Merging Securely M2M Protocols, Internet of Things and Cloud Computing
AbstractThe Internet of Things provides new ways for communication through the Web world using object-enabled networks. At the same time, M2M devices intercommunication and their communication through the web if they were connected to the Internet, presents new challenges, especially in security, that traditional communication models have not yet fully solved. Because of their inborn un-watched, minimal effort and mass-sent nature, M2M devices, and remote communication architectures and solutions for these devices, would encapsulate new dangers in security. These threats are not fully faced by use of security technologies and methods implemented in existing wireless devices, cellular networks or WLANs. The use of cloud computing gives a convenient, on demand and scalable network access to a shared pool of configurable computing resources and devices. This paper concentrates on a secure method to integrate the M2M protocols with the Internet of Things (IoT) and Cloud Computing under the name of Secure Machine-to-Internet Clouding (SM2IC) architecture. The secure design for integrating M2M protocols, along with IoT and cloud computing is proposed. To apply this design, an IoT enabled smart home scenario was examined to analyze secure communication between M2M devices and IoT applications. Also, the cloud computing is used to include different cloud applications, such as, IaaS, PaaS, and SaaS for monitoring the quality of service of M2M devices through IoT applications. Then, simulations were performed to test the proposed security technique, followed by conclusions and future work.
(1) Gartner’s hype cycle special report for 2015, Gartner Inc., 2015. [Online]. Available: http://www.gartner.com/technology/research/hype-cycles/.
(2) Gubbi J., et al., Internet of Things (IoT): A vision, architectural elements, and future directions, Future Gener. Comput. Syst., 2013. 29 (7): p. 1645–1660.
(3) Miorandi D., et al., Internet of things: Vision, applications and research challenges, Ad Hoc Network, 2012. 10 (7):p. 1497–1516.
(4) Yasumoto K., Yamaguchi H., and Shigeno H., Survey of real-time processing technologies of IoT data streams, J. Inf. Process, 2016. 24
(5) Husain S., et al., Recent trends in standards related to the internet of things and machine-to-machine commun., 2014, 4 (6).
(6) Djenouri D., Khelladi L., and Badache N., A Survey of Security
Issues in Mobile Ad-hoc Networks and Sensor Networks, IEEE Communications Surveys, 2005. 7 (4):p. 2-28.
(7) Cho J.-H., Swami A., and Chen R., A Survey on Trust Management for Mobile Ad-hoc Networks, IEEE Communications Surveys & Tutorials, 2011. 13 (4):p. 562-583.
(8) Wang Y., Attebury G., and Ramamurthy B., A Survey of Security Issues in Wire-less Sensor Networks, IEEE Communications Surveys Tutorials, 2006. 8 ( 2 ):p: 2-23.
(9) Cha I., et al., Trust in M2M Communication, IEEE Vehicular Technology Magazine, 2009. 4 ( 3 ): p. 69-75.
(10) Mell P. and Grance T., The nist definition of cloud computing, National Institute of Standards and Technology, 2009. 53 ( 6 ) article 50.
(11) Zhang, Q., Cheng, L., and Boutaba, R., Cloud computing: state-of-the-art and research challenges. Journal of internet services and applications, 2010. 1 (1):p. 7-18.
(12) Zhou J., et al., Cloud Architecture for Dynamic Service Composition, International Journal of Grid and High Performance Computing, 2012. 4 (2):p. 17-31.
(13) Christophe, B., et al., The web of things vision: Things as a service and interaction patterns. Bell Labs Technical Journal, 2011. 16 (1):p. 55-61.
(14) Subashini, S., and Kavitha, V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 2011. 34 (1):p. 1-11.
(15) Botta A., et al., Integration of Cloud Computing and Internet of Things: a Survey, Journal of Future Generation Computer Systems, September 18, 2015.
(16) Gomes, M. M., Righi, R. d. R., and da Costa, C. A., Future directions for providing better iot infrastructure. In: Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct.), 2014, p. 51-54.
(17) Alhakbani, N., ei al., A framework of adaptive interaction support in cloud-based internet of things (iot) environment. In: Internet and Distributed Computing Systems. Springer, 2014, p. 136-146.
(18) Fox, G. C., Kamburugamuve, S., and Hartman, R. D., Architecture and measured characteristics of a cloud based internet of things. In: Collaboration Technologies and Systems (CTS), 2012 International Conference on. IEEE, 2012, p. 6-12.
(19) Dash, S. K., Mohapatra, S., and Pattnaik, P. K., A Survey on Application of Wireless Sensor Network Using Cloud Computing. International Journal of Computer science & Engineering Technologies, 2010. 1 (4):p. 50-55.
(20) Atzoria L. and Giacomo Morabito A.I., The Internet of Things: A Survey, Computer Networks, 2010. 54 (15):p. 2787-2805.
(21) Gantz J., The Embedded Internet: Methodology and Findings, 2009.
[Online]. Available: https://www.bryankorourke.com/blog/2010/3/11/the-embedded-internet-15-billion-devices-by-2015.html
(22) Evans D., The Internet of Things: How the Next Evolution of the Internet Is Changing Everything, 2011. [Online]. Available: http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf
(23) Hatton M., The Global M2M Market in 2013, Machina research whitepaper, 2013.
(24) Emmerson B., M2M: The Internet of 50 Billion Devices, Win-Win, 2010, pp. 19-22.
(25) M2M. [Online]. Available: SingTel M2M, http://info.singtel.com/large-enterprise/about-m2m.
(26) Watson D.S., et al., Machine-to-Machine (M2M) Technology in Demand Responsive Commercial Buildings, in Proceedings of the ACEEE Summer Study on Energy Efficiency in Buildings, 2004, pp.1-14.
(27) ETSI, TS 102 690 M2M Functional Architecture, 2011.
(28) RSA. [Online]. Available: https://en.wikipedia.org/wiki/RSA
(29) Digital signature algorithm. [Online]. Available: https://en.wikipedia.org/wiki/Digital_Signature_Algorithm
(30) Elliptic curve cryptography. [Online]. Available: https://en.wikipedia.org/wiki/Elliptic-curve_cryptography
(31) SHA-2. [Online]. Available: https://en.wikipedia.org/wiki/SHA-2
(32) MATLAB Simulink. [Online]. Available: https://www.mathworks.com/products/simulink
(33) Raspberry Pi. [Online]. Available: https://en.wikipedia.org/wiki/Raspberry_Pi
(34) Choil K.-H., et al., Method of Calculating the Server Capacity for Cloud Computing for SaaS, International Journal of Software Engineering and Its Applications, 2015. 9 (11):p. 117-126 .
(35) Signal strength. [Online]. Available:
(36) Bit error rate. [Online]. Available: https://en.wikipedia.org/wiki/Bit_error_rate
(37) Password cracking. [Online]. Available: https://en.wikipedia.org/wiki/Password_cracking
(38) Password cracking of an application. [Online]. Available: ]https://www.guru99.com/how-to-crack-password-of-an-application.html
(39) Collision attack. [Online]. Available: https://en.wikipedia.org/wiki/Collision_attack
(40) Preimage attack. [Online]. Available:
(41) Collision resistance. [Online]. Available: https://en.wikipedia.org/wiki/Collision_resistance
(42) Preimage resistance and collision resistance. [Online].Available: https://crypto.stackexchange.com/questions/1173/what-are-preimage-resistance-and-collision-resistance-and-how-can-the-lack-ther