scholarly journals Transparent CoAP Services to IoT Endpoints through ICN Operator Networks

Sensors ◽  
2019 ◽  
Vol 19 (6) ◽  
pp. 1339 ◽  
Author(s):  
Hasan Islam ◽  
Dmitrij Lagutin ◽  
Antti Ylä-Jääski ◽  
Nikos Fotiou ◽  
Andrei Gurtov

The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet-of-Things (IoT). However, a full-fledged CoAP-based application may require significant computing capability, power, and storage capacity in IoT devices. To address these challenges, we present the design, implementation, and experimentation with the CoAP handler which provides transparent CoAP services through the ICN core network. In addition, we demonstrate how the CoAP traffic over an ICN network can unleash the full potential of the CoAP, shifting both overhead and complexity from the (constrained) endpoints to the ICN network. The experiments prove that the CoAP Handler helps to decrease the required computation complexity, communication overhead, and state management of the CoAP server.

2022 ◽  
Vol 18 (1) ◽  
pp. 1-51
Author(s):  
Alberto Giaretta ◽  
Nicola Dragoni ◽  
Fabio Massacci

The Internet of Things (IoT) revolutionised the way devices, and human beings, cooperate and interact. The interconnectivity and mobility brought by IoT devices led to extremely variable networks, as well as unpredictable information flows. In turn, security proved to be a serious issue for the IoT, far more serious than it has been in the past for other technologies. We claim that IoT devices need detailed descriptions of their behaviour to achieve secure default configurations, sufficient security configurability, and self-configurability. In this article, we propose S×C4IoT, a framework that addresses these issues by combining two paradigms: Security by Contract (S×C) and Fog computing. First, we summarise the necessary background such as the basic S×C definitions. Then, we describe how devices interact within S×C4IoT and how our framework manages the dynamic evolution that naturally result from IoT devices life-cycles. Furthermore, we show that S×C4IoT can allow legacy S×C-noncompliant devices to participate with an S×C network, we illustrate two different integration approaches, and we show how they fit into S×C4IoT. Last, we implement the framework as a proof-of-concept. We show the feasibility of S×C4IoT and we run different experiments to evaluate its impact in terms of communication and storage space overhead.


Author(s):  
Juan David Arias Correa ◽  
Alex Sandro Roschildt Pinto ◽  
Carlos Montez ◽  
Erico Leão

The transmission and storage of data collected by the devices are essential components of the Internet of Things (IoT). When devices send unnecessary or redundant information, it spends more energy, unnecessarily using the communication channel, besides processing at the destination, data that make a small contribution to the application. Data compression is a possible solution for the significant quantity of information generated by IoT devices. Data compression is the process of reducing the quantity of data necessary to represent some volume of data. This paper proposes the use of Swinging Door Trending (SDT) into an IoT environment and a new calibration step to select its major parameter: the compression deviation. A prototype was built, and experimental results show the effectivity of the proposal.


Sensors ◽  
2020 ◽  
Vol 20 (10) ◽  
pp. 2849
Author(s):  
Felipe Viel ◽  
Luis Augusto Silva ◽  
Valderi Reis Quietinho Leithardt ◽  
Juan Francisco De Paz Santana ◽  
Raimundo Celeste Ghizoni Teive ◽  
...  

The evolution of computing devices and ubiquitous computing has led to the development of the Internet of Things (IoT). Smart Grids (SGs) stand out among the many applications of IoT and comprise several embedded intelligent technologies to improve the reliability and the safety of power grids. SGs use communication protocols for information exchange, such as the Open Smart Grid Protocol (OSGP). However, OSGP does not support the integration with devices compliant with the Constrained Application Protocol (CoAP), a communication protocol used in conventional IoT systems. In this sense, this article presents an efficient software interface that provides integration between OSGP and CoAP. The results obtained demonstrate the effectiveness of the proposed solution, which presents low communication overhead and enables the integration between IoT and SG systems.


2021 ◽  
Vol 19 (1) ◽  
pp. 66-76
Author(s):  
P. Sharma ◽  
P. K. Gupta

With the evolution of the Internet of Things (IoT), the use of smart devices has completely changed the day-to-day life of the human being. IoT devices are of flexible use which is implemented to sense the environment and data efficiently. However, these devices have some constrained capabilities concerning fault tolerance, computation cost, and storage. This requires an improved framework and algorithms for performing effective operations. In this paper, a hybrid framework is proposed, which incorporates the various IoT devices in fog environments to enhance fault tolerance. The proposed framework implements a novel QoS-aware technique based on the combination of checkpoints and replication (CR) for diagnosing faults and the bee-mutation (BM) algorithm for optimal placement of service. A fog service monitor is established to observe the performance of fog nodes. Both the CR module and BM module access the service monitor to ensure that the proposed hybrid framework is fault-tolerant. Furthermore, the proposed CR-BM-based hybrid framework has been evaluated for its performance by using various performance metrics. In the comparative analysis, it is observed that the proposed hybrid framework outperforms the existing genetic algorithm-based framework.


