PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Some security features of selected IoT platforms

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level review of the existing IoT enabling standalone middleware solutions and frameworks in terms of potential application areas, architecture and components, communication APIs as well as support for key security features including access control, support against attacks on service, device authorization and data filtering. On the one hand, it allows the developer to choose the middleware best matching their needs. On the other hand, it can serve as a starting point for further research on middleware security features based on the provided security related open areas and challenges.
Rocznik
Strony
29--61
Opis fizyczny
Bibliogr. 88 poz., rys., tab.
Twórcy
  • Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Gabriela Narutowicza 11/12, 80–233 Gdansk, Poland
  • Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology, Gabriela Narutowicza 11/12, 80–233 Gdansk, Poland
Bibliografia
  • [1] INFSO D.4 Networked Enterprise & RFID, INFSO G.2 Micro & Nanosystems, RFID Working Group of the European Technology Platform on Smart Systems Integration (EPoSS). Internet of things in 2020, a roadmap for the future2008,Technical report, European Research Cluster on the Internet of Things
  • [2] Dr. Vermesan O, Dr. Friess P, Guillemin P, Gusmeroli S, Sundmaeker H, Dr. Bassi A,Jubert I S, Dr.Mazura M, Dr.Harrison M, Dr.Eisenhauer M and Dr.Doody P 2011 Internet of things strategic research roadmap., IERC, European Research Cluster on the Internet of Things
  • [3] Gubbi J, Buyya R, Marusic S and Palaniswami M 2013 Internet of things (iot): A vision, architectural elements, and future directions, Future Generation Computer Systems, 29(7)1645
  • [4] Karpischek S, Michahelles F, Resatsch F and Fleisch E 2009 Mobile sales assistant – an nfc-based product information system for retailers 20
  • [5] Reilly D F, Welsman-Dinelle M, Bate C and Quinn K I 2005Just point and click?: using handhelds to interact with paper maps, In Mobile HCI
  • [6] Niyato D, Hossain E and Camorlinga S 2009 Remote patient monitoring service using heterogeneous wireless access networks: architecture and optimization, IEEE Journal on Selected Areas in Communications, 27(4)412
  • [7] Yuksel A and Yüksel E 2012 Rfid technology in business systems and supply chain management, Journal of Economic and Social Studies, 153
  • [8] Burrell J, Brooke T and Beckwith R 2004 Vineyard computing: Sensor networks in agricultural production, Pervasive Computing, IEEE, 338
  • [9] Martínez-Sala A S, Egea-López E, Garcia-Sanchez F and García-Haro J 2009 Trackingof returnable packaging and transport units with active rfid in the grocery supply chain, Computers in Industry, 60(3)161
  • [10] Vashi S, Ram J, Modi J, Verma S and Prakash C 2017 Internet of things (iot): A vision, architectural elements, and security issues, 2017 International Conference on I-SMAC(IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) 492
  • [11] Perera C, Zaslavsky A, Christen P and Georgakopoulos D 2013 Context aware computing for the internet of things: A survey, CoRR
  • [12] Tan L and Wang N 2010 Future internet: The internet of things 5376
  • [13] Khan R, Khan S, Zaheer R and Khan S. 2012, Future internet: The internet of things architecture, possible applications and key challenges 257
  • [14] Delicato C F, Pires P F and Zomaya A Y 2014 Service-Oriented Middleware: Overview and Illustrative Example 675 Springer Berlin Heidelberg, Berlin, Heidelberg
  • [15] Spiess P, Karnouskos S, Guinard D, Savio D, Baecker O, Sá de Souza L M and Trifa V Soa-based integration of the internet of things in enterprise services, 2009 IEEE International Conference on Web Services 968
  • [16] Razzaque M A, Milojevic M, Palade A and Clarke S 2015 Middleware for internet of things: a survey, IEEE Internet of Things Journal, 31
