| Literature DB >> 28178214 |
Antonio Celesti1, Maria Fazio2, Massimo Villari3,4.
Abstract
Nowadays, in the panorama of Internet of Things (IoT), finding a right compromise between interactivity and security is not trivial at all. Currently, most of pervasive communication technologies are designed to work locally. As a consequence, the development of large-scale Internet services and applications is not so easy for IoT Cloud providers. The main issue is that both IoT architectures and services have started as simple but they are becoming more and more complex. Consequently, the web service technology is often inappropriate. Recently, many operators in both academia and industry fields are considering the possibility to adopt the eXtensible Messaging and Presence Protocol (XMPP) for the implementation of IoT Cloud communication systems. In fact, XMPP offers many advantages in term of real-time capabilities, efficient data distribution, service discovery and inter-domain communication compared to other technologies. Nevertheless, the protocol lacks of native security, data confidentiality and trustworthy federation features. In this paper, considering an XMPP-based IoT Cloud architectural model, we discuss how can be possible to enforce message signing/encryption and Single-Sign On (SSO) authentication respectively for secure inter-module and inter-domain communications in a federated environment. Experiments prove that security mechanisms introduce an acceptable overhead, considering the obvious advantages achieved in terms of data trustiness and privacy.Entities:
Keywords: Cloud computing; IoT; XMPP; federation; security
Year: 2017 PMID: 28178214 PMCID: PMC5335972 DOI: 10.3390/s17020301
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1MOM4C scheme adapted for a an IoT scenario.
Figure 2Hybrid executor node layer composition in an IoT scenario.
Figure 3Activity diagram of the external communication.
Figure 4Activity diagram of the sub-activity executing operation.
Figure 5Example of federation between two MOM4C-based IoT Clouds.
Figure 6Secure Inter-module communication.
Figure 7XMPP message encryption in MOM4C.
Figure 8Step performed by two XMPP servers aiming to build an IoT Cloud federation: the authentication process is executed using SAML 2.0 as external SASL mechanism.
Figure 9Transmission time between client and CM devices on domain A.
Figure 10Trasmission time between domain A CM and domain B TE.