Skip to main content

Toward a Unique IoT Network via Single Sign-On Protocol and Message Queue

  • Conference paper
  • First Online:
Computer Information Systems and Industrial Management (CISIM 2021)

Abstract

Internet of Things (IoT), currently, is one of the most rapidly developing technology trends. However, at present, users, devices, and applications using IoT services mainly connect to IoT service providers in a client-server model. Each IoT service provider has its own management mechanism and internal message exchange method. This results in the isolation between IoT service providers, and it is challenging to connect these organizations into an IoT network. Besides, one of the most popular protocols in IoT deployments, Message Queuing Telemetry Protocol (MQTT), also has significant security and privacy issues. Therefore, in this paper, we propose an IoT Platform Model capable of improving the MQTT protocol’s security problem by using a Single Sign-On. Also, this model allows the organizations to provide the IoT services to connect into a single network but does not change too much of each organization’s current architecture. We describe the evaluation to prove the effectiveness of our approach. Specifically, we check the number of concurrent users who can publish messages simultaneously for two internal communication and external communication; furthermore, a complete code solution is publicized on the authors’ GitHub repository to engage further reproducibility and improvement.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/thanhlam2110/iot-platform-paper.

  2. 2.

    https://oauth.net/2/.

  3. 3.

    https://tools.ietf.org/html/rfc4122.

  4. 4.

    https://docs.mongodb.com/manual/reference/operator/aggregation/graphLookup/.

  5. 5.

    https://apereo.github.io/cas/6.3.x/index.html.

  6. 6.

    https://iot.eclipse.org/.

  7. 7.

    https://jmeter.apache.org/.

References

  1. Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111— Received, vol. 10, pp. 450–456 (2018)

    Google Scholar 

  2. Morfino, V., Rampone, S.: Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics 9(3), 444 (2020)

    Article  Google Scholar 

  3. Atlam, H.F., Alenezi, A., Alassafi, M.O., Wills, G.: Blockchain with internet of things: benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10(6), 40–48 (2018)

    Google Scholar 

  4. Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)

    Article  Google Scholar 

  5. Ccori, P.C., De Biase, L.C.C., Zuffo, M.K., da Silva, F.S.C.: Device discovery strategies for the IoT. In: 2016 IEEE International Symposium on Consumer Electronics (ISCE), pp. 97–98. IEEE (2016)

    Google Scholar 

  6. Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)

    Google Scholar 

  7. Weissman, D., Jayasumana, A.: Integrating IoT monitoring for security operation center. In: 2020 Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2020)

    Google Scholar 

  8. Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for MQTT-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), pp. 290–295. IEEE (2016)

    Google Scholar 

  9. Mishra, B., Kertesz, A.: The use of MQTT in M2M and IoT systems: a survey. IEEE Access 8, 201071–201086 (2020)

    Article  Google Scholar 

  10. Jaikar, S.P., Iyer, K.R.: A survey of messaging protocols for IoT systems. Int. J. Adv. Manage. Technol. Eng. Sci. 8(II), 510–514 (2018)

    Google Scholar 

  11. Çorak, B.H., Okay, F.Y., Güzel, M., Murt, Ş., Ozdemir, S.: Comparative analysis of IoT communication protocols. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2018)

    Google Scholar 

  12. Hillar, G.C.: MQTT Essentials-A lightweight IoT protocol. Packt Publishing Ltd, Birmingham (2017)

    Google Scholar 

  13. Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India (2019)

    Google Scholar 

  14. Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Global Perspect. 27(3), 162–182 (2018)

    Google Scholar 

  15. Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M., et al.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)

    Article  Google Scholar 

  16. Subahi, A., Theodorakopoulos, G.: Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic. Sensors 19(21), 4777 (2019)

    Article  Google Scholar 

  17. Radha, V., Reddy, D.H.: A survey on single sign-on techniques. Procedia Technol. 4, 134–139 (2012)

    Google Scholar 

  18. Fremantle, P., Aziz, B., Kopeckỳ, J., Scott, P.: Federated identity and access management for the internet of things. In: 2014 International Workshop on Secure Internet of Things, pp. 10–17. IEEE (2014)

    Google Scholar 

  19. Fremantle, P., Aziz, B.: OAuthing: privacy-enhancing federation for the internet of things. In: 2016 Cloudification of the Internet of Things (CIoT), pp. 1–6. IEEE (2016)

    Google Scholar 

  20. Rozik, A.S., Tolba, A.S., El-Dosuky, M.A.: Design and implementation of the sense Egypt platform for real-time analysis of IoT data streams. Adv. Internet Things 6(4), 65–91 (2016)

    Article  Google Scholar 

  21. Hugo, Å., Morin, B., Svantorp, K.: Bridging MQTT and Kafka to support C-ITS: a feasibility study. In: 2020 21st IEEE International Conference on Mobile Data Management (MDM), pp. 371–376. IEEE (2020)

    Google Scholar 

  22. Son, H.X., Chen, E.: Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution. Int. J. Adv. Comput. Sci. Appl. 10(2), 507–516 (2019)

    Google Scholar 

  23. Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, ICCSP 2020, pp. 105–109, New York, NY, USA, 2020. Association for Computing Machinery. https://doi.org/10.1145/3377644.3377667

  24. Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31–35, New York, NY, USA, 2020. Association for Computing Machinery (2020). https://doi.org/10.1145/3377644.3377668

  25. Le, H.T., Le, N.T.T., Phien, N.N., Duong-Trung, N.: Introducing multi shippers mechanism for decentralized cash on delivery system. Money 10(6), 13 (2019)

    Google Scholar 

  26. Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677–684 (2019)

    Google Scholar 

  27. Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116–120 (2019)

    Google Scholar 

  28. Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76–80 (2019)

    Google Scholar 

  29. Xuan, S.H., Tran, L.K., Dang, T.K., Pham, Y.N.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25–31. IEEE (2016)

    Google Scholar 

  30. Thi, Q.N.T., Dang, T.K., Van, H.L., Son, H.X.: Using JSON to specify privacy preserving-enabled attribute-based access control policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 561–570. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_44

    Chapter  Google Scholar 

  31. Son, H.X., Dang, T.K., Massacci, F.: REW-SMT: a new approach for rewriting XACML request with dynamic big data security policies. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, K.-K.R. (eds.) SpaCCS 2017. LNCS, vol. 10656, pp. 501–515. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-72389-1_40

    Chapter  Google Scholar 

  32. Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71–78. IEEE (2020)

    Google Scholar 

  33. Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214–227. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-68851-6_15

    Chapter  Google Scholar 

  34. Son, H.X., Le, T.H., Quynh, N.T.T., Huy, H.N.D., Duong-Trung, N., Luong, H.H.: Toward a blockchain-based technology in dealing with emergencies in patient-centered healthcare systems. In: Bouzefrane, S., Laurent, M., Boumerdassi, S., Renault, E. (eds.) MSPN 2020. LNCS, vol. 12605, pp. 44–56. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67550-9_4

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen, T.T.L. et al. (2021). Toward a Unique IoT Network via Single Sign-On Protocol and Message Queue. In: Saeed, K., Dvorský, J. (eds) Computer Information Systems and Industrial Management. CISIM 2021. Lecture Notes in Computer Science(), vol 12883. Springer, Cham. https://doi.org/10.1007/978-3-030-84340-3_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-84340-3_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-84339-7

  • Online ISBN: 978-3-030-84340-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics