Skip to main content
Log in

Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring

  • Original Research
  • Published:
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

Protecting the environment from many threats has become a priority worldwide. The Internet of Things technologies enables the continuous monitoring of various parameters related to environment statuses, such as air quality and many others. In this paper, we propose a security architecture based on cellular networks and Multiple-access Edge Computing to collect sensors’ information in real time. In the proposed architecture, users will interface the Internet of Things devices using their smartphones. The smartphones can interact with the cellular network and the Internet of Things devices at the same time. This unique ability is leveraged to provide strong authentication and confidentiality in accessing the Internet of Things devices. Also in our architecture, we use gateways, as intermediate nodes that can interact with both the smartphones and the sensor nodes. Therefore, our architecture includes a revocation mechanism for captured gateways. We propose an architecture for the Internet of Things devices along with protocols that can be used to establish security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  • Agency USEP (2015) The plain english guide to the clean air act. https://www.epa.gov/sites/production/files/2015-08/documents/peg.pdf

  • Ahmed A, Ahmed E (2016) A survey on mobile edge computing. In: 2016 10th International conference on intelligent systems and control (ISCO), Coimbatore, pp 1–8. https://doi.org/10.1109/ISCO.2016.7727082

  • Akyildiz I, Su W, Sankarasubramaniam Y, Cayirci E (2002) Wireless sensor networks: a survey. Comput Netw 38(4):393–422

    Article  Google Scholar 

  • Akyldiz IF, Kasimoglu IH (2004) Wireless sensor and actor networks: research challenges. Ad Hoc Netw 2(4):351–367. https://doi.org/10.1016/j.adhoc.2004.04.003

    Article  Google Scholar 

  • Anjum F, Mouchtaris P (2007) Security for wireless Ad Hoc networks. Wiley, New York

    Book  Google Scholar 

  • Arridha R, Sukaridhoto S, Pramadihanto D, Funabiki N (2017) Classification extension based on iot-big data analytic for smart environment monitoring and analytic in real-time system. Int J Space-Based Situat Comput 7(2):82–93

    Article  Google Scholar 

  • Ballagas R, Rohs M, Sheridan J, Borchers J (2006) The smart phone: a ubiquitous input device. IEEE Perv Comput 5(1):70–77. https://doi.org/10.1109/MPRV.2006.18

  • Barolli L, Honma Y, Koyama A, Durresi A, Arai J (2004) A selective border-casting zone routing protocol for ad-hoc networks. In: Proceedings 15th International Workshop on Database and Expert Systems Applications, pp 326–330. https://doi.org/10.1109/DEXA.2004.1333494

  • Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319. https://doi.org/10.1007/s00145-004-0314-9

    Article  MathSciNet  MATH  Google Scholar 

  • Brooks TT (2017) Cyber-assurance for the internet of things. Wiley, New York

    Google Scholar 

  • Carman DW, Kruus PS, Matt BJ (2000) Constraints and approaches for distributed sensor network security. NAI Labs Technical Report #00–010. http://people.cs.vt.edu/~kafura/cs6204/Readings/SensorNetworks/SensorNetSecurity-NAILabs.pdf

  • Chan H, Perrig A, Song D (2004) Key distribution techniques for sensor networks, wireless sensor networks. Springer, New York ISBN:1-4020-7883-8

    Google Scholar 

  • Chan H, Perrig A, Song D (2003) Random key predistribution schemes for sensor networks. In: Proceedings of the 2003 IEEE symposium on security and privacy, pp 197–213. http://dl.acm.org/citation.cfm?id=829515.830566

  • Chasaki D, Mansour C (2015) Security challenges in the internet of things. Int J Space-Based Situat Comput 5(3):141–149

    Article  Google Scholar 

  • Chen TM, Venkataramanan V (2005) Dempster-shafer theory for intrusion detection in ad hoc networks. IEEE Internet Comput 9(6):35–41. https://doi.org/10.1109/MIC.2005.123

    Article  Google Scholar 

  • Chen X, Jiao L, Li W, Fu X (2016) Efficient multi-user computation offloading for mobile-edge cloud computing. IEEE/ACM Trans Netw 24(5):2795–2808

