Secure Edge Services for Future Smart Environments

Total Page:16

File Type:pdf, Size:1020Kb

Secure Edge Services for Future Smart Environments C773etukansi.fm Page 1 Monday, November 9, 2020 3:34 PM C 773 OULU 2020 C 773 UNIVERSITY OF OULU P.O. Box 8000 FI-90014 UNIVERSITY OF OULU FINLAND ACTA UNIVERSITATISUNIVERSITATIS OULUENSISOULUENSIS ACTA UNIVERSITATIS OULUENSIS ACTAACTA TECHNICATECHNICACC Tanesh Kumar Tan esh Kuma r University Lecturer Tuomo Glumoff SECURE EDGE SERVICES University Lecturer Santeri Palviainen FOR FUTURE SMART Postdoctoral researcher Jani Peräntie ENVIRONMENTS University Lecturer Anne Tuomisto University Lecturer Veli-Matti Ulvinen Planning Director Pertti Tikkanen Professor Jari Juga University Lecturer Anu Soikkeli University Lecturer Santeri Palviainen UNIVERSITY OF OULU GRADUATE SCHOOL; UNIVERSITY OF OULU, FACULTY OF INFORMATION TECHNOLOGY AND ELECTRICAL ENGINEERING; Publications Editor Kirsti Nurkkala CENTRE FOR WIRELESS COMMUNICATIONS ISBN 978-952-62-2797-9 (Paperback) ISBN 978-952-62-2798-6 (PDF) ISSN 0355-3213 (Print) ISSN 1796-2226 (Online) ACTA UNIVERSITATIS OULUENSIS C Technica 773 TANESH KUMAR SECURE EDGE SERVICES FOR FUTURE SMART ENVIRONMENTS Academic dissertation to be presented with the assent of the Doctoral Training Committee of Information Technology and Electrical Engineering of the University of Oulu for public defence in the OP auditorium (L10), Linnanmaa, on 16 December 2020, at 12 noon UNIVERSITY OF OULU, OULU 2020 Copyright © 2020 Acta Univ. Oul. C 773, 2020 Supervised by Associate Professor Mika Ylianttila Assistant Professor Erkki Harjula Reviewed by Professor Timo T. Hämäläinen Associate Professor Karl Anderson Opponent Professor Pekka Toivanen ISBN 978-952-62-2797-9 (Paperback) ISBN 978-952-62-2798-6 (PDF) ISSN 0355-3213 (Printed) ISSN 1796-2226 (Online) Cover Design Raimo Ahonen PUNAMUSTA TAMPERE 2020 Kumar, Tanesh, Secure edge services for future smart environments. University of Oulu Graduate School; University of Oulu, Faculty of Information Technology and Electrical Engineering; Centre for Wireless Communications Acta Univ. Oul. C 773, 2020 University of Oulu, P.O. Box 8000, FI-90014 University of Oulu, Finland Abstract The recent developments in communications technologies, such as Internet of Things (IoT) and 5G together with various enabling technologies, will lead us to the next major transition in terms of accessing digital services. For example, one of such transition is the availability of gadget-free services for the users from nearby smart environment and can be termed as ‘gadget-free hyperconnected world’. Similarly, Industry 4.0 is another major digital transformation that ensures the intelligence, digitization and automation in the various industrial applications. Such smart environment applications set strict requirements in terms of low-latency along with scalability, security and privacy. The edge computing is required if low-latency requirements exist, in order to avoid latency overhead from routing to a centralized (cloud) server. For the success of this vision, it is highly important to place suitable and strong security solutions in the edge-based smart environment to ensure the overall security. This thesis contributes to two different use cases from the context of smart environment, i) smart healthcare environment, ii) smart home construction and proposes novel contributions to improvement of security for edge based smart IoT applications. Firstly, biometrics-based anonymous and lightweight authentication schemes were developed for the single and multiple gadget-free users in smart IoT healthcare environment. The compliance of the security schemes is proven through performance evaluations and by analysing the security properties. Second, a conceptual security mechanism was formulated for three-tier IoT edge architectures to ensure secure smart node bootstrapping and user’s service accessibility mechanisms. The performance evaluation of the proposed IoT edge architecture is evaluated to assess the feasibility of the system. Finally, edge computing and blockchain integrated IIoT framework ‘BlockEdge’ is proposed for the smart home construction use case. The feasibility of the approach is verified by evaluating the performance and resource-efficiency of BlockEdge in terms of latency, power consumption and network load. Furthermore, this thesis also investigates the potential security requirements, challenges and their solutions for