SlideShare a Scribd company logo
1 of 18
Download to read offline
SECuRE and Trustworthy
Computing Lab
IoTbed: A Generic Architecture for Testbed as a
Service for Internet of Things-based Systems
Authors
Mahmud Hossain, Shahid Noor, Yasser Karim and Ragib Hasan
{mahmud, shaahid, yasser, ragib}@uab.edu
SECuRE and Trustworthy computing Lab (SECRETLab)
University of Alabama at Birmingham
Presenter: Mahmud Hossain, PhD Student, Dept. of Computer and Information Sciences,
UAB
http://secret.cis.uab.edu
SECuRE and Trustworthy
Computing Lab
Internet of Things: A Pervasive Network
2
 A programmable world
 Convergence platform for M2M, RFID,
and Ubiquities computing
 Everyday objects are interconnected
 Objects are smart enough to make
decision
SECuRE and Trustworthy
Computing Lab
Scenario 3
A diverse and
heterogenous network
for testing
SECuRE and Trustworthy
Computing Lab
Availability of Testbeds
 IoT networks are heterogeneous.
 Constructing an equipped testbed is difficult and expensive.
 Existing solutions are specific.
4
SECuRE and Trustworthy
Computing Lab
Existing Testbeds
 Fit Iot-Lab
 A very large scale open testbed, is composed of more than 2700 hundred
low-power connected wireless nodes and 117 mobile robots available for
experimenting with large-scale wireless IoT technologies.
 Do not provide framework for resource allocation and registration.
 FIESTA-IoT
 It is a concept architecture for interconnecting and sharing such testbeds
among stakeholders.
 Facilitates resource allocation and registration processes.
 Reputation scheme and Incentive framework are not available.
5
SECuRE and Trustworthy
Computing Lab
Solution
How can we resolve the scarcity of IoT testbeds ?
 Most of the researchers, enthusiasts and entrepreneurs have
their own IoT devices in small scale.
 Besides industry leaders leader also have their setup.
 A common infrastructure to share all these resources with
each other.
 Proper provisioning and incentive model.
6
SECuRE and Trustworthy
Computing Lab
Our Approach : IoTBed
 A generic architecture for Testbed as a Service using smart devices
located in the edge networks.
 Provides an incentive and contract mechanism which allows building
and operating such a system in an economically feasible manner.
 Smart device owners develop testbeds in their proximal networks.
IoTBed provides a mechanism to rent out these testbeds to users for
experiments.
7
SECuRE and Trustworthy
Computing Lab
System Overview 8
SECuRE and Trustworthy
Computing Lab
Architecture 9
Management and Operation Console
Testbed Controller
Site Coordinator
Gateway
Constrained Applications Running on IoT Nodes
Scheduling
Validation
Data
Management
Configuration
Resource
Manager
Incentive
Management
Experiment Management Resource Manager
Docker
Container
Experiment
Monitoring and
Control
Experiment
Data
Experiment
Executor
SECuRE and Trustworthy
Computing Lab
Component Details
 Management and Operation Control (MOC):
 Enables a testbed client to explore resources provided by the IoTbed
Controller.
 Provides interfaces to submit experiment specifications and to upload
application binaries.
 Resource Manager:
 Monitors and collects available resources in the Testbeds.
 Provides information about available and allocated resources in the
system.
10
SECuRE and Trustworthy
Computing Lab
Component Details
 Experiment Manager:
 Implements five components:
 Validation Service
 Configuration Service
 Scheduling Service
 Experiment Executor
 Data Management Service
 Reputation and Incentive Framework :
 Manages Reputation Points of IoT nodes and Gateways.
 updates the Reputation Point (RP) of a device once the experiment that the
device is currently participating in is completed.
 Also offers monetary incentives to the devices when an experiment is completed.
11
SECuRE and Trustworthy
Computing Lab
Experiment Submission Process
12
SECuRE and Trustworthy
Computing Lab
IoTbed Message Format
13
Experiment Specification
SECuRE and Trustworthy
Computing Lab
Experimental Environment
14
Experimental Setup
Experimental Network
SECuRE and Trustworthy
Computing Lab
Experimental Environment
 IoT devices were simulated using Cooja.
 Testbed Controller was implemented using NodeJS.
 The IoTbed Controller was running as a Web Service on a
Virtual Machine located in Amazon Cloud (AWS-VM).
 The Site Coordinator was a Java application running on a
Desktop PC.
 The Gateway application was implemented using Shell Script
and was running on a Laptop.
15
SECuRE and Trustworthy
Computing Lab
Simulation Results 16
Request for a single type of IoT Device Request for 5 different types of IoT Device
Request for 10 different types of IoT Device
SECuRE and Trustworthy
Computing Lab
In compare with Existing Solutions
17
IoTbed satisfies all 9 criteria, while others satisfy at most 6 of them.
SECuRE and Trustworthy
Computing Lab
Thank You
Q&A
18