    Article  Google Scholar 

  • Cheng L, Niu J, Luo C, Shu L, Kong L, Zhao Z, Gu Y (2018) Towards minimum-delay and energy-efficient flooding in low-duty-cycle wireless sensor networks. Comput Netw 134:66–77. https://doi.org/10.1016/j.comnet.2018.01.012

    Article  Google Scholar 

  • Chi Q, Yan H, Zhang C, Pang Z, Xu LD (2014) A reconfigurable smart sensor interface for industrial wsn in iot environment. IEEE Trans Ind Inf 10(2):1417–1425. https://doi.org/10.1109/TII.2014.2306798

    Article  Google Scholar 

  • Corcoran P, Datta SK (2016) Mobile-edge computing and the internet of things for consumers: Extending cloud computing and services to the edge of the network. IEEE Consum Electron Mag 5(4):73–74

    Article  Google Scholar 

  • Dan L, Xin C, Chongwei H, Liangliang J (2015) Intelligent agriculture greenhouse environment monitoring system based on iot technology. In: 2015 International conference on intelligent transportation, big data and smart city, Halong Bay, pp 487–490. https://doi.org/10.1109/ICITBS.2015.126

  • Du W, Deng J, Han YS, Chen S, Varshney PK (2004) A key management scheme for wireless sensor networks using deployment knowledge. In: Proceedings of the IEEE INFOCOM’04, pp 586–597. https://doi.org/10.1109/INFCOM.2004.1354530

  • Durresi A, Paruchuri V (2005) Geometric broadcast protocol for sensor and actor networks. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 1 (AINA papers), pp 343–348. https://doi.org/10.1109/AINA.2005.192

  • Durresi A, Paruchuri V (2009) Secure Communication among Cell Phones and Sensor Networks. In: Proceedings of the IEEE Global Telecommunications Conference, GLOBECOM 2009, Honolulu, pp 1–7

  • Durresi A, Bulusu V, Durresi M, Paruchuri V, Jain R (2006) Key Distribution for Heterogeneous Mobile Wireless Networks. IEEE GLOBECOM 2006 pp WSN09–4:1–5

  • Durresi A, Bulusu V, Paruchuri V (2007) Security in Ad hoc networks on cellular phones for emergency situations. Ad Hoc Netw J 5(1):126–133

    Article  Google Scholar 

  • Durresi M, Durresi A, Barolli L (2005) Sensor inter-vehicle communication for safer highways. In: 19th International conference on advanced information networking and applications (AINA’05), Vol 2 (AINA papers), pp 599–604. https://doi.org/10.1109/AINA.2005.308

  • Eschenauer L, Gligor VD, Baras J (2002) On trust establishment in mobile ad-hoc networks. In: Christianson B, Crispo B, Malcolm JA, Roe M (eds) Security protocols. Security Protocols 2002. Lecture notes in computer science, vol 2845. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39871-4_6

  • ETSI (2017) Multi-access edge computing. http://www.etsi.org/technologies-clusters/technologies/multi-access-edge-computing

  • Fang S, Xu LD, Zhu Y, Ahati J, Pei H, Yan J, Liu Z (2014) An integrated system for regional environmental monitoring and management based on internet of things. IEEE Trans Industr Inf 10(2):1596–1605. https://doi.org/10.1109/TII.2014.2302638

    Article  Google Scholar 

  • Gaur A, Scotney B, Parr G, McClean S (2015) Smart city architecture and its applications based on IoT. Procedia Comput Sci 52:1089–1094. https://doi.org/10.1016/j.procs.2015.05.122

    Article  Google Scholar 

  • Horwitz J, Lynn B (2002) Toward hierarchical identity-based encryption. Proc. of Eurocrypt02, LNCS 2332, Springer, New York, pp 466–481

  • Hu F (2016) Security and privacy in internet of things (IoTs): models, algorithms, and implementations. CRC Press, Boca Raton

    Book  Google Scholar 

  • Hu YC, Patel M, Sabella D, Sprecher N, Young V (2015) Mobile edge computing key technology towards 5g. ETSI White Paper 11(11):1–16

    Google Scholar 

  • Huang Y, Lee W (2003) A cooperative intrusion detection system for Ad Hoc Networks. In: Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’03), Fairfax VA, USA