  • [17] Issarny V, Georgantas N, Hachem S, Zarras A, Vassiliadist P, Autili M, Gerosa M A and Hamida A B 2011 Service-oriented middleware for the future internet: state of the art and research directions, Journal of Internet Services and Applications, 2(1)23
  • [18] Czarnul P 2015 Integration of Services into Workflow Applications, Chapman and Hall/CRC
  • [19] Czarnul P 2013 Modeling, run-time optimization and execution of distributed work flow applications in the jee-based bee sycluster environment, The Journal of Supercomputing, 63(1)46
  • [20] Czarnul P 2013 A model, design, and implementation of an efficient multithreaded workflow execution engine with data streaming, caching, and storage constraints, The Journal of Supercomputing, 63(3)919
  • [21] 2018 Information security management systems - Overview and vocabulary, Standard, International Organization for Standardization
  • [22] Russell D and Gangemi G T 1991 Computer Security Basics, O’Reilly & Associates, Inc. USA
  • [23] Zao J K, Wang M, Tsai P and Liu J W S 2010 Smart phone based medicine in-take scheduler, reminder and monitor, In The 12th IEEE International Conference on e-Health Networking, Applications and Services 162
  • [24] Czarnul P 2013Design of a distributed system using mobile devices and workflow management for measurement and control of a smart home and health, In 2013 6thInternational Conference on Human System Interactions (HSI)184
  • [25] Baseline security recommendations for iot in the context of critical information infrastructures 2017, European Union Agency for Network and Information Security, Technical report, ENISA - European Union Agency for Network and Information Security
  • [26] Rayome A D 2018 As iot attacks increase 600% in one year, businesses need to up their security
  • [27] Vigliarolo B 2018 Bad user practices caused 41% of medical iot security issues in 2017
  • [28] Krawczyk H 2019 Service-oriented cyberspace for improving cybersecurity, TASK Quarterly: scientific bulletin of Academic Computer Centre in Gdansk, 23(2)141
  • [29] Mayuri A and Sudhir T 2015 Internet of things: Architecture, security issues and countermeasures, International Journal of Computer Applications, 1251
  • [30] Farooq M U, Waseem M, Khairi A and Sadia Mazhar P S 2015 A critical analysis on the security concerns of internet of things (iot),International Journal of ComputerApplications 1111
  • [31] Xiaohui X 2013 Study on security problems and key technologies of the internet of things 407
  • [32] Sicari S, Rizzardi A, Grieco L and Coen-Porisini A 2015 Security, privacy and trust in internet of things: The road ahead, Computer Networks, 76(01)146
  • [33] Jung M 2013 Iotsys - internet of things integration middleware, https://code.google.com/archive/p/iotsys/
  • [34] Open IoT Consortium Open iot project, http://www.openiot.eu
  • [35] Kang P, Borcea C, Xu G, Saxena A, Kremer U and Iftode L 2004 Smart messages: A distributed computing platform for networks of embedded systems, The Computer Journal ,47(4)475
  • [36] Heinzelman W B, Murphy A L, Carvalho H S and Perillo M A 2004 Middleware to support sensor network applications, Network. Mag. of Global Internetwkg.,18(1)6
  • [37] Sacramento V, Endler M, Rubinsztejn H K, Lima L S, Goncalves K, Nascimento F Nand Bueno G A 2004 Moca: A middleware for developing collaborative applications for mobile users, IEEE Distributed Systems Online, 5(10)2
  • [38] Alex H, Kumar M and Shirazi B 2004 Midfusion: middleware for information fusion in sensor network applications, In Proceedings of the 2004 Intelligent Sensors, Sensor Networks and Information Processing Conference 617
  • [39] Souto E, Guimarães G, Vasconcelos G, Vieira M, Rosa N, Ferraz C and Kelner J 2006 Mires: a publish/subscribe middleware for sensor networks, Personal and Ubiquitous Computing, 10(1)37
  • [40] Hasiotis T, Alyfantis G, Tsetsos V, Sekkas O and Hadjiefthymiades S 2005 Sensation: a middleware integration platform for pervasive applications in wireless sensor networks. In Proceedings of the Second European Workshop on Wireless Sensor 366 Networks
