scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Internet of Things Journal in 2017"


Journal ArticleDOI
TL;DR: The relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber- physical world, are explored and existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development.
Abstract: Fog/edge computing has been proposed to be integrated with Internet of Things (IoT) to enable computing services devices deployed at network edge, aiming to improve the user’s experience and resilience of the services in case of failures. With the advantage of distributed architecture and close to end-users, fog/edge computing can provide faster response and greater quality of service for IoT applications. Thus, fog/edge computing-based IoT becomes future infrastructure on IoT development. To develop fog/edge computing-based IoT infrastructure, the architecture, enabling techniques, and issues related to IoT should be investigated first, and then the integration of fog/edge computing and IoT should be explored. To this end, this paper conducts a comprehensive overview of IoT with respect to system architecture, enabling technologies, security and privacy issues, and present the integration of fog/edge computing and IoT, and applications. Particularly, this paper first explores the relationship between cyber-physical systems and IoT, both of which play important roles in realizing an intelligent cyber-physical world. Then, existing architectures, enabling technologies, and security and privacy issues in IoT are presented to enhance the understanding of the state of the art IoT development. To investigate the fog/edge computing-based IoT, this paper also investigate the relationship between IoT and fog/edge computing, and discuss issues in fog/edge computing-based IoT. Finally, several applications, including the smart grid, smart transportation, and smart cities, are presented to demonstrate how fog/edge computing-based IoT to be implemented in real-world applications.

2,057 citations


Journal ArticleDOI
TL;DR: This survey will explore the most relevant limitations of IoT devices and their solutions, and present the classification of IoT attacks, and analyze the security issues in different layers.
Abstract: Internet-of-Things (IoT) are everywhere in our daily life. They are used in our homes, in hospitals, deployed outside to control and report the changes in environment, prevent fires, and many more beneficial functionality. However, all those benefits can come of huge risks of privacy loss and security issues. To secure the IoT devices, many research works have been conducted to countermeasure those problems and find a better way to eliminate those risks, or at least minimize their effects on the user’s privacy and security requirements. The survey consists of four segments. The first segment will explore the most relevant limitations of IoT devices and their solutions. The second one will present the classification of IoT attacks. The next segment will focus on the mechanisms and architectures for authentication and access control. The last segment will analyze the security issues in different layers.

804 citations


Journal ArticleDOI
TL;DR: In this paper, the authors study and systematize existing research on CPS security under a unified framework, which consists of three orthogonal coordinates: 1) from the security perspective, they follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from CPS components, they focus on cyber, physical, and cyber-physical components.
Abstract: With the exponential growth of cyber-physical systems (CPSs), new security challenges have emerged. Various vulnerabilities, threats, attacks, and controls have been introduced for the new generation of CPS. However, there lacks a systematic review of the CPS security literature. In particular, the heterogeneity of CPS components and the diversity of CPS systems have made it difficult to study the problem with one generalized model. In this paper, we study and systematize existing research on CPS security under a unified framework. The framework consists of three orthogonal coordinates: 1) from the security perspective, we follow the well-known taxonomy of threats, vulnerabilities, attacks and controls; 2) from the CPS components perspective, we focus on cyber, physical, and cyber-physical components; and 3) from the CPS systems perspective, we explore general CPS features as well as representative systems (e.g., smart grids, medical CPS, and smart cars). The model can be both abstract to show general interactions of components in a CPS application, and specific to capture any details when needed. By doing so, we aim to build a model that is abstract enough to be applicable to various heterogeneous CPS applications; and to gain a modular view of the tightly coupled CPS components. Such abstract decoupling makes it possible to gain a systematic understanding of CPS security, and to highlight the potential sources of attacks and ways of protection. With this intensive literature review, we attempt to summarize the state-of-the-art on CPS security, provide researchers with a comprehensive list of references, and also encourage the audience to further explore this emerging field.

