Pub Date : 2022-03-28DOI: 10.1109/ciot53061.2022.9766463
Muath A. Obaidat, Jian Lim Choong, Kutub Thakur
The rapid and exponential deployment of Internet of things (IoT) that is connected to the Internet has created an internet of vulnerabilities. The successful deployment in different domains of IoT depends on securing the communications in the IoT ecosystem. With the limited resources that these IoT devices have, it's a very challenging task to provide the necessary security measures for such devices. Many application protocols are used in IoT ecosystem. Constrained Application Protocol (CoAP), however, is one of the most used protocols in the e-health system. CoAP in itself does not provide any security measures. In this paper, we propose an enhancement to CoAP to make it provide such necessary security element. We propose a security mechanism to support Authentication and Access Control scheme for CoAP (AAC-CoAP). The results show that the proposed AC enhancement improved the security of IoT devices. In addition, it shows that the CPU calculation time as well as execution time have improved significantly.
{"title":"A Secure Authentication and Access Control Scheme for CoAP-based IoT","authors":"Muath A. Obaidat, Jian Lim Choong, Kutub Thakur","doi":"10.1109/ciot53061.2022.9766463","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766463","url":null,"abstract":"The rapid and exponential deployment of Internet of things (IoT) that is connected to the Internet has created an internet of vulnerabilities. The successful deployment in different domains of IoT depends on securing the communications in the IoT ecosystem. With the limited resources that these IoT devices have, it's a very challenging task to provide the necessary security measures for such devices. Many application protocols are used in IoT ecosystem. Constrained Application Protocol (CoAP), however, is one of the most used protocols in the e-health system. CoAP in itself does not provide any security measures. In this paper, we propose an enhancement to CoAP to make it provide such necessary security element. We propose a security mechanism to support Authentication and Access Control scheme for CoAP (AAC-CoAP). The results show that the proposed AC enhancement improved the security of IoT devices. In addition, it shows that the CPU calculation time as well as execution time have improved significantly.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128922208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-28DOI: 10.1109/ciot53061.2022.9766805
Ramy Mohamed, Sofiane Zemouri
Providing ubiquitous fifth-generation (5G) connectivity is very appealing to advance a wide range of use cases and industry verticals. However, it is expected that the ultimate capability of 5G networks will only be achievable by a blend of technologies centered around 5G to fulfil the needs for different verticals and use cases. In this regard, this paper presents the key requirements to collectively leverage 5G, artificial intelligence, and cloud computing technologies to enable a smart campus/buildings use case. A comprehensive framework is first presented showing the key enabler constituents of this use case, ranging from the network to cloud and application domains interconnected in a 5G testbed. The description of the individual components in the 5G testbed is then explained. Key technical challenges pertaining to smart campus/buildings use case are then discussed, and potential research directions are outlined.
{"title":"Towards a Cloud-Native 5G Service Chaining for IoT and Video Analytics in Smart Campus","authors":"Ramy Mohamed, Sofiane Zemouri","doi":"10.1109/ciot53061.2022.9766805","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766805","url":null,"abstract":"Providing ubiquitous fifth-generation (5G) connectivity is very appealing to advance a wide range of use cases and industry verticals. However, it is expected that the ultimate capability of 5G networks will only be achievable by a blend of technologies centered around 5G to fulfil the needs for different verticals and use cases. In this regard, this paper presents the key requirements to collectively leverage 5G, artificial intelligence, and cloud computing technologies to enable a smart campus/buildings use case. A comprehensive framework is first presented showing the key enabler constituents of this use case, ranging from the network to cloud and application domains interconnected in a 5G testbed. The description of the individual components in the 5G testbed is then explained. Key technical challenges pertaining to smart campus/buildings use case are then discussed, and potential research directions are outlined.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114460853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-28DOI: 10.1109/ciot53061.2022.9766820
Irfanullah, Razaullah, Saleem Aslam, Fazal Muqeem
The safety of occupants in home is an essential and very important. At present, people use liquefied petroleum gas (LPG) and natural gas for cooking and heating purposes in kitchen and many other residential areas. The use of these gases is increasing in every corner of the world. It is environmentally friendly but sometimes creates serious problems and can causes death and damage properties. The evacuation process of home occupants for safety under emergency condition is still a challenge and every year, numerous deaths occur because of gas leakage, smoke, fire and electric short circuiting. To avoid these problems, we step forward and design a safety system using open source hardware platforms, that is Arduino, Raspberry pi, Bluetooth module and multiple sensors based on Internet of Things (IoT's) for real time, monitoring and early detection of such hazards. we also provide a graphical user interface (GUI) to users for checking the status of sensors and actuators. The designed system is accessible from anywhere at any time and provides safety from electric short circuiting, intensive gas leakage, fire and explosive smoke. If the value of the interfaced sensors is greater than a predefined threshold value, the corresponding safety action will be taken automatically. The aim of this research is to cut down human intervention, reduce human efforts, minimize rate of accidents, prevent casualties and tremendous economics losses from above hazards and taking automatic decisions upon an action.
