SlideShare a Scribd company logo
1 of 23
1
Authors: T. Daisy Premila Bai, S. Albert Rabara
Department of Computer Science
St. Joseph’s College (Autonomous)
Tiruchirapalli, India
Source:2015 3rd International Conference on Future Internet of Things and Cloud
Course details:
Course no : 4130
Course title: Seminar
Presented by:
Khaled md. Saifuddin
1209026
Department of Electronics & Communication Engineering,
Khulna University of Engineering and Technology.
Design and Development of Integrated, Secured and
Intelligent Architecture for
Internet of Things and Cloud Computing
1
2
 Objectives
 Introduction
 Background
 Proposed Approach
 Experimental Study
 Conclusion
ContentsContents
3
 To provide a novel integrated architecture for the IOT and Cloud Computing
through IP/MPLS
 To ensure security for IOT and Cloud Computing through ECC
 To design a unique intelligent architecture adoptable for the public
IOT: Internet Of Things
IP/MPLS: Internet Protocol/ Multilevel protocol Switching
ECC: Elliptic Curve Cryptography
Objectives
4
Internet of Things:
 Not only communicate with peoples through internet but also communicate with every object
electrically through internet .
 It is characterized by real world of smart objects with limited storage and processing power.
 Dynamic global network with self configuring capabilities.
Introduction
5
Cloud computing:
 Cloud Computing is characterized by virtual world with unlimited capability in terms of storage
and processing power
Introduction(cont...)
 cloud computing allows people access to the different kinds of applications through the internet.
6
Background
InternetConnecteddevices
7
Background(cont..)
Industrial Automation Smart Health
Smart Home Smart Cities
8
Background(cont...)
More“Things”arebeing connected
Home/daily-life devices
Business and
Public infrastructure
Health-care
…
9
Background(cont...)
PeopleConnectingtoThings
Motion sensor
Motion sensor
Motion sensor
ECG sensor
Internet
10
Background(cont...)
ThingsConnectingtoThings
- Complex and heterogeneous
resources and networks
11
IOT will generate many data.
BUT
Where those data will be stored???........................
many integrated CloudIoT architectures exist to support applications such as:
i)transport,
ii)healthcare,
iii)smart city,
vii)smart Grid, etc.
BUT....
As the information is not ciphered there are the possibility of larger threats from the ATTACKERS.
Background(cont...)
12
The proposed architecture consists of four key components:
A) Intelligent system
B) IP/MPLS core
C) Integrated cloud IoT platform.
D) Security gateway
Proposed Architecture
Fig1:Proposed architecture
13
Proposed Architecture
A. Intelligent System:
1) Intelligent Smart Card:
 It is an IoT enabled active card
 ISO/IEC standard
 Ensures security and avails services using one UID per citizen.
UID:
 20 digit alpha numeric number.
 Includes country name, state name, place of birth, date of birth, sex, father’s initial and five digit number.
 The last defined five digit number will be the PIN number.
Security Features:
 Biometric information on their hands always.
 MAC ID of the ISC will be encrypted using UID
Unique Traits:
 Can be used to access both on premise and off premise applications.
 It has a special feature to alert the card holder and card issuing center in time of card loss or theft.
Fig2:sample UID
14
Proposed Architecture(cont...)
2) Smart Reader:
Two kinds of readers are proposed
 i)namely RFID reader and ii)smartphone reader.
 RFID reader conforms to the ISO standard
 interface between ISC and smart gateway.
3)Smart Gateway:
 Heart of the smart environment
 It receives UID from the ISC through intelligent smart reader.
 very flexible & supports multiple protocols.
 compatible for both IPv4 and IPv6
 uploads the necessary data to the cloud through IP-MPLS core.
B. IP/MPLS Core:
 Bridges the cloud platform and IoT enabled intelligent systems.
 It provides secure and fast packet switching technology.
 Reliability, availability, security and quality of service.
15
Proposed Architecture(cont…)
C. Integrated Cloud IoT Platform:
 The data generated are processed and sent to the cloud.
 The service providers should register themselves in the proposed system and to be authenticated to
provide their services.
 The cloud vendors are connected through the IP/MPLS core.
D. Security Gateway
 multi-factor authentication to ensure end-to-end security.
 uses elliptic curve cryptography to authenticate the user, card, mobile device and the server.
 Y^2 = X^3 -3X+1 mod 997 is used for encryption and decryption.
The authentication phases of the proposed work solely depend on the registration phase.
1) Registration Phase:
The Registration Center (RC) uniquely registers the credentials of the user, user’s mobile device and the
ISC.
16
Proposed Architecture(cont…)
c) Mobile Device Authentication: The mobile device is authenticated using X.509v3 digital certificate (DC)
and unique identifiable pictures.
d) Service Level Authentication: When a user submits the request, user interface asks the customer to enter the
PIN. PIN is sent to the server in an encrypted form. If it is successful, service will be provided.
2) Authentication Phase:
4 level authentication:
a)Mutual Authentication between the ISC and the reader,
b)User Authentication,
c)Mobile Device Authentication and
d)Service Level Authentication.
a)Mutual Authentication:
ISC is mutually authenticated with the RFID reader using EAP .
b)User Authentication: User is authenticated with the UID number obtained from the ISC.
17
Experimental Study
A. Test Bed
A test bed is created for the proposed architecture and it is tested in a simulated environment. Jmeter tool is
used to analyze the overall performance . The sample test bed is depicted in Fig. 4.
Figure 4. Sample Testbed
18
Experimental Study(cont…)
