Advertisement

Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring

  • Mimoza Durresi
  • Anisa Subashi
  • Arjan Durresi
  • Leonard Barolli
  • Kazunori Uchida
Original Research
  • 81 Downloads

Abstract

Protecting the environment from many threats has become a priority worldwide. The Internet of Things technologies enables the continuous monitoring of various parameters related to environment statuses, such as air quality and many others. In this paper, we propose a security architecture based on cellular networks and Multiple-access Edge Computing to collect sensors’ information in real time. In the proposed architecture, users will interface the Internet of Things devices using their smartphones. The smartphones can interact with the cellular network and the Internet of Things devices at the same time. This unique ability is leveraged to provide strong authentication and confidentiality in accessing the Internet of Things devices. Also in our architecture, we use gateways, as intermediate nodes that can interact with both the smartphones and the sensor nodes. Therefore, our architecture includes a revocation mechanism for captured gateways. We propose an architecture for the Internet of Things devices along with protocols that can be used to establish security.

Keywords

Security Internet of things Multiple-access edge computing Environment monitoring 

Notes

Acknowledgements

This work is partially supported by National Science Foundation under Grant No. 1547411, and by National Institute of Food and Agriculture (NIFA) USDA AWARD NUMBER: 2017-67003-26057.

References

  1. Agency USEP (2015) The plain english guide to the clean air act. https://www.epa.gov/sites/production/files/2015-08/documents/peg.pdf
  2. Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), Coimbatore, pp 1–8.  https://doi.org/10.1109/ISCO.2016.7727082
  3. Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422CrossRefGoogle Scholar
  4. Akyldiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367.  https://doi.org/10.1016/j.adhoc.2004.04.003 CrossRefGoogle Scholar
  5. Anjum F, Mouchtaris P (2007) Security for wireless Ad Hoc networks. Wiley, New YorkCrossRefGoogle Scholar
  6. Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on iot-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situat Comput 7(2):82–93CrossRefGoogle Scholar
  7. Ballagas R, Rohs M, Sheridan J, Borchers J (2006) The smart phone: a ubiquitous input device. IEEE Perv Comput 5(1):70–77.  https://doi.org/10.1109/MPRV.2006.18
  8. Barolli L, Honma Y, Koyama A, Durresi A, Arai J (2004) A selective border-casting zone routing protocol for ad-hoc networks. In: Proceedings 15th International Workshop on Database and Expert Systems Applications, pp 326–330.  https://doi.org/10.1109/DEXA.2004.1333494
  9. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319.  https://doi.org/10.1007/s00145-004-0314-9 MathSciNetCrossRefzbMATHGoogle Scholar
  10. Brooks TT (2017) Cyber-assurance for the internet of things. Wiley, New YorkGoogle Scholar
  11. Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00–010. http://people.cs.vt.edu/~kafura/cs6204/Readings/SensorNetworks/SensorNetSecurity-NAILabs.pdf
  12. Chan H, Perrig A, Song D (2004) Key distribution techniques for sensor networks, wireless sensor networks. Springer, New York ISBN:1-4020-7883-8Google Scholar
  13. Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213. http://dl.acm.org/citation.cfm?id=829515.830566
  14. Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situat Comput 5(3):141–149CrossRefGoogle Scholar
  15. Chen TM, Venkataramanan V (2005) Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9(6):35–41.  https://doi.org/10.1109/MIC.2005.123 CrossRefGoogle Scholar
  16. Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808CrossRefGoogle Scholar
  17. Cheng L, Niu J, Luo C, Shu L, Kong L, Zhao Z, Gu Y (2018) Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks. Comput Netw 134:66–77.  https://doi.org/10.1016/j.comnet.2018.01.012 CrossRefGoogle Scholar
  18. Chi Q, Yan H, Zhang C, Pang Z, Xu LD (2014) A reconfigurable smart sensor interface for industrial wsn in iot environment. IEEE Trans Ind Inf 10(2):1417–1425.  https://doi.org/10.1109/TII.2014.2306798 CrossRefGoogle Scholar
  19. Corcoran P, Datta SK (2016) Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network. IEEE Consum Electron Mag 5(4):73–74CrossRefGoogle Scholar
