Skip to main content

Securing Connection and Data Transfer Between Devices and IoT Cloud Service

  • Chapter
  • First Online:
Integrating Research and Practice in Software Engineering

Abstract

As cloud services are key component of Internet of Things (IoT) applications which are getting increasingly popular nowadays, it is crucial to provide a way of establishing a secure connection between the cloud server and the connected devices. Secure connection and data transfer may involve using token based authentication, cryptographic protocols and other techniques to prevent many popular attacks. The paper presents the violations that may occur in connection between IoT device and the cloud and possible solutions that can be used to solve the security leaks for such connections.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bruce, W., Milne, D.G.R., Andonova, Y.G., Hajjat, F.M.: Internet of Things: convenience vs. privacy and secrecy. Bus. Horiz. 58(6), 615-624 (2015) (Science Direct)

    Google Scholar 

  2. Davice, R.: The Internet of Things opportunities and challenging. European, 1–8 (2015)

    Google Scholar 

  3. Munjal, K., Verma, S.: Internet of Vehicles for Intelligent Transportation System. PEC University of Technology, Department of Computer Science and Engineering, Chandigarh, India (2016)

    Google Scholar 

  4. Tee, T.H., Lee, C.R.: Survey of Position Based Routing for Inter Vehicle Communication System

    Google Scholar 

  5. Yamaji, M., Freeman, D., Middleton, P.: Forecast: Internet of Things—Endpoints and Associated Services, Worldwide. Gartner Research (2016)

    Google Scholar 

  6. de Fuentes, J.M., Gonzalez-Manzano, L., Gonzalez-Tablas, A.I., Blasco, J.: Security models in vehicular ad-hoc networks: a survey. IETE Techn. Rev. (2013)

    Google Scholar 

  7. Abbassi, S.H., Qureshi, I.M., Khalid, O., Abbasi, H.: Basic structural change in vehicular adhoc networks. In: 2013 World Congress on Computer and Information Technology (WCCIT), pp. 1–5. IEEE

    Google Scholar 

  8. Price, G.: The Internet of Things 2015. In: State of The Market: Internet of Things 2015, pp. 1–24. Verison Wireless Company (2015)

    Google Scholar 

  9. Weber, R.: Internet of Things new security and privacy challenges. Comput. Low Secur. Rev. 26(1), 23–30 (2010) (Science Direct)

    Article  MathSciNet  Google Scholar 

  10. Nasir, M.K. et al.: Security challenges and implementation mechanism for vehicular ad hoc network. Int. J. Sci. Technol. Res. (2013)

    Google Scholar 

  11. Cunha, F.D., Boukerche, A., Villas, L., Viana, A.C., Loureiro, A.A.: Data communication in VANETs: a survey, challenges and applications. Doctoral dissertation, INRIA Saclay

    Google Scholar 

  12. Kaushi, K., Tayal, S.: Vanet’s security requirements and attacks. Int. J. Adv. Eng. Sci. 6(1) (2016)

    Google Scholar 

  13. Samara, G., Al-Salihy, A.H., Sures, R.: Security analysis of vehicular ad hoc networks (VANET). In: 2nd International Conference on Network Applications, Protocols and Services (2010)

    Google Scholar 

  14. Xinxing, J.L.: MI-VANET: A New Mobile Infrastructure Based VANET Architecture for Urban Environment, pp. 1-4244–3574-6. IEE (2010)

    Google Scholar 

  15. Chowdhury, M., Gawande, A., Wang, L.: Secure Information Sharing among Autonomous Vehicles in NDN. ACM (2017)

    Google Scholar 

  16. Vinh Hoa, L.A., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) (2014)

    Google Scholar 

  17. Sood, M., Kanwar, S.: Clustering in MANET and VANET: a survey. In: Circuits, Systems, Communication and Information Technology Applications (CSCITA) (2014)

    Google Scholar 

  18. Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 351–355. IEEE, Cambridge, MA (2013)

    Google Scholar 

  19. Possible V2X Infrastructure. https://www.sit.fraunhofer.de/de/angebote/projekte/c2x-pki/. Access: 31 Aug 2018

  20. Shafagh, H., Hithnawi, A.: Poster abstract: security comes first, a publickey cryptography framework for the Internet of Things. In: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 135–136. IEEE, Marina Del Rey, CA (2014)

    Google Scholar 

  21. Qiang, C., Quan, G., Yu, B., Yang, L.: Research on security issues of the Internet of Things. Int. J. Future Gener. Commun. Netw. (IJFGCN) 6(6), 1–10 (2013) (IEEE)

    Article  Google Scholar 

  22. Grassi, G., Pesavento, D., Pau, G., Vuyyuru, R., Wakikawa, R., Zhang, L.: VANET via named data networking. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 410–415 (2014)

    Google Scholar 

  23. SSL pinning. https://androidtechieblog.wordpress.com/2016/07/21/ssl-pinning-to-prevent-a-man-in-the-middle-mitm-attack-on-androidios-application-part-1/. Access: 31 Oct 2018

  24. Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wireless Commun. 13, 5 (2006)

    Article  Google Scholar 

  25. Xin, M., China, H.: A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System, vols. 62–65 (2015)

    Google Scholar 

  26. Grassi, G., Pesavento, D., Wang, L., Pau, G., Vuyyuru, R., Wakikawa, R., Zhang, L.: Vehicular inter-networking via named data. ACM HotMobile

    Google Scholar 

  27. Fagnant, D.J., Kockelman, K.: Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations for capitalizing on self-driven vehicles. Transportation Research Board (2014)

    Google Scholar 

  28. Olivier, F., Carlos, G., Florent, N.: New security architecture for IoT network. Proc. Comput. Sci. 52, 1028–1033 (2015) (Science Direct)

    Article  Google Scholar 

  29. European Automobile Manufacturers’ Association (ACEA): The automobile industry pocket guide 2014–2015. http://www.acea.be/uploads/publications/POCKETGUIDE2014-1.pdf (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aneta Poniszewska-Marańda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Stepień, K., Poniszewska-Marańda, A., Marańda, W. (2020). Securing Connection and Data Transfer Between Devices and IoT Cloud Service. In: Jarzabek, S., Poniszewska-Marańda, A., Madeyski, L. (eds) Integrating Research and Practice in Software Engineering. Studies in Computational Intelligence, vol 851. Springer, Cham. https://doi.org/10.1007/978-3-030-26574-8_7

Download citation

Publish with us

Policies and ethics