2019 ◽  
Vol 9 (2) ◽  
pp. 43-59 ◽  
Author(s):  
Kaium Hossain ◽  
Mizanur Rahman ◽  
Shanto Roy

This article presents a detailed survey on different data compression and storage optimization techniques in the cloud, their implications, and discussion over future directions. The development of the smart city or smart home systems lies in the development of the Internet of Things (IoT). With the increasing number of IoT devices, the tremendous volume of data is being generated every single day. Therefore, it is necessary to optimize the system's performance by managing, compressing and mining IoT data for smart decision support systems. In this article, the authors surveyed recent approaches with up-to-date outcomes and findings related to the management, mining, compression, and optimization of IoT data. The authors then discuss the scopes and limitations of present works and finally, this article presents the future perspectives of IoT data management on basis of cloud, fog, and mobile edge computing.


Author(s):  
Bhanu Chander

The Internet of Things (IoT) pictures an entire connected world, where things or devices are proficient to exchange a few measured data words and interrelate with additional things. This turns for a feasible digital demonstration of the existent world. Nonetheless, nearly all IoT things are simple to mistreat or compromise. Moreover, IoT devices are restricted in computation, power, and storage, so they are more vulnerable to bugs and attacks than endpoint devices like smartphones, tablets, and computers. Blockchain has remarkable interest from academics and industry because of its salient features including reduced dependencies on third parties, cryptographic security, immutability, decentralized nature, distributed nature, and anonymity. In the current scenario, blockchain with its features provides an anonymous framework for IoT. This chapter produces comprehensive knowledge of IoTs, Blockchain knowledge, security issues, Blockchain integration with IoT (BIoT), consensus, mining, message validation mechanisms, challenges, a solution, and future directions.


Cryptography ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 16 ◽  
Author(s):  
Ibou Sene ◽  
Abdoul Aziz Ciss ◽  
Oumar Niang

The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography. Many schemes have been designed so far but none of them simultaneously takes into account these aspects. In this paper, we propose an efficient attribute-based credential scheme for IoT devices. We use elliptic curve cryptography without pairing, blind signing, and zero-knowledge proof. Our scheme supports block signing, selective disclosure, and randomization. It provides data minimization and transaction unlinkability. Our construction is efficient since smaller key size can be used, and computing time can be reduced. As a result, it is a suitable solution for IoT devices characterized by three major constraints, namely low-energy power, small storage capacity, and low computing power.


Author(s):  
Muhammad Saad ◽  
Tariq Rahim Soomro

Internet has become a vital part of our lives. The number of Internet connected devices are increasing every day and approximate there will be 34 billion IoT devices by 2020. It is observed that security is very weak in these devices and can be easily compromised by hackers as some manufactures failed to implement basic security. Current devices use standards that are easy to implement and works for most forms of communications and storage. There is no such standard solution that will work on every device within the Internet of Things, because of the varied constraints between different devices; resulting in classifications within the Internet of Things. This study addresses security challenges in the Internet of Things (IoT); first will discuss the IoT evolution, architecture and its applications in industries. Further, classify and examine privacy threats, including survey, and pointing out the challenges that need to be overcome to ensure that the Internet of Things becomes a reality.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2674 ◽  
Author(s):  
Mike Yuliana ◽  
Wirawan ◽  
Suwadi

One solution to ensure secrecy in the Internet of Things (IoT) is cryptography. However, classical cryptographic systems require high computational complexity that is not appropriate for IoT devices with restricted computing resources, energy, and memory. Physical layer security that utilizes channel characteristics is an often used solution because it is simpler and more efficient than classical cryptographic systems. In this paper, we propose a signal strength exchange (SSE) system as an efficient key generation system and a synchronized quantization (SQ) method as a part of the SSE system that synchronizes data blocks in the quantization phase. The SQ method eliminates the signal pre-processing phase by performing a multi-bit conversion directly from the channel characteristics of the measurement results. Synchronization is carried out between the two authorized nodes to ensure sameness of the produced keys so it can eliminate the error-correcting phase. The test results at the IoT devices equipped with IEEE 802.11 radio show that SSE system is more efficient in terms of computing time and communication overhead than existing systems.


Sensors ◽  
2021 ◽  
Vol 21 (13) ◽  
pp. 4388
Author(s):  
Carlos Gonzalez-Amarillo ◽  
Cristian Cardenas-Garcia  ◽  
Miguel Mendoza-Moreno  ◽  
Gustavo Ramirez-Gonzalez ◽  
Juan Carlos Corrales

Sensor devices that act in the IoT architecture perception layer are characterized by low data processing and storage capacity. These reduced capabilities make the system ubiquitous and lightweight, but considerably reduce its security. The IoT-based Food Traceability Systems (FTS), aimed at ensuring food safety and quality, serve as a motivating scenario for BIoTS development and deployment; therefore, security challenges and gaps related with data integrity are analyzed from this perspective. This paper proposes the BIoTS hardware design that contains some modules built-in VHDL (SHA-256, PoW, and SD-Memory) and other peripheral electronic devices to provide capabilities to the perception layer by implementing the blockchain architecture’s security requirements in an IoT device. The proposed hardware is implemented on FPGA Altera DE0-Nano. BIoTS can participate as a miner in the blockchain network through Smart Contracts and solve security issues related to data integrity and data traceability in an Blockchain-IoT system. Blockchain algorithms implemented in IoT hardware opens a path to IoT devices’ security and ensures participation in data validation inside a food certification process.


Sign in / Sign up

Export Citation Format

Share Document