scholarly journals Real time secure messaging service for internet of things applications using MQTT

IIUC Studies ◽  
2021 ◽  
pp. 27-42
Author(s):  
Md Jiabul Hoque ◽  
Md Razu Ahmed ◽  
Md Akibur Rahman ◽  
Shihab Uddin

Most of the IoT applications require real time and secure exchange of information among connected devices and hence, currently, security of communication protocols is becoming key topic of research. MQTT, a lightweight communication protocol, is used for real time communication between networks. Authors have reviewed numerous published researches on secure MQTT protocol for IoT networks and have discovered security loop holes of MQTT communication protocol that are needed to be addressed. This article proposes a secure and real time MQTT protocol by incorporating SSL certificate to MQTT broker for IoT applications without data loss. The research has been implemented in Raspberry Pi 3B system using Python 3.4.10 development platform along with Numpy 1.11.1 and scipy 0.18.0 (for mathematical analysis), paho-mqtt 1.5.0 (for MQTT publication/subscription), and Chromium (for displaying research outcome). The outcome of this research shows that the proposed MQTT protocol has tighten security during exchanging information over IoT networks without any loss of data. IIUC Studies Vol.17, December 2020: 27-42

Energies ◽  
2020 ◽  
Vol 13 (13) ◽  
pp. 3346
Author(s):  
Mahmoud Hussein ◽  
Ahmed I. Galal ◽  
Emad Abd-Elrahman ◽  
Mohamed Zorkany

IoT-based applications operate in a client–server architecture, which requires a specific communication protocol. This protocol is used to establish the client–server communication model, allowing all clients of the system to perform specific tasks through internet communications. Many data communication protocols for the Internet of Things are used by IoT platforms, including message queuing telemetry transport (MQTT), advanced message queuing protocol (AMQP), MQTT for sensor networks (MQTT-SN), data distribution service (DDS), constrained application protocol (CoAP), and simple object access protocol (SOAP). These protocols only support single-topic messaging. Thus, in this work, an IoT message protocol that supports multi-topic messaging is proposed. This protocol will add a simple “brain” for IoT platforms in order to realize an intelligent IoT architecture. Moreover, it will enhance the traffic throughput by reducing the overheads of messages and the delay of multi-topic messaging. Most current IoT applications depend on real-time systems. Therefore, an RTOS (real-time operating system) as a famous OS (operating system) is used for the embedded systems to provide the constraints of real-time features, as required by these real-time systems. Using RTOS for IoT applications adds important features to the system, including reliability. Many of the undertaken research works into IoT platforms have only focused on specific applications; they did not deal with the real-time constraints under a real-time system umbrella. In this work, the design of the multi-topic IoT protocol and platform is implemented for real-time systems and also for general-purpose applications; this platform depends on the proposed multi-topic communication protocol, which is implemented here to show its functionality and effectiveness over similar protocols.


2018 ◽  
Vol 11 ◽  
pp. 19-28 ◽  
Author(s):  
Zhuming Bi ◽  
Yanfei Liu ◽  
Jeremiah Krider ◽  
Joshua Buckland ◽  
Andrew Whiteman ◽  
...  

2018 ◽  
Vol 3 (1) ◽  
pp. 55
Author(s):  
Griffani Megiyanto Rahmatullah ◽  
Muhammad Ayat ◽  
Wirmanto Suteddy

Sistem keamanan rumah merupakan implementasi yang harus dilakukan untuk meningkatkan keamanan dari kejadian yang tidak diinginkan. Beberapa implementasi hanya memberikan notifikasi sederhana berupa alarm dan tidak menjadi bukti yang kuat apabila terjadi pencurian. Salah satu solusi yang dilakukan adalah penempatan kamera untuk memantau keamanan rumah secara real time diintegrasikan dengan penyimpanan cloud. Bluemix merupakan salah satu provider untuk aplikasi cloud yang memiliki layanan pengolahan dan penyimpanan data, akses aplikasi mobile, pengawasan serta Internet of Things (IoT). Sistem yang diimplementasikan adalah integrasi Raspberry Pi dengan layanan Bluemix untuk melakukan pengawasan keamanan rumah dan memberikan notifikasi kepada pengguna. Sistem mendeteksi jarak menggunakan sensor HC-SR04 terhadap objek dan apabila jarak melewati acuan, hal tersebut adalah indikasi terjadinya pencurian. Berikutnya sistem akan menyalakan buzzer sebagai keluaran suara dan mengaktifkan kamera untuk mengambil gambar lalu diunggah ke object storage Bluemix. Langkah berikutnya yaitu layanan IBM push notification memberikan notifikasi ke perangkat Android pengguna. Pengujian dilakukan dengan menghalangi pembacaan sensor sehingga terjadi indikasi pencurian. Hasilnya adalah sistem berhasil menyalakan buzzer, mengambil gambar lalu diunggah ke Bluemix, dan notifikasi berhasil masuk pada Android. Notifikasi diterima oleh file browser pada perangkat Android dan dilakukan sinkronisasi dengan object storage untuk melakukan pengunduhan berkas gambar yang telah diunggah sebelumnya.Kata kunci: Bluemix, Raspberry Pi, object sorage, IBM push notification Home security system is an implementation that needs to be done to improve the security of unwanted events. Some implementations only provide a simple notification such as alarm and cannot become strong evidence in case of theft. One of the solutions is camera placement to monitor home security in real time integrated with cloud storage. Bluemix is a provider for cloud applications that have data processing and storage services, mobile application access, monitoring and Internet of Things (IoT). System implemented was integration of Raspberry Pi with Bluemix services to conduct home security surveillance and provide notification to user. System detected distance using HC-SR04 sensor to object and if distance passes the reference, it was an indication of theft. Next, system will turned on buzzer as a sound output and activating the camera to take picture and uploaded to Bluemix Object Storage. Next step was IBM push notification service giving notification to user's Android device. The testing was done by blocking the sensor readings so that there was an indication of theft. The result was system succeeded in turning on the buzzer, taking pictures, uploading pictures to Bluemix, and notification successfully logged on Android. Notifications are received by the file browser on Android device and synchronized with object storage to download image files that have been uploaded previously.Keywords: Bluemix, Raspberry Pi, object storage, IBM push notification 


