Skip to main content
Log in

Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Internet of Things (IoT) technology became an inter-disciplinary revolution in the contemporary era. It is capable of influencing human lives significantly when used in different domains. It has plethora of use cases like smart transportation, smart healthcare and smart city to mention few. As IoT is capable of combining physical objects and digital objects seamlessly, it has opened gates to have thousands of use cases where IoT integration takes to the next generation of computations and building applications. The present IoT applications lack in end-to-end security as there are different protocols and vendors involved. No standardizations are made yet. Besides, the sources of big data such as sensor networks in IoT use cases generate large volumes of data that needs more lightweight cryptographic solutions. Diffie Hellman when combined with Elliptic Curve (EC-DH) became an ideal choice to have secure and lightweight communications for connected devices in IoT use cases. However, it is still vulnerable to certain kinds of attacks. To overcome this problem, we proposed an enhanced EC-DH known as E-ECDH for higher level of security to IoT applications. We considered an anomaly detection case study which is part of Healthcare industry. IBM cloud, Watson IoT platform and MQ Telemetry Transport messaging protocol are used as part of experimental setup. Experiments revealed the efficiency of the scheme as it provides higher level of security besides improving in performance in data encryption, decryption, execution time and time taken for upload and download. The proposed scheme can be used with real time IoT applications.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Notes

  1. https://spark.apache.org/docs/2.2.0/api/python/pyspark.html.

  2. https://www.ibm.com/in-en/internet-of-things/solutions/iot-platform/watson-iot-platform.

  3. https://www.ibm.com/cloud/cloudant.

  4. https://www.ibm.com/cloud/public/.

  5. http://mqtt.org/.

References

  1. Baranwal, Nitika, T., & Pateriya, P. K. (2016). Development of IoT based smart security and monitoring devices for agriculture. In 2016 6th international conference—cloud system and big data engineering (Confluence) (pp. 1–6).

  2. Ahmed, I., & Kannan, G. (2018). A review on present state-of-the-art on internet of things. Journal of Advanced Research in Dynamical and Control Systems (12), 352–358.

  3. Reijo, M., & Savola, P. (2015). Risk-driven security metrics development for an eHealth IoT application. In IEEE (pp. 1–6).

  4. Kannan, G., & Mohamed Thameez, R. (2015). Design and implementation of smart sensor interface for herbal monitoring in IoT environment. International Journal of Engineering Research, 3(2), 469–475.

    Google Scholar 

  5. Duc, A., Jabangwe, R., Paul, P., & Abrahamsson, P. (2017). Security challenges in IoT development: a software engineering perspective. Proceedings of XP2017 Scientific Workshops, ACM, 1–5.

  6. Datta, S. K., & Bonnet, C. (2016). Easing IoT application development through data tweet framework. In 2016 IEEE 3rd world forum on internet of things (WF-IoT) (pp. 1–6).

  7. Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.

    Article  Google Scholar 

  8. Kang, Y.-M., Han, M.-R., Han, K.-S., & Kim, J.-B. (2015). A study on the internet of things (IoT) applications. International Journal of Software Engineering and Its Applications, 9(9), 117–126.

    Article  Google Scholar 

  9. Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. D. (2018). Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. ACM Computing Surveys, 52(4), 1–39.

    Article  Google Scholar 

  10. Ahmed, M. I., & Kannan, G. (2020). Overcoming privacy and security challenges of internet of things applications. International Journal of Future Generation Communication and Networking, 13(1), 1550–1556.

    Google Scholar 

  11. Jonsson, F., & Tornkvist, M. (2017). RSA authentication in internet of things. http://www.diva-portal.org/smash/get/diva2:1112039/FULLTEXT01.pdf.

  12. Riahi, A ., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013) A systemic approach for IoT security. DCOSS, Boston, United States (pp. 351–355).

  13. Pustišek, M., & Kos, A. (2018). Approaches to front-end IoT application development for the Ethereumblockchain. Procedia Computer Science, 129, 410–419.

    Article  Google Scholar 

  14. Datta, S. K., Gyrard, A., Bonnet, C., & Boudaoud, K. (2015). oneM2M architecture based user centric iot application development. In 2015 3rd international conference on future internet of things and cloud (pp. 1–8).

  15. Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.

    Article  Google Scholar 

  16. Ahamed, J., & Rajan, A. V. (2016). Internet of things (IoT): Application systems and security vulnerabilities. In 2016 5th International conference on electronic devices, systems and applications (ICEDSA) (pp. 1–5).

  17. Liu, Z., & Yan, T. (2013). Study on multi-view video based on IOT and its application in intelligent security system. In Proceedings 2013 international conference on mechatronic sciences, electric engineering and computer (MEC) (pp 1–4).

  18. DíazLópez, D., Blanco Uribe, M., Santiago Cely, C., Tarquino Murgueitio, D., Garcia, E., Nespoli, P., & Gómez Mármol, F. (2018). Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry, 10(12), 1–34.

    Google Scholar 

  19. Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

    Article  MathSciNet  Google Scholar 

  20. AL-mawee, W. (2012). Privacy and security issues in IoT healthcare applications for the disabled users a survey, 1–57.

  21. Nguyen, X. T., Tran, H. T., Baraki, H., & Geihs, K. (2015). FRASAD: A framework for model-driven IoT Application Development. In 2015 IEEE 2nd world forum on internet of things (WF-IoT) (pp. 1–6).

  22. Jonsson, F., & Tornkvist, M. (2017). RSA authentication in internet of things. http://www.diva-portal.org/smash/get/diva2:1112039/FULLTEXT01.pdf.

  23. Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.

    Article  Google Scholar 

Download references

Funding

Authors declare that there is no funding support for this research work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammed Imtyaz Ahmed.

Ethics declarations

Conflict of interest

Authors declare that there are no conflicts of interest among themselves.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmed, M.I., Kannan, G. Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform. Wireless Pers Commun 120, 153–168 (2021). https://doi.org/10.1007/s11277-021-08439-7

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-021-08439-7

Keywords

Navigation