658 citations


Journal ArticleDOI
TL;DR: A thorough analysis of the challenges and the enabling technologies in developing an IoT middleware that embraces the heterogeneity of IoT devices and also supports the essential ingredients of composition, adaptability, and security aspects of an IoT system is conducted.
Abstract: The Internet of Things (IoT) provides the ability for humans and computers to learn and interact from billions of things that include sensors, actuators, services, and other Internet-connected objects. The realization of IoT systems will enable seamless integration of the cyber world with our physical world and will fundamentally change and empower human interaction with the world. A key technology in the realization of IoT systems is middleware, which is usually described as a software system designed to be the intermediary between IoT devices and applications. In this paper, we first motivate the need for an IoT middleware via an IoT application designed for real-time prediction of blood alcohol content using smartwatch sensor data. This is then followed by a survey on the capabilities of the existing IoT middleware. We further conduct a thorough analysis of the challenges and the enabling technologies in developing an IoT middleware that embraces the heterogeneity of IoT devices and also supports the essential ingredients of composition, adaptability, and security aspects of an IoT system.

573 citations


Journal ArticleDOI
TL;DR: The technical opportunities offered and the technical challenges faced by the IoT in the smart building arena are reviewed, including power over Ethernet, as part of an IoT-based solution, which offers disruptive opportunities in revolutionizing the in-building connectivity of a large swath of devices.
Abstract: The Internet of Things (IoT) is entering the daily operation of many industries; applications include but are not limited to smart cities, smart grids, smart homes, physical security, e-health, asset management, and logistics. For example, the concept of smart cities is emerging in multiple continents, where enhanced street lighting controls, infrastructure monitoring, public safety and surveillance, physical security, gunshot detection, meter reading, and transportation analysis and optimization systems are being deployed on a city-wide scale. A related and cost-effective user-level IoT application is the support of IoT-enabled smart buildings. Commercial space has substantial requirements in terms of comfort, usability, security, and energy management. IoT-based systems can support these requirements in an organic manner. In particular, power over Ethernet, as part of an IoT-based solution, offers disruptive opportunities in revolutionizing the in-building connectivity of a large swath of devices. However, a number of deployment-limiting issues currently impact the scope of IoT utilization, including lack of comprehensive end-to-end standards, fragmented cybersecurity solutions, and a relative dearth of fully-developed vertical applications. This paper reviews some of the technical opportunities offered and the technical challenges faced by the IoT in the smart building arena.

501 citations


Journal ArticleDOI
TL;DR: Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.
Abstract: As modern vehicle and communication technologies advanced apace, people begin to believe that the Intelligent Transportation System (ITS) would be achievable in one decade. ITS introduces information technology to the transportation infrastructures and aims to improve road safety and traffic efficiency. However, security is still a main concern in vehicular communication systems (VCSs). This can be addressed through secured group broadcast. Therefore, secure key management schemes are considered as a critical technique for network security. In this paper, we propose a framework for providing secure key management within the heterogeneous network. The security managers (SMs) play a key role in the framework by capturing the vehicle departure information, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel network topology based on a decentralized blockchain structure. The blockchain concept is proposed to simplify the distributed key management in heterogeneous VCS domains. The second part of the framework uses the dynamic transaction collection period to further reduce the key transfer time during vehicles handover. Extensive simulations and analysis show the effectiveness and efficiency of the proposed framework, in which the blockchain structure performs better in term of key transfer time than the structure with a central manager, while the dynamic scheme allows SMs to flexibly fit various traffic levels.

466 citations


Journal ArticleDOI
TL;DR: A functional framework is provided that identifies the acquisition, management, processing and mining areas of IoT big data, and several associated technical modules are defined and described in terms of their key characteristics and capabilities.
Abstract: Internet of Things (IoT) related applications have emerged as an important field for both engineers and researchers, reflecting the magnitude and impact of data-related problems to be solved in contemporary business organizations especially in cloud computing. This paper first provides a functional framework that identifies the acquisition, management, processing and mining areas of IoT big data, and several associated technical modules are defined and described in terms of their key characteristics and capabilities. Then current research in IoT application is analyzed, moreover, the challenges and opportunities associated with IoT big data research are identified. We also report a study of critical IoT application publications and research topics based on related academic and industry publications. Finally, some open issues and some typical examples are given under the proposed IoT-related research framework.

456 citations


Journal ArticleDOI
TL;DR: A simple, yet general, model to support the QoS-aware deployment of multicomponent IoT applications to Fog infrastructures is proposed and a Java tool, FogTorch, based on the proposed model has been prototyped.
Abstract: Fog computing aims at extending the Cloud by bringing computational power, storage, and communication capabilities to the edge of the network, in support of the IoT. Segmentation, distribution, and adaptive deployment of functionalities over the continuum from Things to Cloud are challenging tasks, due to the intrinsic heterogeneity, hierarchical structure, and very large scale infrastructure they will have to exploit. In this paper, we propose a simple, yet general, model to support the QoS-aware deployment of multicomponent IoT applications to Fog infrastructures. The model describes operational systemic qualities of the available infrastructure (latency and bandwidth), interactions among software components and Things, and business policies. Algorithms to determine eligible deployments for an application to a Fog infrastructure are presented. A Java tool, FogTorch , based on the proposed model has been prototyped.

