scholarly journals Enhancing Digital Certificate Usability in Long Lifespan IoT Devices by Utilizing Private CA

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Daiki Yamakawa ◽  
Takashi Okimoto ◽  
Songpon Teerakanok ◽  
Atsuo Inomata ◽  
Tetsutaro Uehara

Today, smart devices and services have become a part of our daily life. These devices and services offer a richer user experience with a much higher quality of services than before. Many of them utilize sensing functions via cloud architecture to perform remote device controls and monitoring. Generally, the security of the communication between these devices and the service provider (e.g., cloud server) is achieved by using the TLS protocol via PKI standard. In this study, we investigate the risk associating with the use of public certificate authorities (CAs) in a PKI-based IoT system. An experiment is conducted to demonstrate existing vulnerabilities in real IoT devices available in the market. Next, the use of a private CA in the cloud-centric IoT architecture is proposed to achieve better control over the certificate issuing process and the validity period of the certificate. Lastly, the security analysis pointing out the strengths and drawbacks of the proposed method is discussed in detail.

MQTT protocol is publishing-subscribing model for IoT communication. In case of Quality of Services analysis, it is important to check the request and responses between publisher and subscriber. Any threat in communication channel is mostly leads to delay in operation. Hence, if we able to identify the delay parameter, we can suggest by means of QoS that there is a immediate need of security check for IoT system. As many IoT devices performed in unchecked, complicated, and often aggressive surroundings, safe-guarding IoT units present many different challenges. The key purpose for support quality degradation of IoT device interaction can be harmful attacks. Plenty of gadgets are often susceptible to port attacks/botnets hits, such as network attack events, which usually assessed by performing QoS Analysis. To start with factors affecting Quality of Services (QoS), in this paper we developed QoS evaluation algorithm “MQoS” for MQTT protocol and considered QoS-0 as an evaluation parameter. This paper refers the threat model which represents the flow of threats for proposed case study and can help to identify QoS by evaluating the possible communication threats. End–to-end device communication requests and responses are needed to be evaluated for large systems to get the actual QoS parameters for that system. For this reason the actual QoS tests will be conducted for third party applications.In this paper we presented results of MQTTv311 simulation for cooling sensor system.


2018 ◽  
Vol 9 (2) ◽  
pp. 61-72
Author(s):  
Aleksander Sładkowski ◽  
Maria Cieśla ◽  
Bartosz Krupa

Abstract The theoretical part of this article presents knowledge of selected methods used to study the quality level of basic processes. Authors paid particular attention to the Servqual method, which shows the differences that exist between the perceived and delivered quality of services provided by enterprises and the TUL method. The research part will show the Servqual and TUL analysis based on the processes of the existing transport company. The article is based on well-known methodology of Servqual and TUL analysis, which was adjusted to observation of transport processes of logistics service provider. The main scientific goal of the paper was to examine the effectiveness of the methodology used on the example of a transport company and comparison of methods utility. The improvement of the transport process will increase the level of customer satisfaction, and this is the first step to increase the number of transport orders received.


Author(s):  
Partha Sarathi Choudhuri

Service quality has become as one of the most important ensuing factors in the service sector. Considering various needs and requirements of the customers, like any other service provider life insurers also always trying to provide better quality of services to their customers in order to satisfy them. In this chapter, the researcher conducted a study on the quality of services offered by the private life insurers operating in the district of Burdwan, West Bengal, through proper investigation of the service quality structure in the present perspective. Here, accepted 661 usable responses with respect to the customers and 582 usable responses with respect to the insurers were considered as the sample size of the study and statistical package SPSS 16 as well as Bexley's Customer Retention Indicator Grid ware used to perform the analyses.


Sensors ◽  
2020 ◽  
Vol 20 (23) ◽  
pp. 6962
Author(s):  
Shuo Zhang ◽  
Qiaoyan Wen ◽  
Wenmin Li ◽  
Hua Zhang ◽  
Zhengping Jin

Internet of Things (IoT) and cloud computing are adopted widely in daily life and industrial production. Sensors of IoT equipment gather personal, sensitive and important data, which is stored in a cloud server. The cloud helps users to save cost and collaborate. However, the privacy of data is also at risk. Public-key encryption with keyword search (PEKS) is convenient for users to use the data without leaking privacy. In this article, we give a scheme of PEKS for a multi-user to realize the multi-keyword search at once and extend it to show a rank based on keywords match. The receiver can finish the search by himself or herself. With private cloud and server cloud, most users’ computing can be outsourced. Moreover, the PEKS can be transferred to a multi-user model in which the private cloud is used to manage receivers and outsource. The store cloud and the private cloud both obtain nothing with the keyword information. Then our IoT devices can easily run these protocols. As we do not use any pairing operations, the scheme is under more general assumptions that means the devices do not need to take on the heavy task of calculating pairing.


Author(s):  
Ahmed El-Yahyaoui ◽  
Mohamed Daifr Ech-Cherif El Kettani

Fully homomorphic encryption schemes (FHE) are a type of encryption algorithm dedicated to data security in cloud computing. It allows for performing computations over ciphertext. In addition to this characteristic, a verifiable FHE scheme has the capacity to allow an end user to verify the correctness of the computations done by a cloud server on his encrypted data. Since FHE schemes are known to be greedy in term of processing consumption and slow in terms of runtime execution, it is very useful to look for improvement techniques and tools to improve FHE performance. Parallelizing computations is among the best tools one can use for FHE improvement. Batching is a kind of parallelization of computations when applied to an FHE scheme, it gives it the capacity of encrypting and homomorphically processing a vector of plaintexts as a single ciphertext. This is used in the context of cloud computing to perform a known function on several ciphertexts for multiple clients at the same time. The advantage here is in optimizing resources on the cloud side and improving the quality of services provided by the cloud computing. In this article, the authors will present a detailed survey of different FHE improvement techniques in the literature and apply the batching technique to a promising verifiable FHE (VFHE) recently presented by the authors at the WINCOM17 conference.


