Skip to main content

From a Home-Area-Network to a Secure Internet of Things Application

  • Conference paper
  • First Online:
Applied Computer Sciences in Engineering (WEA 2019)

Abstract

In this paper, we present a secure system to control devices at home through the web, which we implement based on the Do It Yourself (DIY) culture. We use a model based on the Goal Question Metric approach to evaluate the quality of our system. Given that we are now in the era of the Internet of Things (IoT), security must be at the same level or even in a higher priority than other aspects such as speed, size, and power consumption. The objective of this work is to verify that acceptable levels of confidentiality, integrity, availability, access control, authentication and non-repudiation can be guaranteed in open platforms such as Arduino, Galileo, Energia, Tiva C, among others. Taking into account these platforms, we developed a system with access control that implements motion detection, light control, and generates a power consumption record. The results show a comparison between our security implementation and other authors’ implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Tiva C Series TM4C123G LaunchPad Evaluation Board.

  2. 2.

    Ormuco: The Connected Cloud.

References

  1. FIPS Pub: Standards for security categorization of federal information and information systems. NIST FIPS 199 (2004)

    Google Scholar 

  2. Nixon, R.: Learning PHP, MySQL, JavaScript, and CSS: A Step-by-Step Guide to Creating Dynamic Websites. O’Reilly Media Inc., Beijing (2012)

    Google Scholar 

  3. Nicholas Zambetti: Wire.h library (2006)

    Google Scholar 

  4. Margolis, M.: Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects. O’Reilly Media Inc., Sebastopol (2011)

    Google Scholar 

  5. Bootstrap framework. https://uxplanet.org/how-to-customize-bootstrap-b8078a011203. Accessed 8 Apr 2016

  6. Bulger, B., Greenspan, J., Wall, D.: MySQL/PHP Database Applications. Wiley, New York (2003)

    MATH  Google Scholar 

  7. Ramon, M.C.: Intel Galileo and Intel Galileo Gen 2. Intel® Galileo and Intel® Galileo Gen 2, pp. 1–33. Apress, Berkeley, CA (2014). https://doi.org/10.1007/978-1-4302-6838-3_1

    Chapter  Google Scholar 

  8. Hummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K.: 6LoWPAN fragmentation attacks and mitigation mechanisms. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55–66. ACM, April 2013

    Google Scholar 

  9. Henze, M., Hermerschmidt, L., Kerpen, D., Huling, R., Rumpe, B., Wehrle, K.: User-driven privacy enforcement for cloud-based services in the internet of things. In: 2014 International Conference on Future Internet of Things and Cloud, pp. 191–196. IEEE, August 2014

    Google Scholar 

  10. Stamp, M.: Information Security: Principles and Practice. Wiley, Hoboken (2011)

    Book  Google Scholar 

  11. Lounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y.: Secure and scalable cloud-based architecture for e-health wireless sensor networks. In: 2012 21st International Conference on Computer Communications and Networks (ICCCN), pp. 1–7. IEEE, July 2012

    Google Scholar 

  12. International Organization for Standardization: Technical Committee ISO/TC 97: ISO7498-2: Information processing system, open system interconnection, basic reference mode. Part 2: security architecture. International Organization for Standardization (1989)

    Google Scholar 

  13. Li, X., Xuan, Z., Wen, L.: Research on the architecture of trusted security system based on the internet of things. In: 2011 Fourth International Conference on Intelligent Computation Technology and Automation, vol. 2, pp. 1172–1175. IEEE, March 2011

    Google Scholar 

  14. Li, D., Sampalli, S., Aung, Z., Williams, J., Sanchez, A.: Fine-grained encryption for search and rescue operation on Internet of Things. In: Asia-Pacific World Congress on Computer Science and Engineering, pp. 1–9. IEEE, November 2014

    Google Scholar 

  15. Islam, S., Falcarin, P.: Measuring security requirements for software security. In: 2011 IEEE 10th International Conference on Cybernetic Intelligent Systems (CIS), pp. 70–75. IEEE, September 2011

    Google Scholar 

  16. Van Solingen, R., Basili, V., Caldiera, G., Rombach, H.D.: Goal question metric (GQM) approach. In: Encyclopedia of Software Engineering (2002)

    Google Scholar 

  17. Pirbhulal, S., et al.: A novel secure IoT-based smart home automation system using a wireless sensor network. Sensors 17(1), 69 (2017)

    Google Scholar 

  18. Han, J.H., Jeon, Y., Kim, J.: Security considerations for secure and trustworthy smart home system in the IoT environment. In: 2015 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1116–1118. IEEE, October 2015

    Google Scholar 

  19. Stergiou, C., Psannis, K.E., Kim, B.G., Gupta, B.: Secure integration of IoT and cloud computing. Future Gener. Comput. Syst. 78, 964–975 (2018)

    Article  Google Scholar 

  20. Santoso, F.K., Vun, N.C.: Securing IoT for smart home system. In: 2015 International Symposium on Consumer Electronics (ISCE), pp. 1–2. IEEE, June 2015

    Google Scholar 

  21. Magre Colorado, L.A., Martíinez-Santos, J.C.: Leveraging 1-wire communication bus system for secure home automation. In: Solano, A., Ordoñez, H. (eds.) CCC 2017. CCIS, vol. 735, pp. 759–771. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-66562-7_54

    Chapter  Google Scholar 

  22. Beaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L.: The SIMON and SPECK lightweight block ciphers. In: 2015 52nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1–6. IEEE, June 2015

    Google Scholar 

  23. Griffor, E.R., Greer, C., Wollman, D.A., Burns, M.J.: Framework for cyber-physical systems: volume 1, overview (No. Special Publication (NIST SP)-1500-201) (2017)

    Google Scholar 

  24. Sabalza, M.M., Santos, J.C.M.: Design and construction of a power meter to optimize usage of the electric power. In: 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1–5. IEEE, October 2014

    Google Scholar 

Download references

Acknowledgments

We would like to thank the anonymous WEA reviewers for their comments and feedback on the ideas in this paper and Tecnologica de Bolivar University for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Juan Carlos Martínez-Santos .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sabalza-Mejia, M., Magre-Colorado, L., Baños, I., Martínez-Santos, J.C. (2019). From a Home-Area-Network to a Secure Internet of Things Application. In: Figueroa-García, J., Duarte-González, M., Jaramillo-Isaza, S., Orjuela-Cañon, A., Díaz-Gutierrez, Y. (eds) Applied Computer Sciences in Engineering. WEA 2019. Communications in Computer and Information Science, vol 1052. Springer, Cham. https://doi.org/10.1007/978-3-030-31019-6_40

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31019-6_40

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31018-9

  • Online ISBN: 978-3-030-31019-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics