Skip to main content

2021 | OriginalPaper | Buchkapitel

Toward a Unique IoT Network via Single Sign-On Protocol and Message Queue

verfasst von : Tran Thanh Lam Nguyen, The Anh Nguyen, Hong Khanh Vo, Hoang Huong Luong, Huynh Tuan Khoi Nguyen, Anh Tuan Dao, Xuan Son Ha

Erschienen in: Computer Information Systems and Industrial Management

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Internet of Things (IoT), currently, is one of the most rapidly developing technology trends. However, at present, users, devices, and applications using IoT services mainly connect to IoT service providers in a client-server model. Each IoT service provider has its own management mechanism and internal message exchange method. This results in the isolation between IoT service providers, and it is challenging to connect these organizations into an IoT network. Besides, one of the most popular protocols in IoT deployments, Message Queuing Telemetry Protocol (MQTT), also has significant security and privacy issues. Therefore, in this paper, we propose an IoT Platform Model capable of improving the MQTT protocol’s security problem by using a Single Sign-On. Also, this model allows the organizations to provide the IoT services to connect into a single network but does not change too much of each organization’s current architecture. We describe the evaluation to prove the effectiveness of our approach. Specifically, we check the number of concurrent users who can publish messages simultaneously for two internal communication and external communication; furthermore, a complete code solution is publicized on the authors’ GitHub repository to engage further reproducibility and improvement.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111— Received, vol. 10, pp. 450–456 (2018) Alam, T.: A reliable communication framework and its use in internet of things (IoT). CSEIT1835111— Received, vol. 10, pp. 450–456 (2018)
2.
Zurück zum Zitat Morfino, V., Rampone, S.: Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics 9(3), 444 (2020)CrossRef Morfino, V., Rampone, S.: Towards near-real-time intrusion detection for IoT devices using supervised learning and apache spark. Electronics 9(3), 444 (2020)CrossRef
3.
Zurück zum Zitat Atlam, H.F., Alenezi, A., Alassafi, M.O., Wills, G.: Blockchain with internet of things: benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10(6), 40–48 (2018) Atlam, H.F., Alenezi, A., Alassafi, M.O., Wills, G.: Blockchain with internet of things: benefits, challenges, and future directions. Int. J. Intell. Syst. Appl. 10(6), 40–48 (2018)
4.
Zurück zum Zitat Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)CrossRef Novo, O.: Blockchain meets IoT: an architecture for scalable access management in IoT. IEEE Internet Things J. 5(2), 1184–1195 (2018)CrossRef
5.
Zurück zum Zitat Ccori, P.C., De Biase, L.C.C., Zuffo, M.K., da Silva, F.S.C.: Device discovery strategies for the IoT. In: 2016 IEEE International Symposium on Consumer Electronics (ISCE), pp. 97–98. IEEE (2016) Ccori, P.C., De Biase, L.C.C., Zuffo, M.K., da Silva, F.S.C.: Device discovery strategies for the IoT. In: 2016 IEEE International Symposium on Consumer Electronics (ISCE), pp. 97–98. IEEE (2016)
6.
Zurück zum Zitat Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015) Karagiannis, V., Chatzimisios, P., Vazquez-Gallego, F., Alonso-Zarate, J.: A survey on application layer protocols for the internet of things. Trans. IoT Cloud Comput. 3(1), 11–17 (2015)
7.
Zurück zum Zitat Weissman, D., Jayasumana, A.: Integrating IoT monitoring for security operation center. In: 2020 Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2020) Weissman, D., Jayasumana, A.: Integrating IoT monitoring for security operation center. In: 2020 Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE (2020)
8.
Zurück zum Zitat Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for MQTT-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), pp. 290–295. IEEE (2016) Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for MQTT-based internet of things. In: 2016 IEEE International Conference on Communications Workshops (ICC), pp. 290–295. IEEE (2016)
9.
Zurück zum Zitat Mishra, B., Kertesz, A.: The use of MQTT in M2M and IoT systems: a survey. IEEE Access 8, 201071–201086 (2020)CrossRef Mishra, B., Kertesz, A.: The use of MQTT in M2M and IoT systems: a survey. IEEE Access 8, 201071–201086 (2020)CrossRef