  • Ikeda M, Barolli L, Hiyama M, Yang T, Marco GD, Durresi A (2009) Performance evaluation of a manet tested for different topologies. In: 2009 International conference on network-based information systems, Indianapolis, IN, pp 327–334. https://doi.org/10.1109/NBiS.2009.32

  • Jane KH, Kirk M (2006) Environmental Sensor Networks: A revolution in the earth system science? Earth Sci Rev 78:177–191

    Article  Google Scholar 

  • Kelly SDT, Suryadevara NK, Mukhopadhyay SC (2013) Towards the implementation of iot for environmental condition monitoring in homes. IEEE Sens J 13(10):3846–3853. https://doi.org/10.1109/JSEN.2013.2263379

    Article  Google Scholar 

  • Lazarescu MT (2013) Design of a wsn platform for long-term environmental monitoring for iot applications. IEEE J Emerg Sel Topics Circuits Syst 3(1):45–54. https://doi.org/10.1109/JETCAS.2013.2243032

    Article  Google Scholar 

  • Liu D, Ning P (2003) Location-based pairwise key establishments for static sensor networks. In: First ACM workshop on security in Ad Hoc and sensor networks, pp 72–82. https://doi.org/10.1145/986858.986869

  • Liu D, Ning P, Li R (2003) Establishing pairwise keys in distributed sensor networks. In: 10th ACM conference on computers and communication security (CCS 03), pp 52–61. https://doi.org/10.1145/948109.948119

  • Liu Y, Zhou G (2012) Key technologies and applications of internet of things. In: 2012 Fifth International Conference on Intelligent Computation Technology and Automation, pp 197–200. https://doi.org/10.1109/ICICTA.2012.56

  • Lo C, Chen Y (1999) Secure communication mechanisms for gsm networks. IEEE Trans Consum Electron 45(4):1074–1080

    Article  MathSciNet  Google Scholar 

  • Mahmoud R, Yousuf T, Aloul F, Zualkernan I (2015) Internet of things (iot) security: Current status, challenges and prospective measures. In: 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), pp 336–341. https://doi.org/10.1109/ICITST.2015.7412116

  • Mainwaring A, Culler D, Polastre J, Szewczyk R, Anderson J (2002) Wireless sensor networks for habitat monitoring. In: Proceedings of the 1st ACM International Workshop on Wireless Sensor Networks and Applications, ACM, New York, NY, USA, WSNA ’02, pp 88–97. https://doi.org/10.1145/570738.570751

  • Mao Y, Zhang J, Letaief KB (2016) Dynamic computation offloading for mobile-edge computing with energy harvesting devices. IEEE J Sel Areas Commun 34(12):3590–3605

    Article  Google Scholar 

  • Mehrotra A, Golding L (1998) Mobility and security management in the gsm system and some proposed future improvements. Proc IEEE 86(7):1480–1497

    Article  Google Scholar 

  • Mitton N, Chaouchi H, Noel T, Gabillon TWA, Capolsini P (2016) Interoperability, safety and security in IoT. In: Second international conference, InterIoT 2016 and third international conference, SaSeIoT 2016, Paris, France, 26–27 October 2016. Springer International Publishing. https://doi.org/10.1007/978-3-319-52727-7 (ISBN 978-3-319-52727-7)

  • Mohammad UM, Kazi MA (2005) A review of micro-nano-scale wireless sensor networks for environmental protection: Prospects and challenges. Sci Technol Adv Mater 6:302–306

    Article  Google Scholar 

  • Morreale P, Goncalves A, Silva C (2015) Mobile ad hoc network communication for disaster recovery. Int J Space-Based Situat Comput 5(3):178–186

    Article  Google Scholar 

  • Nunna S, Kousaridas A, Ibrahim M, Dillinger M, Thuemmler C, Feussner H, Schneider A (2015) Enabling real-time context-aware collaboration through 5g and mobile edge computing. In: 2015 12th international conference on information technology-new generations (ITNG), Las Vegas, NV, pp 601–605. https://doi.org/10.1109/ITNG.2015.155

  • Patel M, Naughton B, Chan C, Sprecher N, Abeta S, Neal A et al (2014) Mobile-edge computing—Introductory technical white paper. https://portal.etsi.org/portals/0/tbpages/mec/docs/mobile-edge_computing_-_introductory_technical_white_paper_v1%2018-09-14.pdf

