1
Authors: T. Daisy Premila Bai, S. Albert Rabara
Department of Computer Science
St. Joseph’s College (Autonomous)
Tiruchirapalli, India
Source:2015 3rd International Conference on Future Internet of Things and Cloud
Course details:
Course no : 4130
Course title: Seminar
Presented by:
Khaled md. Saifuddin
1209026
Department of Electronics & Communication Engineering,
Khulna University of Engineering and Technology.
Design and Development of Integrated, Secured and
Intelligent Architecture for
Internet of Things and Cloud Computing
1
2
 Objectives
 Introduction
 Background
 Proposed Approach
 Experimental Study
 Conclusion
ContentsContents
3
 To provide a novel integrated architecture for the IOT and Cloud Computing
through IP/MPLS
 To ensure security for IOT and Cloud Computing through ECC
 To design a unique intelligent architecture adoptable for the public
IOT: Internet Of Things
IP/MPLS: Internet Protocol/ Multilevel protocol Switching
ECC: Elliptic Curve Cryptography
Objectives
4
Internet of Things:
 Not only communicate with peoples through internet but also communicate with every object
electrically through internet .
 It is characterized by real world of smart objects with limited storage and processing power.
 Dynamic global network with self configuring capabilities.
Introduction
5
Cloud computing:
 Cloud Computing is characterized by virtual world with unlimited capability in terms of storage
and processing power
Introduction(cont...)
 cloud computing allows people access to the different kinds of applications through the internet.
6
Background
InternetConnecteddevices
7
Background(cont..)
Industrial Automation Smart Health
Smart Home Smart Cities
8
Background(cont...)
More“Things”arebeing connected
Home/daily-life devices
Business and
Public infrastructure
Health-care
…
9
Background(cont...)
PeopleConnectingtoThings
Motion sensor
Motion sensor
Motion sensor
ECG sensor
Internet
10
Background(cont...)
ThingsConnectingtoThings
- Complex and heterogeneous
resources and networks
11
IOT will generate many data.
BUT
Where those data will be stored???........................
many integrated CloudIoT architectures exist to support applications such as:
i)transport,
ii)healthcare,
iii)smart city,
vii)smart Grid, etc.
BUT....
As the information is not ciphered there are the possibility of larger threats from the ATTACKERS.
Background(cont...)
12
The proposed architecture consists of four key components:
A) Intelligent system
B) IP/MPLS core
C) Integrated cloud IoT platform.
D) Security gateway
Proposed Architecture
Fig1:Proposed architecture
13
Proposed Architecture
A. Intelligent System:
1) Intelligent Smart Card:
 It is an IoT enabled active card
 ISO/IEC standard
 Ensures security and avails services using one UID per citizen.
UID:
 20 digit alpha numeric number.
 Includes country name, state name, place of birth, date of birth, sex, father’s initial and five digit number.
 The last defined five digit number will be the PIN number.
Security Features:
 Biometric information on their hands always.
 MAC ID of the ISC will be encrypted using UID
Unique Traits:
 Can be used to access both on premise and off premise applications.
 It has a special feature to alert the card holder and card issuing center in time of card loss or theft.
Fig2:sample UID
14
Proposed Architecture(cont...)
2) Smart Reader:
Two kinds of readers are proposed
 i)namely RFID reader and ii)smartphone reader.
 RFID reader conforms to the ISO standard
 interface between ISC and smart gateway.
3)Smart Gateway:
 Heart of the smart environment
 It receives UID from the ISC through intelligent smart reader.
 very flexible & supports multiple protocols.
 compatible for both IPv4 and IPv6
 uploads the necessary data to the cloud through IP-MPLS core.
B. IP/MPLS Core:
 Bridges the cloud platform and IoT enabled intelligent systems.
 It provides secure and fast packet switching technology.
 Reliability, availability, security and quality of service.
15
Proposed Architecture(cont…)
C. Integrated Cloud IoT Platform:
 The data generated are processed and sent to the cloud.
 The service providers should register themselves in the proposed system and to be authenticated to
provide their services.
