Abstract
The continuous spreading of innovative applications and services, based on the emerging Internet of Things (IoT) paradigm, leads to the need of even more efficient network architectures/infrastructures, in order to support the huge amount of information to be transmitted in real-time. Hence, new protocols and mechanisms must be conceived to allow the IoT network to be more reactive towards environmental changes and in promptly satisfying the IoT users’ requests. Aiming at dealing with the emerged issues, the paper presents an efficient IoT platform, which, thanks to fog computing principles, acts as a middleware layer between data producers and consumers; it adopts a security-aware publish&subscribe protocol, based on MQTT, coupled with a network of brokers, for efficiently sharing the processed information with end-users. Transmitted data are kept secure under an enforcement framework based on sticky policies. A test campaign is conducted on a prototypical implementation of the just mentioned platform, for preliminary evaluating its efficiency, in terms of computing effort and latency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
OASIS, MQTT v5 protocol specification, https://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html.
- 3.
- 4.
- 5.
- 6.
Mosquitto broker, http://mosquitto.org.
References
Arif, M., Wang, G., Balas, V.E.: Secure VANETs: trusted communication scheme between vehicles and infrastructure based on fog computing. Stud. Inform. Control 27(2), 235–246 (2018)
Barker, S., Mishra, A., Irwin, D., Cecchet, E., Shenoy, P., Albrecht, J.: Smart*: an open data set and tools for enabling research in sustainable homes. In: SustKDD, August 111, 112 (2012)
Bonomi, F., Milito, R., Zhu, J., Addepalli, S.: Fog computing and its role in the internet of things. In: Proceedings of the First Edition of the MCC Workshop on Mobile Cloud Computing, pp. 13–16. ACM (2012)
Collina, M., Corazza, G.E., Vanelli-Coralli, A.: Introducing the QEST broker: scaling the IoT by bridging MQTT and REST. In: IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications-(PIMRC), pp. 36–41 (2012)
Dini, G., Lopriore, L.: Key propagation in wireless sensor networks. Comput. Elect. Eng. 41, 426–433 (2015)
Ionita, M.G., Patriciu, V.V.: Secure threat information exchange across the internet of things for cyber defense in a fog computing environment. Inform. Econ. 20(3) (2016)
Kang, J., Yu, R., Huang, X., Zhang, Y.: Privacy-preserved pseudonym scheme for fog computing supported internet of vehicles. IEEE Trans. Intell. Transp. Syst. 19(8), 2627–2637 (2018)
Moosavi, S.R., et al.: End-to-end security scheme for mobility enabled healthcare internet of things. Fut. Gener. Comput. Syst. 64, 108–124 (2016)
Mouradian, C., Naboulsi, D., Yangui, S., Glitho, R.H., Morrow, M.J., Polakos, P.A.: A comprehensive survey on fog computing: state-of-the-art and research challenges. IEEE Commun. Surv. Tutor. 20(1), 416–464 (2017)
Neisse, R., Steri, G., Baldini, G.: Enforcement of security policy rules for the internet of things. In: IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), pp. 165–172 (2014)
Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P., Panya, A.: Authorization mechanism for MQTT-based internet of things. In: IEEE International Conference on Communications Workshops (ICC), pp. 290–295 (2016)
Pietro, R.D., Mancini, L., Jajodia, S.: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4), 455–468 (2003)
Rahmani, A.M., et al.: Exploiting smart e-health gateways at the edge of healthcare internet-of-things: a fog computing approach. Fut. Gener. Comput. Syst. 78, 641–658 (2018)
Rausch, T., Nastic, S., Dustdar, S.: EMMA: distributed QoS-aware MQTT middleware for edge computing applications. In: IEEE International Conference on Cloud Engineering (IC2E), pp. 191–197 (2018)
Rizzardi, A., Sicari, S., Miorandi, D., Coen-Porisini, A.: AUPS: an open source authenticated publish/subscribe system for the Internet of Things. Inf. Syst. 62, 29–41 (2016)
Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Internet of Things: security in the keys. In: 12th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, Malta, pp. 129–133, November 2016
Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Dynamic policies in internet of things: enforcement and synchronization. IEEE Internet Things J. 4(6), 2228–2238 (2017)
Sicari, S., Rizzardi, A., Miorandi, D., Coen-Porisini, A.: Security towards the edge: sticky policy enforcement for networked smart objects. Inf. Syst. 71, 78–89 (2017)
Sohal, A.S., Sandhu, R., Sood, S.K., Chang, V.: A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. Comput. Secur. 74, 340–354 (2018)
Sicari, S., Rizzardi, A., Miorandi, D., Cappiello, C., Coen-Porisini, A.: A secure and quality-aware prototypical architecture for the Internet of Things. Inf. Syst. 58, 43–55 (2016)
Thota, C., Sundarasekar, R., Manogaran, G., Varatharajan, R., Priyan, M.: Centralized fog computing security platform for IoT and cloud in healthcare system. In: Exploring the Convergence of Big Data and the Internet of Things, pp. 141–154. IGI Global (2018)
Xu, Y., Mahendran, V., Radhakrishnan, S.: Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery. In: IEEE 8th International Conference on Communication Systems and Networks (COMSNETS), pp. 1–6 (2016)
Yaqoob, I., et al.: Internet of things architecture: recent advances, taxonomy, requirements, and open challenges. IEEE Wirel. Commun. 24(3), 10–16 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A. (2020). Testing and Evaluating a Security-Aware Pub and Sub Protocol in a Fog-Driven IoT Environment. In: Grieco, L.A., Boggia, G., Piro, G., Jararweh, Y., Campolo, C. (eds) Ad-Hoc, Mobile, and Wireless Networks. ADHOC-NOW 2020. Lecture Notes in Computer Science(), vol 12338. Springer, Cham. https://doi.org/10.1007/978-3-030-61746-2_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-61746-2_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-61745-5
Online ISBN: 978-3-030-61746-2
eBook Packages: Computer ScienceComputer Science (R0)