the BlockEdge based IIoT framework. Keywords: authentication, biometrics, Blockchain, Edge Computing, Industrial IoT, security, smart environments Kumar, Tanesh, Tulevaisuuden älykkäiden ympäristöjen turvalliset reunapalvelut. Oulun yliopiston tutkijakoulu; Oulun yliopisto, Tieto- ja sähkötekniikan tiedekunta; Centre for Wireless Communications Acta Univ. Oul. C 773, 2020 Oulun yliopisto, PL 8000, 90014 Oulun yliopisto Tiivistelmä Viestintäteknologian viimeaikainen kehitys mm. esineiden internetin (IoT, Internet of Things) ja 5G teknologioiden alueella on johtamassa seuraavaan keskeiseen siirtymävaiheeseen digitaalis- ten palvelujen käytön kannalta. Esimerkkinä tästä on päätelaitteettomien (gadget free) palvelujen saatavuus älykkäissä ympäristöissä, jota voidaan myös kutsua päätelaitevapaaksi verkostoitu- neeksi ympäristöksi. Industry 4.0 on puolestaan toinen merkittävä muutosprosessi, jota toteute- taan lisätyn älykkyyden, digitalisoinnin ja automaation erilaisten teollisten sovellusten edesaut- tamana. Tällaiset älykkäiden ympäristöjen sovellukset edellyttävät matalaa viivettä, suurta skaa- lautuvuutta, tietoturvaa ja yksityisyydensuojaa. Reunalaskentaa tarvitaan mm. matalan viiveen vaatimusten täyttämiseen, mm. välttämällä tarpeetonta reititystä keskitettyihin (pilvi)palveli- miin. Tämän vision onnistumisen kannalta on erittäin tärkeää sijoittaa sopivia ja vahvoja tieto- turvaratkaisuja reunalaskentapohjaiseen älykkääseen ympäristöön kokonaisturvallisuuden var- mistamiseksi. Tässä väitöskirjatyössä on tutkittu kahta erilaista älykkäisiin ympäristöihin sijoittuvaa käyttö- tapausta i) älykästä terveydenhuoltoympäristöä ja ii) älykästä rakentamista, ja ehdotetaan miten reunapohjaisten älykkäiden IoT-sovellusten tietoturvaa voidaan parantaa tällaisissa ympäristöis- sä. Ensiksi työssä kehitettiin biometriikkaan perustuvat anonyymit ja kevyet todennusjärjestel- mät yhden ja usean päätelaitevapaan käyttäjän tarpeisiin älykkäiden IoT terveydenhuoltopalve- lujen mahdollistamiseksi. Tietoturvaratkaisujen soveltuvuus on todennettu arvioimalla turvalli- suusominaisuuksia ja järjestelmän suorituskykyä. Toiseksi, työssä on kehitetty tietoturvameka- nismi kolmitasoineen IoT reunalaskenta-arkkitehtuuriin, jolla voidaan mahdollistaa käyttäjän turvallinen liittyminen palveluihin. Ehdotetun IoT reunalaskenta-arkkitehtuurin suorituskykyä mitattiin järjestelmän käyttökelpoisuuden arvioimiseksi. Lopuksi reunalaskenta ja lohkoketjut on integroitu työssä esitettyyn "BlockEdge"-konseptiin teollisen internetin (IIoT) viitekehyksessä, jota voidaan hyödyntää mm. älykkään rakentamisen palvelujen rakentamisessa. Työssä arvioidaan ratkaisun käyttökelpoisuutta suorituskyvyn ja resurssitehokkuuden, viiveiden, energiakulutuksen sekä verkkoliikenteen suhteen. Lisäksi työs- sä arvioidaan kyseisten ratkaisujen tietoturvavaatimuksia, haasteita ja niiden ratkaisuja. Asiasanat: biometriikka, lohkoketjut, reunalaskenta, teollinen laitteiden Internet, tietoturva, tunnistautuminen, älykkäät ympäristöt Dedicated to my parents 8 Acknowledgements The research work presented in this doctoral thesis has been carried out in the Networks and Systems Unit at the Centre for Wireless Communications (CWC-NS), University of Oulu, Finland. This thesis has been financially supported by Academy of Finland 6Genesis Flagship (grant 318927). The work was conducted as part of The Naked Approach, Towards Digital Paradise and Industrial Edge research projects. In addition, the thesis is also funded by the Finnish Funding Agency for Innovation (TEKES), Nokia Foundation, Riita and Jorma J. Takanen, HPY Foundation, KAUTE Foundation, and University of Oulu Graduate School (UniOGS). First of all, I would like to express my deepest gratitude to my primary supervisor, Associate Prof. Mika Ylianttila, for his kind guidance, support, continuous confidence and encouragement throughout my doctoral journey. My co-supervisor, Assistant Prof. Erkki Harjula also deserves my great appreciation for his continual support, fruitful discussions, and insightful guidance over the years. As a project manager, he always provided friendly and flexible research environment. I am deeply grateful to the Dr. Ijaz Ahmad for his invaluable suggestions and motivations during my doctoral studies. My special thanks to Tenager and Parisa for the great office days and memories. Many thanks to Prof. An Braeken for hosting my research visit and having great collaboration. I am very thankful to my present