 The cloud vendors are connected through the IP/MPLS core.
D. Security Gateway
 multi-factor authentication to ensure end-to-end security.
 uses elliptic curve cryptography to authenticate the user, card, mobile device and the server.
 Y^2 = X^3 -3X+1 mod 997 is used for encryption and decryption.
The authentication phases of the proposed work solely depend on the registration phase.
1) Registration Phase:
The Registration Center (RC) uniquely registers the credentials of the user, user’s mobile device and the
ISC.
16
Proposed Architecture(cont…)
c) Mobile Device Authentication: The mobile device is authenticated using X.509v3 digital certificate (DC)
and unique identifiable pictures.
d) Service Level Authentication: When a user submits the request, user interface asks the customer to enter the
PIN. PIN is sent to the server in an encrypted form. If it is successful, service will be provided.
2) Authentication Phase:
4 level authentication:
a)Mutual Authentication between the ISC and the reader,
b)User Authentication,
c)Mobile Device Authentication and
d)Service Level Authentication.
a)Mutual Authentication:
ISC is mutually authenticated with the RFID reader using EAP .
b)User Authentication: User is authenticated with the UID number obtained from the ISC.
17
Experimental Study
A. Test Bed
A test bed is created for the proposed architecture and it is tested in a simulated environment. Jmeter tool is
used to analyze the overall performance . The sample test bed is depicted in Fig. 4.
Figure 4. Sample Testbed
18
Experimental Study(cont…)
Figure 5. Overall System Thoroughput
Figure 6. Screenshot for System Throughput - Graph
Figure 7. Screenshot for System Throughput - Data
19
Experimental Study(cont…)
A.System Throughput:
Sample tests have been done with 10, 20, 30, 40, 50, 60, 70, 80, 90, 100,110 and 120 service requesters, The system
throughput increases gradually up to 10 requests and keeps rapidly increasing till 120. At one point, the system has
reached the saturation point due to various factors and the throughput declines. However, the proposed system provides
response to the service requests with a reasonable response time.
B. Transaction Response Time:
The average time taken to perform the various transactions during every second of the load is tested
using the JMeter tool. To evaluate the transaction response time, different loads are set on the
proposed system by creating up to 500 virtual service requesters.
Figure 8. Transaction Response Time
20
Conclusion
i)The proposed is a unique one to avail any applications anywhere, anytime with one ISC. Implementing
this architecture will help every citizen to have only one ISC for any applications in a smart environment.
ii)The message encryption and the multifactor authentication ensure unique authentication, integrity,
confidentiality and privacy of the users.
iii)The simulated results prove the performance of the proposed system. Higher level security by
incorporating ECC, overall simulation of this architecture and real time implementation are in the
progress of this research. Certainly, the proposed architecture eliminates ambiguity and enhances security.
21
References
[1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of
Things (IoT): A Vision, Architectural Elements, and Future
Directions,” Future Generation Computer Systems, vol. 29, Feb.
2013, pp. 1645–1660, doi: 10.1016/j.future.2013.01.010.
[2] O. Vermesan and P. Friess, “Internet of Things from Research and
Innovation to Market Deployment,” River Publishers Series in
Communications, Aalborg, 2014, pp. 8-15.
[3] O. Vermesan and P. Friess, “Internet of Things: Converging
Technologies for Smart Environments and Integrated Ecosystems,”
River Publishers Series in Communications, Aalborg, 2013, pp.7-112.
[4] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,”
IEEE Computer, vol. 44, Sept. 2011, pp. 51-58, doi:
10.1109/MC.2011.291.
[5] L. Badger T. Grance, R.P. Corner and J. Voas, “DRAFT Cloud
Computing Synopsis and Recommendations,” National Institute of
Standards and Technology, Washington, DC, May 2011, p.84.
[6] R. Buyya, J. Broberg and A. Goscinski, “Cloud Computing Principles
and Paradigms,” WILEY, USA, Feb. 2011, pp. 3-42.
[7] C. Atkins, K. Koanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H.
