Skip to main content
Top
Published in: Wireless Personal Communications 1/2021

06-05-2021

Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform

Authors: Mohammed Imtyaz Ahmed, G. Kannan

Published in: Wireless Personal Communications | Issue 1/2021

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Internet of Things (IoT) technology became an inter-disciplinary revolution in the contemporary era. It is capable of influencing human lives significantly when used in different domains. It has plethora of use cases like smart transportation, smart healthcare and smart city to mention few. As IoT is capable of combining physical objects and digital objects seamlessly, it has opened gates to have thousands of use cases where IoT integration takes to the next generation of computations and building applications. The present IoT applications lack in end-to-end security as there are different protocols and vendors involved. No standardizations are made yet. Besides, the sources of big data such as sensor networks in IoT use cases generate large volumes of data that needs more lightweight cryptographic solutions. Diffie Hellman when combined with Elliptic Curve (EC-DH) became an ideal choice to have secure and lightweight communications for connected devices in IoT use cases. However, it is still vulnerable to certain kinds of attacks. To overcome this problem, we proposed an enhanced EC-DH known as E-ECDH for higher level of security to IoT applications. We considered an anomaly detection case study which is part of Healthcare industry. IBM cloud, Watson IoT platform and MQ Telemetry Transport messaging protocol are used as part of experimental setup. Experiments revealed the efficiency of the scheme as it provides higher level of security besides improving in performance in data encryption, decryption, execution time and time taken for upload and download. The proposed scheme can be used with real time IoT applications.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Baranwal, Nitika, T., & Pateriya, P. K. (2016). Development of IoT based smart security and monitoring devices for agriculture. In 2016 6th international conference—cloud system and big data engineering (Confluence) (pp. 1–6). Baranwal, Nitika, T., & Pateriya, P. K. (2016). Development of IoT based smart security and monitoring devices for agriculture. In 2016 6th international conference—cloud system and big data engineering (Confluence) (pp. 1–6).
2.
go back to reference Ahmed, I., & Kannan, G. (2018). A review on present state-of-the-art on internet of things. Journal of Advanced Research in Dynamical and Control Systems (12), 352–358. Ahmed, I., & Kannan, G. (2018). A review on present state-of-the-art on internet of things. Journal of Advanced Research in Dynamical and Control Systems (12), 352–358.
3.
go back to reference Reijo, M., & Savola, P. (2015). Risk-driven security metrics development for an eHealth IoT application. In IEEE (pp. 1–6). Reijo, M., & Savola, P. (2015). Risk-driven security metrics development for an eHealth IoT application. In IEEE (pp. 1–6).
4.
go back to reference Kannan, G., & Mohamed Thameez, R. (2015). Design and implementation of smart sensor interface for herbal monitoring in IoT environment. International Journal of Engineering Research, 3(2), 469–475. Kannan, G., & Mohamed Thameez, R. (2015). Design and implementation of smart sensor interface for herbal monitoring in IoT environment. International Journal of Engineering Research, 3(2), 469–475.
5.
go back to reference Duc, A., Jabangwe, R., Paul, P., & Abrahamsson, P. (2017). Security challenges in IoT development: a software engineering perspective. Proceedings of XP2017 Scientific Workshops, ACM, 1–5. Duc, A., Jabangwe, R., Paul, P., & Abrahamsson, P. (2017). Security challenges in IoT development: a software engineering perspective. Proceedings of XP2017 Scientific Workshops, ACM, 1–5.
6.
go back to reference Datta, S. K., & Bonnet, C. (2016). Easing IoT application development through data tweet framework. In 2016 IEEE 3rd world forum on internet of things (WF-IoT) (pp. 1–6). Datta, S. K., & Bonnet, C. (2016). Easing IoT application development through data tweet framework. In 2016 IEEE 3rd world forum on internet of things (WF-IoT) (pp. 1–6).
7.
go back to reference Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.CrossRef
8.
go back to reference Kang, Y.-M., Han, M.-R., Han, K.-S., & Kim, J.-B. (2015). A study on the internet of things (IoT) applications. International Journal of Software Engineering and Its Applications, 9(9), 117–126.CrossRef Kang, Y.-M., Han, M.-R., Han, K.-S., & Kim, J.-B. (2015). A study on the internet of things (IoT) applications. International Journal of Software Engineering and Its Applications, 9(9), 117–126.CrossRef
9.
go back to reference Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. D. (2018). Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. ACM Computing Surveys, 52(4), 1–39.CrossRef Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. D. (2018). Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. ACM Computing Surveys, 52(4), 1–39.CrossRef
10.
go back to reference Ahmed, M. I., & Kannan, G. (2020). Overcoming privacy and security challenges of internet of things applications. International Journal of Future Generation Communication and Networking, 13(1), 1550–1556. Ahmed, M. I., & Kannan, G. (2020). Overcoming privacy and security challenges of internet of things applications. International Journal of Future Generation Communication and Networking, 13(1), 1550–1556.
12.
go back to reference Riahi, A ., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013) A systemic approach for IoT security. DCOSS, Boston, United States (pp. 351–355). Riahi, A ., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013) A systemic approach for IoT security. DCOSS, Boston, United States (pp. 351–355).
13.
go back to reference Pustišek, M., & Kos, A. (2018). Approaches to front-end IoT application development for the Ethereumblockchain. Procedia Computer Science, 129, 410–419.CrossRef Pustišek, M., & Kos, A. (2018). Approaches to front-end IoT application development for the Ethereumblockchain. Procedia Computer Science, 129, 410–419.CrossRef
14.
go back to reference Datta, S. K., Gyrard, A., Bonnet, C., & Boudaoud, K. (2015). oneM2M architecture based user centric iot application development. In 2015 3rd international conference on future internet of things and cloud (pp. 1–8). Datta, S. K., Gyrard, A., Bonnet, C., & Boudaoud, K. (2015). oneM2M architecture based user centric iot application development. In 2015 3rd international conference on future internet of things and cloud (pp. 1–8).
15.
go back to reference Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.CrossRef Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.CrossRef
16.
go back to reference Ahamed, J., & Rajan, A. V. (2016). Internet of things (IoT): Application systems and security vulnerabilities. In 2016 5th International conference on electronic devices, systems and applications (ICEDSA) (pp. 1–5). Ahamed, J., & Rajan, A. V. (2016). Internet of things (IoT): Application systems and security vulnerabilities. In 2016 5th International conference on electronic devices, systems and applications (ICEDSA) (pp. 1–5).
17.
go back to reference Liu, Z., & Yan, T. (2013). Study on multi-view video based on IOT and its application in intelligent security system. In Proceedings 2013 international conference on mechatronic sciences, electric engineering and computer (MEC) (pp 1–4). Liu, Z., & Yan, T. (2013). Study on multi-view video based on IOT and its application in intelligent security system. In Proceedings 2013 international conference on mechatronic sciences, electric engineering and computer (MEC) (pp 1–4).
18.
go back to reference DíazLópez, D., Blanco Uribe, M., Santiago Cely, C., Tarquino Murgueitio, D., Garcia, E., Nespoli, P., & Gómez Mármol, F. (2018). Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry, 10(12), 1–34. DíazLópez, D., Blanco Uribe, M., Santiago Cely, C., Tarquino Murgueitio, D., Garcia, E., Nespoli, P., & Gómez Mármol, F. (2018). Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry, 10(12), 1–34.
19.
go back to reference Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetCrossRef Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.MathSciNetCrossRef
20.
go back to reference AL-mawee, W. (2012). Privacy and security issues in IoT healthcare applications for the disabled users a survey, 1–57. AL-mawee, W. (2012). Privacy and security issues in IoT healthcare applications for the disabled users a survey, 1–57.
21.
go back to reference Nguyen, X. T., Tran, H. T., Baraki, H., & Geihs, K. (2015). FRASAD: A framework for model-driven IoT Application Development. In 2015 IEEE 2nd world forum on internet of things (WF-IoT) (pp. 1–6). Nguyen, X. T., Tran, H. T., Baraki, H., & Geihs, K. (2015). FRASAD: A framework for model-driven IoT Application Development. In 2015 IEEE 2nd world forum on internet of things (WF-IoT) (pp. 1–6).
23.
go back to reference Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.CrossRef Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.CrossRef
Metadata
Title
Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform
Authors
Mohammed Imtyaz Ahmed
G. Kannan
Publication date
06-05-2021
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 1/2021
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-021-08439-7

Other articles of this Issue 1/2021

Wireless Personal Communications 1/2021 Go to the issue