Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System
Abstract
:1. Introduction
2. Related Work and Research Contribution
- Recent related works have studied the IoT security problem with the main focus of addressing the information leak of different IoT devices in smart environments, such as healthcare medical devices, home/office consumer devices, and educational toy devices [21,39,40]. Other categories of security studies have focused on anomaly detection by monitoring and fingerprinting IoT networks using machine learning techniques, and these solutions are resource-intensive and impractical for large-scale smart environments [41,42,43]. Further, research studies on secure smart environments are very much focused on specific application domains. One study in the literature proposed a security architecture for smart water management systems that relate to the real-world case scenario of this research work [44]. However, it ensures secure booting, secure communications, and secure firmware updates of IoT devices in that specific environment. In addition, it adopts cryptographic hash functions that are complex and resource extensive, making such solutions not practically viable for large-scale IoT deployments. Existing security models are complex for resource-constrained IoT and are not generic enough nor dynamically adaptable for a scalable IoT environment. These gaps in existing literature form the main motivation for this research, which is to propose a simple, interoperable, and adaptive security model for large-scale IoT infrastructure.
- The main goal of this research is to propose a lightweight security model using a simple architecture of VPN suitable for a large-scale IoT deployment. We believe this is an important step in the realm of IoT and Industry 4.0 towards realizing the smart cities of the future. While there are several methods to use VPN in IoT as a common engineering practice, performance and latency are inherent issues with VPN for large-scale deployments in real-world environments [5,24]. Another important aspect to consider in the practical world is its increasing cost and complexity associated with scalability. High administrative time and resources required to manage the network infrastructure could have an impact on the practical viability of a security model. A self-managed IoT infrastructure is warranted for successful adoption in large-scale IoT based smart environments. There is a need for an end-to-end practical solution with an easy-to-use remote device management system that is secure and compatible with the distributed and heterogeneous networks of IoT.
- IoT devices connected via leading cloud service providers, such as Amazon Web Services (AWS), could be considered as an essential security infrastructure to provide large-scale support for data storage, data processing, and data sharing. However, security challenges posed by each layer of the IoT architecture should be addressed by the cloud service providers to enforce security protocols and privacy standards [45]. The sensor data sent to the edge, fog, and then to the cloud require a network protocol with trusted measures, such as point-to-point encryption, and security certificates. Further, such systems require a paid account with a cloud service provider to have full access to the security certificates, encryption keys, and other resources for achieving cloud-based authorization and authentication mechanisms. A recently proposed model consisting of AWS cloud as master cloud, Raspberry Pi 4 as Edge Node, and Virtual Machines as IoT devices was implemented with an AWS paid account as a proof-of-concept [46]. However, the authors also suggest future studies to be performed on cryptographic security methods that are much more capable of operating on resource-constrained IoT devices (Light Weight Crypto). Further, a replay attack is a major threat towards the cloud infrastructure that raises privacy and security concerns for cloud service adoption for IoT networks [47]. Another recent work proposes a two-factor authentication for IoT security that could restrict unauthorized access to sensitive data communicated by sensors and nodes in an IoT network [48]. Our approach is more suitable for large-scale secure IoT deployments that require an IoT security model to support a simple, extremely low-cost, and self-managed IoT infrastructure.
- Overall, the main contributions are three-fold: (i) The proposed unique and simple end-to-end IoT security model low-cost leverages off-the-shelf technologies for implementing a large-scale IoT infrastructure, (ii) the practically viable solution has the advantages of an adaptive, interoperable and secure IoT deployment for any smart environment, and (iii) the implementation of our IoT security model within a smart water monitoring system demonstrates its application to any real-world case scenario. The novelty of the proposed solution is in the unique method of integrating the security protocol, such as VPN with the IoT devices, and the controller as one embedded device to establish secure connectivity without having to invest on high-cost proprietary solutions. Our solution also integrates various technologies to provide secure VPN client access to manage, monitor, and control IoT devices in a large-scale smart environment with a user-friendly mobile data analytics capability. This study could instill academic and practical interest in this dynamically challenging IoT security domain with provisions for future research in studying the solution implementation in various large-scale smart environments.