Sawano, “A Cloud Service for End-User Participation Concerning the
Internet of Things,” Proc. IEEE Conf. Signal-Image Technology and
Internet-Based Systems (SITIS), IEEE, Dec. 2013, pp. 273-278,
[8] P. P. Pereira, J. Eliasson, R. Kyusakov, J. Delsing, A. Raayatinezhad,
and M. Johansson, “Enabling Cloud Connectivity for Mobile Internet
of Things Applications,” Proc. IEEE Symp. Service Oriented System
Engineering (SOSE), IEEE, Mar. 2013, pp. 518-526, doi:
10.1109/SOSE.2013.33.
[9] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G.
Cattaneo, S. Gusmeroli, G. Micheletti, D. Rotondi and R. Stevens,
“Definition of a Research and Innovation Policy Leveraging Cloud
Computing and IoT Combination. Final Report,” European
Commission, SMART 2013/0037, 2013.
[15] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot and L. Gurgen,
“Sharing User IoT Devices in the Cloud”, IEEE World Forum on
Internet of Things (WF-IoT), IEEE, Mar. 2014, pp. 373-374, doi:
10.1109/WF-IoT.2014.6803193.
[16] G.C. Fox, S. Kamburugamuve and R. D. Hartman, “Architecture and
Measured Characteristics of a Cloud Based Internet of Things,” Proc.
Int. Conf. Collaboration Technologies and Systems (CTS), IEEE,
May 2012, pp. 6-12, doi: 10.1109/CTS.2012.6261020.
[17] D. Evans “The Internet of Things How the Next Evolution of the
Internet Is Changing Everything,” White Paper, Cisco, Apr. 2011.
[18] M. Aazam, P.P. Hung and E.N. Huh, “Smart Gateway Based
Communication for Cloud of Things”, Proc. IEEE Conf. Intelligent
Sensors, Sensor Networks and Information Processing (ISSNIP),
IEEE, Apr. 2014, pp. 1-6, doi: 10.1109/ISSNIP.2014.6827673.
[19] A. Botta, W. Donato, V. Persico and A. Pescap, “On the Integration
of Cloud Computing and Internet of Things,” Proc. IEEE Conf.
Future Internet of Things and Cloud (FiCloud), IEEE, Aug. 2014, pp.
23-30, doi: 10.1109/FiCloud.2014.14.
[20] “Enabling Connected Smart Cities For A Better Tomorrow,”
Elitecore Wi-Fi Service Management Platform (SMP), 2015,
http://www.elitecore.com/downloads/datasheets/wifioffload/Elitecore
-Smart-City-Solution.pdf.
[21] C. Dobre and F. Xhafa, “Intelligent Services for Big Data Science,”
Future Generation Computer Systems, Generation Computer
Systems, July 2014, vol. 37, pp. 267–281, doi: 10.1016/j. future.
2013.07.014.
[22] M. Aazam, I. Khan, A.A. Alsaffar and E. N. Huh, “Cloud of Things:
Integrating Internet of Things and Cloud Computing and the Issues
Involved”, Proc. 11th Int. Bhurban Conf. Applied Sciences &
Technology (IBCAST), IEEE, Jan. 2014, pp. 414-419, doi:
10.1109/IBCAST.2014.6778179.
Thank you
for your kind
Attention!
22
23
Answer
ECC:
Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure
of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on
plain Galois fields) to provide equivalent security.
X.509v3:
X.509 V3is an important standard for a public key infrastructure (PKI) to manage digital certificates and
public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email
communication
EAP:
Extensible Authentication Protocol (EAP) which is an authentication framework frequently used in wireless
networks by adopting ECC algorithm.

More Related Content

PDF
A Review Study on Secure Authentication in Mobile System
PDF
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
PDF
Understanding Architecture of Internet of Things
PDF
Malware threat analysis techniques and approaches for IoT applications: a review
PDF
DNA computing based stream cipher for internet of things using MQTT protocol
PDF
A Novel Security Approach for Communication using IOT
PDF
76 s201918
PDF
Bridging IoT infrastructure and cloud application using cellular-based intern...
