Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform

被引:11
作者
Ahmed, Mohammed Imtyaz [1 ]
Kannan, G. [1 ]
机构
[1] BS Abdur Rahman Crescent Inst Sci & Technol, ECE Dept, Chennai, Tamil Nadu, India
关键词
Internet of things (IoT); Diffie– Hellman; EC-DH; End to end security;
D O I
10.1007/s11277-021-08439-7
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Internet of Things (IoT) technology became an inter-disciplinary revolution in the contemporary era. It is capable of influencing human lives significantly when used in different domains. It has plethora of use cases like smart transportation, smart healthcare and smart city to mention few. As IoT is capable of combining physical objects and digital objects seamlessly, it has opened gates to have thousands of use cases where IoT integration takes to the next generation of computations and building applications. The present IoT applications lack in end-to-end security as there are different protocols and vendors involved. No standardizations are made yet. Besides, the sources of big data such as sensor networks in IoT use cases generate large volumes of data that needs more lightweight cryptographic solutions. Diffie Hellman when combined with Elliptic Curve (EC-DH) became an ideal choice to have secure and lightweight communications for connected devices in IoT use cases. However, it is still vulnerable to certain kinds of attacks. To overcome this problem, we proposed an enhanced EC-DH known as E-ECDH for higher level of security to IoT applications. We considered an anomaly detection case study which is part of Healthcare industry. IBM cloud, Watson IoT platform and MQ Telemetry Transport messaging protocol are used as part of experimental setup. Experiments revealed the efficiency of the scheme as it provides higher level of security besides improving in performance in data encryption, decryption, execution time and time taken for upload and download. The proposed scheme can be used with real time IoT applications.
引用
收藏
页码:153 / 168
页数:16
相关论文
共 21 条
[1]  
Ahamed J, 2016, INT C ELECT DEVICE S
[2]  
Ahmed I., 2018, J ADV RES DYNAMICAL, P352
[3]  
AL-mawee, 2012, PRIVACY SECURITY ISS, P1
[4]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[5]  
Baranwal T, 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), P597, DOI 10.1109/CONFLUENCE.2016.7508189
[6]   Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities [J].
Celik, Z. Berkay ;
Fernandes, Earlence ;
Pauley, Eric ;
Tan, Gang ;
Mcdaniel, Patrick .
ACM COMPUTING SURVEYS, 2019, 52 (04)
[7]  
Datta Suman, 2016, 2016 74th Annual Device Research Conference (DRC), P1, DOI 10.1109/DRC.2016.7548288
[8]  
Datta Subhajit, 2015, 2015 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM). Proceedings, P1, DOI 10.1109/ESEM.2015.7321215
[9]   Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms [J].
Diaz Lopez, Daniel ;
Blanco Uribe, Maria ;
Santiago Cely, Claudia ;
Tarquino Murgueitio, Daniel ;
Garcia Garcia, Edwin ;
Nespoli, Pantaleone ;
Gomez Marmol, Felix .
SYMMETRY-BASEL, 2018, 10 (12)
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654