Skip to main content

2018 | Buch

Interoperability, Safety and Security in IoT

Third International Conference, InterIoT 2017, and Fourth International Conference, SaSeIot 2017, Valencia, Spain, November 6-7, 2017, Proceedings

herausgegeben von: Prof. Giancarlo Fortino, Prof. Carlos E. Palau, Antonio Guerrieri, Nora Cuppens, Frédéric Cuppens, Prof. Hakima Chaouchi, Alban Gabillon

Verlag: Springer International Publishing

Buchreihe : Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

insite
SUCHEN

Über dieses Buch

This book constitutes the refereed post-conference proceedings of the Third International Conference on Interoperability, InterIoT 2017, which was collocated with SaSeIoT 2017, and took place in Valencia, Spain, in November 2017. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).

Inhaltsverzeichnis

Frontmatter

InterIoT Track

Frontmatter
A Bayesian Approach for an Efficient Data Reduction in IoT
Abstract
Todays, Internet of Things (IoT) is starting to occupy a major place in our everyday lives. It has already achieved a huge success in several sectors and continues to bring us a range of new capabilities and services. However, despite the apparent success, one of issues which must be tackle is the big quantity of data produced and transmitted by the objects. Transmitting these big quantity of data not only increases the energy consumption of objects but can also cause network congestion.
To meet this issue, a Bayesian Inference Approach (BIA) that can avoid the transmission of highly correlated data is proposed. An hierarchical architecture with smart devices and data centers is adopted. We evaluate our BIA approach using the data obtained from the M3 sensors deployed in the FIT IoT-LAB platform and three distinct scenarios. The obtained results prove the effectiveness of our BIA approach. The number of transmitted data and energy consumption are significantly reduced, and the information accuracy is maintained at a good level.
Cristanel Razafimandimby, Valeria Loscrí, Anna Maria Vegni, Driss Aourir, Alessandro Neri
Battery Friendly Internet of Medical Media Things Networks
Abstract
Rapid proliferation in the medical wearable device market has become the center of attention and changed the every corner of the medical world for the effective and economical information transmission, but because of the tiny size and high power drain more battery charge is consumed, so to remedy that problem this paper proposes ON-OFF Battery Friendly Algorithm (OBFA) to minimize the energy drain and hence to enhance the battery lifetime of these portable devices. Patient’s bio-signals such as, electrocardiogram (ECG) data from World’s larger database, i.e., PhysioNet is taken and examined with our proposed OBFA for further transmission over joint IoT and Wireless Body Sensor Networks (WBSNs). Experimental platform reveals that battery charge consumption is reduced and lifetime is improved in comparison with traditional baseline scheme.
Sandeep Pirbhulal, Ali Hassan Sodhro, Aicha Sekhari, Yacine Ouzrout, Wanqing Wu
Semantically Enriched Hypermedia APIs for Next Generation IoT
Abstract
As the Internet of Things is gaining momentum, the number of Internet connected devices is growing exponentially, as well as the data generated by them. This raises several issues to solve in this field, most notably the ones regarding interoperability between various devices. To ease Machine-to-Machine communication, new data models must be created to explicitly describe devices and their capabilities in a standardized way. This paper discusses the IETF’s Media Types for Hypertext Sensor Markup data model that is currently in the design process. First, we present an overview of how semantic Web technologies can be used create self-describing APIs, and then present a smart home use case that relies on these technologies.
Andriy Mazayev, Jaime A. Martins, Noélia Correia
Smart Devices for Automated Emergency Calls
Abstract
The Internet-of-Things (IoT) promises to transform our society into smart environments, incorporating smart objects that cooperate to fulfil specific goals. Amongst its many applications, emergencies can also benefit from IoT principles and use of automation for a better emergency response and reducing the number of fatalities. Smart devices can be used to detect emergency events (e.g., fire, presence of hazardous gases) and automatically trigger alerts to emergency services. However, emergency services today mostly rely on circuit-switch networks and audio-based calls. Therefore, in this paper, we describe our concept to apply the IoT paradigm to the concept of automated calls, in which audio calls are generated from preformatted messages and a text-to-speech engine. Supported by an implemented prototype, our approach brings the benefits of automated calls without requiring significant investments to the infrastructure and systems of emergency services.
Mihai Buf, Barbara Guerra, Marco Manso
A Standardizable Network Architecture Supporting Interoperability in the Smart City Internet of Things
Abstract
An increase of 2.5 billion people is expected in urban areas by 2050, when 66% of the world population will reside here. It is therefore reasonable to assume a parallel growth in the smart city Internet of Things (IoT). A challenge, however, is presented in the interoperability between the devices deployed, limited due to the ad hoc and proprietary ways which systems have been rolled out to date. A standardized network infrastructure specific to the IoT can work towards resolving the challenges. This approach to operation, however, raises questions with regard to how an architecture may support different devices and applications simultaneously, and additionally be extensible to accommodate applications and devices not available at the time of the framework’s development. In this paper, these questions are explored, and an IoT infrastructure which accommodates the interoperability communication constraints and challenges today is proposed.
Cathryn Peoples
AmI Open Source System for the Intelligent Control of Residences for the Elderly
Abstract
The IoT has an enormous potential to dramatically improve the quality of life and health of elderly population. In this sense, Ambient Intelligent (AmI) environments focused on the domains of Assisted Living (AAL) represent one of the most promising IoT areas to explore and exploit. We present an intelligent AmI open-source system that aims to monitor and control smart homes and residences for elderly people in order to enhance the safety, health and comfort of the elderly people. For achieving an interoperable interface for collecting, storing and retrieving data from very heterogeneous sensors it integrates a Sensor Observation Service of the Open Geospatial Consortium and follows open standards. Our system is validated from a practical perspective as it is implemented in a pilot residence in Spain.
Regel Gonzalez-Usach, Diana Yacchirema, Vicente Collado, Carlos Palau
A Scalable Agent-Based Smart Environment for Edge-Based Urban IoT Systems
Abstract
New Internet of Things (IoT) applications are encouraging Smart City and Smart Environments initiatives all over the world, by leveraging big data and ubiquitous connectivity. This new technology enables systems to monitor, manage and control devices, and to create new knowledge and actionable information, by the real-time analysis of data streams. In order to develop applications in the depicted scenario, the adoption of new paradigms is required. This paper suggests combining the emergent concept of edge/fog computing with the agent metaphor, so as to enable designing systems based on the decentralization of control functions over distributed autonomous and cooperative entities, which run at the edge of the network. Moreover, we suggest the adoption of the iSapiens platform as a reference, as it was designed specifically for the mentioned purposes. Multi-agent applications running on top of iSapiens can create smart services using adaptive and decentralized algorithms which exploit the principles of cognitive IoT.
Franco Cicirelli, Giancarlo Fortino, Antonio Guerrieri, Giandomenico Spezzano, Andrea Vinci
Observing Interoperability of IoT Systems Through Model-Based Testing
Abstract
Internet of Things (IoT) has drastically modified the industrial services provided through autonomous machine-to-machine interactions. Such systems comprise of devices manufactured by various suppliers. Verification is a challenge due to high heterogeneity of composing devices. In this paper, we present initial results of model-based interoperability testing for IoT systems to facilitate automatic test case generation. We utilize messaging model of Constrained Application Protocol so as to deduce complex relations between participating devices. We use Complex-Event Processing (CEP) techniques in order to streamline the verification process after generating proper runtime monitors from sequence diagrams. We demonstrate our solution on a fictitious healthcare system.
Koray Incki, Ismail Ari
Towards High Throughput Semantic Translation
Abstract
One of “urban legends” of today’s computer science is: use of semantic technologies can become a serious performance bottleneck. It is even possible that this, widely spread, belief is one of the reasons of slow progress in adopting semantic technologies in real-world applications. Since, obviously, IoT scenarios involve fast flowing streams of sensor data, will use of semantic technologies be “efficient enough” to not to adversely affect the effectiveness of the whole Internet of Things (IoT) ecosystem. The aim of this contribution is to provide an initial response to this question.
Maria Ganzha, Marcin Paprzycki, Wiesław Pawłowski, Paweł Szmeja, Katarzyna Wasielewska, Bartłomiej Solarz-Niesłuchowski, Jara Suárez de Puga García
Assessing the Impact of Mobility on LoRa Communications
Abstract
The use of LPWAN (Low Powered Wide Area Network) technologies in the scope of the Internet of Things have become the best alternative to send data between devices and cloud systems. Among these technologies, LoRa stands out as a novel and promising system that could be used in areas with a high device density, and in locations where other technologies do not provide enough communications range. In the past, most research works have made experiments in static scenarios, without taking the mobility of the things into account.
Our research is focused in analyzing the impact that mobility will have in LoRa communications performance, with the objective to determine the adequacy of this technology for vehicular scenarios oriented to data sensing, or in applications where small pieces of data are transmitted over long distances.
Experimental results show that both the mobility and the message size affect LoRa communications, despite still allowing to reach an acceptable coverage range.
Óscar Alvear, Jorge Herrera-Tapia, Carlos T. Calafate, Enrique Hernández-Orallo, Juan-Carlos Cano, Pietro Manzoni

SaSeIoT Track

Frontmatter
A Reinforcement Protection Game in the Internet of Things
Abstract
The vast scale of the Internet of Things (IoT), combined with its heterogeneous nature involving many different types of devices and machines, could lead the IoT to be vulnerable to a variety of security threats and malicious attacks. Addressing the broad array of threats requires that different security mechanisms are deployed at appropriate locations within the broader IoT communication network. In this paper, we examine this problem by applying a resource allocation approach involving a game-theoretical framework to model: (a) an attack aimed to maximize total damage to the network, and (b) an attack aimed to compromise at least one of the devices. To evaluate the probability of a successful attack we apply a contest success function, and found the associated equilibrium strategies in closed form. Additionally, we note an interesting relationship between equilibrium strategies in security reinforcement games and OFDM transmission games under hostile jamming. A criteria is designed that allows one to determine whether an IoT controller’s resources is sufficient to protect all of the IoT devices it manages.
Andrey Garnaev, Wade Trappe
Safety-Related Wireless Communication via RF Modules for Industrial IoT Applications
Abstract
The major trend of IoT concept in the recent years is this technology being widely engaged into the industrial applications where the principles of critical safety are the essential concerns. Moreover, the great advantages and the rapid development of wireless communication technologies have driven them to form the backbone of IoT applications. Therefore, these wireless technologies must comply additional safety-related requirements in order to make their great features available for industrial applications. This research work is a complement work to the research introduced by Hayek et al. [1] and it describes a conceptual design of a safety-related wireless communication protocol based on RF technology, that fulfills the needed requirements as well as implements the safety approaches defined in the related safety standards to achieve all enhancements that make this technology suitable to be used in industrial internet of things applications.
Samer Telawi, Ali Hayek, Josef Börcsök
Blockchain and IoT: Mind the Gap
Abstract
Blockchain, the core technology behind the first decentralized cryptocurrency, Bitcoin, has been recently proposed as a promising solution to create a viable decentralized network of Internet of Things (IoT) with good security and privacy properties. This survey investigates the currently proposed Blockchain-IoT solutions and examines their suitability for IoT devices.
Anass Sedrati, Mohamed Ahmed Abdelraheem, Shahid Raza
Lightweight X.509 Digital Certificates for the Internet of Things
Abstract
X.509 is the de facto digital certificate standard used in building the Public Key Infrastructure (PKI) on the Internet. However, traditional X.509 certificates are too heavy for battery powered or energy harvesting Internet of Things (IoT) devices where it is crucial that energy consumption and memory footprints are as minimal as possible.
In this paper we propose, implement, and evaluate a lightweight digital certificate for resource-constrained IoT devices. We develop an X.509 profile for IoT including only the fields necessary for IoT devices, without compromising the certificate security. Furthermore, we also propose compression of the X.509 profiled fields using the contemporary CBOR encoding scheme. Most importantly, our solutions are compatible with the existing X.509 standard, meaning that our profiled and compressed X.509 certificates for IoT can be enrolled, verified and revoked without requiring modification in the existing X.509 standard and PKI implementations. We implement our solution in the Contiki OS and perform evaluation of our profiled and compressed certificates on a state-of-the-art IoT hardware.
Filip Forsby, Martin Furuhed, Panos Papadimitratos, Shahid Raza
Privacy Preserving and Resilient Cloudified IoT Architecture to Support eHealth Systems
Abstract
Significant improvement in eHealth services in both quality and financial points of view are possible if public cloud infrastructures could be utilized in storing and processing personal health information (PHI) from IoT devices monitoring and collecting data from persons. The challenge is that personal health records are highly sensitive and health related organization are not willing to trust the cybersecurity of public clouds. Another challenge is that strict regulation is in place regarding the physical location of PHI. This paper addresses these issues by proposing tokenization architecture and crypto-implementation for personal identity number (PIN). This will allow the storage and processing of the personal health information (PII) in the public cloud as the data cannot be identified to a specific person. The proposal follows the general data protection regulation (GDPR) by offering secure and highly resilient architecture for the separation of health data and person identity.
Jarkko Paavola, Jani Ekqvist
Using Physical Unclonable Functions for Internet-of-Thing Security Cameras
Abstract
This paper proposes a low-cost solution to develop IoT security cameras. Integrity and confidentiality of the image data are achieved by cryptographic modules that implement symmetric key-based techniques which are usually available in the hardware of the IoT cameras. The novelty of this proposal is that the secret key required is not stored but reconstructed from the start-up values of a SRAM in the camera hardware acting as a PUF (Physical Unclonable Function), so that the physical authenticity of the camera is also ensured. The start-up values of the SRAM are also exploited to change the IV (Initialization Vector) in the encryption algorithm. All the steps for enrollment and normal operation can be included in a simple firmware to be executed by the camera. There is no need to include specific hardware but only a SRAM is needed which could be powered down and up by firmware.
Rosario Arjona, Miguel A. Prada-Delgado, Javier Arcenegui, Iluminada Baturone
Smart Wearable System for Safety-Related Industrial IoT Applications
Abstract
The Industrial Internet of Things enables the realization of modular, flexible and efficient production processes. Machines and production plants are networked over various communication channels and organize themselves in an intelligent way to create products tailored to the customer’s specific needs. Highly networked system structures will evolve including the interference of humans as well as of machines. Apart from security, functional safety plays an increasingly important role in the networking of humans and machines. Especially in environments where humans interact with dangerous systems or moving in the same area as autonomous driving robots, it is very important to provide a maximum of safety. In this paper, a system solution is introduced, which detects the movement of persons, prevents collisions between autonomous driving machines and humans, and decreases the probability of potential hazards in the interaction between humans and machines, while the movement of all participants should not be restricted.
Ali Hayek, Samer Telawi, Johannes Klos, Josef Börcsök, Roy Abi Zeid Daou
Backmatter
Metadaten
Titel
Interoperability, Safety and Security in IoT
herausgegeben von
Prof. Giancarlo Fortino
Prof. Carlos E. Palau
Antonio Guerrieri
Nora Cuppens
Frédéric Cuppens
Prof. Hakima Chaouchi
Alban Gabillon
Copyright-Jahr
2018
Electronic ISBN
978-3-319-93797-7
Print ISBN
978-3-319-93796-0
DOI
https://doi.org/10.1007/978-3-319-93797-7

Premium Partner