378 citations


Journal ArticleDOI
TL;DR: A framework for structural health monitoring (SHM) using IoT technologies on intelligent and reliable monitoring is introduced and technologies involved in IoT and SHM system implementation as well as data routing strategy in IoT environment are presented.
Abstract: Internet of Things (IoT) has recently received a great attention due to its potential and capacity to be integrated into any complex system. As a result of rapid development of sensing technologies such as radio-frequency identification, sensors and the convergence of information technologies such as wireless communication and Internet, IoT is emerging as an important technology for monitoring systems. This paper reviews and introduces a framework for structural health monitoring (SHM) using IoT technologies on intelligent and reliable monitoring. Specifically, technologies involved in IoT and SHM system implementation as well as data routing strategy in IoT environment are presented. As the amount of data generated by sensing devices are voluminous and faster than ever, big data solutions are introduced to deal with the complex and large amount of data collected from sensors installed on structures.

319 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed a joint optimization framework for all the nodes, DSOs, and DSSs to achieve the optimal resource allocation schemes in a distributed fashion, where a Stackelberg game was formulated to analyze the pricing problem for the DSO and the resource allocation problem for DSS.
Abstract: Fog computing is a promising architecture to provide economical and low latency data services for future Internet of Things (IoT)-based network systems. Fog computing relies on a set of low-power fog nodes (FNs) that are located close to the end users to offload the services originally targeting at cloud data centers. In this paper, we consider a specific fog computing network consisting of a set of data service operators (DSOs) each of which controls a set of FNs to provide the required data service to a set of data service subscribers (DSSs). How to allocate the limited computing resources of FNs to all the DSSs to achieve an optimal and stable performance is an important problem. Therefore, we propose a joint optimization framework for all FNs, DSOs, and DSSs to achieve the optimal resource allocation schemes in a distributed fashion. In the framework, we first formulate a Stackelberg game to analyze the pricing problem for the DSOs as well as the resource allocation problem for the DSSs. Under the scenarios that the DSOs can know the expected amount of resource purchased by the DSSs, a many-to-many matching game is applied to investigate the pairing problem between DSOs and FNs. Finally, within the same DSO, we apply another layer of many-to-many matching between each of the paired FNs and serving DSSs to solve the FN-DSS pairing problem. Simulation results show that our proposed framework can significantly improve the performance of the IoT-based network systems.

312 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of different SDN-based technologies, which are useful to fulfill the requirements of IoT, from different networking aspects—edge, access, core, and data center networking.
Abstract: Internet of things (IoT) facilitates billions of devices to be enabled with network connectivity to collect and exchange real-time information for providing intelligent services. Thus, IoT allows connected devices to be controlled and accessed remotely in the presence of adequate network infrastructure. Unfortunately, traditional network technologies such as enterprise networks and classic timeout-based transport protocols are not capable of handling such requirements of IoT in an efficient, scalable, seamless, and cost-effective manner. Besides, the advent of software-defined networking (SDN) introduces features that allow the network operators and users to control and access the network devices remotely, while leveraging the global view of the network. In this respect, we provide a comprehensive survey of different SDN-based technologies, which are useful to fulfill the requirements of IoT, from different networking aspects— edge , access , core , and data center networking. In these areas, the utility of SDN-based technologies is discussed, while presenting different challenges and requirements of the same in the context of IoT applications. We present a synthesized overview of the current state of IoT development. We also highlight some of the future research directions and open research issues based on the limitations of the existing SDN-based technologies.