A Review Study on Secure Authentication in Mobile System
KAFA: A novel interoperability open framework to utilize Indonesian electroni...
Understanding Architecture of Internet of Things
Malware threat analysis techniques and approaches for IoT applications: a review
DNA computing based stream cipher for internet of things using MQTT protocol
A Novel Security Approach for Communication using IOT
76 s201918
Bridging IoT infrastructure and cloud application using cellular-based intern...

What's hot (17)

PDF
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
PDF
Research Inventy : International Journal of Engineering and Science
PDF
PDF
IRJET- Review On Semantic Open IoT Service Platform
PDF
Internet of Things Malware : A Survey
PPT
Internet of things Unit I
PPTX
A fair survey on Internet of Things(IoT)
PDF
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
PDF
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
PDF
Residential access control system using QR code and the IoT
PPTX
Introduction to IoT - Unit I
PDF
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
PDF
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
PDF
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
PDF
Dual method cryptography image by two force secure and steganography secret m...
PDF
Home monitoring system using io t
PPTX
Internet of Things
DESIGN AND IMPLEMENTATION OF E-PASSPORT SCHEME USING CRYPTOGRAPHIC ALGORITHM ...
Research Inventy : International Journal of Engineering and Science
IRJET- Review On Semantic Open IoT Service Platform
Internet of Things Malware : A Survey
Internet of things Unit I
A fair survey on Internet of Things(IoT)
Top 2 Cited Papers in 2017 - International Journal of Network Security & Its ...
Graphical Based Password for Android Phones using Keystroke Dynamics - A Survey
Residential access control system using QR code and the IoT
Introduction to IoT - Unit I
RPL AND COAP PROTOCOLS, EXPERIMENTAL ANALYSIS FOR IOT: A CASE STUDY
Secure Modern Healthcare System Based on Internet of Things and Secret Sharin...
A Comprehensive Survey on Exiting Solution Approaches towards Security and Pr...
Dual method cryptography image by two force secure and steganography secret m...
Home monitoring system using io t
Internet of Things
Ad

Similar to Internet of things .pptx [repaired] (20)

PDF
June 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
May 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
March 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
February 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
March 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
April 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
February 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
January 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
December 2023 - Top 10 Read Articles in Network Security & Its Applications
PDF
April 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
August 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
July 2024 - Top 10 Read Articles in Network Security and Its Applications
PDF
November 2023 - Top 10 Read Articles in Network Security & Its Applications
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
May 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
June 2024 - Top 10 Read Articles in Network Security and Its Applications
PDF
January 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
September 2024: Top 10 Read Articles in Network Security and Its Applications
June 2023: Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
May 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
October 2023 - Top 10 Read Articles in Network Security & Its Applications.pdf
March 2024 - Top 10 Read Articles in Network Security & Its Applications
February 2023: Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
February 2024 - Top 10 Read Articles in Network Security & Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
December 2023 - Top 10 Read Articles in Network Security & Its Applications
April 2024 - Top 10 Read Articles in Network Security & Its Applications
August 2024 - Top 10 Read Articles in Network Security & Its Applications.pdf
July 2024 - Top 10 Read Articles in Network Security and Its Applications
November 2023 - Top 10 Read Articles in Network Security & Its Applications
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
May 2022: Top 10 Read Articles in Network Security and Its Applications
June 2024 - Top 10 Read Articles in Network Security and Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
September 2024: Top 10 Read Articles in Network Security and Its Applications
Ad

Recently uploaded (20)

PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PDF
simpleintnettestmetiaerl for the simple testint
PDF
Understand the Gitlab_presentation_task.pdf
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
DOCX
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
Exploring The Internet Of Things(IOT).ppt
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PPTX
Reading as a good Form of Recreation
PPTX
t_and_OpenAI_Combined_two_pressentations
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PPTX
AI_Cyberattack_Solutions AI AI AI AI .pptx
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
simpleintnettestmetiaerl for the simple testint
Understand the Gitlab_presentation_task.pdf
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Powerful Ways AIRCONNECT INFOSYSTEMS Pvt Ltd Enhances IT Infrastructure in In...
