Abstract
As cloud services are key component of Internet of Things (IoT) applications which are getting increasingly popular nowadays, it is crucial to provide a way of establishing a secure connection between the cloud server and the connected devices. Secure connection and data transfer may involve using token based authentication, cryptographic protocols and other techniques to prevent many popular attacks. The paper presents the violations that may occur in connection between IoT device and the cloud and possible solutions that can be used to solve the security leaks for such connections.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bruce, W., Milne, D.G.R., Andonova, Y.G., Hajjat, F.M.: Internet of Things: convenience vs. privacy and secrecy. Bus. Horiz. 58(6), 615-624 (2015) (Science Direct)
Davice, R.: The Internet of Things opportunities and challenging. European, 1–8 (2015)
Munjal, K., Verma, S.: Internet of Vehicles for Intelligent Transportation System. PEC University of Technology, Department of Computer Science and Engineering, Chandigarh, India (2016)
Tee, T.H., Lee, C.R.: Survey of Position Based Routing for Inter Vehicle Communication System
Yamaji, M., Freeman, D., Middleton, P.: Forecast: Internet of Things—Endpoints and Associated Services, Worldwide. Gartner Research (2016)
de Fuentes, J.M., Gonzalez-Manzano, L., Gonzalez-Tablas, A.I., Blasco, J.: Security models in vehicular ad-hoc networks: a survey. IETE Techn. Rev. (2013)
Abbassi, S.H., Qureshi, I.M., Khalid, O., Abbasi, H.: Basic structural change in vehicular adhoc networks. In: 2013 World Congress on Computer and Information Technology (WCCIT), pp. 1–5. IEEE
Price, G.: The Internet of Things 2015. In: State of The Market: Internet of Things 2015, pp. 1–24. Verison Wireless Company (2015)
Weber, R.: Internet of Things new security and privacy challenges. Comput. Low Secur. Rev. 26(1), 23–30 (2010) (Science Direct)
Nasir, M.K. et al.: Security challenges and implementation mechanism for vehicular ad hoc network. Int. J. Sci. Technol. Res. (2013)
Cunha, F.D., Boukerche, A., Villas, L., Viana, A.C., Loureiro, A.A.: Data communication in VANETs: a survey, challenges and applications. Doctoral dissertation, INRIA Saclay
Kaushi, K., Tayal, S.: Vanet’s security requirements and attacks. Int. J. Adv. Eng. Sci. 6(1) (2016)
Samara, G., Al-Salihy, A.H., Sures, R.: Security analysis of vehicular ad hoc networks (VANET). In: 2nd International Conference on Network Applications, Protocols and Services (2010)
Xinxing, J.L.: MI-VANET: A New Mobile Infrastructure Based VANET Architecture for Urban Environment, pp. 1-4244–3574-6. IEE (2010)
Chowdhury, M., Gawande, A., Wang, L.: Secure Information Sharing among Autonomous Vehicles in NDN. ACM (2017)
Vinh Hoa, L.A., Cavalli, A.: Security attacks and solutions in vehicular ad hoc networks: a survey. Int. J. AdHoc Netw. Syst. (IJANS) (2014)
Sood, M., Kanwar, S.: Clustering in MANET and VANET: a survey. In: Circuits, Systems, Communication and Information Technology Applications (CSCITA) (2014)
Riahi, A., Challal, Y., Natalizio, E., Chtourou, Z., Bouabdallah, A.: A systemic approach for IoT security. In: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 351–355. IEEE, Cambridge, MA (2013)
Possible V2X Infrastructure. https://www.sit.fraunhofer.de/de/angebote/projekte/c2x-pki/. Access: 31 Aug 2018
Shafagh, H., Hithnawi, A.: Poster abstract: security comes first, a publickey cryptography framework for the Internet of Things. In: International Conference on Distributed Computing in Sensor Systems (DCOSS), pp. 135–136. IEEE, Marina Del Rey, CA (2014)
Qiang, C., Quan, G., Yu, B., Yang, L.: Research on security issues of the Internet of Things. Int. J. Future Gener. Commun. Netw. (IJFGCN) 6(6), 1–10 (2013) (IEEE)
Grassi, G., Pesavento, D., Pau, G., Vuyyuru, R., Wakikawa, R., Zhang, L.: VANET via named data networking. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 410–415 (2014)
SSL pinning. https://androidtechieblog.wordpress.com/2016/07/21/ssl-pinning-to-prevent-a-man-in-the-middle-mitm-attack-on-androidios-application-part-1/. Access: 31 Oct 2018
Raya, M., Papadimitratos, P., Hubaux, J.P.: Securing vehicular communications. IEEE Wireless Commun. 13, 5 (2006)
Xin, M., China, H.: A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System, vols. 62–65 (2015)
Grassi, G., Pesavento, D., Wang, L., Pau, G., Vuyyuru, R., Wakikawa, R., Zhang, L.: Vehicular inter-networking via named data. ACM HotMobile
Fagnant, D.J., Kockelman, K.: Preparing a nation for autonomous vehicles: opportunities, barriers and policy recommendations for capitalizing on self-driven vehicles. Transportation Research Board (2014)
Olivier, F., Carlos, G., Florent, N.: New security architecture for IoT network. Proc. Comput. Sci. 52, 1028–1033 (2015) (Science Direct)
European Automobile Manufacturers’ Association (ACEA): The automobile industry pocket guide 2014–2015. http://www.acea.be/uploads/publications/POCKETGUIDE2014-1.pdf (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Stepień, K., Poniszewska-Marańda, A., Marańda, W. (2020). Securing Connection and Data Transfer Between Devices and IoT Cloud Service. In: Jarzabek, S., Poniszewska-Marańda, A., Madeyski, L. (eds) Integrating Research and Practice in Software Engineering. Studies in Computational Intelligence, vol 851. Springer, Cham. https://doi.org/10.1007/978-3-030-26574-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-26574-8_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-26573-1
Online ISBN: 978-3-030-26574-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)