3. Research Design
- (a)
- Research philosophical consideration—we consider an interpretive epistemology as the choice of the research philosophical paradigm [55,56,57]. We identify the IoT security viewpoints based on literature by identifying the inherent vulnerabilities in each of the four basic layers of the IoT architecture (presented in Section 4). These viewpoints serve as theoretical and practical knowledge forming the basis for proposing an effective solution for the research problem.
- (b)
- inquiry technique consideration—we adopt an inquiry technique that is qualitative in nature employing descriptive data that is interpretive in nature [58]. We propose a practically viable end-to-end lightweight security model through developing network security reference architectures, which is typically design-oriented research that aims at solving the IoT security problem (presented in Section 5). Similar to other IoT related qualitative studies reported in the literature [59,60], we describe the proposed IoT security model with an interpretive approach and establish the credibility, conformability, transferability, and dependability of the solution through practical solution deployment.
- (c)
- research logic consideration—we adopt an abduction logic to infer the application of the proposed secure IoT infrastructure within a single case setting using well-established guidelines [61]. For illustrating a practical use of the proposed secure IoT infrastructure, we include a working prototype in a real-world smart environment. Data analytics and visualization of the data collected via a secure and smart water monitoring system is demonstrated for the research logic consideration in the case scenario (presented in Section 6).
- 5.
- Overall, the research contribution is the development of an adaptive end-to-end security model for large-scale IoT infrastructure with essential features of simplicity and scalability. Further, in this study, the pilot deployment of our IoT security model in a real-world case scenario of a smart water monitoring system serves as a starting point for “model testing” within our deductive research journey. In future research, the IoT security model will be applied to other smart environments as part of an inductive research study. Such an approach of our research design would facilitate to iteratively finetune and evolve with a generalized end-to-end security model that would become applicable for any large-scale IoT deployment.
4. Security Requirements of IoT Architecture
- (a)
- Device or Perception Layer;
- (b)
- Network or Transmission Layer;
- (c)
- Middleware or Service Layer;
- (d)
- Application or Business Layer.
- (a)
- Device or Perception Layer
- (b)
- Network or Transmission Layer
- (c)
- Middleware or Service Layer
- (d)
- Application or Business Layer
5. Proposed Security Model for a Scalable IoT Infrastructure
6. IoT Security Model Deployment—A Case Scenario of Smart Water Monitoring System
Implementation of Our Proposed IoT Security Model
7. Discussion and Current Trends
8. Conclusions and Future Work
Author Contributions
Funding
Acknowledgments
Conflicts of Interest
References
- Srirama, S. Mobile web and cloud services enabling internet of things. CSI Trans. ICT 2017, 5, 109–117. [Google Scholar] [CrossRef]
- Hassija, V.; Chamola, V.; Saxena, V.; Jain, D.; Goyal, P.; Sikdar, B. A survey on iot security: Application areas, security threats, and solution architectures. IEEE Access 2019, 7, 82721–82743. [Google Scholar] [CrossRef]
- Kang, W.M.; Moon, S.Y.; Park, J.H. An enhanced security framework for home appliances in smart home. Hum. Cent. Comput. Inf. Sci. 2017, 7, 6. [Google Scholar] [CrossRef] [Green Version]
- Venkatraman, S. A Self-Learning Framework for the IoT Security. In Smart Devices, Applications, and Protocols for the IoT; IGI Global: Hershey, PA, USA, 2019; pp. 34–53. [Google Scholar]
