet of Things (IoT) became established during the last decade as an emerging technology with considerable potentialities and applicability. Its paradigm of everything connected together penetrated the real world, with smart devices located in several daily appliances. Such intelligent objects are able to communicate autonomously through already existing network infrastructures, thus generating a more concrete integration between real world and computer-based systems. On the downside, the great benefit carried by the IoT paradigm in our life brings simultaneously severe security issues, since the information exchanged among the objects frequently remains unprotected from malicious attackers. The paper at hand proposes COSMOS (Collaborative, Seamless and Adaptive Sentinel for the Internet of Things), a novel sentinel to protect smart environments from cyber threats. Our sentinel shields the IoT devices using multiple defensive rings, resulting in a more accurate and robust protection. Additionally, we discuss the current deployment of the sentinel on a commodity device (i.e., Raspberry Pi). Exhaustive experiments are conducted on the sentinel, demonstrating that it performs meticulously even in heavily stressing conditions. Each defensive layer is tested, reaching a remarkable performance, thus proving the applicability of COSMOS in a distributed and dynamic scenario such as IoT. With the aim of easing the enjoyment of the proposed sentinel, we further developed a friendly and ease-to-use COSMOS App, so that end-users can manage sentinel(s) directly using their own devices (e.g., smartphone).


Author(s):  
Yong Kyu Lee

This chapter reviews the internet of things (IoT) as a key component of a smart city and how it is applied to consumers' daily lives and business. The IoT is a part of information and communication technology (ICT) and is considered a powerful means to improve consumers' quality of life. The “thing” could be any object which has internet capability, such as wearable devices and smart TVs/phones/speakers. Several studies have identified driving factors that have led consumers to adopting them, but also concerns of consumers' resistance to IoT devices. The three major fields of application of IoT technologies were selected to review the role of the IoT in consumers' daily lives and business.


2019 ◽  
Vol 2019 ◽  
pp. 1-10 ◽  
Author(s):  
Fei Xiao ◽  
Zhaowen Lin ◽  
Yi Sun ◽  
Yan Ma

The Internet of Things (IoT) provides various benefits, which makes smart device even closer. With more and more smart devices in IoT, security is not a one-device affair. Many attacks targeted at traditional computers in IoT environment may also aim at other IoT devices. In this paper, we consider an approach to protect IoT devices from being attacked by local computers. In response to this issue, we propose a novel behavior-based deep learning framework (BDLF) which is built in cloud platform for detecting malware in IoT environment. In the proposed BDLF, we first construct behavior graphs to provide efficient information of malware behaviors using extracted API calls. We then use a neural network-Stacked AutoEncoders (SAEs) for extracting high-level features from behavior graphs. The layers of SAEs are inserted one after another and the last layer is connected to some added classifiers. The architecture of the SAEs is 6,000-2,000-500. The experiment results demonstrate that the proposed BDLF can learn the semantics of higher-level malicious behaviors from behavior graphs and further increase the average detection precision by 1.5%.


2020 ◽  
Author(s):  
Tanweer Alam

<p>Blockchain (BC) in the Internet of Things (IoT) is a novel technology that acts with decentralized, distributed, public and real-time ledger to store transactions among IoT nodes. A blockchain is a series of blocks, each block is linked to its previous blocks. Every block has the cryptographic hash code, previous block hash, and its data. The transactions in BC are the basic units that are used to transfer data between IoT nodes. The IoT nodes are different kind of physical but smart devices with embedded sensors, actuators, programs and able to communicate with other IoT nodes. The role of BC in IoT is to provide a procedure to process secured records of data through IoT nodes. BC is a secured technology that can be used publicly and openly. IoT requires this kind of technology to allow secure communication among IoT nodes in heterogeneous environment. The transactions in BC could be traced and explored through anyone who are authenticated to communicate within the IoT. The BC in IoT may help to improve the communication security. In this paper, I explored this approach, its opportunities and challenges. </p>


Author(s):  
Suma V

The Internet of Things [IoT] is one of the most recent technologies that has influenced the way people communicate. With its growth, IoT encounters a number of challenges, including device heterogeneity, energy construction, comparability, and security. Energy and security are important considerations when transmitting data via edge networks and IoT. Interference with data in an IoT network might occur unintentionally or on purpose by malicious attackers, and it will have a significant impact in real time. To address the security problems, the suggested solution incorporates software defined networking (SDN) and blockchain. In particular, this research work has introduced an energy efficient and secure blockchain-enabled architecture using SDN controllers that are operating on a novel routing methodology in IoT. To establish communication between the IoT devices, private and public blockchain are used for eliminating Proof of Work (POW). This enables blockchain to be a suitable resource-constrained protocol for establishing an efficient communication. Experimental observation indicates that, an algorithm based on routing protocol will have low energy consumption, lower delay and higher throughput, when compared with other classic routing algorithms.


2020 ◽  
Author(s):  
Tanweer Alam

<p>Peoples are naturally communicators but devices are not. In the Internet of Things (IoT) architecture, the smart devices (SDs), sensors, programs and association of smart objects are connected together to transfer information among them. The SD is designed as physical device linked with computing resources that are capable to connect and communicate with another SD through any medium and protocol. The communication among intelligent physical things is a challenging task to exchange information that guaranteed to reach to the destination completely in a real time with the same order as sending without corruption. The reliable communication between physical things can be built in the transmission control protocol (TCP) layers. In TCP layer, the reliable communication is required the error detection, correction and confirmation to exchange information among smart devices. In this paper, the author represents a framework to deal with reliability issues to enable the adoption of IoT devices. The results found the improvement in reliability. </p>


Sign in / Sign up

Export Citation Format

Share Document