More Related Content

What's hot

Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
Ankit Raj
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
Naveena N
 

What's hot (20)

How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021How I started with Azure IoT - Global Azure Greece 2021
How I started with Azure IoT - Global Azure Greece 2021
 
Azure IoT hub
Azure IoT hubAzure IoT hub
Azure IoT hub
 
Authentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based EncryptionAuthentication on Cloud using Attribute Based Encryption
Authentication on Cloud using Attribute Based Encryption
 
Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2Attribute based encryption in cloud with significant reduction reviw2
Attribute based encryption in cloud with significant reduction reviw2
 
Azure IoT Edge
Azure IoT EdgeAzure IoT Edge
Azure IoT Edge
 
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidenti...
 
20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure20 common security vulnerabilities and misconfiguration in Azure
20 common security vulnerabilities and misconfiguration in Azure
 
Building IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT CoreBuilding IoT Solutions using Windows IoT Core
Building IoT Solutions using Windows IoT Core
 
1
11
1
 
Securing and maintaining azure sql
Securing and maintaining azure sqlSecuring and maintaining azure sql
Securing and maintaining azure sql
 
IoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoTIoT platforms – comparison Azure IoT vs AWS IoT
IoT platforms – comparison Azure IoT vs AWS IoT
 
Azure Penetration Testing
Azure Penetration TestingAzure Penetration Testing
Azure Penetration Testing
 
Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...Cloud centric multi-level authentication as a service for secure public safet...
Cloud centric multi-level authentication as a service for secure public safet...
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
A Fully Anonymous Attribute-Based Encryption to Control Cloud Data Access and...
 
Developing an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the ScratchDeveloping an IoT System FIWARE Based from the Scratch
Developing an IoT System FIWARE Based from the Scratch
 
Attribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryptionAttribute based encryption with verifiable outsourced decryption
Attribute based encryption with verifiable outsourced decryption
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
When Cloud-Native Java meets Containers, Kubernetes and Istio
When Cloud-Native Java meets Containers, Kubernetes and IstioWhen Cloud-Native Java meets Containers, Kubernetes and Istio
When Cloud-Native Java meets Containers, Kubernetes and Istio
 
Attribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud SecurityAttribute-Based Encryption for Cloud Security
Attribute-Based Encryption for Cloud Security
 

Similar to IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems

Similar to IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems (20)

AF-2599-P.docx
AF-2599-P.docxAF-2599-P.docx
AF-2599-P.docx
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
Living on the (IoT) edge (Sam Vanhoutte @TechdaysNL 2017)
 
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017) Integration of Things (Sam Vanhoutte @Iglooconf 2017)
Integration of Things (Sam Vanhoutte @Iglooconf 2017)
 
Internet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujoseInternet of things at the Edge with Azure IoT Edge by sonujose
Internet of things at the Edge with Azure IoT Edge by sonujose
 
Cloud computing lab open stack
Cloud computing lab open stackCloud computing lab open stack
Cloud computing lab open stack
 
Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics Sensing WiFi Network for Personal IoT Analytics
Sensing WiFi Network for Personal IoT Analytics
 
Cloud for Kubernetes : Session4
Cloud for Kubernetes : Session4Cloud for Kubernetes : Session4
Cloud for Kubernetes : Session4
 
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
FIWARE Global Summit - Using ML/AI Techniques with FIWARE and Connected IoT D...
 