and past colleagues, Dr. Timo Koskela, Assistant Prof. Madhusanka Liyanage, Dr. Pawani Porambage, Ahsan, Jude, Vidhya, Johirul and Muneeb for the cheerful time and interesting discussions. I am grateful to the official reviewers, Prof. Timo T. Hämäläinen and Associate Prof. Karl Anderson for their valuable comments and to Prof. Pekka Toivanen for serving as the opponent in the doctoral defence. I am fortunate to have friends like Sagar, Attith and Rajinder in Oulu for always being around in good and tough times. My sister Nisha and Dileep Kumar brought back the nice family-like feeling in the Oulu. My brother Dr. Teerath also deserves my thanks for his support since the childhood. I am deeply grateful to my siblings, my parents and in-laws, all of whom provided
Recommended publications
  • Smart Market-Makers for the “Internet of Things”
    35 Wanted: Smart market-makers for the “Internet of Things” Ansgar Schlautmann, Didier Levy, Stuart Keeping and Gregory Pankert The “Internet of Things” is The “Internet of Things” is one of the hottest topics be- among the hottest topics ing debated today across industries worldwide. The most currently being debated, diverse products – home appliances, medical equipment, with the projected poten- cars and power meters, to name but a few – are getting tial in turnover whetting connected to the Internet. When products can thus com- the appetite of industry municate with the outside world, they are said to become experts around the globe. connected devices and smart objects: one can interact However, solution pro- with them remotely, query how they are doing and change viders are still searching their state as required. For example, a smart vital sign- for sustainable business monitoring device can connect a person who has a chronic models for this new field illness to a physician’s office, enabling telemedicine. The and offering their solu- combination of a smart object and the service exploiting its tions in a trial-and-error capabilities is called a smart solution. mode. In this article the authors explore alterna- Industry experts are outbidding each other when estimat- tive ways in which vari- ing the number of smart objects in homes, offices, facto- ous types of players can ries, vehicles and elsewhere. The estimates range from create value in this bud- 22 billion (IMS) to 50 billion (Cisco and Ericsson) by 2020, ding market. up from six billion today. Beecham Research predicts that global revenue from these objects will grow from $15 bil- lion in 2011 to more than $30 billion in 2014.
    [Show full text]
  • Intelligent Traffic Information System Based on Integration of Internet Of
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 2, 2015 Intelligent Traffic Information System Based on Integration of Internet of Things and Agent Technology Hasan Omar Al-Sakran Management Information Systems Department King Saud University Riyadh, Saudi Arabia Abstract—In recent years popularity of private cars is getting users. Through collected real-time traffic data, the system can urban traffic more and more crowded. As result traffic is recognize current traffic operation, traffic flow conditions and becoming one of important problems in big cities in all over the can predict the future traffic flow. The system may issue some world. Some of the traffic concerns are congestions and accidents latest real-time traffic information that helps drivers choosing which have caused a huge waste of time, property damage and optimal routes. Therefore, the system can precisely environmental pollution. This research paper presents a novel administrate, monitor and control moving vehicles. intelligent traffic administration system, based on Internet of Constructing an intelligent traffic system based on IoT has a Things, which is featured by low cost, high scalability, high number of benefits such improvement of traffic conditions, compatibility, easy to upgrade, to replace traditional traffic reduction the traffic jam and management costs, high management system and the proposed system can improve road reliability, traffic safety and independence of weather traffic tremendously. The Internet of Things is based on the conditions [1, 2]. Internet, network wireless sensing and detection technologies to realize the intelligent recognition on the tagged traffic object, Such traffic IoT must include every element of traffic such tracking, monitoring, managing and processed automatically.