Figure 5. Overall System Thoroughput
Figure 6. Screenshot for System Throughput - Graph
Figure 7. Screenshot for System Throughput - Data
19
Experimental Study(cont…)
A.System Throughput:
Sample tests have been done with 10, 20, 30, 40, 50, 60, 70, 80, 90, 100,110 and 120 service requesters, The system
throughput increases gradually up to 10 requests and keeps rapidly increasing till 120. At one point, the system has
reached the saturation point due to various factors and the throughput declines. However, the proposed system provides
response to the service requests with a reasonable response time.
B. Transaction Response Time:
The average time taken to perform the various transactions during every second of the load is tested
using the JMeter tool. To evaluate the transaction response time, different loads are set on the
proposed system by creating up to 500 virtual service requesters.
Figure 8. Transaction Response Time
20
Conclusion
i)The proposed is a unique one to avail any applications anywhere, anytime with one ISC. Implementing
this architecture will help every citizen to have only one ISC for any applications in a smart environment.
ii)The message encryption and the multifactor authentication ensure unique authentication, integrity,
confidentiality and privacy of the users.
iii)The simulated results prove the performance of the proposed system. Higher level security by
incorporating ECC, overall simulation of this architecture and real time implementation are in the
progress of this research. Certainly, the proposed architecture eliminates ambiguity and enhances security.
21
References
[1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of
Things (IoT): A Vision, Architectural Elements, and Future
Directions,” Future Generation Computer Systems, vol. 29, Feb.
2013, pp. 1645–1660, doi: 10.1016/j.future.2013.01.010.
[2] O. Vermesan and P. Friess, “Internet of Things from Research and
Innovation to Market Deployment,” River Publishers Series in
Communications, Aalborg, 2014, pp. 8-15.
[3] O. Vermesan and P. Friess, “Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems,”
River Publishers Series in Communications, Aalborg, 2013, pp.7-112.
[4] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,”
IEEE Computer, vol. 44, Sept. 2011, pp. 51-58, doi:
10.1109/MC.2011.291.
[5] L. Badger T. Grance, R.P. Corner and J. Voas, “DRAFT Cloud
Computing Synopsis and Recommendations,” National Institute of
Standards and Technology, Washington, DC, May 2011, p.84.
[6] R. Buyya, J. Broberg and A. Goscinski, “Cloud Computing Principles
and Paradigms,” WILEY, USA, Feb. 2011, pp. 3-42.
[7] C. Atkins, K. Koanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H.
Sawano, “A Cloud Service for End-User Participation Concerning the
Internet of Things,” Proc. IEEE Conf. Signal-Image Technology and
Internet-Based Systems (SITIS), IEEE, Dec. 2013, pp. 273-278,
[8] P. P. Pereira, J. Eliasson, R. Kyusakov, J. Delsing, A. Raayatinezhad,
and M. Johansson, “Enabling Cloud Connectivity for Mobile Internet
of Things Applications,” Proc. IEEE Symp. Service Oriented System
Engineering (SOSE), IEEE, Mar. 2013, pp. 518-526, doi:
10.1109/SOSE.2013.33.
[9] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G.
Cattaneo, S. Gusmeroli, G. Micheletti, D. Rotondi and R. Stevens,
“Definition of a Research and Innovation Policy Leveraging Cloud
Computing and IoT Combination. Final Report,” European
Commission, SMART 2013/0037, 2013.
[15] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot and L. Gurgen,
“Sharing User IoT Devices in the Cloud”, IEEE World Forum on
Internet of Things (WF-IoT), IEEE, Mar. 2014, pp. 373-374, doi:
10.1109/WF-IoT.2014.6803193.
[16] G.C. Fox, S. Kamburugamuve and R. D. Hartman, “Architecture and
Measured Characteristics of a Cloud Based Internet of Things,” Proc.
Int. Conf. Collaboration Technologies and Systems (CTS), IEEE,
May 2012, pp. 6-12, doi: 10.1109/CTS.2012.6261020.
[17] D. Evans “The Internet of Things How the Next Evolution of the
Internet Is Changing Everything,” White Paper, Cisco, Apr. 2011.
[18] M. Aazam, P.P. Hung and E.N. Huh, “Smart Gateway Based
Communication for Cloud of Things”, Proc. IEEE Conf. Intelligent
Sensors, Sensor Networks and Information Processing (ISSNIP),
IEEE, Apr. 2014, pp. 1-6, doi: 10.1109/ISSNIP.2014.6827673.
[19] A. Botta, W. Donato, V. Persico and A. Pescap, “On the Integration
of Cloud Computing and Internet of Things,” Proc. IEEE Conf.
Future Internet of Things and Cloud (FiCloud), IEEE, Aug. 2014, pp.
23-30, doi: 10.1109/FiCloud.2014.14.
[20] “Enabling Connected Smart Cities For A Better Tomorrow,”
Elitecore Wi-Fi Service Management Platform (SMP), 2015,
http://www.elitecore.com/downloads/datasheets/wifioffload/Elitecore
-Smart-City-Solution.pdf.
[21] C. Dobre and F. Xhafa, “Intelligent Services for Big Data Science,”
Future Generation Computer Systems, Generation Computer
Systems, July 2014, vol. 37, pp. 267–281, doi: 10.1016/j. future.
2013.07.014.
[22] M. Aazam, I. Khan, A.A. Alsaffar and E. N. Huh, “Cloud of Things:
Integrating Internet of Things and Cloud Computing and the Issues
Involved”, Proc. 11th Int. Bhurban Conf. Applied Sciences &
Technology (IBCAST), IEEE, Jan. 2014, pp. 414-419, doi:
10.1109/IBCAST.2014.6778179.
Thank you
for your kind
Attention!
22
23
Answer
ECC:
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure
of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on
plain Galois fields) to provide equivalent security.
X.509v3:
X.509 V3is an important standard for a public key infrastructure (PKI) to manage digital certificates and
public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email
communication
EAP:
Extensible Authentication Protocol (EAP) which is an authentication framework frequently used in wireless
networks by adopting ECC algorithm.