  20. Dan L, Xin C, Chongwei H, Liangliang J (2015) Intelligent agriculture greenhouse environment monitoring system based on iot technology. In: 2015 International conference on intelligent transportation, big data and smart city, Halong Bay, pp 487–490.  https://doi.org/10.1109/ICITBS.2015.126
  21. Du W, Deng J, Han YS, Chen S, Varshney PK (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the IEEE INFOCOM’04, pp 586–597.  https://doi.org/10.1109/INFCOM.2004.1354530
  22. Durresi A, Paruchuri V (2005) Geometric broadcast protocol for sensor and actor networks. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 1 (AINA papers), pp 343–348.  https://doi.org/10.1109/AINA.2005.192
  23. Durresi A, Paruchuri V (2009) Secure Communication among Cell Phones and Sensor Networks. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM 2009, Honolulu, pp 1–7Google Scholar
  24. Durresi A, Bulusu V, Durresi M, Paruchuri V, Jain R (2006) Key Distribution for Heterogeneous Mobile Wireless Networks. IEEE GLOBECOM 2006 pp WSN09–4:1–5Google Scholar
  25. Durresi A, Bulusu V, Paruchuri V (2007) Security in Ad hoc networks on cellular phones for emergency situations. Ad Hoc Netw J 5(1):126–133CrossRefGoogle Scholar
  26. Durresi M, Durresi A, Barolli L (2005) Sensor inter-vehicle communication for safer highways. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 2 (AINA papers), pp 599–604.  https://doi.org/10.1109/AINA.2005.308
  27. Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Security protocols. Security Protocols 2002. Lecture notes in computer science, vol 2845. Springer, Berlin, Heidelberg.  https://doi.org/10.1007/978-3-540-39871-4_6
  28. Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Industr Inf 10(2):1596–1605.  https://doi.org/10.1109/TII.2014.2302638 CrossRefGoogle Scholar
  29. Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094.  https://doi.org/10.1016/j.procs.2015.05.122 CrossRefGoogle Scholar
  30. Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. Proc. of Eurocrypt02, LNCS 2332, Springer, New York, pp 466–481Google Scholar
  31. Hu F (2016) Security and privacy in internet of things (IoTs): models, algorithms, and implementations. CRC Press, Boca RatonCrossRefGoogle Scholar
  32. Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing key technology towards 5g. ETSI White Paper 11(11):1–16Google Scholar
  33. Huang Y, Lee W (2003) A cooperative intrusion detection system for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), Fairfax VA, USAGoogle Scholar
  34. Ikeda M, Barolli L, Hiyama M, Yang T, Marco GD, Durresi A (2009) Performance evaluation of a manet tested for different topologies. In: 2009 International conference on network-based information systems, Indianapolis, IN, pp 327–334.  https://doi.org/10.1109/NBiS.2009.32
  35. Jane KH, Kirk M (2006) Environmental Sensor Networks: A revolution in the earth system science? Earth Sci Rev 78:177–191CrossRefGoogle Scholar
  36. Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of iot for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853.  https://doi.org/10.1109/JSEN.2013.2263379 CrossRefGoogle Scholar
  37. Lazarescu MT (2013) Design of a wsn platform for long-term environmental monitoring for iot applications. IEEE J Emerg Sel Topics Circuits Syst 3(1):45–54.  https://doi.org/10.1109/JETCAS.2013.2243032 CrossRefGoogle Scholar
  38. Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: First ACM workshop on security in Ad Hoc and sensor networks, pp 72–82.  https://doi.org/10.1145/986858.986869
  39. Liu D, Ning P, Li R (2003) Establishing pairwise keys in distributed sensor networks. In: 10th ACM conference on computers and communication security (CCS 03), pp 52–61.  https://doi.org/10.1145/948109.948119
  40. Liu Y, Zhou G (2012) Key technologies and applications of internet of things. In: 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pp 197–200.  https://doi.org/10.1109/ICICTA.2012.56
  41. Lo C, Chen Y (1999) Secure communication mechanisms for gsm networks. IEEE Trans Consum Electron 45(4):1074–1080MathSciNetCrossRefGoogle Scholar
  42. Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of things (iot) security: Current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp 336–341.  https://doi.org/10.1109/ICITST.2015.7412116
  43. Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, ACM, New York, NY, USA, WSNA ’02, pp 88–97.  https://doi.org/10.1145/570738.570751
  44. Mao Y, Zhang J, Letaief KB (2016) Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Sel Areas Commun 34(12):3590–3605CrossRefGoogle Scholar
  45. Mehrotra A, Golding L (1998) Mobility and security management in the gsm system and some proposed future improvements. Proc IEEE 86(7):1480–1497CrossRefGoogle Scholar