    [Show full text]
  • Iot: the Age of Machine
    International Journal of Engineering Research and General Science Volume 3, Issue 6, November-December, 2015 ISSN 2091-2730 IoT: The Age of Machine Dharam J. Gami Atmiya Institute of Technology and Science, Gujarat Technological University, Gujarat Email: [email protected] Abstract— IoT is not just a technology but it is an ideology or a concept which leads to a new age that is age of machine. IoT is the key to fully digitalize the world. Move towards IoT will revolutionise human life where machine-to-machine communication is emphasized and human interaction is minimized. IoT demands everything on internet and be controlled and managed by machine itself. The goal of this paper is to give an imagination and a Skelton of IoT. This paper also highlights the challenges in IoT implementation and other critical issues. Keywords— IoT, age of machine, smart objects, IoT challenges, automation, architecture, open loop, RFID. INTRODUCTION The term IoT was first coined by Kevin Ashton in 1992 [7]. IoT don’t have any exact or wildly accepted definition. We can explain IoT by saying that ―IoT is a network of things, where thing refers to a smart object. Objects are embedded with electronics, software, sensors, and network connectivity, which enable these objects to collect and exchange data [7]. The idea is to connect every object via Internet and make them communicate. IoT is expected to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine communications (M2M) and covers a variety of protocols, domains, and applications [12]. To do so, creating a new framework, infrastructure or technology is not feasible.
    [Show full text]
  • Ambient Intelligence: Second European Symposium, EUSAI 2004
    Lecture Notes in Computer Science 3295 Commenced Publication in 1973 Founding and Former Series Editors: Gerhard Goos, Juris Hartmanis, and Jan van Leeuwen Editorial Board David Hutchison Lancaster University, UK Takeo Kanade Carnegie Mellon University, Pittsburgh, PA, USA Josef Kittler University of Surrey, Guildford, UK Jon M. Kleinberg Cornell University, Ithaca, NY, USA Friedemann Mattern ETH Zurich, Switzerland John C. Mitchell Stanford University, CA, USA Moni Naor Weizmann Institute of Science, Rehovot, Israel Oscar Nierstrasz University of Bern, Switzerland C. Pandu Rangan Indian Institute of Technology, Madras, India Bernhard Steffen University of Dortmund, Germany Madhu Sudan Massachusetts Institute of Technology, MA, USA Demetri Terzopoulos New York University, NY, USA Doug Tygar University of California, Berkeley, CA, USA Moshe Y. Vardi Rice University, Houston, TX, USA Gerhard Weikum Max-Planck Institute of Computer Science, Saarbruecken, Germany This page intentionally left blank Panos Markopoulos Berry Eggen Emile Aarts James L. Crowley (Eds.) Ambient Intelligence Second European Symposium, EUSAI 2004 Eindhoven, The Netherlands, November 8-11, 2004 Proceedings Springer eBook ISBN: 3-540-30473-8 Print ISBN: 3-540-23721-6 ©2005 Springer Science + Business Media, Inc. Print ©2004 Springer-Verlag Berlin Heidelberg All rights reserved No part of this eBook may be reproduced or transmitted in any form or by any means, electronic, mechanical, recording, or otherwise, without written consent from the Publisher Created in the United States of America Visit Springer's eBookstore at: http://ebooks.springerlink.com and the Springer Global Website Online at: http://www.springeronline.com Preface This volume of the LNCS is the formal proceedings of the 2nd European Symposium on Ambient Intelligence, EUSAI 2004.