  • [41] Mueller R, Alonso G and Kossmann D 2007 Swissqm: Next generation data processing in sensor networks, In CIDR’07
  • [42] Lima R d C A, Rosa S N and Marques I R L 2008Ts-mid: Middleware for wireless sensor networks based on tuple space, In 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008) 886
  • [43] Badii A, Crouch M and Lallah CH 2010A context-awareness framework for intelligent networked embedded systems 105
  • [44] Hoffmann M, Badii A, Engberg S, Nair R, Thiemert D, Matthess M and Schütte J 2019 Towards semantic resolution of security in ambient environments, Fraunhofer SIT
  • [45] L F, Sehic S and Dustdar S 2010 Copal: An adaptive approach to context provisioning.2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications 286
  • [46] Eclipse Eclipse leshan, https://projects.eclipse.org/projects/iot.leshan
  • [47] Yao Y and Gehrke J 2002 The cougar approach to in-network query processing in sensor networks, ACM SIGMOD Record, 31(09)9
  • [48]Cornell University Cougar project, http://www.cs.cornell.edu/database/cougar/in-dex.php
  • [49] Li S, Lin Y, Son S H, Stankovic J A and Wei Y 2004 Event detection services using data service middleware in distributed sensor networks, Telecommunication Systems, 26(2)351
  • [50] Gibbons P B, Karp B, Ke Y, Nath S and Seshan S 2003 Irisnet: An architecture for a world wide sensor web, IEEE Pervasive Computing,02(4)22
  • [51] Chen H, Finin W T and Joshi A 2003 An intelligent broker for context-aware systems
  • [52] Aberer K, Hauswirth M and Salehi A 2006 A middleware for fast and flexible sensor network deployment, In Proceedings of the 32Nd International Conference on Very Large Data Bases. VLDB Endowment, VLDB, 61199
  • [53] Aberer K, Hauswirth M and Salehi A 2006 Gsn global sensor networkshttps://github.com/LSIR/gsn
  • [54] Gluhak A, Presser M, Shelby Z, Scotton P, Schott W and Chevillat P 2019 e-sensereference model for sensor networks in b3g mobile communication systems
  • [55] Lombriser C, Perianu M M, Perianu R M, Roggen D, Havinga P and Troster G 2007 Organizing context information processing in dynamic wireless sensor networks, In 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information 67
  • [56] Horré W, Michiels S, Joosen W and Verbaeten P 2008 Davim: Adaptable miaddleware for sensor networks, IEEE Distributed Systems Online, 9(1)1
  • [57] Pietschmann S, Mitschick A, Winkler R and Meißner K 2008 Croco: Ontology-based, cross-application context management, In 2008 Third International Workshop on Semantic Media Adaptation and Personalization 88
  • [58] Rouvoy R, Barone P, Ding Y, Eliassen F, Hallsteinsen S, Lorenzo J, Mamelli A and Scholz U 2009 Software engineering for self-adaptive systems, chapter MUSIC: Middle-ware Support for Self-Adaptation in Ubiquitous and Service-Oriented Environments 164 Springer-Verlag, Berlin, Heidelberg
  • [59] Zhou X, Tang X, Yuan X and Chen D 2009 Spbca: Semantic pattern-based context-aware middle ware, In 2009 15th International Conference on Parallel and Distributed Systems 891
  • [60] Guo B, Sun L and Zhang D 2010 The architecture design of a cross-domain context management system 499
  • [61] Terziyan V, Kaykova O and Zhovtobryukh D 2010Ubiroad: Semantic middleware for context-aware smart road environments, In Proceedings of the 2010 Fifth International Conference on Internet and Web Applications and Services, ICIW 10295 Washington, DC, USA
  • [62] Corredor I, Martínez M J, Familiar S M and López L 2012Knowledge-aware and service-oriented middleware for deploying pervasive services, J. Netw. Comput. Appl., 35(2)562
  • [63] Raverdy P, Issarny V and Caporuscio M 2010ubisoap: A service-oriented middleware for ubiquitous networking, IEEE Transactions on Services Computing, 586
  • [64] Perera C, Jayaraman P P, Zaslavsky A, Georgakopoulos D and Christen P 2014 Mosden:An internet of things middleware for resource constrained mobile devices, In 2014 47thHawaii International Conference on System Sciences (HICSS) 001053