{"title":"Internet of Things Platform for Real Time Automated Safety System Based on Multi Sensor Network and Bluetooth Module","authors":"Irfanullah, Razaullah, Saleem Aslam, Fazal Muqeem","doi":"10.1109/ciot53061.2022.9766820","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766820","url":null,"abstract":"The safety of occupants in home is an essential and very important. At present, people use liquefied petroleum gas (LPG) and natural gas for cooking and heating purposes in kitchen and many other residential areas. The use of these gases is increasing in every corner of the world. It is environmentally friendly but sometimes creates serious problems and can causes death and damage properties. The evacuation process of home occupants for safety under emergency condition is still a challenge and every year, numerous deaths occur because of gas leakage, smoke, fire and electric short circuiting. To avoid these problems, we step forward and design a safety system using open source hardware platforms, that is Arduino, Raspberry pi, Bluetooth module and multiple sensors based on Internet of Things (IoT's) for real time, monitoring and early detection of such hazards. we also provide a graphical user interface (GUI) to users for checking the status of sensors and actuators. The designed system is accessible from anywhere at any time and provides safety from electric short circuiting, intensive gas leakage, fire and explosive smoke. If the value of the interfaced sensors is greater than a predefined threshold value, the corresponding safety action will be taken automatically. The aim of this research is to cut down human intervention, reduce human efforts, minimize rate of accidents, prevent casualties and tremendous economics losses from above hazards and taking automatic decisions upon an action.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-28DOI: 10.1109/ciot53061.2022.9766643
Lorenzo Bacchiani, G. Palma, L. Sciullo, M. Bravetti, Marco De Felice, M. Gabbrielli, G. Zavattaro, Roberto Della Penna, Corrado Iorizzo, Andrea Livaldi, L. Magnotta, Mirko Orsini
The paper presents the SEAWALL platform enabling heterogeneous data acquisition and low-latency processing for the Industry 4.0, developed within the homonymous project founded by the Italian BIREX industrial consortium. The architecture features cutting-edge technologies (such as Kubernetes, ISTIO, KubeEdge, W3C WoT), in order to support the seamless orchestration of workloads among the nodes of a cloud-edge continuum in QoS-aware scenarios where the latency requirement of the anomaly detection must be continuously assessed. The paper presents the industrial use-case from the SEAWALL project and the components of the cloud/edge architecture.
{"title":"SEAWALL: Seamless Low Latency Cloud Platforms for the Industry 4.0","authors":"Lorenzo Bacchiani, G. Palma, L. Sciullo, M. Bravetti, Marco De Felice, M. Gabbrielli, G. Zavattaro, Roberto Della Penna, Corrado Iorizzo, Andrea Livaldi, L. Magnotta, Mirko Orsini","doi":"10.1109/ciot53061.2022.9766643","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766643","url":null,"abstract":"The paper presents the SEAWALL platform enabling heterogeneous data acquisition and low-latency processing for the Industry 4.0, developed within the homonymous project founded by the Italian BIREX industrial consortium. The architecture features cutting-edge technologies (such as Kubernetes, ISTIO, KubeEdge, W3C WoT), in order to support the seamless orchestration of workloads among the nodes of a cloud-edge continuum in QoS-aware scenarios where the latency requirement of the anomaly detection must be continuously assessed. The paper presents the industrial use-case from the SEAWALL project and the components of the cloud/edge architecture.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133462989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-28DOI: 10.1109/ciot53061.2022.9766685
Fabian Sparbrodt, M. García-Valls
Blockchain relies on a peer-to-peer trusted model over a transparent publicly-available distributed ledger. Much has been said about this particular definition, about the technology, its benefits, potential for new market niches, and revolutionary possibilities. Functional aspects are typically put forward, whereas non-functional sides like performance issues and, above all, security threats are left in a second line. The excitement on this technology yields most of the literature to report success cases and final results. However, there are fewer works focusing on practical technology revisions that provide the insights into blockchain fundamental technology. To effectively widespread this technology it is needed to digest the basic tools that enable the creation of a blockchain application and that enable one to join a particular blockchain network of her/his interest. This paper describes and analyzes, from a practical point of view, the implementation of Solidity smart contracts and their deployment on an Ethereum blockchain network. Moreover, it discusses in the end limitations of the technology as far as its security issues is concerned.
