From a Home-Area-Network to a Secure Internet of Things Application

In this paper, we present a secure system to control devices at home through the web, which we implement based on the Do It Yourself (DIY) culture. We use a model based on the Goal Question Metric approach to evaluate the quality of our system. Given that we are now in the era of the Internet of Thi...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2019
Institución:
Universidad Tecnológica de Bolívar
Repositorio:
Repositorio Institucional UTB
Idioma:
eng
OAI Identifier:
oai:repositorio.utb.edu.co:20.500.12585/9168
Acceso en línea:
https://hdl.handle.net/20.500.12585/9168
Palabra clave:
Home area network
Internet of things
Open source
Security
TDES
Access control
Electric power utilization
Internet of things
Network security
Quality control
Goal-question-metric approach
Home area network
Internet of thing (IOT)
Motion detection
Open sources
Security
Security implementations
TDES
Home networks
Rights
restrictedAccess
License
http://creativecommons.org/licenses/by-nc-nd/4.0/
id UTB2_fda39b600e79df0c39ac3864e735c1af
oai_identifier_str oai:repositorio.utb.edu.co:20.500.12585/9168
network_acronym_str UTB2
network_name_str Repositorio Institucional UTB
repository_id_str
dc.title.none.fl_str_mv From a Home-Area-Network to a Secure Internet of Things Application
title From a Home-Area-Network to a Secure Internet of Things Application
spellingShingle From a Home-Area-Network to a Secure Internet of Things Application
Home area network
Internet of things
Open source
Security
TDES
Access control
Electric power utilization
Internet of things
Network security
Quality control
Goal-question-metric approach
Home area network
Internet of thing (IOT)
Motion detection
Open sources
Security
Security implementations
TDES
Home networks
title_short From a Home-Area-Network to a Secure Internet of Things Application
title_full From a Home-Area-Network to a Secure Internet of Things Application
title_fullStr From a Home-Area-Network to a Secure Internet of Things Application
title_full_unstemmed From a Home-Area-Network to a Secure Internet of Things Application
title_sort From a Home-Area-Network to a Secure Internet of Things Application
dc.contributor.editor.none.fl_str_mv Figueroa-Garcia J.C.
Duarte-Gonzalez M.
Jaramillo-Isaza S.
Orjuela-Canon A.D.
Diaz-Gutierrez Y.
dc.subject.keywords.none.fl_str_mv Home area network
Internet of things
Open source
Security
TDES
Access control
Electric power utilization
Internet of things
Network security
Quality control
Goal-question-metric approach
Home area network
Internet of thing (IOT)
Motion detection
Open sources
Security
Security implementations
TDES
Home networks
topic Home area network
Internet of things
Open source
Security
TDES
Access control
Electric power utilization
Internet of things
Network security
Quality control
Goal-question-metric approach
Home area network
Internet of thing (IOT)
Motion detection
Open sources
Security
Security implementations
TDES
Home networks
description In this paper, we present a secure system to control devices at home through the web, which we implement based on the Do It Yourself (DIY) culture. We use a model based on the Goal Question Metric approach to evaluate the quality of our system. Given that we are now in the era of the Internet of Things (IoT), security must be at the same level or even in a higher priority than other aspects such as speed, size, and power consumption. The objective of this work is to verify that acceptable levels of confidentiality, integrity, availability, access control, authentication and non-repudiation can be guaranteed in open platforms such as Arduino, Galileo, Energia, Tiva C, among others. Taking into account these platforms, we developed a system with access control that implements motion detection, light control, and generates a power consumption record. The results show a comparison between our security implementation and other authors’ implementation. © 2019, Springer Nature Switzerland AG.