- Ondiege, B.; Clarke, M.; Mapp, G. Exploring a new security framework for remote patient monitoring devices. Computers 2017, 6, 11. [Google Scholar] [CrossRef] [Green Version]
- Fernandes, E.; Jung, J.; Prakash, A. Security analysis of emerging smart home applications. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 22–26 May 2016; pp. 636–654. [Google Scholar]
- Roy, A.; Datta, A.; Siddiquee, J.; Poddar, B.; Biswas, B.; Saha, S.; Sarkar, P. Energy-efficient Data Centers and smart temperature control system with IoT sensing. In Proceedings of the 2016 IEEE 7th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 13–15 October 2016; pp. 1–4. [Google Scholar]
- Medwed, M. IoT security challenges and ways forward. In Proceedings of the 6th International Workshop on Trustworthy Embedded Devices; ACM: New York, NY, USA, 2016; p. 55. [Google Scholar]
- Sivanathan, A.; Gharakheili, H.H.; Sivaraman, V. Managing iot cyber-security using programmable telemetry and machine learning. IEEE Trans. Netw. Serv. Manag. 2020, 17, 60–74. [Google Scholar] [CrossRef]
- Miettinen, M.; Marchal, S.; Hafeez, I.; Asokan, N.; Sadeghi, A.R.; Tarkoma, S. IoT sentinel: Automated device-type identification for security enforcement in IoT. In Proceedings of the 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), Atlanta, GA, USA, 5–8 June 2017; pp. 2177–2184. [Google Scholar]
- Lochab, K.; Yadav, D.K.; Singh, M.; Sharmab, A. Internet of things in cloud environment: Services and challenges. Int. J. Database Theory Appl. 2017, 10, 23–32. [Google Scholar] [CrossRef]
- Guarnizo, J.D.; Tambe, A.; Bhunia, S.S.; Ochoa, M.; Tippenhauer, N.O.; Shabtai, A.; Elovici, Y. SIPHON: Towards scalable high-interaction physical honeypots. In Proceedings of the ACM Workshop on Cyber-Physical System Security; ACM: New York, NY, USA, 2017; pp. 57–68. [Google Scholar]
- Venkatraman, S.; Overmars, A. New Method of Prime Factorisation-Based Attacks on RSA Authentication in IoT. Cryptography 2019, 3, 20. [Google Scholar] [CrossRef] [Green Version]
- Diaz Lopez, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Moron Castro, S.; Nespoli, P.; Gomez Marmol, F. Shielding IoT against Cyber-Attacks: An Event-Based Approach Using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018. [Google Scholar] [CrossRef]
- Knieriem, B.; Zhang, X.; Levine, P.; Breitinger, F.; Baggili, I. An overview of the usage of default passwords. In Digital Forensics and Cyber Crime, ICDF2C 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Matoušek, P., Schmiedecker, M., Eds.; Springer: Cham, Germany, 2018; Volume 216, pp. 195–203. [Google Scholar]
- Neshenko, N.; Bou-Harb, E.; Crichigno, J.; Kaddoum, G.; Ghani, N. Demystifying IoT Security: An exhaustive survey on IoT vulnerabilities and a first empirical look on internet-scale IoT exploitations. IEEE Commun. Surv. Tutor. 2019, 21, 2702–2733. [Google Scholar] [CrossRef]
- Makhdoom, I.; Abolhasan, M.; Lipman, J.; Liu, R.P.; Ni, W. Anatomy of threats to the Internet of things. IEEE Commun. Surv. Tutor. 2018, 21, 1636–1675. [Google Scholar] [CrossRef]
- Alaba, F.A.; Othman, M.; Hashem, I.A.T.; Alotaibi, F. Internet of Things security: A survey. J. Netw. Comput. Appl. 2017, 88, 10–28. [Google Scholar] [CrossRef]
- Rizal, R.; Riadi, I.; Prayudi, Y. Network forensics for detecting flooding attack on internet of things (IoT) device. Int. J. Cyber Secur. Digit. Forensics 2018, 7, 382–390. [Google Scholar]
- Stellios, I.; Kotzanikolaou, P.; Psarakis, M.; Alcaraz, C.; Lopez, J. A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services. IEEE Commun. Surv. Tuts. 2018, 20, 3453–3495. [Google Scholar] [CrossRef]
- Moosavi, S.; Gia, T.; Nigussie, E.; Rahmani, A.; Virtanen, S.; Tenhunen, H.; Isoaho, J. End-to-end security scheme for mobility enabled healthcare internet of things. Future Gener. Comput. Syst. 2016, 64, 108–124. [Google Scholar] [CrossRef]
