IoT applications are promising for future daily activities; therefore, the number
of IoT connected devices is expected to reach billions in the coming few years.
However, IoT has different application frameworks. Furthermore, IoT
applications require higher security standards. In this work, an IoT
application framework is presented with a security embedded structure using the
integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The
performance analysis of the model is presented. Comparing the model with existing
models and different design structures shows that the model presented in this
work is promising for a functioning IoT design model with security. The
security in the model is a built-in feature in its structure. The model is
built on recommended frameworks; therefore, it is ready for integration with
other web standards for data sharing, which will help in making IoT applications integrated from different
developing parties.
User Managed Access (2015) Kantara Initiative Staff.
[3]
Biswas, A.R. and Giaffreda, R. (2014) IoT and Cloud Convergence: Opportunities and Challenges. 2014 IEEE World Forum on Internet of Things (WF-IoT), Seoul, 6-8 March 2014, 375-376. https://doi.org/10.1109/WF-IoT.2014.6803194
[4]
Zhao, F. (2010) Sensors Meet the Cloud: Planetary-Scale Distributed Sensing and Decision Making. 9th IEEE International Conference on Cognitive Informatics (ICCI’10), Beijing, 7-9 July 2010, 998-998. https://doi.org/10.1109/COGINF.2010.5599715
[5]
Alam, S., Chowdhury, M.M.R. and Noll, J. (2010) Senaas: An Event-Driven Sensor Virtualization Approach for Internet of Things Cloud. 2010 IEEE International Conference on Networked Embedded Systems for Enterprise Applications, Suzhou, 25-26 November 2010, 1-6. https://doi.org/10.1109/NESEA.2010.5678060
[6]
Nikolov, N. and Nakov, O. (2019) Research of Secure Communication of ESP32 Iot Embedded System to .NET Core Cloud Structure Using MQTT SSL/TLS. 2019 IEEE XXVIII International Scientific Conference Electronics (ET), Sozopol, 12-14 September 2019, 1-4. https://doi.org/10.1109/ET.2019.8878636
[7]
Singh, M., Rajan, M.A., Shivraj, V.L. and Balamuralidhar, P. (2015) Secure MQTT for Internet of Things (IoT). 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, 4-6 April 2015, 746-751. https://doi.org/10.1109/CSNT.2015.16
[8]
Wang, X., Zhang, J.E., Schooler, M. and Ion, M. (2014) Performance Evaluation of Attribute-Based Encryption: Toward Data Privacy in the IoT. 2014 IEEE International Conference on Communications (ICC), Sydney, 10-14 June 2014, 725-730. https://doi.org/10.1109/ICC.2014.6883405
[9]
Perera, C., Zaslavsky, A., Christen, P. and Georgakopoulos, D. (2014) Context Aware Computing for the Internet of Things: A Survey. IEEE Communications Surveys Tutorials, 16, 414-454. https://doi.org/10.1109/SURV.2013.042313.00197
[10]
Dai, H., Zheng, Z. and Zhang, Y. (2019) Blockchain for Internet of Things: A Survey. IEEE Internet of Things Journal, 6, 8076-8094. https://doi.org/10.1109/JIOT.2019.2920987
[11]
Niruntasukrat, A., Issariyapat, C., Pongpaibool, P., Meesublak, K., Aiumsupucgul, P. and Panya, A. (2016) Authorization Mechanism for MQTT-Based Internet of Things. 2016 IEEE International Conference on Communications Workshops (ICC), Kuala Lumpur, 23-27 May 2016, 290-295. https://doi.org/10.1109/ICCW.2016.7503802
[12]
Ullah, R., Ahmed, S.H. and Kim, B. (2018) Information-Centric Networking with Edge Computing for IoT: Research Challenges and Future Directions. IEEE Access, 6, 73465-73488. https://doi.org/10.1109/ACCESS.2018.2884536
[13]
Alhazmi, O.H. and Aloufi, K.S. (2019) Fog-Based Internet of Things: A Security Scheme. 2019 2nd International Conference on Computer Applications Information Security (ICCAIS), Riyadh, 1-3 May 2019, 1-6. https://doi.org/10.1109/CAIS.2019.8769506
[14]
Aloufi, K.S. and Alhazmi, O.H. (2020) Secure IoT Resources with Access Control over Restful Web Services. Jordanian Journal of Electrical Engineering, 6, 63-77. https://doi.org/10.5455/jjee.204-1581015531
[15]
Cruz-Piris, L., Rivera, D., Mersa-Maestre, I., De la Hoz, E. and Velasco, J.R. (2018) Access Control Mechanism for IoT Environments Based on Modelling Communication Procedures as Resources. Sensors, 18, 917. https://doi.org/10.3390/s18030917
[16]
Aloufi, K. (2019) 6loWPAN Stack Model Configuration for IoT Streaming Data Transmission over CoAP. International Journal of Communication Networks and Information Security, 11, 304-3012.
[17]
Yokotani, T. and Sasaki, Y. (2016) Transfer Protocols of Tiny Data Blocks in IoT and Their Performance Evaluation. 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, 12-14 December 2016, 54-57. https://doi.org/10.1109/WF-IoT.2016.7845442
[18]
Yokotani T. and Sasaki, Y. (2016) Comparison with http and MQTT on Required Network Resources for IoT. 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, 13-15 September 2016, 1-6. https://doi.org/10.1109/ICCEREC.2016.7814989
[19]
Hardjono, T., Maler, E., Machulak, M. and Catalano, D. (2013) User-Managed Access (UMA) Profile of OAuth 2.0 Internet-Draft Draft-Hardjono-Oauth-Umacore-13. https://tools.ietf.org/html/draft-hardjono-oauth-umacore-13
[20]
Jones, M. and Hardt, D. (2012) The OAuth 2.0 Authorization Framework: Bearer Token Usage. https://tools.ietf.org/html/rfc6750
[21]
Siriwardena, P. (2014) Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE. Apress, Pittsburg. https://doi.org/10.1007/978-1-4302-6817-8
[22]
Maler, E., Machulak, M., Richer, J. and Hardjono, T. (2019) User-Managed Access (UMA) 2.0 Grant for OAuth 2.0 Authorization. Internet-Draft Draft-Maler-Oauth-Umagrant-00, Internet Engineering Task Force.
[23]
Al-khafajiy, M., Baker, T., Waraich, A., Al-Jumeily, D. and Hussain, A. (2018) Iot-Fog Optimal Workload via Fog Offloading. 2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), Zurich, 17-20 December 2018, 359-364. https://doi.org/10.1109/UCC-Companion.2018.00081
[24]
Jaloudi, S. (2019) Mqtt for Iot-Based Applications in Smart Cities. Palestinian Journal of Technology and Applied Sciences, 2, 1-13.
[25]
Osipov, M. (2008) Home Automation with Zigbee. In: Balandin, S., Moltchanov, D. and Koucheryavy, Y., Eds., Next Generation Teletraffic and Wired/Wireless Advanced Networking, Springer, Berlin, 263-270. https://doi.org/10.1007/978-3-540-85500-2_26