  • Petriu E, Georganas N, Petriu D, Makrakis D, Groza VZ (2000) Sensor based information appliances. IEEE Instrum Meas Mag 3(4):31–35

    Article  Google Scholar 

  • Russell B, Van Duren D (2016) Practical internet of things security. Packt Publishing, Birmingham

    Google Scholar 

  • Sandra PS, Sandeep CM, Nair V, Vindhuja MV, Nair SS, Raja MP (2017) Wsn based industrial parameter monitoring using smartwatch. In: 2017 International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp 1–6. https://doi.org/10.1109/ICCPCT.2017.8074279

  • Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Proceedings of CRYPTO 84 on Advances in cryptology, Springer, New York, pp 47–53

  • Shi W, Dustdar S (2016) The promise of edge computing. Computer 49(5):78–81

    Article  Google Scholar 

  • Sterne D, Balasubramanyam P, Carman D, Wilson B, Talpade R, Ko C, Balupari R, Tseng C-Y, Bowen T, Levitt K, Rowe J (2005) A general cooperative intrusion detection architecture for MANETs. In: Third IEEE international workshop on information assurance (IWIA’05), pp 57–70. https://doi.org/10.1109/IWIA.2005.1

  • Subhadrabandhu D, Sarkar S, Anjum F (2005) Architecture and Algorithms for a Distributed Reputation System. In: Proceedings of the 2005 IFIP Networking Conference, University of Waterloo, Ontario, Canada

  • Subhadrabandhu D, Sarkar S, Anjum F (2006a) Efficacy of misuse detection in Ad Hoc networks: part I. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:274–290

    Article  Google Scholar 

  • Subhadrabandhu D, Sarkar S, Anjum F (2006b) Efficacy of misuse detection in Ad Hoc networks: part II. IEEE J Sel Areas Commun Spec Issue Secur Wirel Netw 24:290–305

    Article  Google Scholar 

  • Xu T, Wendt JB, Potkonjak M (2014) Security of IoT systems: design challenges and opportunities. In: Proceedings of the 2014 IEEE/ACM international conference on computer-aided design, ICCAD ’14, IEEE Press, Piscataway, NJ, USA, pp 417–423. http://dl.acm.org/citation.cfm?id=2691365.2691450

  • Yang T, Ikeda M, Mino G, Barolli L, Durresi A, Xhafa F (2010) Performance evaluation of wireless sensor networks for mobile sink considering consumed energy metric. In: 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, pp 245–250. https://doi.org/10.1109/WAINA.2010.50

  • Yi S, Li C, Li Q (2015) A survey of fog computing: concepts, applications and issues. In: Proceedings of the 2015 Workshop on Mobile Big Data, ACM, pp 37–42

  • Yuan D, Kanhere SS, Hollick M (2017) Instrumenting wireless sensor networks a survey on the metrics that matter. Perv Mobile Comput 37:45–62. https://doi.org/10.1016/j.pmcj.2016.10.001

    Article  Google Scholar 

  • Zhang Y, Lee W, Huang YA (2003) Intrusion detection techniques for mobile wireless networks. Wirel Netw 9(5):545–556. https://doi.org/10.1023/A:1024600519144

    Article  Google Scholar 

  • Zhang ZK, Cho MCY, Wang CW, Hsu CW, Chen CK, Shieh S (2014) Iot security: Ongoing challenges and research opportunities. In: 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp 230–234. https://doi.org/10.1109/SOCA.2014.58

  • Zhu S, Setia S, Jajodia S (2003) Leap: Efficient security mechanisms for large-scale distributed sensor networks. 10th ACM conference on computers and communication security (CCS 03), pp 62–72. https://doi.org/10.1145/948109.94812

Download references

Acknowledgements

This work is partially supported by National Science Foundation under Grant No. 1547411, and by National Institute of Food and Agriculture (NIFA) USDA AWARD NUMBER: 2017-67003-26057.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arjan Durresi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Durresi, M., Subashi, A., Durresi, A. et al. Secure communication architecture for internet of things using smartphones and multi-access edge computing in environment monitoring. J Ambient Intell Human Comput 10, 1631–1640 (2019). https://doi.org/10.1007/s12652-018-0759-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12652-018-0759-6

Keywords

Navigation