10.
Zurück zum Zitat Jaikar, S.P., Iyer, K.R.: A survey of messaging protocols for IoT systems. Int. J. Adv. Manage. Technol. Eng. Sci. 8(II), 510–514 (2018) Jaikar, S.P., Iyer, K.R.: A survey of messaging protocols for IoT systems. Int. J. Adv. Manage. Technol. Eng. Sci. 8(II), 510–514 (2018)
11.
Zurück zum Zitat Çorak, B.H., Okay, F.Y., Güzel, M., Murt, Ş., Ozdemir, S.: Comparative analysis of IoT communication protocols. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2018) Çorak, B.H., Okay, F.Y., Güzel, M., Murt, Ş., Ozdemir, S.: Comparative analysis of IoT communication protocols. In: 2018 International Symposium on Networks, Computers and Communications (ISNCC), pp. 1–6. IEEE (2018)
12.
Zurück zum Zitat Hillar, G.C.: MQTT Essentials-A lightweight IoT protocol. Packt Publishing Ltd, Birmingham (2017) Hillar, G.C.: MQTT Essentials-A lightweight IoT protocol. Packt Publishing Ltd, Birmingham (2017)
13.
Zurück zum Zitat Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India (2019) Anthraper, J.J., Kotak, J.: Security, privacy and forensic concern of MQTT protocol. In: Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India (2019)
14.
Zurück zum Zitat Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Global Perspect. 27(3), 162–182 (2018) Mena, D.M., Papapanagiotou, I., Yang, B.: Internet of things: survey on security. Inf. Secur. J. Global Perspect. 27(3), 162–182 (2018)
15.
Zurück zum Zitat Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M., et al.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)CrossRef Tawalbeh, L., Muheidat, F., Tawalbeh, M., Quwaider, M., et al.: IoT privacy and security: challenges and solutions. Appl. Sci. 10(12), 4102 (2020)CrossRef
16.
Zurück zum Zitat Subahi, A., Theodorakopoulos, G.: Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic. Sensors 19(21), 4777 (2019)CrossRef Subahi, A., Theodorakopoulos, G.: Detecting IoT user behavior and sensitive information in encrypted IoT-app traffic. Sensors 19(21), 4777 (2019)CrossRef
17.
Zurück zum Zitat Radha, V., Reddy, D.H.: A survey on single sign-on techniques. Procedia Technol. 4, 134–139 (2012) Radha, V., Reddy, D.H.: A survey on single sign-on techniques. Procedia Technol. 4, 134–139 (2012)
18.
Zurück zum Zitat Fremantle, P., Aziz, B., Kopeckỳ, J., Scott, P.: Federated identity and access management for the internet of things. In: 2014 International Workshop on Secure Internet of Things, pp. 10–17. IEEE (2014) Fremantle, P., Aziz, B., Kopeckỳ, J., Scott, P.: Federated identity and access management for the internet of things. In: 2014 International Workshop on Secure Internet of Things, pp. 10–17. IEEE (2014)
19.
Zurück zum Zitat Fremantle, P., Aziz, B.: OAuthing: privacy-enhancing federation for the internet of things. In: 2016 Cloudification of the Internet of Things (CIoT), pp. 1–6. IEEE (2016) Fremantle, P., Aziz, B.: OAuthing: privacy-enhancing federation for the internet of things. In: 2016 Cloudification of the Internet of Things (CIoT), pp. 1–6. IEEE (2016)
20.
Zurück zum Zitat Rozik, A.S., Tolba, A.S., El-Dosuky, M.A.: Design and implementation of the sense Egypt platform for real-time analysis of IoT data streams. Adv. Internet Things 6(4), 65–91 (2016)CrossRef Rozik, A.S., Tolba, A.S., El-Dosuky, M.A.: Design and implementation of the sense Egypt platform for real-time analysis of IoT data streams. Adv. Internet Things 6(4), 65–91 (2016)CrossRef
21.
Zurück zum Zitat Hugo, Å., Morin, B., Svantorp, K.: Bridging MQTT and Kafka to support C-ITS: a feasibility study. In: 2020 21st IEEE International Conference on Mobile Data Management (MDM), pp. 371–376. IEEE (2020) Hugo, Å., Morin, B., Svantorp, K.: Bridging MQTT and Kafka to support C-ITS: a feasibility study. In: 2020 21st IEEE International Conference on Mobile Data Management (MDM), pp. 371–376. IEEE (2020)
22.
Zurück zum Zitat Son, H.X., Chen, E.: Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution. Int. J. Adv. Comput. Sci. Appl. 10(2), 507–516 (2019) Son, H.X., Chen, E.: Towards a fine-grained access control mechanism for privacy protection and policy conflict resolution. Int. J. Adv. Comput. Sci. Appl. 10(2), 507–516 (2019)
23.