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
Exploring The Internet Of Things(IOT).ppt
Mathew Digital SEO Checklist Guidlines 2025
Uptota Investor Deck - Where Africa Meets Blockchain
Reading as a good Form of Recreation
t_and_OpenAI_Combined_two_pressentations
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
250152213-Excitation-SystemWERRT (1).ppt
curriculumandpedagogyinearlychildhoodcurriculum-171021103104 - Copy.pptx
Introduction to cybersecurity and digital nettiquette
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
AI_Cyberattack_Solutions AI AI AI AI .pptx
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf

Internet of things .pptx [repaired]

  • 1. 1 Authors: T. Daisy Premila Bai, S. Albert Rabara Department of Computer Science St. Joseph’s College (Autonomous) Tiruchirapalli, India Source:2015 3rd International Conference on Future Internet of Things and Cloud Course details: Course no : 4130 Course title: Seminar Presented by: Khaled md. Saifuddin 1209026 Department of Electronics & Communication Engineering, Khulna University of Engineering and Technology. Design and Development of Integrated, Secured and Intelligent Architecture for Internet of Things and Cloud Computing 1
  • 2. 2  Objectives  Introduction  Background  Proposed Approach  Experimental Study  Conclusion ContentsContents
  • 3. 3  To provide a novel integrated architecture for the IOT and Cloud Computing through IP/MPLS  To ensure security for IOT and Cloud Computing through ECC  To design a unique intelligent architecture adoptable for the public IOT: Internet Of Things IP/MPLS: Internet Protocol/ Multilevel protocol Switching ECC: Elliptic Curve Cryptography Objectives
  • 4. 4 Internet of Things:  Not only communicate with peoples through internet but also communicate with every object electrically through internet .  It is characterized by real world of smart objects with limited storage and processing power.  Dynamic global network with self configuring capabilities. Introduction
  • 5. 5 Cloud computing:  Cloud Computing is characterized by virtual world with unlimited capability in terms of storage and processing power Introduction(cont...)  cloud computing allows people access to the different kinds of applications through the internet.
  • 7. 7 Background(cont..) Industrial Automation Smart Health Smart Home Smart Cities
  • 11. 11 IOT will generate many data. BUT Where those data will be stored???........................ many integrated CloudIoT architectures exist to support applications such as: i)transport, ii)healthcare, iii)smart city, vii)smart Grid, etc. BUT.... As the information is not ciphered there are the possibility of larger threats from the ATTACKERS. Background(cont...)
  • 12. 12 The proposed architecture consists of four key components: A) Intelligent system B) IP/MPLS core C) Integrated cloud IoT platform. D) Security gateway Proposed Architecture Fig1:Proposed architecture
  • 13. 13 Proposed Architecture A. Intelligent System: 1) Intelligent Smart Card:  It is an IoT enabled active card  ISO/IEC standard  Ensures security and avails services using one UID per citizen. UID:  20 digit alpha numeric number.  Includes country name, state name, place of birth, date of birth, sex, father’s initial and five digit number.  The last defined five digit number will be the PIN number. Security Features:  Biometric information on their hands always.  MAC ID of the ISC will be encrypted using UID Unique Traits:  Can be used to access both on premise and off premise applications.  It has a special feature to alert the card holder and card issuing center in time of card loss or theft. Fig2:sample UID
  • 14. 14 Proposed Architecture(cont...) 2) Smart Reader: Two kinds of readers are proposed  i)namely RFID reader and ii)smartphone reader.  RFID reader conforms to the ISO standard  interface between ISC and smart gateway. 3)Smart Gateway:  Heart of the smart environment  It receives UID from the ISC through intelligent smart reader.  very flexible & supports multiple protocols.  compatible for both IPv4 and IPv6  uploads the necessary data to the cloud through IP-MPLS core. B. IP/MPLS Core:  Bridges the cloud platform and IoT enabled intelligent systems.  It provides secure and fast packet switching technology.  Reliability, availability, security and quality of service.
