Abstract
Internet of Things (IoT) technology became an inter-disciplinary revolution in the contemporary era. It is capable of influencing human lives significantly when used in different domains. It has plethora of use cases like smart transportation, smart healthcare and smart city to mention few. As IoT is capable of combining physical objects and digital objects seamlessly, it has opened gates to have thousands of use cases where IoT integration takes to the next generation of computations and building applications. The present IoT applications lack in end-to-end security as there are different protocols and vendors involved. No standardizations are made yet. Besides, the sources of big data such as sensor networks in IoT use cases generate large volumes of data that needs more lightweight cryptographic solutions. Diffie Hellman when combined with Elliptic Curve (EC-DH) became an ideal choice to have secure and lightweight communications for connected devices in IoT use cases. However, it is still vulnerable to certain kinds of attacks. To overcome this problem, we proposed an enhanced EC-DH known as E-ECDH for higher level of security to IoT applications. We considered an anomaly detection case study which is part of Healthcare industry. IBM cloud, Watson IoT platform and MQ Telemetry Transport messaging protocol are used as part of experimental setup. Experiments revealed the efficiency of the scheme as it provides higher level of security besides improving in performance in data encryption, decryption, execution time and time taken for upload and download. The proposed scheme can be used with real time IoT applications.
Similar content being viewed by others
References
Baranwal, Nitika, T., & Pateriya, P. K. (2016). Development of IoT based smart security and monitoring devices for agriculture. In 2016 6th international conference—cloud system and big data engineering (Confluence) (pp. 1–6).
Ahmed, I., & Kannan, G. (2018). A review on present state-of-the-art on internet of things. Journal of Advanced Research in Dynamical and Control Systems (12), 352–358.
Reijo, M., & Savola, P. (2015). Risk-driven security metrics development for an eHealth IoT application. In IEEE (pp. 1–6).
Kannan, G., & Mohamed Thameez, R. (2015). Design and implementation of smart sensor interface for herbal monitoring in IoT environment. International Journal of Engineering Research, 3(2), 469–475.
Duc, A., Jabangwe, R., Paul, P., & Abrahamsson, P. (2017). Security challenges in IoT development: a software engineering perspective. Proceedings of XP2017 Scientific Workshops, ACM, 1–5.
Datta, S. K., & Bonnet, C. (2016). Easing IoT application development through data tweet framework. In 2016 IEEE 3rd world forum on internet of things (WF-IoT) (pp. 1–6).
Ammar, M., Russello, G., & Crispo, B. (2018). Internet of things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8–27.
Kang, Y.-M., Han, M.-R., Han, K.-S., & Kim, J.-B. (2015). A study on the internet of things (IoT) applications. International Journal of Software Engineering and Its Applications, 9(9), 117–126.
Celik, Z. B., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. D. (2018). Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities. ACM Computing Surveys, 52(4), 1–39.
Ahmed, M. I., & Kannan, G. (2020). Overcoming privacy and security challenges of internet of things applications. International Journal of Future Generation Communication and Networking, 13(1), 1550–1556.
Jonsson, F., & Tornkvist, M. (2017). RSA authentication in internet of things. http://www.diva-portal.org/smash/get/diva2:1112039/FULLTEXT01.pdf.
Riahi, A ., Challal, Y., Natalizio, E., Chtourou, Z., & Bouabdallah, A. (2013) A systemic approach for IoT security. DCOSS, Boston, United States (pp. 351–355).
Pustišek, M., & Kos, A. (2018). Approaches to front-end IoT application development for the Ethereumblockchain. Procedia Computer Science, 129, 410–419.
Datta, S. K., Gyrard, A., Bonnet, C., & Boudaoud, K. (2015). oneM2M architecture based user centric iot application development. In 2015 3rd international conference on future internet of things and cloud (pp. 1–8).
Tweneboah-Koduah, S., Skouby, K. E., & Tadayoni, R. (2017). Cyber security threats to IoT applications and service domains. Wireless Personal Communications, 95(1), 169–185.
Ahamed, J., & Rajan, A. V. (2016). Internet of things (IoT): Application systems and security vulnerabilities. In 2016 5th International conference on electronic devices, systems and applications (ICEDSA) (pp. 1–5).
Liu, Z., & Yan, T. (2013). Study on multi-view video based on IOT and its application in intelligent security system. In Proceedings 2013 international conference on mechatronic sciences, electric engineering and computer (MEC) (pp 1–4).
DíazLópez, D., Blanco Uribe, M., Santiago Cely, C., Tarquino Murgueitio, D., Garcia, E., Nespoli, P., & Gómez Mármol, F. (2018). Developing secure IoT services: A security-oriented review of IoT platforms. Symmetry, 10(12), 1–34.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.
AL-mawee, W. (2012). Privacy and security issues in IoT healthcare applications for the disabled users a survey, 1–57.
Nguyen, X. T., Tran, H. T., Baraki, H., & Geihs, K. (2015). FRASAD: A framework for model-driven IoT Application Development. In 2015 IEEE 2nd world forum on internet of things (WF-IoT) (pp. 1–6).
Jonsson, F., & Tornkvist, M. (2017). RSA authentication in internet of things. http://www.diva-portal.org/smash/get/diva2:1112039/FULLTEXT01.pdf.
Ukil, A., Bandyopadhyay, S., Bhattacharyya, A., Pal, A., & Bose, T. (2014). Lightweight security scheme for IoT applications using CoAP. International Journal of Pervasive Computing and Communications, 10(4), 372–392.
Funding
Authors declare that there is no funding support for this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
Authors declare that there are no conflicts of interest among themselves.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Ahmed, M.I., Kannan, G. Secure End to End Communications and Data Analytics in IoT Integrated Application Using IBM Watson IoT Platform. Wireless Pers Commun 120, 153–168 (2021). https://doi.org/10.1007/s11277-021-08439-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-021-08439-7