Abstract
Protecting the environment from many threats has become a priority worldwide. The Internet of Things technologies enables the continuous monitoring of various parameters related to environment statuses, such as air quality and many others. In this paper, we propose a security architecture based on cellular networks and Multiple-access Edge Computing to collect sensors’ information in real time. In the proposed architecture, users will interface the Internet of Things devices using their smartphones. The smartphones can interact with the cellular network and the Internet of Things devices at the same time. This unique ability is leveraged to provide strong authentication and confidentiality in accessing the Internet of Things devices. Also in our architecture, we use gateways, as intermediate nodes that can interact with both the smartphones and the sensor nodes. Therefore, our architecture includes a revocation mechanism for captured gateways. We propose an architecture for the Internet of Things devices along with protocols that can be used to establish security.

Similar content being viewed by others
Explore related subjects
Discover the latest articles and news from researchers in related subjects, suggested using machine learning.References
Agency USEP (2015) The plain english guide to the clean air act. https://www.epa.gov/sites/production/files/2015-08/documents/peg.pdf
Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), Coimbatore, pp 1–8. https://doi.org/10.1109/ISCO.2016.7727082
Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422
Akyldiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367. https://doi.org/10.1016/j.adhoc.2004.04.003
Anjum F, Mouchtaris P (2007) Security for wireless Ad Hoc networks. Wiley, New York
Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on iot-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situat Comput 7(2):82–93
Ballagas R, Rohs M, Sheridan J, Borchers J (2006) The smart phone: a ubiquitous input device. IEEE Perv Comput 5(1):70–77. https://doi.org/10.1109/MPRV.2006.18
Barolli L, Honma Y, Koyama A, Durresi A, Arai J (2004) A selective border-casting zone routing protocol for ad-hoc networks. In: Proceedings 15th International Workshop on Database and Expert Systems Applications, pp 326–330. https://doi.org/10.1109/DEXA.2004.1333494
Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319. https://doi.org/10.1007/s00145-004-0314-9
Brooks TT (2017) Cyber-assurance for the internet of things. Wiley, New York
Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00–010. http://people.cs.vt.edu/~kafura/cs6204/Readings/SensorNetworks/SensorNetSecurity-NAILabs.pdf
Chan H, Perrig A, Song D (2004) Key distribution techniques for sensor networks, wireless sensor networks. Springer, New York ISBN:1-4020-7883-8
Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213. http://dl.acm.org/citation.cfm?id=829515.830566
Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situat Comput 5(3):141–149
Chen TM, Venkataramanan V (2005) Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9(6):35–41. https://doi.org/10.1109/MIC.2005.123
Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808
Cheng L, Niu J, Luo C, Shu L, Kong L, Zhao Z, Gu Y (2018) Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks. Comput Netw 134:66–77. https://doi.org/10.1016/j.comnet.2018.01.012
Chi Q, Yan H, Zhang C, Pang Z, Xu LD (2014) A reconfigurable smart sensor interface for industrial wsn in iot environment. IEEE Trans Ind Inf 10(2):1417–1425. https://doi.org/10.1109/TII.2014.2306798
Corcoran P, Datta SK (2016) Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network. IEEE Consum Electron Mag 5(4):73–74
Dan L, Xin C, Chongwei H, Liangliang J (2015) Intelligent agriculture greenhouse environment monitoring system based on iot technology. In: 2015 International conference on intelligent transportation, big data and smart city, Halong Bay, pp 487–490. https://doi.org/10.1109/ICITBS.2015.126
Du W, Deng J, Han YS, Chen S, Varshney PK (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the IEEE INFOCOM’04, pp 586–597. https://doi.org/10.1109/INFCOM.2004.1354530
Durresi A, Paruchuri V (2005) Geometric broadcast protocol for sensor and actor networks. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 1 (AINA papers), pp 343–348. https://doi.org/10.1109/AINA.2005.192
Durresi A, Paruchuri V (2009) Secure Communication among Cell Phones and Sensor Networks. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM 2009, Honolulu, pp 1–7
Durresi A, Bulusu V, Durresi M, Paruchuri V, Jain R (2006) Key Distribution for Heterogeneous Mobile Wireless Networks. IEEE GLOBECOM 2006 pp WSN09–4:1–5
Durresi A, Bulusu V, Paruchuri V (2007) Security in Ad hoc networks on cellular phones for emergency situations. Ad Hoc Netw J 5(1):126–133
Durresi M, Durresi A, Barolli L (2005) Sensor inter-vehicle communication for safer highways. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 2 (AINA papers), pp 599–604. https://doi.org/10.1109/AINA.2005.308
Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Security protocols. Security Protocols 2002. Lecture notes in computer science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_6
ETSI (2017) Multi-access edge computing. http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing
Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Industr Inf 10(2):1596–1605. https://doi.org/10.1109/TII.2014.2302638
Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094. https://doi.org/10.1016/j.procs.2015.05.122
Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. Proc. of Eurocrypt02, LNCS 2332, Springer, New York, pp 466–481
Hu F (2016) Security and privacy in internet of things (IoTs): models, algorithms, and implementations. CRC Press, Boca Raton
Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing key technology towards 5g. ETSI White Paper 11(11):1–16
Huang Y, Lee W (2003) A cooperative intrusion detection system for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), Fairfax VA, USA