Journal ArticleDOI
TL;DR: In this article, a LoRa error model is constructed from extensive complex baseband bit error rate simulations and used as an interference model in an ns-3 module that enables to study multichannel, multispreading factor, multigateway, bi-directional LoRaWAN networks with thousands of end devices.
Abstract: As LoRaWAN networks are actively being deployed in the field, it is important to comprehend the limitations of this low power wide area network technology. Previous work has raised questions in terms of the scalability and capacity of LoRaWAN networks as the number of end devices grows to hundreds or thousands per gateway. Some works have modeled LoRaWAN networks as pure ALOHA networks, which fails to capture important characteristics such as the capture effect and the effects of interference. Other works provide a more comprehensive model by relying on empirical and stochastic techniques. This paper uses a different approach where a LoRa error model is constructed from extensive complex baseband bit error rate simulations and used as an interference model. The error model is combined with the LoRaWAN MAC protocol in an ns-3 module that enables to study multichannel, multispreading factor, multigateway, bi-directional LoRaWAN networks with thousands of end devices. Using the LoRaWAN ns-3 module, a scalability analysis of LoRaWAN shows the detrimental impact downstream traffic has on the delivery ratio of confirmed upstream traffic. The analysis shows that increasing gateway density can ameliorate but not eliminate this effect, as stringent duty cycle requirements for gateways continue to limit downstream opportunities.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a signal quality-aware Internet of Things (IoT)-enabled electrocardiogram (ECG) telemetry system for continuous cardiac health monitoring applications.
Abstract: In this paper, we propose a novel signal quality-aware Internet of Things (IoT)-enabled electrocardiogram (ECG) telemetry system for continuous cardiac health monitoring applications. The proposed quality-aware ECG monitoring system consists of three modules: 1) ECG signal sensing module; 2) automated signal quality assessment (SQA) module; and 3) signal-quality aware (SQAw) ECG analysis and transmission module. The main objectives of this paper are: design and development of a light-weight ECG SQA method for automatically classifying the acquired ECG signal into acceptable or unacceptable class and real-time implementation of proposed IoT-enabled ECG monitoring framework using ECG sensors, Arduino, Android phone, Bluetooth, and cloud server. The proposed framework is tested and validated using the ECG signals taken from the MIT-BIH arrhythmia and Physionet challenge databases and the real-time recorded ECG signals under different physical activities. Experimental results show that the proposed SQA method achieves promising results in identifying the unacceptable quality of ECG signals and outperforms existing methods based on the morphological and RR interval features and machine learning approaches. This paper further shows that the transmission of acceptable quality of ECG signals can significantly improve the battery lifetime of IoT-enabled devices. The proposed quality-aware IoT paradigm has great potential for assessing clinical acceptability of ECG signals in improvement of accuracy and reliability of unsupervised diagnosis system.

Journal ArticleDOI
TL;DR: A survey on clustering over the last two decades reveals that QoS aware clustering demands more attention and indicates that clustering techniques enhanced with smart network selection solutions could highly benefit the QoS and QoE in IoT.
Abstract: Wireless sensor network (WSN) systems are typically composed of thousands of sensors that are powered by limited energy resources. To extend the networks longevity, clustering techniques have been introduced to enhance energy efficiency. This paper presents a survey on clustering over the last two decades. Existing protocols are analyzed from a quality of service (QoS) perspective including three common objectives, those of energy efficiency, reliable communication and latency awareness. This review reveals that QoS aware clustering demands more attention. Furthermore, there is a need to clarify how to improve quality of user experience (QoE) through clustering. Understanding the users’ requirements is critical in intelligent systems for the purpose of enabling the ability of supporting diverse scenarios. User awareness or user oriented design is one remaining challenging problem in clustering. In additional, this paper discusses the potential challenges of implementing clustering schemes to Internet of Things (IoT) systems in 5G networks. We indicate that clustering techniques enhanced with smart network selection solutions could highly benefit the QoS and QoE in IoT. As the current studies for WSNs are conducted either in homogeneous or low level heterogeneous networks, they are not ideal or even not able to function in highly dynamic IoT systems with a large range of user scenarios. Moreover, when 5G is finally realized, the problem will become more complex than that in traditional simplified WSNs. Several challenges related to applying clustering techniques to IoT in 5G environment are presented and discussed.

Journal ArticleDOI
Jiming Chen1, Kang Hu1, Wang Qi1, Yuyi Sun1, Zhiguo Shi1, Shibo He1 
TL;DR: A system that includes NB devices, an IoT cloud platform, an application server, and a user app is designed that provides an easy approach to academic research as well as commercial applications.
Abstract: Recently, narrowband Internet of Things (NB-IoT), one of the most promising low power wide area (LPWA) technologies, has attracted much attention from both academia and industry. It has great potential to meet the huge demand for machine-type communications in the era of IoT. To facilitate research on and application of NB-IoT, in this paper, we design a system that includes NB devices, an IoT cloud platform, an application server, and a user app. The core component of the system is to build a development board that integrates an NB-IoT communication module and a subscriber identification module, a micro-controller unit and power management modules. We also provide a firmware design for NB device wake-up, data sensing, computing and communication, and the IoT cloud configuration for data storage and analysis. We further introduce a framework on how to apply the proposed system to specific applications. The proposed system provides an easy approach to academic research as well as commercial applications.