  • 15. 15 Proposed Architecture(cont…) C. Integrated Cloud IoT Platform:  The data generated are processed and sent to the cloud.  The service providers should register themselves in the proposed system and to be authenticated to provide their services.  The cloud vendors are connected through the IP/MPLS core. D. Security Gateway  multi-factor authentication to ensure end-to-end security.  uses elliptic curve cryptography to authenticate the user, card, mobile device and the server.  Y^2 = X^3 -3X+1 mod 997 is used for encryption and decryption. The authentication phases of the proposed work solely depend on the registration phase. 1) Registration Phase: The Registration Center (RC) uniquely registers the credentials of the user, user’s mobile device and the ISC.
  • 16. 16 Proposed Architecture(cont…) c) Mobile Device Authentication: The mobile device is authenticated using X.509v3 digital certificate (DC) and unique identifiable pictures. d) Service Level Authentication: When a user submits the request, user interface asks the customer to enter the PIN. PIN is sent to the server in an encrypted form. If it is successful, service will be provided. 2) Authentication Phase: 4 level authentication: a)Mutual Authentication between the ISC and the reader, b)User Authentication, c)Mobile Device Authentication and d)Service Level Authentication. a)Mutual Authentication: ISC is mutually authenticated with the RFID reader using EAP . b)User Authentication: User is authenticated with the UID number obtained from the ISC.
  • 17. 17 Experimental Study A. Test Bed A test bed is created for the proposed architecture and it is tested in a simulated environment. Jmeter tool is used to analyze the overall performance . The sample test bed is depicted in Fig. 4. Figure 4. Sample Testbed
  • 18. 18 Experimental Study(cont…) Figure 5. Overall System Thoroughput Figure 6. Screenshot for System Throughput - Graph Figure 7. Screenshot for System Throughput - Data
  • 19. 19 Experimental Study(cont…) A.System Throughput: Sample tests have been done with 10, 20, 30, 40, 50, 60, 70, 80, 90, 100,110 and 120 service requesters, The system throughput increases gradually up to 10 requests and keeps rapidly increasing till 120. At one point, the system has reached the saturation point due to various factors and the throughput declines. However, the proposed system provides response to the service requests with a reasonable response time. B. Transaction Response Time: The average time taken to perform the various transactions during every second of the load is tested using the JMeter tool. To evaluate the transaction response time, different loads are set on the proposed system by creating up to 500 virtual service requesters. Figure 8. Transaction Response Time
  • 20. 20 Conclusion i)The proposed is a unique one to avail any applications anywhere, anytime with one ISC. Implementing this architecture will help every citizen to have only one ISC for any applications in a smart environment. ii)The message encryption and the multifactor authentication ensure unique authentication, integrity, confidentiality and privacy of the users. iii)The simulated results prove the performance of the proposed system. Higher level security by incorporating ECC, overall simulation of this architecture and real time implementation are in the progress of this research. Certainly, the proposed architecture eliminates ambiguity and enhances security.