    [Show full text]
  • Service Composition for IP Smart Object Using Realtime Web Protocols: Concept and Research Challenges
    Service Composition for IP Smart Object using Realtime Web Protocols: Concept and Research Challenges Son N. Hana,∗, Imran Khana,c, Gyu Myoung Leeb, Noel Crespia, Roch H. Glithoc aTelecom SudParis, 9 Charles Fourier, 91011 Evry, France bLiverpool John Moores University, Byrom Street, Liverpool, L3 3AF, UK cConcordia University, 1515 St Catherine Street West, Montreal, Quebec Canada H3G 2W1 Abstract The Internet of Things (IoT) refers to a world-wide network of interconnected physical things using standardized communication protocols. Recent develop- ment of Internet Protocol (IP) stacks for resource-constrained devices unveils a possibility for the future IoT based on the stable and scalable IP technol- ogy much like today's Internet of computers. One important question remains: how can data and events (denoted as services) introduced by a variety of IP networked things be exchanged and aggregated efficiently in various application domains. Because the true value of IoT lies in the interaction of several services from physical things, answers to this question are essential to support a rapid creation of new IoT smart and ubiquitous applications. The problem is known as service composition. This article explains the practicability of the future full-IP IoT with realtime Web protocols to formally state the problem of service composition for IP smart objects, provides literature review, and discusses its research challenges. Keywords: Internet of Things, Smart Object, Service Composition ∗Corresponding author Email address: [email protected] (Son N. Han) Preprint submitted to Journal of Computer Standards & Interfaces August 19, 2015 1. Introduction The Internet of Things (IoT) is the next major evolution of the Internet where heterogeneous devices and machines are being connected to the Internet, to each other, and to people.
    [Show full text]
  • Indoor Air Quality Monitoring Systems for Enhanced Living Environments: a Review Toward Sustainable Smart Cities
    sustainability Review Indoor Air Quality Monitoring Systems for Enhanced Living Environments: A Review toward Sustainable Smart Cities Gonçalo Marques 1 , Jagriti Saini 2 , Maitreyee Dutta 2 , Pradeep Kumar Singh 3,* and Wei-Chiang Hong 4,* 1 Instituto de Telecomunicações, Universidade da Beira Interior, 6201-001 Covilhã, Portugal; [email protected] or [email protected] 2 National Institute of Technical Teachers Training & Research, Chandigarh 160019, India; [email protected] (J.S.); [email protected] (M.D.) 3 Department of Computer Science and Engineering, Jaypee University of Information Technology, Solan 173234, India 4 Department of Information Management, Oriental Institute of Technology, New Taipei 224, Taiwan * Correspondence: [email protected] or [email protected] (P.K.S.); fi[email protected] (W.-C.H.) Received: 30 March 2020; Accepted: 13 May 2020; Published: 14 May 2020 Abstract: Smart cities follow different strategies to face public health challenges associated with socio-economic objectives. Buildings play a crucial role in smart cities and are closely related to people’s health. Moreover, they are equally essential to meet sustainable objectives. People spend most of their time indoors. Therefore, indoor air quality has a critical impact on health and well-being. With the increasing population of elders, ambient-assisted living systems are required to promote occupational health and well-being. Furthermore, living environments must incorporate monitoring systems to detect unfavorable indoor quality scenarios in useful time. This paper reviews the current state of the art on indoor air quality monitoring systems based on Internet of Things and wireless sensor networks in the last five years (2014–2019).
    [Show full text]
  • Freedom and Privacy in Ambient Intelligence,’ Ethics and Information Technology 7(3), 157-166
    This is a preprint version of the following article: Brey, P. (2006). ‘Freedom and Privacy in Ambient Intelligence,’ Ethics and Information Technology 7(3), 157-166. Freedom and Privacy in Ambient Intelligence Abstract This paper analyzes ethical aspects of the new paradigm of Ambient Intelligence, which is a combination of Ubiquitous Computing with Intelligent User Interfaces. After an introduction to the approach, two key ethical dimensions will be analyzed: freedom and privacy. It is argued that Ambient Intelligence, though often designed to enhance freedom and control, has the potential to limit freedom and autonomy as well. Ambient Intelligence also harbors great privacy risks, and these are explored as well. Keywords Ambient Intelligence, Ubiquitous Computing, Intelligent User Interfaces, smart objects, invisible computers, freedom, autonomy, privacy THE PROMISE OF AMBIENT INTELLIGENCE Envision the following scenario: A young mother is on her way home, driving together with her 8-month old daughter who is sleeping in her child seat on the passenger side of the car. The infant is protected by an intelligent system called SBE 2 against airbag deployment, which could be fatal in the case of an accident. SBE 2 detects when there is a child seat on the passenger seat instead of a person and automatically disables the airbag (...) Arriving home, a surveillance camera recognizes the young mother, automatically disables the alarm, unlocks the front door as she approaches it and turns on the lights to a level of brightness that the home control system has learned she likes. After dropping off her daughter, the young mother gets ready for grocery shopping.
