Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing
1. 1
Authors: T. Daisy Premila Bai, S. Albert Rabara
Department of Computer Science
St. Joseph’s College (Autonomous)
Tiruchirapalli, India
Source:2015 3rd International Conference on Future Internet of Things and Cloud
Course details:
Course no : 4130
Course title: Seminar
Presented by:
Khaled md. Saifuddin
1209026
Department of Electronics & Communication Engineering,
Khulna University of Engineering and Technology.
Design and Development of Integrated, Secured and
Intelligent Architecture for
Internet of Things and Cloud Computing
1
3. 3
To provide a novel integrated architecture for the IOT and Cloud Computing
through IP/MPLS
To ensure security for IOT and Cloud Computing through ECC
To design a unique intelligent architecture adoptable for the public
IOT: Internet Of Things
IP/MPLS: Internet Protocol/ Multilevel protocol Switching
ECC: Elliptic Curve Cryptography
Objectives
4. 4
Internet of Things:
Not only communicate with peoples through internet but also communicate with every object
electrically through internet .
It is characterized by real world of smart objects with limited storage and processing power.
Dynamic global network with self configuring capabilities.
Introduction
5. 5
Cloud computing:
Cloud Computing is characterized by virtual world with unlimited capability in terms of storage
and processing power
Introduction(cont...)
cloud computing allows people access to the different kinds of applications through the internet.
11. 11
IOT will generate many data.
BUT
Where those data will be stored???........................
many integrated CloudIoT architectures exist to support applications such as:
i)transport,
ii)healthcare,
iii)smart city,
vii)smart Grid, etc.
BUT....
As the information is not ciphered there are the possibility of larger threats from the ATTACKERS.
Background(cont...)
12. 12
The proposed architecture consists of four key components:
A) Intelligent system
B) IP/MPLS core
C) Integrated cloud IoT platform.
D) Security gateway
Proposed Architecture
Fig1:Proposed architecture
13. 13
Proposed Architecture
A. Intelligent System:
1) Intelligent Smart Card:
It is an IoT enabled active card
ISO/IEC standard
Ensures security and avails services using one UID per citizen.
UID:
20 digit alpha numeric number.
Includes country name, state name, place of birth, date of birth, sex, father’s initial and five digit number.
The last defined five digit number will be the PIN number.
Security Features:
Biometric information on their hands always.
MAC ID of the ISC will be encrypted using UID
Unique Traits:
Can be used to access both on premise and off premise applications.
It has a special feature to alert the card holder and card issuing center in time of card loss or theft.
Fig2:sample UID
14. 14
Proposed Architecture(cont...)
2) Smart Reader:
Two kinds of readers are proposed
i)namely RFID reader and ii)smartphone reader.
RFID reader conforms to the ISO standard
interface between ISC and smart gateway.
3)Smart Gateway:
Heart of the smart environment
It receives UID from the ISC through intelligent smart reader.
very flexible & supports multiple protocols.
compatible for both IPv4 and IPv6
uploads the necessary data to the cloud through IP-MPLS core.
B. IP/MPLS Core:
Bridges the cloud platform and IoT enabled intelligent systems.
It provides secure and fast packet switching technology.
Reliability, availability, security and quality of service.
15. 15
Proposed Architecture(cont…)
C. Integrated Cloud IoT Platform:
The data generated are processed and sent to the cloud.
The service providers should register themselves in the proposed system and to be authenticated to
provide their services.
The cloud vendors are connected through the IP/MPLS core.
D. Security Gateway
multi-factor authentication to ensure end-to-end security.
uses elliptic curve cryptography to authenticate the user, card, mobile device and the server.
Y^2 = X^3 -3X+1 mod 997 is used for encryption and decryption.
The authentication phases of the proposed work solely depend on the registration phase.
1) Registration Phase:
The Registration Center (RC) uniquely registers the credentials of the user, user’s mobile device and the
ISC.
16. 16
Proposed Architecture(cont…)
c) Mobile Device Authentication: The mobile device is authenticated using X.509v3 digital certificate (DC)
and unique identifiable pictures.
d) Service Level Authentication: When a user submits the request, user interface asks the customer to enter the
PIN. PIN is sent to the server in an encrypted form. If it is successful, service will be provided.
2) Authentication Phase:
4 level authentication:
a)Mutual Authentication between the ISC and the reader,
b)User Authentication,
c)Mobile Device Authentication and
d)Service Level Authentication.
a)Mutual Authentication:
ISC is mutually authenticated with the RFID reader using EAP .
b)User Authentication: User is authenticated with the UID number obtained from the ISC.
17. 17
Experimental Study
A. Test Bed
A test bed is created for the proposed architecture and it is tested in a simulated environment. Jmeter tool is
used to analyze the overall performance . The sample test bed is depicted in Fig. 4.
Figure 4. Sample Testbed
18. 18
Experimental Study(cont…)
Figure 5. Overall System Thoroughput
Figure 6. Screenshot for System Throughput - Graph
Figure 7. Screenshot for System Throughput - Data
19. 19
Experimental Study(cont…)
A.System Throughput:
Sample tests have been done with 10, 20, 30, 40, 50, 60, 70, 80, 90, 100,110 and 120 service requesters, The system
throughput increases gradually up to 10 requests and keeps rapidly increasing till 120. At one point, the system has
reached the saturation point due to various factors and the throughput declines. However, the proposed system provides
response to the service requests with a reasonable response time.
B. Transaction Response Time:
The average time taken to perform the various transactions during every second of the load is tested
using the JMeter tool. To evaluate the transaction response time, different loads are set on the
proposed system by creating up to 500 virtual service requesters.
Figure 8. Transaction Response Time
20. 20
Conclusion
i)The proposed is a unique one to avail any applications anywhere, anytime with one ISC. Implementing
this architecture will help every citizen to have only one ISC for any applications in a smart environment.
ii)The message encryption and the multifactor authentication ensure unique authentication, integrity,
confidentiality and privacy of the users.
iii)The simulated results prove the performance of the proposed system. Higher level security by
incorporating ECC, overall simulation of this architecture and real time implementation are in the
progress of this research. Certainly, the proposed architecture eliminates ambiguity and enhances security.
21. 21
References
[1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of
Things (IoT): A Vision, Architectural Elements, and Future
Directions,” Future Generation Computer Systems, vol. 29, Feb.
2013, pp. 1645–1660, doi: 10.1016/j.future.2013.01.010.
[2] O. Vermesan and P. Friess, “Internet of Things from Research and
Innovation to Market Deployment,” River Publishers Series in
Communications, Aalborg, 2014, pp. 8-15.
[3] O. Vermesan and P. Friess, “Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems,”
River Publishers Series in Communications, Aalborg, 2013, pp.7-112.
[4] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,”
IEEE Computer, vol. 44, Sept. 2011, pp. 51-58, doi:
10.1109/MC.2011.291.
[5] L. Badger T. Grance, R.P. Corner and J. Voas, “DRAFT Cloud
Computing Synopsis and Recommendations,” National Institute of
Standards and Technology, Washington, DC, May 2011, p.84.
[6] R. Buyya, J. Broberg and A. Goscinski, “Cloud Computing Principles
and Paradigms,” WILEY, USA, Feb. 2011, pp. 3-42.
[7] C. Atkins, K. Koanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H.
Sawano, “A Cloud Service for End-User Participation Concerning the
Internet of Things,” Proc. IEEE Conf. Signal-Image Technology and
Internet-Based Systems (SITIS), IEEE, Dec. 2013, pp. 273-278,
[8] P. P. Pereira, J. Eliasson, R. Kyusakov, J. Delsing, A. Raayatinezhad,
and M. Johansson, “Enabling Cloud Connectivity for Mobile Internet
of Things Applications,” Proc. IEEE Symp. Service Oriented System
Engineering (SOSE), IEEE, Mar. 2013, pp. 518-526, doi:
10.1109/SOSE.2013.33.
[9] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G.
Cattaneo, S. Gusmeroli, G. Micheletti, D. Rotondi and R. Stevens,
“Definition of a Research and Innovation Policy Leveraging Cloud
Computing and IoT Combination. Final Report,” European
Commission, SMART 2013/0037, 2013.
[15] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot and L. Gurgen,
“Sharing User IoT Devices in the Cloud”, IEEE World Forum on
Internet of Things (WF-IoT), IEEE, Mar. 2014, pp. 373-374, doi:
10.1109/WF-IoT.2014.6803193.
[16] G.C. Fox, S. Kamburugamuve and R. D. Hartman, “Architecture and
Measured Characteristics of a Cloud Based Internet of Things,” Proc.
Int. Conf. Collaboration Technologies and Systems (CTS), IEEE,
May 2012, pp. 6-12, doi: 10.1109/CTS.2012.6261020.
[17] D. Evans “The Internet of Things How the Next Evolution of the
Internet Is Changing Everything,” White Paper, Cisco, Apr. 2011.
[18] M. Aazam, P.P. Hung and E.N. Huh, “Smart Gateway Based
Communication for Cloud of Things”, Proc. IEEE Conf. Intelligent
Sensors, Sensor Networks and Information Processing (ISSNIP),
IEEE, Apr. 2014, pp. 1-6, doi: 10.1109/ISSNIP.2014.6827673.
[19] A. Botta, W. Donato, V. Persico and A. Pescap, “On the Integration
of Cloud Computing and Internet of Things,” Proc. IEEE Conf.
Future Internet of Things and Cloud (FiCloud), IEEE, Aug. 2014, pp.
23-30, doi: 10.1109/FiCloud.2014.14.
[20] “Enabling Connected Smart Cities For A Better Tomorrow,”
Elitecore Wi-Fi Service Management Platform (SMP), 2015,
http://www.elitecore.com/downloads/datasheets/wifioffload/Elitecore
-Smart-City-Solution.pdf.
[21] C. Dobre and F. Xhafa, “Intelligent Services for Big Data Science,”
Future Generation Computer Systems, Generation Computer
Systems, July 2014, vol. 37, pp. 267–281, doi: 10.1016/j. future.
2013.07.014.
[22] M. Aazam, I. Khan, A.A. Alsaffar and E. N. Huh, “Cloud of Things:
Integrating Internet of Things and Cloud Computing and the Issues
Involved”, Proc. 11th Int. Bhurban Conf. Applied Sciences &
Technology (IBCAST), IEEE, Jan. 2014, pp. 414-419, doi:
10.1109/IBCAST.2014.6778179.
23. 23
Answer
ECC:
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure
of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on
plain Galois fields) to provide equivalent security.
X.509v3:
X.509 V3is an important standard for a public key infrastructure (PKI) to manage digital certificates and
public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email
communication
EAP:
Extensible Authentication Protocol (EAP) which is an authentication framework frequently used in wireless
networks by adopting ECC algorithm.