Advertisement

Dynamic Interface and Access Model by Dead Token for IoT Systems

  • Jorge Hernandez
  • Karen Daza
  • Hector FlorezEmail author
  • Sanjay Misra
Conference paper
  • 325 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 1051)

Abstract

Communication between users and intelligent devices is normally done through a graphical user interface. In addition, devices that communicate using Bluetooth are also implementing a control interface. Thus, most of the devices in an enclosure such as home or work can be remotely controlled. This implies that each device can have an interface and an IP assignment for its own control. In this way, users must learn and manage several communication interfaces. In this paper, we present a model of a general graphical user interface to control different smart devices that can consume HTTP requests or that are controlled by Bluetooth. In addition, we present an authentication approach for the Internet of Things that uses the proposed model.

Keywords

Internet of Things Dynamic Graphical User Interface HTTP Security Model 

References

  1. 1.
    Arévalo-Gómez, M.Á., Carrillo-Zambrano, E., Herrera-Quintero, L.F., Chavarriaga, J.: Water wells monitoring solution in rural zones using IoT approaches and cloud-based real-time databases. In: Proceedings of the Euro American Conference on Telematics and Information Systems, p. 39. ACM (2018)Google Scholar
  2. 2.
    Bandyopadhyay, D., Sen, J.: Internet of things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)CrossRefGoogle Scholar
  3. 3.
    Bello, O., Zeadally, S.: Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 10(3), 1172–1182 (2016)CrossRefGoogle Scholar
  4. 4.
    Castillejo, P., Martínez, J.F., López, L., Rubio, G.: An internet of things approach for managing smart services provided by wearable devices. Int. J. Distrib. Sens. Netw. 9(2), 190813 (2013)CrossRefGoogle Scholar
  5. 5.
    Florez, H., Sánchez, M., Villalobos, J.: A catalog of automated analysis methods for enterprise models. SpringerPlus 5(1), 406 (2016)CrossRefGoogle Scholar
  6. 6.
    Gan, G., Lu, Z., Jiang, J.: Internet of things security analysis. In: 2011 International Conference on Internet Technology and Applications, pp. 1–4. IEEE (2011)Google Scholar
  7. 7.
    Hamidi, H.: An approach to develop the smart health using internet of things and authentication based on biometric technology. Future Gener. Comput. Syst. 91, 434–449 (2019)CrossRefGoogle Scholar
  8. 8.
    Holder, O., Ben-Shaul, I., Gazit, H.: System support for dynamic layout of distributed applications. In: icdcs, pp. 403–411 (1999)Google Scholar
  9. 9.
    Kang, D.H., et al.: Room temperature control and fire alarm/suppression IoT service using MQTT on AWS. In: 2017 International Conference on Platform Technology and Service (PlatCon), pp. 1–5. IEEE (2017)Google Scholar
  10. 10.
    Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)Google Scholar
  11. 11.
    Karmakar, G., Roy, S., Chattopadhyay, G., Xiao, Z.: Dynamically controlling exterior and interior window coverings through IoT for environmental friendly smart homes. In: 2017 IEEE International Conference on Mechatronics (ICM), pp. 487–491. IEEE (2017)Google Scholar
  12. 12.
    Kollar, L.: GUIML, creating dynamic GUI objects using XML. Math. Comput. Model. 38(7–9), 893–901 (2003)CrossRefGoogle Scholar
  13. 13.
    Kortuem, G., Kawsar, F., Sundramoorthy, V., Fitton, D., et al.: Smart objects as building blocks for the internet of things. IEEE Internet Comput. 14(1), 44–51 (2009)CrossRefGoogle Scholar
  14. 14.
    Mattern, F., Floerkemeier, C.: From the internet of computers to the internet of things. In: Sachs, K., Petrov, I., Guerrero, P. (eds.) From Active Data Management to Event-Based Systems and More. LNCS, vol. 6462, pp. 242–259. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-17226-7_15CrossRefGoogle Scholar
  15. 15.
    Odusami, M., Abayomi-Alli, O., Misra, S., Shobayo, O., Damasevicius, R., Maskeliunas, R.: Android malware detection: a survey. In: Florez, H., Diaz, C., Chavarriaga, J. (eds.) ICAI 2018. CCIS, vol. 942, pp. 255–266. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-01535-0_19CrossRefGoogle Scholar
  16. 16.
    Prehofer, C.: Models at rest or modelling restful interfaces for the internet of things. In: 2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), pp. 251–255. IEEE (2015)Google Scholar
  17. 17.
    Rahman, R.A., Shah, B.: Security analysis of IoT protocols: a focus in COAP. In: 2016 3rd MEC International Conference on Big Data and Smart City (ICBDSC), pp. 1–7. IEEE (2016)Google Scholar
  18. 18.
    ur Rehman, S., Iannella, A., Gruhn, V.: A security based reference architecture for cyber-physical systems. In: Florez, H., Diaz, C., Chavarriaga, J. (eds.) ICAI 2018. CCIS, vol. 942, pp. 157–169. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-01535-0_12CrossRefGoogle Scholar
  19. 19.
    Sadeghi, A.R., Wachsmann, C., Waidner, M.: Security and privacy challenges in industrial internet of things. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE (2015)Google Scholar
  20. 20.
    Sethi, P., Sarangi, S.R.: Internet of things: architectures, protocols, and applications. J. Electr. Comput. Eng. 2017, 25 pages (2017)CrossRefGoogle Scholar
  21. 21.
    Suo, H., Wan, J., Zou, C., Liu, J.: Security in the Internet of Things: a review. In: 2012 International Conference on Computer Science and Electronics Engineering, vol. 3, pp. 648–651. IEEE (2012)Google Scholar
  22. 22.
    Wanumen, L., Moreno, J., Florez, H.: Mobile based approach for accident reporting. In: Botto-Tobar, M., Pizarro, G., Zúñiga-Prieto, M., D’Armas, M., Zúñiga Sánchez, M. (eds.) CITT 2018. CCIS, vol. 895, pp. 302–311. Springer, Cham (2019).  https://doi.org/10.1007/978-3-030-05532-5_22CrossRefGoogle Scholar
  23. 23.
    Windarto, Y.E., Eridani, D.: Door and light control prototype using Intel Galileo based Internet of Things:(case study: embedded and robotics laboratory, department of computer engineering, Diponegoro University). In: 2017 4th International Conference on Information Technology, Computer, and Electrical Engineering (ICITACEE), pp. 176–180. IEEE (2017)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Universidad Distrital Francisco Jose de CaldasBogotáColombia
  2. 2.Covenant UniversityOtaNigeria

Personalised recommendations