Journal ArticleDOI
TL;DR: An efficient and secure data acquisition scheme based on ciphertext policy attribute-based encryption that can fulfill the security requirements of the Cloud-IoT in smart grid and effectively reduce the time cost compared with other popular approaches.
Abstract: Cloud-supported Internet of Things (Cloud-IoT) has been broadly deployed in smart grid systems. The IoT front-ends are responsible for data acquisition and status supervision, while the substantial amount of data is stored and managed in the cloud server. Achieving data security and system efficiency in the data acquisition and transmission process are of great significance and challenging, because the power grid-related data is sensitive and in huge amount. In this paper, we present an efficient and secure data acquisition scheme based on ciphertext policy attribute-based encryption. Data acquired from the terminals will be partitioned into blocks and encrypted with its corresponding access subtree in sequence, thereby the data encryption and data transmission can be processed in parallel. Furthermore, we protect the information about the access tree with threshold secret sharing method, which can preserve the data privacy and integrity from users with the unauthorized sets of attributes. The formal analysis demonstrates that the proposed scheme can fulfill the security requirements of the Cloud-IoT in smart grid. The numerical analysis and experimental results indicate that our scheme can effectively reduce the time cost compared with other popular approaches.

Journal ArticleDOI
TL;DR: A privacy-preserving protocol for enhancing security in vehicular crowdsensing-based road surface condition monitoring system using fog computing is proposed, designed with security aspects such as information confidentiality, mutual authenticity, integrity, privacy, as well as anonymity.
Abstract: In the recent past, great attention has been directed toward road surface condition monitoring. As a matter of fact, this activity is of critical importance in transportation infrastructure management. In response, multiple solutions have been proposed which make use of mobile sensing, more specifically contemporary applications and architectures that are used in both crowdsensing and vehicle-based sensing. This has allowed for automated control as well as analysis of road surface quality. These innovations have thus encouraged and showed the importance of cloud to provide reliable transport services to clients. Nonetheless, these initiatives have not been without challenges that range from mobility support, locational awareness, low latency, as well as geo-distribution. As a result, a new term has been coined for this novel paradigm, called, fog computing. In this paper, we propose a privacy-preserving protocol for enhancing security in vehicular crowdsensing-based road surface condition monitoring system using fog computing. At the onset, this paper proposes a certificateless aggregate signcryption scheme that is highly efficient. On the basis of the proposed scheme, a data transmission protocol for monitoring road surface conditions is designed with security aspects such as information confidentiality, mutual authenticity, integrity, privacy, as well as anonymity. In analyzing the system, the ability of the proposed protocol to achieve the set objectives and exercise higher efficiency with respect to computational and communication abilities in comparison to existing systems is also considered.

Journal ArticleDOI
TL;DR: In this paper, an improved energy-efficient, secure, and privacy-preserving communication protocol for the SHSs is proposed and message authentication codes are incorporated to guarantee data integrity and authenticity.
Abstract: The development of the Internet of Things has made extraordinary progress in recent years in both academic and industrial fields There are quite a few smart home systems (SHSs) that have been developed by major companies to achieve home automation However, the nature of smart homes inevitably raises security and privacy concerns In this paper, we propose an improved energy-efficient, secure, and privacy-preserving communication protocol for the SHSs In our proposed scheme, data transmissions within the SHS are secured by a symmetric encryption scheme with secret keys being generated by chaotic systems Meanwhile, we incorporate message authentication codes to our scheme to guarantee data integrity and authenticity We also provide detailed security analysis and performance evaluation in comparison with our previous work in terms of computational complexity, memory cost, and communication overhead

