Transport Layer Security (TLS) / Datagram Transport Layer Security (DTLS) Profiles for the Internet of Things

Author(s):  
T. Fossati
Author(s):  
Tae-Ho Cho

The Internet of Things (IoT) is an ever evolving infrastructure of physical objects and Internet-enabled devices and systems featuring IP addresses for connectivity. Physical objects consist of home appliances, electronic gadgets, machinery, healthcare items, wearable devices and anything that could be connected to the Internet. Each type of connection requires particular types of security service. Security algorithms in user devices are fixed by default and selected based on preferences. This limitation causes energy waste since a user might be using all services in an algorithm, even those the user does not need. In order to counter this problem, we propose an energy aware security service selection method that saves energy by selecting only particular types of security service required by a given connection. In this paper, we compared the energy consumption of each communication to provide integrity, authentication, and confidentiality in Secure Sockets Layer/Transport Layer Security (SSL/TLS) with our proposed method. The experimental results demonstrate the validity of our proposed method. Our proposed method saved 54.94% energy for integrity and 74.52% for authentication.


2019 ◽  
Vol 9 (2) ◽  
pp. 310
Author(s):  
Xiaowen Chen ◽  
Guanci Yang

Tensioning is an important process for producing prestressed concrete beams and directly affects bridge performance and driving safety. Active sensing and management of tensioning process data can improve the efficiency of quality monitoring and level of prestressed concrete beams. To realize remote collection and quality monitoring of tensioning process data, a framework for data sensing and processing of tensioning system based on the Internet of Things (IoT) is proposed in this study. Firstly, we investigate the technical framework and techniques of the system and designs a work flow of sensing, transport, and application service layers. The architecture of the tensioning system is presented. Then we propose a data acquisition and preprocessing method for the sensing layer, put forwards the data-pushing mechanism of the transport layer, and designs the function and work flow of the application service layer. After that, .NET platform and Android Studio are used to implement the tensioning system based on Browser/Server (B/S) architecture and mobile terminals. Finally, the case results of the system in seven precast beam fields in the Hubei section of Zhengzhou–Wanzhou high-speed Railway are given, which show that the developed system realizes collection, active pushing, and remote monitoring of tensioning process data.


2016 ◽  
Vol 2016 ◽  
pp. 1-12 ◽  
Author(s):  
Lianhong Ding ◽  
Yifan Chen ◽  
Juntao Li

The Internet of Things (IoT), a network of objects, has been regarded as the next revolution for the global information industry after the Internet. With IoT, many intelligent applications can be accomplished or improved. This paper presents a framework for dangerous goods management in container yard using IoT technology. The framework consists of three layers: perceptual layer, transport layer, and application layer. It offers an infrastructure for management and data analysis and utilization. According to the features of dangerous goods, the framework can be enhanced for container information forecast, container gate-in and gate-out management, environment parameters monitoring, and fire control as well. In order to verify our method, a prototype system is developed, which shows good performance. With our method, safe operation of dangerous goods in container yard can be accomplished.


Author(s):  
Serhii Tsyrulnyk

Networks that allow digital devices to connect and transmit data are covering the world fast. Thanks to the networks, it is possible to connect all mobile devices, electronic sensors, electronic measuring devices, medical devices and sensors. They track, share, evaluate, and in some cases automatically adjust the data that is collected and transmitted. The concept of "Internet of Things" is complex and has several levels: end devices (sensors, actuators), transport layer (telecommunications environment, including wired and wireless networks) and the level of data processing (collection, storage and processing). The market environment creates requirements for young professionals, and competition between higher education institutions and vocational education institutions provides an opportunity to train a highly qualified specialist who can study and create modern hardware and software for smart electronic devices and systems that are nodes of the Internet of Things network. The article deals with issues related to the peculiarities of creating simple devices within the concept of the Internet of Things based on the popular Wi-Fi module ESP8266 and the introduction of this research into the educational process. The technical possibilities, features of connection and interaction of the ESP8266 module for meteorological monitoring are revealed. The organization of the module's access to the Internet, data sending and their monitoring using the popular mobile applications Blynk, Virtuino and the cloud IoT service ThingSpeak is shown. Their work in non-commercial tasks and ease of use for educational institutions are analyzed. The article provides the source codes of programs for the Wi-Fi module ESP8266 with a digital sensor BME280


2013 ◽  
Vol 748 ◽  
pp. 910-914
Author(s):  
Zhong Wei Zhou ◽  
Lei Shi

With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.


2013 ◽  
Vol 765-767 ◽  
pp. 1007-1010
Author(s):  
Yun Chang Sang ◽  
Xin Gao

With the development of technology and applications of the Internet of Things, Things technology and industry being the attention from the government to enterprises and research institutions at different levels. The guarantee of Things safety is an important prerequisite to promote the healthy development of the Internet of Things. Articles oriented networking current mainstream architecture research from the three levels of perception layer, transport layer and application layer, the security threat of the Internet of Things, and appropriate security measures, provided for the establishment of the security architecture of the Internet of Things theoretical reference.


Sensors ◽  
2021 ◽  
Vol 21 (19) ◽  
pp. 6524
Author(s):  
Koen Tange ◽  
Sebastian Mödersheim ◽  
Apostolos Lalos ◽  
Xenofon Fafoutis ◽  
Nicola Dragoni

In recent years, the Transport Layer Security (TLS) protocol has enjoyed rapid growth as a security protocol for the Internet of Things (IoT). In its newest iteration, TLS 1.3, the Internet Engineering Task Force (IETF) has standardized a zero round-trip time (0-RTT) session resumption sub-protocol, allowing clients to already transmit application data in their first message to the server, provided they have shared session resumption details in a previous handshake. Since it is common for IoT devices to transmit periodic messages to a server, this 0-RTT protocol can help in reducing bandwidth overhead. Unfortunately, the sub-protocol has been designed for the Web and is susceptible to replay attacks. In our previous work, we adapted the 0-RTT protocol to strengthen it against replay attacks, while also reducing bandwidth overhead, thus making it more suitable for IoT applications. However, we did not include a formal security analysis of the protocol. In this work, we address this and provide a formal security analysis using OFMC. Further, we have included more accurate estimates on its performance, as well as making minor adjustments to the protocol itself to reduce implementation ambiguity and improve resilience.


2020 ◽  
pp. 1-12
Author(s):  
Zhang Caiqian ◽  
Zhang Xincheng

The existing stand-alone multimedia machines and online multimedia machines in the market have certain deficiencies, so they cannot meet the actual needs. Based on this, this research combines the actual needs to design and implement a multi-media system based on the Internet of Things and cloud service platform. Moreover, through in-depth research on the MQTT protocol, this study proposes a message encryption verification scheme for the MQTT protocol, which can solve the problem of low message security in the Internet of Things communication to a certain extent. In addition, through research on the fusion technology of the Internet of Things and artificial intelligence, this research designs scheme to provide a LightGBM intelligent prediction module interface, MQTT message middleware, device management system, intelligent prediction and push interface for the cloud platform. Finally, this research completes the design and implementation of the cloud platform and tests the function and performance of the built multimedia system database. The research results show that the multimedia database constructed in this paper has good performance.


Sign in / Sign up

Export Citation Format

Share Document