Zurück zum Zitat Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, ICCSP 2020, pp. 105–109, New York, NY, USA, 2020. Association for Computing Machinery. https://doi.org/10.1145/3377644.3377667 Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: Smart care: integrating blockchain technology into the design of patient-centered healthcare systems. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, ICCSP 2020, pp. 105–109, New York, NY, USA, 2020. Association for Computing Machinery. https://​doi.​org/​10.​1145/​3377644.​3377667
24.
Zurück zum Zitat Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31–35, New York, NY, USA, 2020. Association for Computing Machinery (2020). https://doi.org/10.1145/3377644.3377668 Duong-Trung, N., Son, H.X., Le, H.T., Phan, T.T.: On components of a patient-centered healthcare system using smart contract. In: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy, pp. 31–35, New York, NY, USA, 2020. Association for Computing Machinery (2020). https://​doi.​org/​10.​1145/​3377644.​3377668
25.
Zurück zum Zitat Le, H.T., Le, N.T.T., Phien, N.N., Duong-Trung, N.: Introducing multi shippers mechanism for decentralized cash on delivery system. Money 10(6), 13 (2019) Le, H.T., Le, N.T.T., Phien, N.N., Duong-Trung, N.: Introducing multi shippers mechanism for decentralized cash on delivery system. Money 10(6), 13 (2019)
26.
Zurück zum Zitat Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677–684 (2019) Le, N.T.T., et al.: Assuring non-fraudulent transactions in cash on delivery by introducing double smart contracts. Int. J. Adv. Comput. Sci. Appl. 10(5), 677–684 (2019)
27.
Zurück zum Zitat Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116–120 (2019) Hoang, N.M., Son, H.X.: A dynamic solution for fine-grained policy conflict resolution. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 116–120 (2019)
28.
Zurück zum Zitat Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76–80 (2019) Son, H.X., Hoang, N.M.: A novel attribute-based access control system for fine-grained privacy protection. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 76–80 (2019)
29.
Zurück zum Zitat Xuan, S.H., Tran, L.K., Dang, T.K., Pham, Y.N.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25–31. IEEE (2016) Xuan, S.H., Tran, L.K., Dang, T.K., Pham, Y.N.: Rew-XAC: an approach to rewriting request for elastic ABAC enforcement with dynamic policies. In: 2016 International Conference on Advanced Computing and Applications (ACOMP), pp. 25–31. IEEE (2016)
32.
Zurück zum Zitat Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71–78. IEEE (2020) Ha, X.S., Le, H.T., Metoui, N., Duong-Trung, N.: DeM-CoD: novel access-control-based cash on delivery mechanism for decentralized marketplace. In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 71–78. IEEE (2020)
33.
Zurück zum Zitat Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214–227. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-68851-6_15CrossRef Ha, X.S., Le, T.H., Phan, T.T., Nguyen, H.H.D., Vo, H.K., Duong-Trung, N.: Scrutinizing trust and transparency in cash on delivery systems. In: Wang, G., Chen, B., Li, W., Di Pietro, R., Yan, X., Han, H. (eds.) SpaCCS 2020. LNCS, vol. 12382, pp. 214–227. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-68851-6_​15CrossRef
34.
Zurück zum Zitat Son, H.X., Le, T.H., Quynh, N.T.T., Huy, H.N.D., Duong-Trung, N., Luong, H.H.: Toward a blockchain-based technology in dealing with emergencies in patient-centered healthcare systems. In: Bouzefrane, S., Laurent, M., Boumerdassi, S., Renault, E. (eds.) MSPN 2020. LNCS, vol. 12605, pp. 44–56. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-67550-9_4CrossRef Son, H.X., Le, T.H., Quynh, N.T.T., Huy, H.N.D., Duong-Trung, N., Luong, H.H.: Toward a blockchain-based technology in dealing with emergencies in patient-centered healthcare systems. In: Bouzefrane, S., Laurent, M., Boumerdassi, S., Renault, E. (eds.) MSPN 2020. LNCS, vol. 12605, pp. 44–56. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-67550-9_​4CrossRef
Metadaten
Titel
Toward a Unique IoT Network via Single Sign-On Protocol and Message Queue
verfasst von
Tran Thanh Lam Nguyen
The Anh Nguyen
Hong Khanh Vo
Hoang Huong Luong
Huynh Tuan Khoi Nguyen
Anh Tuan Dao
Xuan Son Ha
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-84340-3_22