More Related Content

What's hot

DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...ijait
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceinventy
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET Journal
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A SurveyIJCSES Journal
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit Iparveen837153
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)Gokulnath J
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...IJNSA Journal
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT IJECEIAES
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYijasuc
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Eswar Publications
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...IJECEIAES
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io tPuneet Mishra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 

What's hot (17)

DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
575 579
575 579575 579
575 579
 
IRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service PlatformIRJET- Review On Semantic Open IoT Service Platform
IRJET- Review On Semantic Open IoT Service Platform
 
Internet of Things Malware : A Survey
Internet of Things Malware : A SurveyInternet of Things Malware : A Survey
Internet of Things Malware : A Survey
 
Internet of things Unit I
Internet of things   Unit IInternet of things   Unit I
Internet of things Unit I
 
A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)A fair survey on Internet of Things(IoT)
A fair survey on Internet of Things(IoT)
 
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
 
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyGraphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
 
Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT Residential access control system using QR code and the IoT
Residential access control system using QR code and the IoT
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDYRPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
 
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
 
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
 
Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...Dual method cryptography image by two force secure and steganography secret m...
Dual method cryptography image by two force secure and steganography secret m...
 
Home monitoring system using io t
Home monitoring system using io tHome monitoring system using io t
Home monitoring system using io t
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 

Similar to Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing

Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Scientific Review SR
 
Internet of things-IoT.pptx
Internet of things-IoT.pptxInternet of things-IoT.pptx
Internet of things-IoT.pptxMukulislam1
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hydKishore5511
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Zakaria Hossain
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsIJNSA Journal
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTDaniel Wachtel
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusvivatechijri
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...journalBEEI
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsIJNSA Journal
 

Similar to Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing (20)

Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...Architectural Layers of Internet of Things: Analysis of Security Threats and ...
Architectural Layers of Internet of Things: Analysis of Security Threats and ...
 
