scholarly journals Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms

Symmetry ◽  
2018 ◽  
Vol 10 (12) ◽  
pp. 669 ◽  
Author(s):  
Daniel Díaz López ◽  
María Blanco Uribe ◽  
Claudia Santiago Cely ◽  
Daniel Tarquino Murgueitio ◽  
Edwin Garcia Garcia ◽  
...  

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.

Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


2020 ◽  
Author(s):  
Tanweer Alam ◽  
Mohamed Benaida

Building the innovative blockchain-based architecture across the Internet of Things (IoT) platform for the education system could be an enticing mechanism to boost communication efficiency within the 5 G network. Wireless networking would have been the main research area allowing people to communicate without using the wires. It was established at the start of the Internet by retrieving the web pages to connect from one computer to another computer Moreover, high-speed, intelligent, powerful networks with numerous contemporary technologies, such as low power consumption, and so on, appear to be available in today's world to connect among each other. The extension of fog features on physical things under IoT is allowed in this situation. One of the complex tasks throughout the area of mobile communications would be to design a new virtualization framework based on blockchain across the Internet of Things architecture. The goal of this research is to connect a new study for an educational system that contains Blockchain to the internet of things or keeping things cryptographically secure on the internet. This research combines with its improved blockchain and IoT to create an efficient interaction system between students, teachers, employers, developers, facilitators and accreditors on the Internet. This specified framework is detailed research's great estimation.


2017 ◽  
Author(s):  
Paul Fremantle ◽  
Philip Scott

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the middleware framework. The paper is composed of three main sections. Firstly, we propose a matrix of security and privacy threats for IoT. This matrix is used as the basis of a widespread literature review aimed at identifying requirements on IoT platforms and middleware. Secondly, we present a structured literature review of the available middleware and how security is handled in these middleware approaches. We utilise the requirements from the first phase to evaluate. Finally, we draw a set of conclusions and identify further work in this area.


Author(s):  
Elodie Attié ◽  
Lars Meyer-Waarden

The internet of things, or the IoT, is progressively and surely invading environments, and is consequently creating new kinds of consumer needs and behaviors. More and more companies are getting involved in this growing field, showing the importance for them to understand this technology market. This chapter aims at studying the acceptance process of the IoT. More specifically, the main factors that influence consumer decisions to accept and use the IoT and smart objects have been tested, such as the ethical, wellbeing, social, and utility values. The importance of each benefit is demonstrated, according to specific targets and to examples of applications. A system of values that represents the promises of the IoT and the central needs of users is also described. Besides, a typology of users should help companies creating or refining targeting strategies and should guide consumers into their acceptance process. Finally, further research directions are discussed.


2021 ◽  
Vol 17 (1) ◽  
pp. 85-105
Author(s):  
Hany Abdelghaffar ◽  
Mohamed Abousteit

To deliver more value to customers, companies are striving to offer more digital services, and the internet of things (IOT) is the main enabler to maximize such value. However, one of the major challenges companies are facing is digital service integration with other providers, where IoT platform is playing important role to achieve such integration opening door for interoperability within actors in the IoT ecosystem. There have been a little research addressing IoT platforms interoperability from business value perspective, considering technical and non-technical factors as selection criteria to adopt such platforms. This paper uses a case study as a method. To validate the suggested interoperability criteria, interviews were conducted for IoT platform providers and two things providers. It was observed that considering technical factors alone when selecting IoT platform make companies oversee the value technology add to their business as IoT platform is not only about technology but also about business model in which this platform will be operating and the company position and role in IoT ecosystem. The paper contributes by providing criteria to achieve interoperability for IoT platform from both technical and business aspects.


Author(s):  
Laura Belli ◽  
Simone Cirani ◽  
Luca Davoli ◽  
Gianluigi Ferrari ◽  
Lorenzo Melegari ◽  
...  

The Internet of Things (IoT) will consist of billions (50 billions by 2020) of interconnected heterogeneous devices denoted as “Smart Objects:” tiny, constrained devices which are going to be pervasively deployed in several contexts. To meet low-latency requirements, IoT applications must rely on specific architectures designed to handle the gigantic stream of data coming from Smart Objects. This paper propose a novel Cloud architecture for Big Stream applications that can efficiently handle data coming from Smart Objects through a Graph-based processing platform and deliver processed data to consumer applications with low latency. The authors reverse the traditional “Big Data” paradigm, where real-time constraints are not considered, and introduce the new “Big Stream” paradigm, which better fits IoT scenarios. The paper provides a performance evaluation of a practical open-source implementation of the proposed architecture. Other practical aspects, such as security considerations, and possible business oriented exploitation plans are presented.


2019 ◽  
Vol 6 (1) ◽  
pp. 15-30 ◽  
Author(s):  
Yasmine Labiod ◽  
Abdelaziz Amara Korba ◽  
Nacira Ghoualmi-Zine

In the recent years, the Internet of Things (IoT) has been widely deployed in different daily life aspects such as home automation, electronic health, the electric grid, etc. Nevertheless, the IoT paradigm raises major security and privacy issues. To secure the IoT devices, many research works have been conducted to counter those issues and discover a better way to remove those risks, or at least reduce their effects on the user's privacy and security requirements. This article mainly focuses on a critical review of the recent authentication techniques for IoT devices. First, this research presents a taxonomy of the current cryptography-based authentication schemes for IoT. In addition, this is followed by a discussion of the limitations, advantages, objectives, and attacks supported of current cryptography-based authentication schemes. Finally, the authors make in-depth study on the most relevant authentication schemes for IoT in the context of users, devices, and architecture that are needed to secure IoT environments and that are needed for improving IoT security and items to be addressed in the future.


Sign in / Sign up

Export Citation Format

Share Document