Journal ArticleDOI
TL;DR: A security and performance analysis of the protocols shows that they are not only robust against different types of attacks, but are also very efficient in terms of computation, memory, energy, and communication overhead.
Abstract: The Internet of Things (IoT) represents a great opportunity to connect people, information, and things, which will in turn cause a paradigm shift in the way we work, interact, and think. IoT devices are usually small, low cost, and have limited resources, which makes them vulnerable to physical, side-channel, and cloning attacks. Therefore, any protocol designed for IoT systems should not only be secure but also efficient in terms of usage of chip area, energy, storage, and processing. To address this issue, we present light-weight mutual authentication protocols for IoT systems based on physical unclonable functions. Protocols for two scenarios are presented, one when an IoT device and server wish to communicate and the other when two IoT devices want to establish a session. A security and performance analysis of the protocols shows that they are not only robust against different types of attacks, but are also very efficient in terms of computation, memory, energy, and communication overhead. The proposed protocols are suitable for real time applications and are an attractive choice for implementing mutual authentication in IoT systems.

Journal ArticleDOI
TL;DR: A deep-dive is carried out into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low- power wireless personal area networks, outing protocol for routing protocol forLow-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol.
Abstract: The increasing pervasiveness of wireless sensor networks (WSNs) in diverse application domains including critical infrastructure systems, sets an extremely high security bar in the design of WSN systems to exploit their full benefits, increasing trust while avoiding loss. Nevertheless, a combination of resource restrictions and the physical exposure of sensor devices inevitably cause such networks to be vulnerable to security threats, both external and internal. While several researchers have provided a set of open problems and challenges in WSN security and privacy, there is a gap in the systematic study of the security implications arising from the nature of existing communication protocols in WSNs. Therefore, we have carried out a deep-dive into the main security mechanisms and their effects on the most popular protocols and standards used in WSN deployments, i.e., IEEE 802.15.4, Berkeley media access control for low-power sensor networks, IPv6 over low-power wireless personal area networks, outing protocol for routing protocol for low-power and lossy networks (RPL), backpressure collection protocol, collection tree protocol, and constrained application protocol, where potential security threats and existing countermeasures are discussed at each layer of WSN stack. This paper culminates in a deeper analysis of network layer attacks deployed against the RPL routing protocol. We quantify the impact of individual attacks on the performance of a network using the Cooja network simulator. Finally, we discuss new research opportunities in network layer security and how to use Cooja as a benchmark for developing new defenses for WSN systems.

Journal ArticleDOI
TL;DR: This paper proposes a resource allocation strategy for fog computing based on priced timed Petri nets (PTPNs), by which the user can choose the satisfying resources autonomously from a group of preallocated resources.
Abstract: Fog computing, also called “clouds at the edge,” is an emerging paradigm allocating services near the devices to improve the quality of service (QoS) The explosive prevalence of Internet of Things, big data, and fog computing in the context of cloud computing makes it extremely challenging to explore both cloud and fog resource scheduling strategy so as to improve the efficiency of resources utilization, satisfy the users’ QoS requirements, and maximize the profit of both resource providers and users This paper proposes a resource allocation strategy for fog computing based on priced timed Petri nets (PTPNs), by which the user can choose the satisfying resources autonomously from a group of preallocated resources Our strategy comprehensively considers the price cost and time cost to complete a task, as well as the credibility evaluation of both users and fog resources We construct the PTPN models of tasks in fog computing in accordance with the features of fog resources Algorithm that predicts task completion time is presented Method of computing the credibility evaluation of fog resource is also proposed In particular, we give the dynamic allocation algorithm of fog resources Simulation results demonstrate that our proposed algorithms can achieve a higher efficiency than static allocation strategies in terms of task completion time and price

Journal ArticleDOI
TL;DR: This paper proposes a security and privacy preservation scheme to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution, and implements a prototype system to evaluate the influence of security scheme on system performance.
Abstract: Face identification and resolution technology is crucial to ensure the identity consistency of humans in physical space and cyber space. In the current Internet of Things (IoT) and big data situation, the increase of applications based on face identification and resolution raises the demands of computation, communication, and storage capabilities. Therefore, we have proposed the fog computing-based face identification and resolution framework to improve processing capacity and save the bandwidth. However, there are some security and privacy issues brought by the properties of fog computing-based framework. In this paper, we propose a security and privacy preservation scheme to solve the above issues. We give an outline of the fog computing-based face identification and resolution framework, and summarize the security and privacy issues. Then the authentication and session key agreement scheme, data encryption scheme, and data integrity checking scheme are proposed to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution. Finally, we implement a prototype system to evaluate the influence of security scheme on system performance. Meanwhile, we also evaluate and analyze the security properties of proposed scheme from the viewpoint of logical formal proof and the confidentiality, integrity, and availability (CIA) properties of information security. The results indicate that the proposed scheme can effectively meet the requirements for security and privacy preservation.