{"title":"Digesting smart contracts in Ethereum blockchain networks","authors":"Fabian Sparbrodt, M. García-Valls","doi":"10.1109/ciot53061.2022.9766685","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766685","url":null,"abstract":"Blockchain relies on a peer-to-peer trusted model over a transparent publicly-available distributed ledger. Much has been said about this particular definition, about the technology, its benefits, potential for new market niches, and revolutionary possibilities. Functional aspects are typically put forward, whereas non-functional sides like performance issues and, above all, security threats are left in a second line. The excitement on this technology yields most of the literature to report success cases and final results. However, there are fewer works focusing on practical technology revisions that provide the insights into blockchain fundamental technology. To effectively widespread this technology it is needed to digest the basic tools that enable the creation of a blockchain application and that enable one to join a particular blockchain network of her/his interest. This paper describes and analyzes, from a practical point of view, the implementation of Solidity smart contracts and their deployment on an Ethereum blockchain network. Moreover, it discusses in the end limitations of the technology as far as its security issues is concerned.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"57 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116626412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-10DOI: 10.48550/arXiv.2203.05622
Hai Dinh-Tuan, Felix Beierle
In the last few years, the proliferation of edge and cloud computing infrastructures as well as the increasing number of mobile devices has facilitated the emergence of many novel applications. However, that increase of complexities also creates novel challenges for service providers, for example, the efficient management of interdependent services during runtime. One strategy is to reallocate services dynamically by migrating them to suitable servers. However, not every microservice can be deployed as stateless instances, which leads to suboptimal performance of live migration techniques. In this work, we propose a novel live migration scheme focusing on stateful microservices in edge/cloud environments by utilizing the underlying messaging infrastructure to reconstruct the service's state. Not only can this approach be applied in various microservice deployment scenarios, experimental evaluation results also show a reduction of 19.92% downtime compared to the stop-and-copy migration method.
{"title":"MS2M: A message-based approach for live stateful microservices migration","authors":"Hai Dinh-Tuan, Felix Beierle","doi":"10.48550/arXiv.2203.05622","DOIUrl":"https://doi.org/10.48550/arXiv.2203.05622","url":null,"abstract":"In the last few years, the proliferation of edge and cloud computing infrastructures as well as the increasing number of mobile devices has facilitated the emergence of many novel applications. However, that increase of complexities also creates novel challenges for service providers, for example, the efficient management of interdependent services during runtime. One strategy is to reallocate services dynamically by migrating them to suitable servers. However, not every microservice can be deployed as stateless instances, which leads to suboptimal performance of live migration techniques. In this work, we propose a novel live migration scheme focusing on stateful microservices in edge/cloud environments by utilizing the underlying messaging infrastructure to reconstruct the service's state. Not only can this approach be applied in various microservice deployment scenarios, experimental evaluation results also show a reduction of 19.92% downtime compared to the stop-and-copy migration method.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130029564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-13DOI: 10.1109/ciot53061.2022.9766738
Florian Meyer, Phil Malessa, Jan Niklas Diercks, V. Turau
For data collection scenarios in the industrial Internet of Things, wireless communication offers a cost-effective and easy-to-deploy alternative to wired networks. Especially when data needs to be forwarded via multiple battery-powered nodes to a gateway for analysis in the cloud, high energy efficiency and reliability are required. IEEE 802.15.4 DSME acknowledges every packet individually (ACK), imposing an overhead for each transmitted packet and increasing energy consumption. In networks with little interference, it may thus be beneficial to aggregate ACKs for multiple nodes and broadcast them in a compressed format. This paper compares different of these group acknowledgment (GACK) schemes in best-case and worst-case scenarios and proposes novel GACK schemes to examine whether GACKs constitute a viable alternative to regular ACKs. Results indicate that GACKs can provide a 17% higher reliability than regular ACKs in a best-case scenario. On the other hand, they reduced reliability by at least 15% in comparison to regular ACKs in all other scenarios. Experiments on hardware do not indicate lower energy consumption.
{"title":"Are Group Acknowledgements Worth Anything in IEEE 802.15.4 DSME: A Comparative Analysis","authors":"Florian Meyer, Phil Malessa, Jan Niklas Diercks, V. Turau","doi":"10.1109/ciot53061.2022.9766738","DOIUrl":"https://doi.org/10.1109/ciot53061.2022.9766738","url":null,"abstract":"For data collection scenarios in the industrial Internet of Things, wireless communication offers a cost-effective and easy-to-deploy alternative to wired networks. Especially when data needs to be forwarded via multiple battery-powered nodes to a gateway for analysis in the cloud, high energy efficiency and reliability are required. IEEE 802.15.4 DSME acknowledges every packet individually (ACK), imposing an overhead for each transmitted packet and increasing energy consumption. In networks with little interference, it may thus be beneficial to aggregate ACKs for multiple nodes and broadcast them in a compressed format. This paper compares different of these group acknowledgment (GACK) schemes in best-case and worst-case scenarios and proposes novel GACK schemes to examine whether GACKs constitute a viable alternative to regular ACKs. Results indicate that GACKs can provide a 17% higher reliability than regular ACKs in a best-case scenario. On the other hand, they reduced reliability by at least 15% in comparison to regular ACKs in all other scenarios. Experiments on hardware do not indicate lower energy consumption.","PeriodicalId":180813,"journal":{"name":"2022 5th Conference on Cloud and Internet of Things (CIoT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127673909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}