  • 21. 21 References [1] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, “Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions,” Future Generation Computer Systems, vol. 29, Feb. 2013, pp. 1645–1660, doi: 10.1016/j.future.2013.01.010. [2] O. Vermesan and P. Friess, “Internet of Things from Research and Innovation to Market Deployment,” River Publishers Series in Communications, Aalborg, 2014, pp. 8-15. [3] O. Vermesan and P. Friess, “Internet of Things: Converging Technologies for Smart Environments and Integrated Ecosystems,” River Publishers Series in Communications, Aalborg, 2013, pp.7-112. [4] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,” IEEE Computer, vol. 44, Sept. 2011, pp. 51-58, doi: 10.1109/MC.2011.291. [5] L. Badger T. Grance, R.P. Corner and J. Voas, “DRAFT Cloud Computing Synopsis and Recommendations,” National Institute of Standards and Technology, Washington, DC, May 2011, p.84. [6] R. Buyya, J. Broberg and A. Goscinski, “Cloud Computing Principles and Paradigms,” WILEY, USA, Feb. 2011, pp. 3-42. [7] C. Atkins, K. Koanagi, T. Tsuchiya, T. Miyosawa, H. Hirose, and H. Sawano, “A Cloud Service for End-User Participation Concerning the Internet of Things,” Proc. IEEE Conf. Signal-Image Technology and Internet-Based Systems (SITIS), IEEE, Dec. 2013, pp. 273-278, [8] P. P. Pereira, J. Eliasson, R. Kyusakov, J. Delsing, A. Raayatinezhad, and M. Johansson, “Enabling Cloud Connectivity for Mobile Internet of Things Applications,” Proc. IEEE Symp. Service Oriented System Engineering (SOSE), IEEE, Mar. 2013, pp. 518-526, doi: 10.1109/SOSE.2013.33. [9] S. Aguzzi, D. Bradshaw, M. Canning, M. Cansfield, P. Carter, G. Cattaneo, S. Gusmeroli, G. Micheletti, D. Rotondi and R. Stevens, “Definition of a Research and Innovation Policy Leveraging Cloud Computing and IoT Combination. Final Report,” European Commission, SMART 2013/0037, 2013. [15] Y. Benazzouz, C. Munilla, O. Gunalp, M. Gallissot and L. Gurgen, “Sharing User IoT Devices in the Cloud”, IEEE World Forum on Internet of Things (WF-IoT), IEEE, Mar. 2014, pp. 373-374, doi: 10.1109/WF-IoT.2014.6803193. [16] G.C. Fox, S. Kamburugamuve and R. D. Hartman, “Architecture and Measured Characteristics of a Cloud Based Internet of Things,” Proc. Int. Conf. Collaboration Technologies and Systems (CTS), IEEE, May 2012, pp. 6-12, doi: 10.1109/CTS.2012.6261020. [17] D. Evans “The Internet of Things How the Next Evolution of the Internet Is Changing Everything,” White Paper, Cisco, Apr. 2011. [18] M. Aazam, P.P. Hung and E.N. Huh, “Smart Gateway Based Communication for Cloud of Things”, Proc. IEEE Conf. Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), IEEE, Apr. 2014, pp. 1-6, doi: 10.1109/ISSNIP.2014.6827673. [19] A. Botta, W. Donato, V. Persico and A. Pescap, “On the Integration of Cloud Computing and Internet of Things,” Proc. IEEE Conf. Future Internet of Things and Cloud (FiCloud), IEEE, Aug. 2014, pp. 23-30, doi: 10.1109/FiCloud.2014.14. [20] “Enabling Connected Smart Cities For A Better Tomorrow,” Elitecore Wi-Fi Service Management Platform (SMP), 2015, http://www.elitecore.com/downloads/datasheets/wifioffload/Elitecore -Smart-City-Solution.pdf. [21] C. Dobre and F. Xhafa, “Intelligent Services for Big Data Science,” Future Generation Computer Systems, Generation Computer Systems, July 2014, vol. 37, pp. 267–281, doi: 10.1016/j. future. 2013.07.014. [22] M. Aazam, I. Khan, A.A. Alsaffar and E. N. Huh, “Cloud of Things: Integrating Internet of Things and Cloud Computing and the Issues Involved”, Proc. 11th Int. Bhurban Conf. Applied Sciences & Technology (IBCAST), IEEE, Jan. 2014, pp. 414-419, doi: 10.1109/IBCAST.2014.6778179.
  • 22. Thank you for your kind Attention! 22
  • 23. 23 Answer ECC: Elliptic curve cryptography (ECC) is an approach to public-key cryptography based on the algebraic structure of elliptic curves over finite fields. ECC requires smaller keys compared to non-ECC cryptography (based on plain Galois fields) to provide equivalent security. X.509v3: X.509 V3is an important standard for a public key infrastructure (PKI) to manage digital certificates and public-key encryption and a key part of the Transport Layer Security protocol used to secure web and email communication EAP: Extensible Authentication Protocol (EAP) which is an authentication framework frequently used in wireless networks by adopting ECC algorithm.