publishDate 2019
dc.date.issued.none.fl_str_mv 2019
dc.date.accessioned.none.fl_str_mv 2020-03-26T16:33:07Z
dc.date.available.none.fl_str_mv 2020-03-26T16:33:07Z
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_c94f
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/conferenceObject
dc.type.hasversion.none.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.spa.none.fl_str_mv Conferencia
status_str publishedVersion
dc.identifier.citation.none.fl_str_mv Communications in Computer and Information Science; Vol. 1052, pp. 475-486
dc.identifier.isbn.none.fl_str_mv 9783030310189
dc.identifier.issn.none.fl_str_mv 18650929
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12585/9168
dc.identifier.doi.none.fl_str_mv 10.1007/978-3-030-31019-6_40
dc.identifier.instname.none.fl_str_mv Universidad Tecnológica de Bolívar
dc.identifier.reponame.none.fl_str_mv Repositorio UTB
dc.identifier.orcid.none.fl_str_mv 57212001418
56682785300
57212004586
26325154200
identifier_str_mv Communications in Computer and Information Science; Vol. 1052, pp. 475-486
9783030310189
18650929
10.1007/978-3-030-31019-6_40
Universidad Tecnológica de Bolívar
Repositorio UTB
57212001418
56682785300
57212004586
26325154200
url https://hdl.handle.net/20.500.12585/9168
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.conferencedate.none.fl_str_mv 16 October 2019 through 18 October 2019
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_16ec
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/restrictedAccess
dc.rights.cc.none.fl_str_mv Atribución-NoComercial 4.0 Internacional
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
Atribución-NoComercial 4.0 Internacional
http://purl.org/coar/access_right/c_16ec
eu_rights_str_mv restrictedAccess
dc.format.medium.none.fl_str_mv Recurso electrónico
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Springer
publisher.none.fl_str_mv Springer
dc.source.none.fl_str_mv https://www.scopus.com/inward/record.uri?eid=2-s2.0-85075681794&doi=10.1007%2f978-3-030-31019-6_40&partnerID=40&md5=ec89944fdf901961d1ae89a278a03fbd
institution Universidad Tecnológica de Bolívar
dc.source.event.none.fl_str_mv 6th Workshop on Engineering Applications, WEA 2019
bitstream.url.fl_str_mv https://repositorio.utb.edu.co/bitstream/20.500.12585/9168/1/MiniProdInv.png
bitstream.checksum.fl_str_mv 0cb0f101a8d16897fb46fc914d3d7043
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio Institucional UTB
repository.mail.fl_str_mv repositorioutb@utb.edu.co
_version_ 1814021788028370944
spelling Figueroa-Garcia J.C.Duarte-Gonzalez M.Jaramillo-Isaza S.Orjuela-Canon A.D.Diaz-Gutierrez Y.Sabalza-Mejia M.Magre Colorado, Luz AlejandraBaños I.Martínez-Santos J.C.2020-03-26T16:33:07Z2020-03-26T16:33:07Z2019Communications in Computer and Information Science; Vol. 1052, pp. 475-486978303031018918650929https://hdl.handle.net/20.500.12585/916810.1007/978-3-030-31019-6_40Universidad Tecnológica de BolívarRepositorio UTB57212001418566827853005721200458626325154200In this paper, we present a secure system to control devices at home through the web, which we implement based on the Do It Yourself (DIY) culture. We use a model based on the Goal Question Metric approach to evaluate the quality of our system. Given that we are now in the era of the Internet of Things (IoT), security must be at the same level or even in a higher priority than other aspects such as speed, size, and power consumption. The objective of this work is to verify that acceptable levels of confidentiality, integrity, availability, access control, authentication and non-repudiation can be guaranteed in open platforms such as Arduino, Galileo, Energia, Tiva C, among others. Taking into account these platforms, we developed a system with access control that implements motion detection, light control, and generates a power consumption record. The results show a comparison between our security implementation and other authors’ implementation. © 2019, Springer Nature Switzerland AG.We would like to thank the anonymous WEA reviewers for their comments and feedback on the ideas in this paper and Tecnologica de Bolivar University for their support.Recurso electrónicoapplication/pdfengSpringerhttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/restrictedAccessAtribución-NoComercial 4.0 Internacionalhttp://purl.org/coar/access_right/c_16echttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85075681794&doi=10.1007%2f978-3-030-31019-6_40&partnerID=40&md5=ec89944fdf901961d1ae89a278a03fbd6th Workshop on Engineering Applications, WEA 2019From a Home-Area-Network to a Secure Internet of Things Applicationinfo:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionConferenciahttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_c94fHome