Journal ArticleDOI
TL;DR: The results of the collected data show that three positive motivations, compatibility, connectedness, and control, and a negative hindrance, cost, are significant determinants of the technology acceptance behavior of users.
Abstract: With rapid improvements in communication technologies and infrastructure, the Internet of Things (IoT) has become a promising sector within the global information and communication technology industry. Various fields are employing the concept of IoT for their traditional products and services for convenient use by consumers. In the construction industry, the majority of leading companies and organizations are using IoT technologies in a smart home environment. However, only few studies have focused on the user experience of IoT technologies in such an environment. Thus, the current study explores the key determinants of user acceptance of IoT technologies in a smart home environment, and investigates a research model integrated with five potential user factors and a technology acceptance model. The results of the collected data, which were investigated using a structural equation modeling method, show that three positive motivations, compatibility, connectedness, and control, and a negative hindrance, cost, are significant determinants of the technology acceptance behavior of users. The current study can serve as a foundation for future studies on improving IoT technologies in a smart home environment by considering the user experience.

Journal ArticleDOI
TL;DR: This paper case study a smart plug system of a known brand is case study by exploiting its communication protocols and successfully launching four attacks: 1) device scanning attack; 2) brute force attack; 3) spoofing attack; 4) firmware attack.
Abstract: With the rapid development of the Internet of Things, more and more small devices are connected into the Internet for monitoring and control purposes One such type of devices, smart plugs, have been extensively deployed worldwide in millions of homes for home automation These smart plugs, however, would pose serious security problems if their vulnerabilities were not carefully investigated Indeed, we discovered that some popular smart home plugs have severe security vulnerabilities which could be fixed but unfortunately are left open In this paper, we case study a smart plug system of a known brand by exploiting its communication protocols and successfully launching four attacks: 1) device scanning attack; 2) brute force attack; 3) spoofing attack; and 4) firmware attack Our real-world experimental results show that we can obtain the authentication credentials from the users by performing these attacks We also present guidelines for securing smart plugs

Journal ArticleDOI
TL;DR: A new hierarchical model is proposed by introducing the concept of field, shallow, and deep cloudlets where the cloudlet tier itself is designed in three hierarchical levels based on the principle of LTE-advanced backhaul network.
Abstract: The multitiered concept of Internet of Things (IoT) devices, cloudlets, and clouds is facilitating a user-centric IoT. However, in such three tier network, it is still desirable to investigate efficient strategies to offer the computing, storage, and communications resources to the users. To this end, this paper proposes a new hierarchical model by introducing the concept of field , shallow , and deep cloudlets where the cloudlet tier itself is designed in three hierarchical levels based on the principle of LTE-advanced backhaul network. Accordingly, we explore a two time scale approach in which the computing resources are offered in an auction-based profit maximization manner and then the communications resources are allocated to satisfy the users’ quality of service.

Journal ArticleDOI
TL;DR: A lightweight device authentication protocol is proposed by leveraging the frequency response of a speaker and a microphone from two wireless IoT devices as the acoustic hardware fingerprint and authenticates the legitimate user by matching the fingerprint extracted in the learning process and the verification process.
Abstract: Device authentication is a critical and challenging issue for the emerging Internet of Things (IoT). One promising solution to authenticate IoT devices is to extract a fingerprint to perform device authentication by exploiting variations in the transmitted signal caused by hardware and manufacturing inconsistencies. In this paper, we propose a lightweight device authentication protocol [named speaker-to-microphone (S2M)] by leveraging the frequency response of a speaker and a microphone from two wireless IoT devices as the acoustic hardware fingerprint. S2M authenticates the legitimate user by matching the fingerprint extracted in the learning process and the verification process, respectively. To validate and evaluate the performance of S2M, we design and implement it in both mobile phones and PCs and the extensive experimental results show that S2M achieves both low false negative rate and low false positive rate in various scenarios under different attacks.