Author(s):  
Kunal.S. Pawar ◽  
Pravin.C. Latane

With the development in the education system, considering the latest current online exam system, a new projection of online exam system based on Raspberry pi IOT is proposed, and the key implementation techniques and methods are also described. The growing ubiquity of wireless, RFID mobile and sensor devices has provide a promising opportunity to build the powerful examination systems and applications by Internet of Things (IoT). A wide range of IoT applications have been developed in recent years. In an effort to understand the development of IoT in online examination, here we propose the current research of IoT, IOT key enabling technologies, major IoT applications in online examination and identifies research trends and challenges. Here we initially all the examine details are stored in the server. Then By applying face recognition (in Open CV based) technique, you can start the online examination. Due to sometime unwanted person also enter to wright the exam, so this is the best way to identified any culprits are found or not.


Author(s):  
Kunal Pawar ◽  
Pravin Latane

In this research we have proposed IOT based advanced Online examination using Raspberry pi for Alarm system and border security. With the event of recent education, considering the defect of current online exam system, a replacement projection of online exam system primarily based on Raspberry pi IOT is projected, and also the key implementation techniques and ways also are represented. Internet of Things (IOT) has provided a promising chance to make powerful Examination systems and applications by leverage the growing omnipresence of wireless, RFID mobile and detector devices. a large vary of IOT applications are developed in recent years. In a shot to grasp the event of IOT in on-line examination, here we tend to propose this analysis of IOT, IOT key facultative technologies, major IOT applications in on-line examination and identifies analysis trends and challenges. Here we tend to introduce all the examiner details square measure holds on within the server. Then if somebody needs to starts on-line examination, 1st they ought to apply face recognition (in Open CV based) technique. as a result of it slow unwanted person conjointly enter to Wright the examination, thus this can be the simplest thanks to known any culprits square measure found or not. Then examination enter to Wright the exam, here conjointly I am apply some security. Currently a day’s already queries square measure hold on within the on-line or any paper written copy.


2021 ◽  
Author(s):  
B. Mohamed Arafath Rajack ◽  
N. Subramanian ◽  
N. Arun Pragadesh ◽  
R. Suvanesh ◽  
S. Vignesh

In this modern world agriculture is one of the major booming sectors around the world. In India around 60 percent of GDP comes from agriculture sector alone. Also, around the world there are many technologies showing up in the field of agriculture. In this paper proposed a technology by means of which potential pest attack in the crops can be detected and the respective pesticide is also sprayed as well. Along with these there is a range of sensor employed in the field connected to the controller that will take the real time values from the field and can be displayed in the respective screen (monitor or mobile screen) by means of technology called IOT (Internet of Things). Raspberry-pi is used as the controller to perform IoT. system is linked with an application called “cain” Which allows us to display various values of sensors in the monitor or in mobile application.


Sensors ◽  
2020 ◽  
Vol 20 (3) ◽  
pp. 861
Author(s):  
Bogdan Oniga ◽  
Leon Denis ◽  
Vasile Dadarlat ◽  
Adrian Munteanu

The Internet of Things (IoT) domain presents a wide spectrum of technologies for building IoT applications. The requirements are varying from one application to another granting uniqueness to each IoT system. Each application demands custom implementations to achieve efficient, secure and cost-effective environments. They pose a set of properties that cannot be addressed by a single-based protocol IoT network. Such properties are achievable by designing a heterogeneous IoT system, which integrates diverse IoT protocols and provides a network management solution to efficiently manage the system components. This paper proposes an IoT message-based communication model applied atop the IoT protocols in order to achieve functional scalability and network management transparency agnostic to the employed communication protocol. The paper evaluates the proposed communication model and proves its functional scalability in a heterogeneous IoT system. The experimental assessment compares the payload size of the proposed system with respect to the LwM2M standard, a protocol designed specifically for IoT applications. In addition, the paper discusses the energy consumption introduced by the proposed model as well as the options available to reduce such impact.