    [Show full text]
  • PERSEO: a System to Personalize the Environment Response Through Smart Phones and Objects
    5th International Workshop on Smart Environments and Ambient Intelligence 2013, San Diego (22 March 2013) PERSEO: a system to Personalize the Environment Response through Smart phonEs and Objects Luca Bergesio, Íñigo Marquínez, Ana M. Bernardos, Juan A. Besada, José R. Casar Telecommunications School Universidad Politécnica de Madrid Madrid, Spain {luca.bergesio, imarquinez, abernardos, besada, jramon}@grpss.ssr.upm.es AbstractWhen designing services to control the behavior of a describes a mobile-instrumented interaction concept, which smart environment, it is feasible to rely on mobile devices as facilitates the coordination between the mobile devices con- mediators to empower the user and handle his needs and pre- tent and actions, and the smart objects in the environment, ferences. In this direction, this paper describes a concept for facilitating the use of enhanced interfaces to visualize and mobile-object instrumented interaction through a system that manipulate media data, services and applications. enables the orchestration of a set of smart objects with sensing Section II frames the current research in the state-of-the- and/or media capabilities deployed in a room. These objects art of interaction concepts with mobile devices as enablers. are coordinated to respond accordingly to the physical and Section III details our proposal, describing a validation sce- logical state of a mobile device. A specific case of use is de- nario for deployment. Section IV gives details about the me- scribed; it is centered on a 'smart night table' that coordinates dia management infrastructure. Section V defines the archi- the response of the smart environment, populated with inter- faces such as a TV, tablet, sound system and photo frameworK.
    [Show full text]
  • Physiological and Behavior Monitoring Systems for Smart Healthcare Environments: a Review
    sensors Review Physiological and Behavior Monitoring Systems for Smart Healthcare Environments: A Review Mariana Jacob Rodrigues 1,2,* , Octavian Postolache 1,2 and Francisco Cercas 1,2 1 Iscte–Instituto Universitário de Lisboa, Av. das Forças Armadas, 1649-026 Lisboa, Portugal; [email protected] (O.P.); [email protected] (F.C.) 2 Instituto de Telecomunicações, Av. Rovisco Pais, 1, 1049-001 Lisboa, Portugal * Correspondence: [email protected] Received: 14 March 2020; Accepted: 10 April 2020; Published: 12 April 2020 Abstract: Healthcare optimization has become increasingly important in the current era, where numerous challenges are posed by population ageing phenomena and the demand for higher quality of the healthcare services. The implementation of Internet of Things (IoT) in the healthcare ecosystem has been one of the best solutions to address these challenges and therefore to prevent and diagnose possible health impairments in people. The remote monitoring of environmental parameters and how they can cause or mediate any disease, and the monitoring of human daily activities and physiological parameters are among the vast applications of IoT in healthcare, which has brought extensive attention of academia and industry. Assisted and smart tailored environments are possible with the implementation of such technologies that bring personal healthcare to any individual, while living in their preferred environments. In this paper we address several requirements for the development of such environments, namely the deployment of physiological signs monitoring systems, daily activity recognition techniques, as well as indoor air quality monitoring solutions. The machine learning methods that are most used in the literature for activity recognition and body motion analysis are also referred.