area networkInternet of thingsOpen sourceSecurityTDESAccess controlElectric power utilizationInternet of thingsNetwork securityQuality controlGoal-question-metric approachHome area networkInternet of thing (IOT)Motion detectionOpen sourcesSecuritySecurity implementationsTDESHome networks16 October 2019 through 18 October 2019FIPS Pub: Standards for security categorization of federal information and information systems (2004) NIST FIPS, p. 199Nixon, R., (2012) Learning PHP, Mysql, Javascript, and CSS: A Step-By-Step Guide to Creating Dynamic Websites(2006), Nicholas Zambetti: Wire.h libraryMargolis, M., (2011), https://uxplanet.org/how-to-customize-bootstrap-b8078a011203Bulger, B., Greenspan, J., Wall, D., (2003) Mysql/Php Database Applications, , Wiley, New YorkRamon, M.C., (2014) Intel Galileo and Intel Galileo Gen 2. IntelR○ Galileo and IntelR○ Galileo Gen, 2, pp. 1-33. , https://doi.org/10.1007/978-1-4302-6838-31, pp., Apress, Berkeley, CAHummen, R., Hiller, J., Wirtz, H., Henze, M., Shafagh, H., Wehrle, K., 6LoWPAN fragmentation attacks and mitigation mechanisms (2013) Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 55-66. , pp., ACM, AprilHenze, M., Hermerschmidt, L., Kerpen, D., Huling, R., Rumpe, B., Wehrle, K., User-driven privacy enforcement for cloud-based services in the internet of things (2014) 2014 International Conference on Future Internet of Things and Cloud, pp. 191-196. , pp., IEEE, AugustStamp, M., (2011) Information Security: Principles and Practice, , Wiley, HobokenLounis, A., Hadjidj, A., Bouabdallah, A., Challal, Y., Secure and scalable cloud-based architecture for e-health wireless sensor networks (2012) 2012 21St International Conference on Computer Communications and Networks (ICCCN), pp. 1-7International Organization for Standardization: Technical Committee ISO/TC 97: ISO7498-2: Information processing system, open system interconnection, basic reference mode. Part 2: Security architecture (1989) International Organization for StandardizationLi, X., Xuan, Z., Wen, L., Research on the architecture of trusted security system based on the internet of things (2011) 2011 Fourth International Conference on Intelligent Computation Technology and Automation, 2, pp. 1172-1175. , vol., pp., IEEE, MarchLi, D., Sampalli, S., Aung, Z., Williams, J., Sanchez, A., Fine-grained encryption for search and rescue operation on Internet of Things (2014) Asia-Pacific World Congress on Computer Science and Engineering, pp. 1-9. , pp., IEEE, NovemberIslam, S., Falcarin, P., Measuring security requirements for software security (2011) 2011 IEEE 10Th International Conference on Cybernetic Intelligent Systems (CIS), pp. 70-75. , pp., IEEE, Septembervan Solingen, R., Basili, V., Caldiera, G., Rombach, H.D., Goal question metric (GQM) approach (2002) Encyclopedia of Software EngineeringPirbhulal, S., A novel secure IoT-based smart home automation system using a wireless sensor network (2017) Sensors, 17 (1), p. 69Han, J.H., Jeon, Y., Kim, J., Security considerations for secure and trustworthy smart home system in the IoT environment (2015) 2015 International Conference on Information and Communication Technology Convergence (ICTC), pp. 1116-1118. , pp., IEEE, OctoberStergiou, C., Psannis, K.E., Kim, B.G., Gupta, B., Secure integration of IoT and cloud computing (2018) Future Gener. Comput. Syst., 78, pp. 964-975Santoso, F.K., Vun, N.C., Securing IoT for smart home system (2015) 2015 International Symposium on Consumer Electronics (ISCE), pp. 1-2. , pp., IEEE, JuneMagre Colorado, L.A., Martíinez-Santos, J.C., Leveraging 1-wire communication bus system for secure home automation (2017) CCC 2017. CCIS, 735, pp. 759-771. , https://doi.org/10.1007/978-3-319-66562-754, Solano, A., Ordoñez, H. (eds.), vol., pp., Springer, ChamBeaulieu, R., Treatman-Clark, S., Shors, D., Weeks, B., Smith, J., Wingers, L., The SIMON and SPECK lightweight block ciphers (2015) 2015 52Nd ACM/EDAC/IEEE Design Automation Conference (DAC), pp. 1-6. , pp., IEEE, JuneGriffor, E.R., Greer, C., Wollman, D.A., Burns, M.J., Framework for cyber-physical systems: Volume 1, overview (No (2017) Special Publication (NIST SP)-1500-201)Sabalza, M.M., Santos, J.C.M., Design and construction of a power meter to optimize usage of the electric power (2014) 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1-5. , pp., IEEE, Octoberhttp://purl.org/coar/resource_type/c_c94fTHUMBNAILMiniProdInv.pngMiniProdInv.pngimage/png23941https://repositorio.utb.edu.co/bitstream/20.500.12585/9168/1/MiniProdInv.png0cb0f101a8d16897fb46fc914d3d7043MD5120.500.12585/9168oai:repositorio.utb.edu.co:20.500.12585/91682023-05-26 16:12:56.021Repositorio Institucional UTBrepositorioutb@utb.edu.co