  • [65] Jung M 2014An integration middleware for the internet of things
  • [66] Delicato F, Silva J R, Pirmez L, Pires P, Portocarrero J, Batista T and Rodrigues T 2014 Prisma: Publish/subscribe and resource oriented middleware for wireless sensor networks 2014
  • [67] Duhart C, Sauvage P and Bertelle C 2015 EMMA:A resource oriented framework for service choreography over wireless sensor and actor networks, CoRR
  • [68] Moldovan G, Tragos E Z, Fragkiadakis A, Pohls H C and Calvo D 2016 An iot middleware for enhanced security and privacy: The rerum approach, In 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS) 1
  • [69] Rausch T, Nastic S and Dustdar S 2018 Emma: Distributed qos-aware mqtt middleware for edge computing applications, In 2018 IEEE International Conference on Cloud Engineering (IC2E) 191
  • [70] Google. Xively, https://xively.com/
  • [71] KaaIoT Technologies. Kaa, https://www.kaaproject.org/overview/
  • [72] SiteWhere LLC Sitewhere, http://www.sitewhere.org/
  • [73] DataArt Solutions, Device hive, https://devicehive.com/
  • [74] DataArt Solutions, Devicehive - usage, https://devicehive.com/industries/
  • [75] FIWARE FOUNDATION Fiware, https://www.fiware.org/
  • [76] Celesti A, Fazio M, Márquez G F, Glikson A, Mauwa H, Bagula A, Celesti F and Villari M 2019 How to develop iot cloud e-health systems based on fiware: A lesson learnt, Journal of Sensor and Actuator Networks, 8(1)1 https://www.mdpi.com/2224-2708/8/1/7
  • [77] López-Riquelme J A, Pavón-Pulido N, Navarro-Hellín H, Soto-Valles F and Torres-Sánchez R 2017 A software architecture based on FIWARE cloud for Precision Agriculture, Agricultural Water Management, 183(C)123
  • [78] Fernández P, Santana J M, Ortega s, Trujillo A, Suárez J P, Domínguez C, Santana J and Sánchez A 2016 Smartport: A platform for sensor data monitoring in a seaport based on fiware, Sensors,16(3)1 https://www.mdpi.com/1424-8220/16/3/417
  • [79] Carnevale L, Galletta A, Fazio M, Celesti A and Villari M 2018 Designing a fiware cloud solution for making your travel smoother: The fliware experience, In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC)392
  • [80] Ayoade G, El-Ghamry A, Karande V, Khan L, Alrahmawy M and Rashad Z M 2019 Secure data processing for iot middleware systems, The Journal of Supercomputing, 75(8)4684
  • [81] Fremantle P and Scott P 2017 A survey of secure middleware for the internet of things, Peer J Computer Science, 3(e114)
  • [82] Vulpe A, Arseni S C, Marcu I, Voicu C and Fratu O 2017 Building a unified middle ware architecture for security in iot.,In Álvaro Rocha, Ana Maria Correia, Hojjat Adeli, Luís Paulo Reis, and Sandra Costanzo, editors, Recent Advances in Information Systems and Technologies 105 Cham
  • [83] Panarello A, Tapas N, Merlino G, Longo F and Puliafito A 2018 Blockchain and iot integration: A systematic survey, Sensors,182575
  • [84] Anus A and Buchwald P 2019Safe locker - a secure cargo transport control support it system, TASK Quarterly: scientific bulletin of Academic Computer Centre in Gdansk, 23(1)19
  • [85] López D, Uribe M, Santiago C, Murgueitio D, Garcia E, Nespoli P and Marmol F G 2018 Developing secure iot services: A security-oriented review of iot platforms, Symmetry,10669
  • [86] Mohsin M, Anwar Z, Husari G, Al-Shaer E and Rahman M 2016 Iotsat: A for malframe work for security analysis of the internet of things (iot)180
  • [87] Ge M, Hong J B, Guttmann W and Kim D S 2017 A framework for automating security analysis of the internet of things, J. Netw. Comput. Appl., 83(C)12
  • [88] Mohsin M, Anwar Z, Zaman F and Al-Shaer E 2017Iotchecker: A data-driven framework for security analytics of internet of things configurations, Computers & Security 70 199
Uwagi
PL
Opracowanie rekordu ze środków MNiSW, umowa Nr 461252 w ramach programu "Społeczna odpowiedzialność nauki" - moduł: Popularyzacja nauki i promocja sportu (2021).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-7365140f-f96f-4cef-85db-a70c2f2a71b3
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.