    [Show full text]
  • Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things
    Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things Maanak Gupta and Ravi Sandhu Institute for Cyber Security (ICS), Center for Security and Privacy Enhanced Cloud Computing (C-SPECC), Department of Computer Science, University of Texas at San Antonio Email: [email protected], [email protected] ABSTRACT (SACMAT’18). ACM, New York, NY, USA, 12 pages. https://doi:org/10:1145/ Internet of Things has become a predominant phenomenon in ev- 3205977:3205994 ery sphere of smart life. Connected Cars and Vehicular Internet of Things, which involves communication and data exchange between vehicles, traffic infrastructure or other entities are pivotal to realize 1 INTRODUCTION the vision of smart city and intelligent transportation. Vehicular Internet of Things (IoT) is the new era of technology which en- Cloud offers a promising architecture wherein storage and process- visions to make human lives smarter. The concept has attracted ing capabilities of smart objects are utilized to provide on-the-fly wide applications and services in variety of domains including fog platform. Researchers have demonstrated vulnerabilities in this health-care, homes, industry, transportation, power grids etc. The emerging vehicular IoT ecosystem, where data has been stolen from magnitude of this technology is illustrated by the number of de- critical sensors and smart vehicles controlled remotely. Security vices which are estimated to be more than 20 billion by year 2020 and privacy is important in Internet of Vehicles (IoV) where ac- [32]. The prime asset delivered by such massive interconnection cess to electronic control units, applications and data in connected and networking of smart devices is Big Data, which is analyzed to cars should only be authorized to legitimate users, sensors or ve- gather insights and deliver valuable information.
    [Show full text]
  • Security in Smart Object Networks
    Security in Smart Object Networks MOHIT SETHI Degree project in Security and Mobile Computing Second cycle Stockholm, Sweden 2012 Aalto University School of Science Degree Programme of Computer Science and Engineering Mohit Sethi Security in Smart Object Networks Master's Thesis Espoo, June 30, 2012 Supervisors: Professor Tuomas Aura, Aalto University, Finland Professor Markus Hidell, Royal Institute of Technology, Sweden Instructors: Ari Ker¨anen,NomadicLab, Ericsson Research, Finland Jari Arkko, NomadicLab, Ericsson Research, Finland Aalto University School of Science ABSTRACT OF Degree Programme of Computer Science and Engineering MASTER'S THESIS Author: Mohit Sethi Title: Security in Smart Object Networks Date: June 30, 2012 Pages: 73 Professorship: Computer Science Code: T-110 Supervisors: Professor Tuomas Aura Professor Markus Hidell Instructors: Ari Ker¨anen,M.Sc. (Tech.) Jari Arkko, Licentiate (Tech.) Internet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes. This involves the inter-connection of a large number of heterogeneous networked entities and networks. Emergence of technologies such as Zigbee, Bluetooth low energy and embedded sensors has transformed simple physical devices into smart objects that can understand and react to their environment. Such smart objects form the building blocks for the Internet of Things. The communication infrastructure for these objects is based on an extension of the Internet protocol stack. Although the need for security is widely accepted, there is no clear consensus on how IP-based Internet security protocols can be applied to resource-constrained smart object networks. In this thesis, we develop a new secure and energy- efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks.
    [Show full text]
  • Using Images to Extend Smart Object Discovery in an Internet of Things Scenario
    Using images to extend smart object discovery in an Internet of Things scenario Romulo Silva Windson Viana Paulo Filipe Dantas Virtual University Institute Group of Computer Networks, Group of Computer Networks, Federal University of Ceara Software Engineering and Systems Software Engineering and Systems 60451-970, Fortaleza, Ceará, Brazil Federal University of Ceara Federal University of Ceara [email protected] 60451-970, Fortaleza, Ceará, Brazil 60451-970, Fortaleza, Ceará, Brazil [email protected] [email protected] ABSTRACT The most common smart object discovery approaches aim to The Internet of Things (IoT) represents a new paradigm in the In- discover and make all SO’s within a network available to users. ternet history and in the way people interact with everyday objects. However, those approaches can become problematic when there Academics and several industry segments have been working over are several SO’s within reach. The Cisco Internet Business Solutions the past years to make this vision possible. It is estimated that there Group (Cisco IBSG) estimates that there will be 50 billion smart will be dozens or hundreds of devices simultaneously connected objects connected by 2020. The number of objects connected to the to the user’s network (e.g., in their home) in the next years, which network can reach a mark of 6.58 per person. [3]. can make the discovery and interaction with smart object more Under those circumstances, a more selective and appropriate complicated to IoT users increasingly. This work proposes a smart smart object discovery approach is necessary to reduce the interest objects discovery approach using image recognition, which aims to options of SO’s in a network.
    [Show full text]