9. 23765.pdf
9. 23765.pdf9. 23765.pdf
9. 23765.pdf
 
Internet of things-IoT.pptx
Internet of things-IoT.pptxInternet of things-IoT.pptx
Internet of things-IoT.pptx
 
IOT.pdf
IOT.pdfIOT.pdf
IOT.pdf
 
Iot lecture notes_hyd
Iot lecture notes_hydIot lecture notes_hyd
Iot lecture notes_hyd
 
Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)Cloud of things (IoT + Cloud Computing)
Cloud of things (IoT + Cloud Computing)
 
December 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2022: Top 10 Read Articles in Network Security and Its Applications
December 2022: Top 10 Read Articles in Network Security and Its Applications
 
October 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its ApplicationsOctober 2022: Top 10 Read Articles in Network Security & Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
 
September 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its ApplicationsSeptember 2022: Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
 
November 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its ApplicationsNovember 2022: Top 10 Read Articles in Network Security and Its Applications
November 2022: Top 10 Read Articles in Network Security and Its Applications
 
July 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its ApplicationsJuly 2022 - Top 10 Read Articles in Network Security & Its Applications
July 2022 - Top 10 Read Articles in Network Security & Its Applications
 
August 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its ApplicationsAugust 2022: Top 10 Read Articles in Network Security and Its Applications
August 2022: Top 10 Read Articles in Network Security and Its Applications
 
April 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its ApplicationsApril 2022 - Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
 
June 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its ApplicationsJune 2022: Top 10 Read Articles in Network Security and Its Applications
June 2022: Top 10 Read Articles in Network Security and Its Applications
 
December 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its ApplicationsDecember 2021: Top 10 Read Articles in Network Security and Its Applications
December 2021: Top 10 Read Articles in Network Security and Its Applications
 
May 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its ApplicationsMay 2022: Top 10 Read Articles in Network Security and Its Applications
May 2022: Top 10 Read Articles in Network Security and Its Applications
 
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoTA STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
A STUDY ON SECURITY ISSUES AND CHALLENGES IN IoT
 
A survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current statusA survey on Internet of Things (IoT) security : Challenges and Current status
A survey on Internet of Things (IoT) security : Challenges and Current status
 
Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...Development of web-based surveillance system for Internet of Things (IoT) app...
Development of web-based surveillance system for Internet of Things (IoT) app...
 
March 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its ApplicationsMarch 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2022 - Top 10 Read Articles in Network Security and Its Applications
 

Recently uploaded

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewingbigorange77
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 

Recently uploaded (20)

10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
Denver Web Design brochure for public viewing
Denver Web Design brochure for public viewingDenver Web Design brochure for public viewing
Denver Web Design brochure for public viewing
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 

Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing

  • 1. 1 Authors: T. Daisy Premila Bai, S. Albert Rabara Department of Computer Science St. Joseph’s College (Autonomous) Tiruchirapalli, India Source:2015 3rd International Conference on Future Internet of Things and Cloud Course details: Course no : 4130 Course title: Seminar Presented by: Khaled md. Saifuddin 1209026 Department of Electronics & Communication Engineering, Khulna University of Engineering and Technology. Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing 1
  • 2. 2  Objectives  Introduction  Background  Proposed Approach  Experimental Study  Conclusion ContentsContents
  • 3. 3  To provide a novel integrated architecture for the IOT and Cloud Computing through IP/MPLS  To ensure security for IOT and Cloud Computing through ECC  To design a unique intelligent architecture adoptable for the public IOT: Internet Of Things IP/MPLS: Internet Protocol/ Multilevel protocol Switching ECC: Elliptic Curve Cryptography Objectives
  • 4. 4 Internet of Things:  Not only communicate with peoples through internet but also communicate with every object electrically through internet .  It is characterized by real world of smart objects with limited storage and processing power.  Dynamic global network with self configuring capabilities. Introduction
  • 5. 5 Cloud computing:  Cloud Computing is characterized by virtual world with unlimited capability in terms of storage and processing power Introduction(cont...)  cloud computing allows people access to the different kinds of applications through the internet.
  • 7. 7 Background(cont..) Industrial Automation Smart Health Smart Home Smart Cities
  • 11. 11 IOT will generate many data. BUT Where those data will be stored???........................ many integrated CloudIoT architectures exist to support applications such as: i)transport, ii)healthcare, iii)smart city, vii)smart Grid, etc. BUT.... As the information is not ciphered there are the possibility of larger threats from the ATTACKERS. Background(cont...)
  • 12. 12 The proposed architecture consists of four key components: A) Intelligent system B) IP/MPLS core C) Integrated cloud IoT platform. D) Security gateway Proposed Architecture Fig1:Proposed architecture
  • 13. 13 Proposed Architecture A. Intelligent System: 1) Intelligent Smart Card:  It is an IoT enabled active card  ISO/IEC standard  Ensures security and avails services using one UID per citizen. UID:  20 digit alpha numeric number.  Includes country name, state name, place of birth, date of birth, sex, father’s initial and five digit number.  The last defined five digit number will be the PIN number. Security Features:  Biometric information on their hands always.  MAC ID of the ISC will be encrypted using UID Unique Traits:  Can be used to access both on premise and off premise applications.  It has a special feature to alert the card holder and card issuing center in time of card loss or theft. Fig2:sample UID
  • 14. 14 Proposed Architecture(cont...) 2) Smart Reader: Two kinds of readers are proposed  i)namely RFID reader and ii)smartphone reader.  RFID reader conforms to the ISO standard  interface between ISC and smart gateway. 3)Smart Gateway:  Heart of the smart environment  It receives UID from the ISC through intelligent smart reader.  very flexible & supports multiple protocols.  compatible for both IPv4 and IPv6  uploads the necessary data to the cloud through IP-MPLS core. B. IP/MPLS Core:  Bridges the cloud platform and IoT enabled intelligent systems.  It provides secure and fast packet switching technology.  Reliability, availability, security and quality of service.
  • 15. 15 Proposed Architecture(cont…) C. Integrated Cloud IoT Platform:  The data generated are processed and sent to the cloud.  The service providers should register themselves in the proposed system and to be authenticated to provide their services.  The cloud vendors are connected through the IP/MPLS core. D. Security Gateway  multi-factor authentication to ensure end-to-end security.  uses elliptic curve cryptography to authenticate the user, card, mobile device and the server.  Y^2 = X^3 -3X+1 mod 997 is used for encryption and decryption. The authentication phases of the proposed work solely depend on the registration phase. 1) Registration Phase: The Registration Center (RC) uniquely registers the credentials of the user, user’s mobile device and the ISC.
  • 16. 16 Proposed Architecture(cont…) c) Mobile Device Authentication: The mobile device is authenticated using X.509v3 digital certificate (DC) and unique identifiable pictures. d) Service Level Authentication: When a user submits the request, user interface asks the customer to enter the PIN. PIN is sent to the server in an encrypted form. If it is successful, service will be provided. 2) Authentication Phase: 4 level authentication: a)Mutual Authentication between the ISC and the reader, b)User Authentication, c)Mobile Device Authentication and d)Service Level Authentication. a)Mutual Authentication: ISC is mutually authenticated with the RFID reader using EAP . b)User Authentication: User is authenticated with the UID number obtained from the ISC.
  • 17. 17 Experimental Study A. Test Bed A test bed is created for the proposed architecture and it is tested in a simulated environment. Jmeter tool is used to analyze the overall performance . The sample test bed is depicted in Fig. 4. Figure 4. Sample Testbed
  • 18. 18 Experimental Study(cont…) Figure 5. Overall System Thoroughput Figure 6. Screenshot for System Throughput - Graph Figure 7. Screenshot for System Throughput - Data