  46. Mitton N, Chaouchi H, Noel T, Gabillon TWA, Capolsini P (2016) Interoperability, safety and security in IoT. In: Second international conference, InterIoT 2016 and third international conference, SaSeIoT 2016, Paris, France, 26–27 October 2016. Springer International Publishing.  https://doi.org/10.1007/978-3-319-52727-7 (ISBN 978-3-319-52727-7)
  47. Mohammad UM, Kazi MA (2005) A review of micro-nano-scale wireless sensor networks for environmental protection: Prospects and challenges. Sci Technol Adv Mater 6:302–306CrossRefGoogle Scholar
  48. Morreale P, Goncalves A, Silva C (2015) Mobile ad hoc network communication for disaster recovery. Int J Space-Based Situat Comput 5(3):178–186CrossRefGoogle Scholar
  49. Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5g and mobile edge computing. In: 2015 12th international conference on information technology-new generations (ITNG), Las Vegas, NV, pp 601–605.  https://doi.org/10.1109/ITNG.2015.155
  50. Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A et al (2014) Mobile-edge computing—Introductory technical white paper. https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf
  51. Petriu E, Georganas N, Petriu D, Makrakis D, Groza VZ (2000) Sensor based information appliances. IEEE Instrum Meas Mag 3(4):31–35CrossRefGoogle Scholar
  52. Russell B, Van Duren D (2016) Practical internet of things security. Packt Publishing, BirminghamGoogle Scholar
  53. Sandra PS, Sandeep CM, Nair V, Vindhuja MV, Nair SS, Raja MP (2017) Wsn based industrial parameter monitoring using smartwatch. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp 1–6.  https://doi.org/10.1109/ICCPCT.2017.8074279
  54. Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on Advances in cryptology, Springer, New York, pp 47–53Google Scholar
  55. Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81CrossRefGoogle Scholar
  56. Sterne D, Balasubramanyam P, Carman D, Wilson B, Talpade R, Ko C, Balupari R, Tseng C-Y, Bowen T, Levitt K, Rowe J (2005) A general cooperative intrusion detection architecture for MANETs. In: Third IEEE international workshop on information assurance (IWIA’05), pp 57–70.  https://doi.org/10.1109/IWIA.2005.1
  57. Subhadrabandhu D, Sarkar S, Anjum F (2005) Architecture and Algorithms for a Distributed Reputation System. In: Proceedings of the 2005 IFIP Networking Conference, University of Waterloo, Ontario, CanadaGoogle Scholar
  58. Subhadrabandhu D, Sarkar S, Anjum F (2006a) Efficacy of misuse detection in Ad Hoc networks: part I. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:274–290CrossRefGoogle Scholar
  59. Subhadrabandhu D, Sarkar S, Anjum F (2006b) Efficacy of misuse detection in Ad Hoc networks: part II. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:290–305CrossRefGoogle Scholar
  60. Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design, ICCAD ’14, IEEE Press, Piscataway, NJ, USA, pp 417–423. http://dl.acm.org/citation.cfm?id=2691365.2691450
  61. Yang T, Ikeda M, Mino G, Barolli L, Durresi A, Xhafa F (2010) Performance evaluation of wireless sensor networks for mobile sink considering consumed energy metric. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp 245–250.  https://doi.org/10.1109/WAINA.2010.50
  62. Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, pp 37–42Google Scholar
  63. Yuan D, Kanhere SS, Hollick M (2017) Instrumenting wireless sensor networks a survey on the metrics that matter. Perv Mobile Comput 37:45–62.  https://doi.org/10.1016/j.pmcj.2016.10.001 CrossRefGoogle Scholar
  64. Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556.  https://doi.org/10.1023/A:1024600519144 CrossRefGoogle Scholar
  65. Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) Iot security: Ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp 230–234.  https://doi.org/10.1109/SOCA.2014.58
  66. Zhu S, Setia S, Jajodia S (2003) Leap: Efficient security mechanisms for large-scale distributed sensor networks. 10th ACM conference on computers and communication security (CCS 03), pp 62–72.  https://doi.org/10.1145/948109.94812

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Department of IT, Mathematics and StatisticsEuropean University of TiranaTiranaAlbania
  2. 2.Department of Computer and Information ScienceIndiana University Purdue University IndianapolisIndianapolisUSA
  3. 3.Department of Information and Communication EngineeringFukuoka Institute of Technology (FIT)FukuokaJapan

Personalised recommendations