Journal ArticleDOI
TL;DR: This work forms both the privacy concerns and user expectations in CPSSs based on real-world knowledge and designs a corresponding data publishing mechanism for users that achieves a local maximized performance on the aspect published data size.
Abstract: Due to the close correlation with individual’s physical features and status, the adoption of cyber-physical social systems (CPSSs) has been inevitably hindered by users’ privacy concerns. Such concerns keep growing as our bile devices have more embedded sensors, while the existing countermeasures only provide incapable and limited privacy preservation for sensitive physical information. Therefore, we propose a novel privacy preservation framework for CPSSs. We formulate both the privacy concerns and user expectations in CPSSs based on real-world knowledge. We also design a corresponding data publishing mechanism for users. It regulates the publishing behaviors to hide sensitive physical profiles. Meanwhile, the published data retain comprehensive social profiles for users. Our analysis demonstrates that the mechanism achieves a local maximized performance on the aspect published data size. The experiment results toward real datasets reveals that the performance is comparable to the global optimal one.

Journal ArticleDOI
TL;DR: A WiFi-based IPS that exploits the frequency diversity via frequency hopping and determines the location according to the TRRS demonstrates a perfect centimeter-level accuracy in an office environment with strong NLOS using only one pair of single-antenna WiFi devices.
Abstract: Indoor positioning systems (IPSs) are attracting more and more attention from the academia and industry recently. Among them, approaches based on WiFi techniques are more favorable since they are built upon the WiFi infrastructures available in most indoor spaces. However, due to the bandwidth limit in mainstream WiFi systems, the IPS leveraging WiFi can hardly achieve centimeter localization accuracy under strong nonline-of-sight (NLOS) conditions which is common for indoor environment. In this paper, to achieve the centimeter-level accuracy, we present a WiFi-based IPS that exploits the frequency diversity via frequency hopping. In the offline phase, the system collects channel frequency responses (CFRs) from multiple channels and from a number of locations-of-interest. Then, the CFRs are post-processed to mitigate the synchronization errors as well as interference from other WiFi networks. Then, using bandwidth concatenation, the CFRs from multiple channels are combined into location fingerprints which are stored into a local database. During the online phase, CFRs are formulated into the location fingerprint and is compared against the fingerprints in the database via the time-reversal resonating strength (TRRS). Finally, the IPS determines the location according to the TRRS. Extensive experiment results demonstrate a perfect centimeter-level accuracy in an office environment with strong NLOS using only one pair of single-antenna WiFi devices.

Journal ArticleDOI
TL;DR: The design requirements of a smart shopping system are identified, a prototype system is built to test functionality, and a secure communication protocol is designed to make the system practical to validate the feasibility of such a system.
Abstract: The Internet of Things (IoT) is changing human lives by connecting everyday objects together For example, in a grocery store, all items can be connected with each other, forming a smart shopping system In such an IoT system, an inexpensive radio frequency identification (RFID) tag can be attached to each product which, when placed into a smart shopping cart, can be automatically read by a cart equipped with an RFID reader As a result, billing can be conducted from the shopping cart itself, preventing customers from waiting in a long queue at checkout Additionally, smart shelving can be added into this system, equipped with RFID readers, and can monitor stock, perhaps also updating a central server Another benefit of this kind of system is that inventory management becomes much easier, as all items can be automatically read by an RFID reader instead of manually scanned by a laborer To validate the feasibility of such a system, in this paper we identify the design requirements of a smart shopping system, build a prototype system to test functionality, and design a secure communication protocol to make the system practical To the best of our knowledge, this is the first time a smart shopping system is proposed with security under consideration

Journal ArticleDOI
TL;DR: This paper surveys and compares accelerometer signals classification methods to enable IoT for rehabilitation and elderly monitoring for active aging and considers two functions useful for such treatments: activity recognition and movement recognition.
Abstract: Rehabilitation and elderly monitoring for active aging can benefit from Internet of Things (IoT) capabilities in particular for in-home treatments. In this paper, we consider two functions useful for such treatments: 1) activity recognition (AR) and 2) movement recognition (MR). The former is aimed at detecting if a patient is idle, still, walking, running, going up/down the stairs, or cycling; the latter individuates specific movements often required for physical rehabilitation, such as arm circles, arm presses, arm twist, curls, seaweed, and shoulder rolls. Smartphones are the reference platforms being equipped with an accelerometer sensor and elements of the IoT. The work surveys and compares accelerometer signals classification methods to enable IoT for the aforementioned functions. The considered methods are support vector machines (SVMs), decision trees, and dynamic time warping. A comparison of the methods has been proposed to highlight their performance: all the techniques have good recognition accuracies and, among them, the SVM-based approaches show an accuracy above 90% in the case of AR and above 99% in the case of MR.