한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview한컴MDS_Microsoft Azure IoT Overview
한컴MDS_Microsoft Azure IoT Overview
 
IRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private NetworkIRJET - Cloud based Datacenter in Virtual Private Network
IRJET - Cloud based Datacenter in Virtual Private Network
 
Edge computing and its role in architecting IoT
Edge computing and its role in architecting IoTEdge computing and its role in architecting IoT
Edge computing and its role in architecting IoT
 
chapter 5.docx
chapter 5.docxchapter 5.docx
chapter 5.docx
 
chapter 5.pdf
chapter 5.pdfchapter 5.pdf
chapter 5.pdf
 
BRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edgeBRK2122 IOT - From the cloud to the edge
BRK2122 IOT - From the cloud to the edge
 
Azure iot edge and AI enabling the intelligent edge
Azure iot edge and AI  enabling the intelligent edgeAzure iot edge and AI  enabling the intelligent edge
Azure iot edge and AI enabling the intelligent edge
 
Introduction to FIWARE Open Ecosystem
Introduction to FIWARE Open EcosystemIntroduction to FIWARE Open Ecosystem
Introduction to FIWARE Open Ecosystem
 
Azure Internet of Things
Azure Internet of ThingsAzure Internet of Things
Azure Internet of Things
 
Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...Federating Infrastructure as a Service cloud computing systems to create a un...
Federating Infrastructure as a Service cloud computing systems to create a un...
 

More from Mahmud Hossain

More from Mahmud Hossain (11)

Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
Towards a Holistic Framework for Secure, Privacy-aware, and Trustworthy Inter...
 
CACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming ServiceCACROS: A Context-Aware Cloud Content Roaming Service
CACROS: A Context-Aware Cloud Content Roaming Service
 
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
Trust-IoV: A Trustworthy Forensic Investigation Framework for the Internet of...
 
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in...
 
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the CloudSecprov: Trustworthy and Efficient Provenance Management in the Cloud
Secprov: Trustworthy and Efficient Provenance Management in the Cloud
 
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
Rosaic: A Round-wise Fair Scheduling Approach for Mobile Clouds Based on Task...
 
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
Probe-IoT: A Public Digital Ledger Based Forensic Investigation Framework for...
 
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service AuthJugo: A Generic Architecture for Composite Cloud as a Service Auth
Jugo: A Generic Architecture for Composite Cloud as a Service Auth
 
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
Towards an Analysis of Security Issues, Challenges, and Open Problems in the ...
 
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
HSC-IoT: A Hardware and Software Co-Verification based Authentication Scheme ...
 
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
BooT-IoT: A Privacy-Aware Authentication Scheme for Secure Bootstrapping of I...
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems

  • 1. SECuRE and Trustworthy Computing Lab IoTbed: A Generic Architecture for Testbed as a Service for Internet of Things-based Systems Authors Mahmud Hossain, Shahid Noor, Yasser Karim and Ragib Hasan {mahmud, shaahid, yasser, ragib}@uab.edu SECuRE and Trustworthy computing Lab (SECRETLab) University of Alabama at Birmingham Presenter: Mahmud Hossain, PhD Student, Dept. of Computer and Information Sciences, UAB http://secret.cis.uab.edu
  • 2. SECuRE and Trustworthy Computing Lab Internet of Things: A Pervasive Network 2  A programmable world  Convergence platform for M2M, RFID, and Ubiquities computing  Everyday objects are interconnected  Objects are smart enough to make decision
  • 3. SECuRE and Trustworthy Computing Lab Scenario 3 A diverse and heterogenous network for testing
  • 4. SECuRE and Trustworthy Computing Lab Availability of Testbeds  IoT networks are heterogeneous.  Constructing an equipped testbed is difficult and expensive.  Existing solutions are specific. 4
  • 5. SECuRE and Trustworthy Computing Lab Existing Testbeds  Fit Iot-Lab  A very large scale open testbed, is composed of more than 2700 hundred low-power connected wireless nodes and 117 mobile robots available for experimenting with large-scale wireless IoT technologies.  Do not provide framework for resource allocation and registration.  FIESTA-IoT  It is a concept architecture for interconnecting and sharing such testbeds among stakeholders.  Facilitates resource allocation and registration processes.  Reputation scheme and Incentive framework are not available. 5
  • 6. SECuRE and Trustworthy Computing Lab Solution How can we resolve the scarcity of IoT testbeds ?  Most of the researchers, enthusiasts and entrepreneurs have their own IoT devices in small scale.  Besides industry leaders leader also have their setup.  A common infrastructure to share all these resources with each other.  Proper provisioning and incentive model. 6
  • 7. SECuRE and Trustworthy Computing Lab Our Approach : IoTBed  A generic architecture for Testbed as a Service using smart devices located in the edge networks.  Provides an incentive and contract mechanism which allows building and operating such a system in an economically feasible manner.  Smart device owners develop testbeds in their proximal networks. IoTBed provides a mechanism to rent out these testbeds to users for experiments. 7
  • 8. SECuRE and Trustworthy Computing Lab System Overview 8
  • 9. SECuRE and Trustworthy Computing Lab Architecture 9 Management and Operation Console Testbed Controller Site Coordinator Gateway Constrained Applications Running on IoT Nodes Scheduling Validation Data Management Configuration Resource Manager Incentive Management Experiment Management Resource Manager Docker Container Experiment Monitoring and Control Experiment Data Experiment Executor
  • 10. SECuRE and Trustworthy Computing Lab Component Details  Management and Operation Control (MOC):  Enables a testbed client to explore resources provided by the IoTbed Controller.  Provides interfaces to submit experiment specifications and to upload application binaries.  Resource Manager:  Monitors and collects available resources in the Testbeds.  Provides information about available and allocated resources in the system. 10
  • 11. SECuRE and Trustworthy Computing Lab Component Details  Experiment Manager:  Implements five components:  Validation Service  Configuration Service  Scheduling Service  Experiment Executor  Data Management Service  Reputation and Incentive Framework :  Manages Reputation Points of IoT nodes and Gateways.  updates the Reputation Point (RP) of a device once the experiment that the device is currently participating in is completed.  Also offers monetary incentives to the devices when an experiment is completed. 11
  • 12. SECuRE and Trustworthy Computing Lab Experiment Submission Process 12
  • 13. SECuRE and Trustworthy Computing Lab IoTbed Message Format 13 Experiment Specification
  • 14. SECuRE and Trustworthy Computing Lab Experimental Environment 14 Experimental Setup Experimental Network
  • 15. SECuRE and Trustworthy Computing Lab Experimental Environment  IoT devices were simulated using Cooja.  Testbed Controller was implemented using NodeJS.  The IoTbed Controller was running as a Web Service on a Virtual Machine located in Amazon Cloud (AWS-VM).  The Site Coordinator was a Java application running on a Desktop PC.  The Gateway application was implemented using Shell Script and was running on a Laptop. 15
  • 16. SECuRE and Trustworthy Computing Lab Simulation Results 16 Request for a single type of IoT Device Request for 5 different types of IoT Device Request for 10 different types of IoT Device
  • 17. SECuRE and Trustworthy Computing Lab In compare with Existing Solutions 17 IoTbed satisfies all 9 criteria, while others satisfy at most 6 of them.
  • 18. SECuRE and Trustworthy Computing Lab Thank You Q&A 18