2020 ◽  
Vol 5 (2 Februari) ◽  
pp. 155-166
Author(s):  
Ahmad Roihan ◽  
Nina Rahayu ◽  
Danang Saputro Aji

Semua perusahaan menginginkan sistem kehadiran yang lebih baik di mana dapat meningkatkan tingkat kedisiplinan pegawai dalam kehadiran. Dalam hal ini, menjadi masalah yang harus dicari solusinya dan membutuhkan fasilitas atau perancangan berupa sistem kehadiran yang dapat memudahkan dalam melakukan absensi kehadiran dan mengurangi akan terjadinya kesalahan dan kecurangan. Penelitian ini mengembangkan sistem sebagai pemecahan masalah pada sistem kehadiran yang telah ada saat ini dengan sistem kehadiran dengan pengenalan wajah. Raspberry Pi digunakan sebagai mikro komputer untuk melakukan proses pengolahan data untuk mengaktifkan webcam yang akan mendeteksi wajah ketika gerakan telah terdeteksi oleh PIR sensor sebagai input serta perancangan menggunakan bahasa pemrograman Python yang dijalankan pada platform sistem operasi Raspbian. Tujuan dari penelitian ini yaitu  mampu menerapkan sistem yang dapat melakukan pembacaan wajah pegawai untuk input kehadiran secara real time.   Kata Kunci: Kehadiran, Raspberry, Face Recognition, Webcam, Python


Author(s):  
Pijush Kanti Dutta Pramanik ◽  
Saurabh Pal ◽  
Aditya Brahmachari ◽  
Prasenjit Choudhury

This chapter describes how traditionally, Cloud Computing has been used for processing Internet of Things (IoT) data. This works fine for the analytical and batch processing jobs. But most of the IoT applications demand real-time response which cannot be achieved through Cloud Computing mainly because of inherent latency. Fog Computing solves this problem by offering cloud-like services at the edge of the network. The computationally powerful edge devices have enabled realising this idea. Witnessing the exponential rise of IoT applications, Fog Computing deserves an in-depth exploration. This chapter establishes the need for Fog Computing for processing IoT data. Readers will be able to gain a fair comprehension of the various aspects of Fog Computing. The benefits, challenges and applications of Fog Computing with respect to IoT have been mentioned elaboratively. An architecture for IoT data processing is presented. A thorough comparison between Cloud and Fog has been portrayed. Also, a detailed discussion has been depicted on how the IoT, Fog, and Cloud interact among them.


2021 ◽  
Vol 10 (2) ◽  
pp. 153-162
Author(s):  
Gibson Kimutai ◽  
Alexander Ngenzi ◽  
Said Rutabayiro Ngoga ◽  
Rose C. Ramkat ◽  
Anna Förster

Abstract. Tea (Camellia sinensis) is one of the most consumed drinks across the world. Based on processing techniques, there are more than 15 000 categories of tea, but the main categories include yellow tea, Oolong tea, Illex tea, black tea, matcha tea, green tea, and sencha tea, among others. Black tea is the most popular among the categories worldwide. During black tea processing, the following stages occur: plucking, withering, cutting, tearing, curling, fermentation, drying, and sorting. Although all these stages affect the quality of the processed tea, fermentation is the most vital as it directly defines the quality. Fermentation is a time-bound process, and its optimum is currently manually detected by tea tasters monitoring colour change, smelling the tea, and tasting the tea as fermentation progresses. This paper explores the use of the internet of things (IoT), deep convolutional neural networks, and image processing with majority voting techniques in detecting the optimum fermentation of black tea. The prototype was made up of Raspberry Pi 3 models with a Pi camera to take real-time images of tea as fermentation progresses. We deployed the prototype in the Sisibo Tea Factory for training, validation, and evaluation. When the deep learner was evaluated on offline images, it had a perfect precision and accuracy of 1.0 each. The deep learner recorded the highest precision and accuracy of 0.9589 and 0.8646, respectively, when evaluated on real-time images. Additionally, the deep learner recorded an average precision and accuracy of 0.9737 and 0.8953, respectively, when a majority voting technique was applied in decision-making. From the results, it is evident that the prototype can be used to monitor the fermentation of various categories of tea that undergo fermentation, including Oolong and black tea, among others. Additionally, the prototype can also be scaled up by retraining it for use in monitoring the fermentation of other crops, including coffee and cocoa.


Sign in / Sign up

Export Citation Format

Share Document