Sensors ◽  
2020 ◽  
Vol 20 (9) ◽  
pp. 2468 ◽  
Author(s):  
Khalid Haseeb ◽  
Ahmad Almogren ◽  
Ikram Ud Din ◽  
Naveed Islam ◽  
Ayman Altameem

Nowadays, the integration of Wireless Sensor Networks (WSN) and the Internet of Things (IoT) provides a great concern for the research community for enabling advanced services. An IoT network may comprise a large number of heterogeneous smart devices for gathering and forwarding huge data. Such diverse networks raise several research questions, such as processing, storage, and management of massive data. Furthermore, IoT devices have restricted constraints and expose to a variety of malicious network attacks. This paper presents a Secure Sensor Cloud Architecture (SASC) for IoT applications to improve network scalability with efficient data processing and security. The proposed architecture comprises two main phases. Firstly, network nodes are grouped using unsupervised machine learning and exploit weighted-based centroid vectors for the development of intelligent systems. Secondly, the proposed architecture makes the use of sensor-cloud infrastructure for boundless storage and consistent service delivery. Furthermore, the sensor-cloud infrastructure is protected against malicious nodes by using a mathematically unbreakable one-time pad (OTP) encryption scheme to provide data security. To evaluate the performance of the proposed architecture, different simulation experiments are conducted using Network Simulator (NS3). It has been observed through experimental results that the proposed architecture outperforms other state-of-the-art approaches in terms of network lifetime, packet drop ratio, energy consumption, and transmission overhead.


2018 ◽  
Author(s):  
Daisy Christiana Santoso

ABSTRACRestaurant or caffee is part of tourism industry that played a role as service providers food and beverage for people who were far from home. The customer’s need of value service pushing the service provider of food and beverage to get involved in the competition and won them all. Any activities of the restaurant must be focused on management efforts to provide the performances of service that exceed expectations of customers. These efforts can be done through the development of the quality of care with consists of reability, responsibility, assurance, empathy, and tangibles. Based on the above description, then done reseacrh on the strategy the development of the quality of services to the satisfaction of customers. Unit analysis of this research are the guests who has ever been and making purchases at Dave Kichen. Methods used in this study is the method of observation, interview and documentation. The analysis of data used is the analysis of qualitative to see the influence of a variable is independent of variable dependent. The analysis is shown by those independent states (in the world service) to variable dependent (reward customers). These other factors that arent pursuing.


2019 ◽  
Vol 2 (2) ◽  
pp. 13-43
Author(s):  
Ashish Tiwari ◽  
Rajeev Mohan Sharma

Fog Computing provides resources as a service. Various providers are providing the best form of Quality of Services (QoS) which works in the principal of pay per use. Now it is important to connect the Internet of Things (IoT) services in fog computing. The strategy for choosing a service provider is assessed by which cloud provider provides what.


Author(s):  
María T. Lamata ◽  
Daymi Morales Vega

The evaluation of the Quality of Services (QoS) has been a topic of particular interest to many authors. In the literature, many works have been developed where different models are proposed to assess the QoS in different environments. These models evaluate the QoS from a set of criteria, which may vary from one environment to another, and thus they do not always have the same importance. Considering this, there have been many studies proposing techniques to evaluate the performance of the quality criteria. Techniques have also been developed to obtain the ranking of a given service provider. The purpose of this chapter is to make a literature review of service quality models, methods for determining the weights of the criteria, and the methods used to conduct an overall assessment of service providers.


2021 ◽  
Vol 2 (1) ◽  
pp. 10-17
Author(s):  
Andree Fajar Pratama ◽  
Syamsyarief Baqaruzi ◽  
Ali Muhtar

Perilaku boros air bersih menyebabkan semakin banyak orang yang kehilangan akses terhadap air bersih. Penggunaan air di dalam rumah tangga selama ini masih sangat sulit untuk dilakukan pengelolaan dalam penggunaan air secara efektif. Kelangkaan air bersih adalah situasi saat terjadinya kekurangan air untuk memenuhi kebutuhan manusia. Penelitian ini menmbangun sistem Home Water Flow Monitoring (HEROIG) berbasis Internet of Things (IoT) untuk melakukan monitoring dan controlling penggunaan air pada rumah. Perangkat keras menggunakan NodeMCU sebagai mikrokontroler serta mengirimkan hasil sensing debit air oleh sensor water flow yang akan dikirimkan ke cloud server. Pengontrolan dapat dilakukan melalui aplikasi android HEROIG yang telah dibuat dan terintegrasi dengan sistem IoT yang harus bekerja dalam koneksi jaringan yang baik. Pengujian kualitas koneksi jaringan atau Quality of Services (QoS) khususnya packet loss menggunakan dua parameter yaitu dari waktu dan jarak. Hasil pengujian packet loss parameter waktu dengan pengujian enam detik sekali dalam waktu satu menit memiliki nilai rata-rata packet loss 1,13%, kemudian untuk pengujian parameter jarak dengan selisih setiap jarak adalah empat meter memiliki nilai rata-rata packet loss 0,15%. Hasil pengujian tersebut menunjukan kualitas pengiriman data sensor ke cloud server memiliki parameter QoS packet loss kategori sangat baik, karena memiliki nilai packet loss <3%.


Sign in / Sign up

Export Citation Format

Share Document