Two-Way Communications Through Firewalls Using QLM Messaging

Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 131)


Nowadays, organizations make a point of protecting the confidentiality of their data and assets using firewalls, proxies and NATs, which goes against providing a high level of data usability and interoperability between distinct information systems, or “Things” in the so-called Internet of Things. Such security procedures often prevent two-way communications between nodes located on each side of the firewall. Quantum Lifecycle Management (QLM) messaging has been introduced as a messaging standard proposal that would fulfill the requirements for exchanging the kind of information required by an IoT. In this regard, the QLM piggy backing property proposed in that standard makes it possible to achieve two-way communication through a firewall. This property is introduced in this paper, along with the first proofs-of-concept.


Internet of things Quantum lifecycle management Intelligent product Network security Piggy backing 


  1. 1.
    Gershenfeld, N., Krikorian, R., Cohen, D.: The Internet of Things. Sci. Am. 291(4), 76–81 (2004)CrossRefGoogle Scholar
  2. 2.
    Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Context aware computing for the internet of things: a survey. IEEE Commun. Surv. Tutor. 99, 1–41 (2013)Google Scholar
  3. 3.
    Framling, K., Maharjan, M.: Standardized communication between intelligent products for the IoT. In: 11th IFAC Workshop on Intelligent Manufacturing Systems. São Paulo (2013)Google Scholar
  4. 4.
    Chen, L.: Application perspectives for active safety system based on internet of vehicles. In: Proceedings of the FISITA 2012 World Automotive Congress. Beijing (2012)Google Scholar
  5. 5.
    Kiritsis, D., Bufardi, A., Xirouchakis, P.: Research issues on product lifecycle management and information tracking using smart embedded systems. Adv. Eng. Inform. 17(3), 189–202 (2003)CrossRefGoogle Scholar
  6. 6.
    Kubler, S., Madhikermi, M., Främling, K.: Deferred retrieval of IoT information using QLM messaging interface. In: 10th International Conference on Mobile Web Information Systems. Paphos (2013)Google Scholar
  7. 7.
    Bishop, M.: What is computer security? IEEE Secur. Priv. 1(1), 67–69 (2003)CrossRefGoogle Scholar
  8. 8.
    Li, M., Lou, W., Ren, K.: Data security and privacy in wireless body area networks. IEEE Wirel. Commun. 17(1), 51–58 (2010)CrossRefGoogle Scholar

Copyright information

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2014

Authors and Affiliations

  1. 1.School of ScienceAalto UniversityEspooFinland

Personalised recommendations