Ikeda M, Barolli L, Hiyama M, Yang T, Marco GD, Durresi A (2009) Performance evaluation of a manet tested for different topologies. In: 2009 International conference on network-based information systems, Indianapolis, IN, pp 327–334. https://doi.org/10.1109/NBiS.2009.32
Jane KH, Kirk M (2006) Environmental Sensor Networks: A revolution in the earth system science? Earth Sci Rev 78:177–191
Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of iot for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853. https://doi.org/10.1109/JSEN.2013.2263379
Lazarescu MT (2013) Design of a wsn platform for long-term environmental monitoring for iot applications. IEEE J Emerg Sel Topics Circuits Syst 3(1):45–54. https://doi.org/10.1109/JETCAS.2013.2243032
Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: First ACM workshop on security in Ad Hoc and sensor networks, pp 72–82. https://doi.org/10.1145/986858.986869
Liu D, Ning P, Li R (2003) Establishing pairwise keys in distributed sensor networks. In: 10th ACM conference on computers and communication security (CCS 03), pp 52–61. https://doi.org/10.1145/948109.948119
Liu Y, Zhou G (2012) Key technologies and applications of internet of things. In: 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pp 197–200. https://doi.org/10.1109/ICICTA.2012.56
Lo C, Chen Y (1999) Secure communication mechanisms for gsm networks. IEEE Trans Consum Electron 45(4):1074–1080
Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of things (iot) security: Current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp 336–341. https://doi.org/10.1109/ICITST.2015.7412116
Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, ACM, New York, NY, USA, WSNA ’02, pp 88–97. https://doi.org/10.1145/570738.570751
Mao Y, Zhang J, Letaief KB (2016) Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Sel Areas Commun 34(12):3590–3605
Mehrotra A, Golding L (1998) Mobility and security management in the gsm system and some proposed future improvements. Proc IEEE 86(7):1480–1497
Mitton N, Chaouchi H, Noel T, Gabillon TWA, Capolsini P (2016) Interoperability, safety and security in IoT. In: Second international conference, InterIoT 2016 and third international conference, SaSeIoT 2016, Paris, France, 26–27 October 2016. Springer International Publishing. https://doi.org/10.1007/978-3-319-52727-7 (ISBN 978-3-319-52727-7)
Mohammad UM, Kazi MA (2005) A review of micro-nano-scale wireless sensor networks for environmental protection: Prospects and challenges. Sci Technol Adv Mater 6:302–306
Morreale P, Goncalves A, Silva C (2015) Mobile ad hoc network communication for disaster recovery. Int J Space-Based Situat Comput 5(3):178–186
Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5g and mobile edge computing. In: 2015 12th international conference on information technology-new generations (ITNG), Las Vegas, NV, pp 601–605. https://doi.org/10.1109/ITNG.2015.155
Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A et al (2014) Mobile-edge computing—Introductory technical white paper. https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf
Petriu E, Georganas N, Petriu D, Makrakis D, Groza VZ (2000) Sensor based information appliances. IEEE Instrum Meas Mag 3(4):31–35
Russell B, Van Duren D (2016) Practical internet of things security. Packt Publishing, Birmingham
Sandra PS, Sandeep CM, Nair V, Vindhuja MV, Nair SS, Raja MP (2017) Wsn based industrial parameter monitoring using smartwatch. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp 1–6. https://doi.org/10.1109/ICCPCT.2017.8074279
Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on Advances in cryptology, Springer, New York, pp 47–53
Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81
Sterne D, Balasubramanyam P, Carman D, Wilson B, Talpade R, Ko C, Balupari R, Tseng C-Y, Bowen T, Levitt K, Rowe J (2005) A general cooperative intrusion detection architecture for MANETs. In: Third IEEE international workshop on information assurance (IWIA’05), pp 57–70. https://doi.org/10.1109/IWIA.2005.1
Subhadrabandhu D, Sarkar S, Anjum F (2005) Architecture and Algorithms for a Distributed Reputation System. In: Proceedings of the 2005 IFIP Networking Conference, University of Waterloo, Ontario, Canada
Subhadrabandhu D, Sarkar S, Anjum F (2006a) Efficacy of misuse detection in Ad Hoc networks: part I. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:274–290
Subhadrabandhu D, Sarkar S, Anjum F (2006b) Efficacy of misuse detection in Ad Hoc networks: part II. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:290–305
Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design, ICCAD ’14, IEEE Press, Piscataway, NJ, USA, pp 417–423. http://dl.acm.org/citation.cfm?id=2691365.2691450
Yang T, Ikeda M, Mino G, Barolli L, Durresi A, Xhafa F (2010) Performance evaluation of wireless sensor networks for mobile sink considering consumed energy metric. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp 245–250. https://doi.org/10.1109/WAINA.2010.50
Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, pp 37–42
Yuan D, Kanhere SS, Hollick M (2017) Instrumenting wireless sensor networks a survey on the metrics that matter. Perv Mobile Comput 37:45–62. https://doi.org/10.1016/j.pmcj.2016.10.001
Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556. https://doi.org/10.1023/A:1024600519144
Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) Iot security: Ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp 230–234. https://doi.org/10.1109/SOCA.2014.58
Zhu S, Setia S, Jajodia S (2003) Leap: Efficient security mechanisms for large-scale distributed sensor networks. 10th ACM conference on computers and communication security (CCS 03), pp 62–72. https://doi.org/10.1145/948109.94812
Acknowledgements
This work is partially supported by National Science Foundation under Grant No. 1547411, and by National Institute of Food and Agriculture (NIFA) USDA AWARD NUMBER: 2017-67003-26057.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Durresi, M., Subashi, A., Durresi, A. et al. Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring. J Ambient Intell Human Comput 10, 1631–1640 (2019). https://doi.org/10.1007/s12652-018-0759-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-018-0759-6