  • 19. 19 Experimental Study(cont…) A.System Throughput: Sample tests have been done with 10, 20, 30, 40, 50, 60, 70, 80, 90, 100,110 and 120 service requesters, The system throughput increases gradually up to 10 requests and keeps rapidly increasing till 120. At one point, the system has reached the saturation point due to various factors and the throughput declines. However, the proposed system provides response to the service requests with a reasonable response time. B. Transaction Response Time: The average time taken to perform the various transactions during every second of the load is tested using the JMeter tool. To evaluate the transaction response time, different loads are set on the proposed system by creating up to 500 virtual service requesters. Figure 8. Transaction Response Time
  • 20. 20 Conclusion i)The proposed is a unique one to avail any applications anywhere, anytime with one ISC. Implementing this architecture will help every citizen to have only one ISC for any applications in a smart environment. ii)The message encryption and the multifactor authentication ensure unique authentication, integrity, confidentiality and privacy of the users. iii)The simulated results prove the performance of the proposed system. Higher level security by incorporating ECC, overall simulation of this architecture and real time implementation are in the progress of this research. Certainly, the proposed architecture eliminates ambiguity and enhances security.
  • 21. 21 References [1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Generation Computer Systems, vol. 29, Feb. 2013, pp. 1645–1660, doi: 10.1016/j.future.2013.01.010. [2] O. Vermesan and P. Friess, “Internet of Things from Research and Innovation to Market Deployment,” River Publishers Series in Communications, Aalborg, 2014, pp. 8-15. [3] O. Vermesan and P. Friess, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems,” River Publishers Series in Communications, Aalborg, 2013, pp.7-112. [4] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,” IEEE Computer, vol. 44, Sept. 2011, pp. 51-58, doi: 10.1109/MC.2011.291. [5] L. Badger T. Grance, R.P. Corner and J. Voas, “DRAFT Cloud Computing Synopsis and Recommendations,” National Institute of Standards and Technology, Washington, DC, May 2011, p.84. [6] R. Buyya, J. Broberg and A. Goscinski, “Cloud Computing Principles and Paradigms,” WILEY, USA, Feb. 2011, pp. 3-42. [7] C. Atkins, K. Koanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H. Sawano, “A Cloud Service for End-User Participation Concerning the Internet of Things,” Proc. IEEE Conf. Signal-Image Technology and Internet-Based Systems (SITIS), IEEE, Dec. 2013, pp. 273-278, [8] P. P. Pereira, J. Eliasson, R. Kyusakov, J. Delsing, A. Raayatinezhad, and M. Johansson, “Enabling Cloud Connectivity for Mobile Internet of Things Applications,” Proc. IEEE Symp. Service Oriented System Engineering (SOSE), IEEE, Mar. 2013, pp. 518-526, doi: 10.1109/SOSE.2013.33. [9] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G. Cattaneo, S. Gusmeroli, G. Micheletti, D. Rotondi and R. Stevens, “Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination. Final Report,” European Commission, SMART 2013/0037, 2013. [15] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot and L. Gurgen, “Sharing User IoT Devices in the Cloud”, IEEE World Forum on Internet of Things (WF-IoT), IEEE, Mar. 2014, pp. 373-374, doi: 10.1109/WF-IoT.2014.6803193. [16] G.C. Fox, S. Kamburugamuve and R. D. Hartman, “Architecture and Measured Characteristics of a Cloud Based Internet of Things,” Proc. Int. Conf. Collaboration Technologies and Systems (CTS), IEEE, May 2012, pp. 6-12, doi: 10.1109/CTS.2012.6261020. [17] D. Evans “The Internet of Things How the Next Evolution of the Internet Is Changing Everything,” White Paper, Cisco, Apr. 2011. [18] M. Aazam, P.P. Hung and E.N. Huh, “Smart Gateway Based Communication for Cloud of Things”, Proc. IEEE Conf. Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Apr. 2014, pp. 1-6, doi: 10.1109/ISSNIP.2014.6827673. [19] A. Botta, W. Donato, V. Persico and A. Pescap, “On the Integration of Cloud Computing and Internet of Things,” Proc. IEEE Conf. Future Internet of Things and Cloud (FiCloud), IEEE, Aug. 2014, pp. 23-30, doi: 10.1109/FiCloud.2014.14. [20] “Enabling Connected Smart Cities For A Better Tomorrow,” Elitecore Wi-Fi Service Management Platform (SMP), 2015, http://www.elitecore.com/downloads/datasheets/wifioffload/Elitecore -Smart-City-Solution.pdf. [21] C. Dobre and F. Xhafa, “Intelligent Services for Big Data Science,” Future Generation Computer Systems, Generation Computer Systems, July 2014, vol. 37, pp. 267–281, doi: 10.1016/j. future. 2013.07.014. [22] M. Aazam, I. Khan, A.A. Alsaffar and E. N. Huh, “Cloud of Things: Integrating Internet of Things and Cloud Computing and the Issues Involved”, Proc. 11th Int. Bhurban Conf. Applied Sciences & Technology (IBCAST), IEEE, Jan. 2014, pp. 414-419, doi: 10.1109/IBCAST.2014.6778179.
  • 22. Thank you for your kind Attention! 22
  • 23. 23 Answer ECC: Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields) to provide equivalent security. X.509v3: X.509 V3is an important standard for a public key infrastructure (PKI) to manage digital certificates and public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email communication EAP: Extensible Authentication Protocol (EAP) which is an authentication framework frequently used in wireless networks by adopting ECC algorithm.