- Ngu, A.H.; Gutierrez, M.; Metsis, V.; Nepal, S.; Sheng, Q.Z. IoT middleware: A survey on issues and enabling technologies. IEEE Internet Things J. 2017, 4, 1–20. [Google Scholar] [CrossRef]
- Das, P.K.; Narayanan, S.; Sharma, N.K.; Joshi, A.; Joshi, K.; Finin, T. Context-sensitive policy based security in internet of things. In Proceedings of the 2016 IEEE International Conference on Smart Computing (SMARTCOMP), St. Louis, MO, USA, 18–20 May 2016; pp. 1–6. [Google Scholar]
- Iqbal, M.; Riadi, I. Analysis of security virtual private network (VPN) using openVPN. Int. J. Cyber Secur. Digit. Forensics 2019, 8, 58–65. [Google Scholar]
- Nundloll, V.; Porter, B.; Blair, G.S.; Emmett, B.; Cosby, J.; Jones, D.L.; Chadwick, D.; Winterbourn, B.; Beattie, P.; Dean, G.; et al. The Design and Deployment of an End-To-End IoT Infrastructure for the Natural Environment. Future Internet 2019, 11, 129. [Google Scholar]
- Lee, C.; Fumagalli, A. Internet of Things Security-Multilayered Method for End to End Data Communications Over Cellular Networks. In Proceedings of the 2019 IEEE 5th World Forum on Internet of Things (WF-IoT), Limerick, Ireland, 15–18 April 2019; pp. 24–28. [Google Scholar] [CrossRef]
- Alrawi, O.; Lever, C.; Antonakakis, M.; Monrose, F. Sok: Security Evaluation of Home-based IoT Deployments. In Proceedings of the IEEE Symposium on Security and Privacy (S&P), San Francisco, CA, USA, 20–22 May 2019. [Google Scholar]
- Fang, H.; Qi, A.; Wang, X. Fast authentication and progressive authorization in large-scale IoT: How to leverage ai for security enhancement. IEEE Netw. 2020, 34, 24–29. [Google Scholar] [CrossRef]
- Can, O.; Sahingoz, O.K. A survey of intrusion detection systems in wireless sensor networks. In Proceedings of the 6th International Conference on Modeling, Simulation, and Applied Optimization (ICMSAO), Istanbul, Turkey, 27–29 May 2015; pp. 1–6. [Google Scholar]
- Hsu, C.; Lin, J.C. An empirical examination of consumer adoption of internet of things services: Network externalities and concern for information privacy perspectives. Comput. Hum. Behav. 2016, 62, 516–527. [Google Scholar] [CrossRef]
- Abomhara, M.; Koien, G. Cyber security and the internet of things: Vulnerabilities, threats, intruders and attacks. J. Cyber Secur. 2015, 4, 65–88. [Google Scholar] [CrossRef]
- Sinha, R.S.; Wei, Y.; Hwang, S.H. A survey on LPWA Technology: LoRa and NB-IoT. ICT Express 2017, 3, 1–21. [Google Scholar] [CrossRef]
- Mekkia, K.; Bajica, E.; Chaxela, F.; Meyerb, F. A Comparative Study of LPWAN Technologies for Large-Scale IoT Deployment. ICT Express 2019, 5, 1–7. [Google Scholar] [CrossRef]
- Basu, D.; Gu, T.; Mohapatra, P. Security issues of low power wide area networks in the context of LoRa networks. arXiv 2020, arXiv:abs/2006.16554. [Google Scholar]
- Aras, E.; Ramachandran, G.S.; Lawrence, P.; Hunghes, D. Exploring the Security Vulnerabilities of LoRa. In Proceedings of the 3rd IEEE International Conference on Cybernetics, Exeter, UK, 21–23 June 2017. [Google Scholar]
- Butun, I.; Pereira, N.; Gidlund, M. Security risk analysis of LoRaWAN and future directions. Future Internet 2019, 11, 3. [Google Scholar] [CrossRef] [Green Version]
- Pathak, G.; Gutierrez, J.; Rehman, S.U. Security in low powered wide area networks: Opportunities for software defined network-supported solutions. Electronics 2020, 9, 1195. [Google Scholar] [CrossRef]
- Lee, W.; Kim, N. Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking. Information 2017, 8, 65. [Google Scholar] [CrossRef] [Green Version]
- Jose, A.C.; Malekian, R.; Ye, N. Improving home automation security; integrating device fingerprinting into smart home. IEEE Access 2016, 4, 5776–5787. [Google Scholar] [CrossRef] [Green Version]
- Chu, G.; Apthorpe, N.; Feamster, N. Security and privacy analyses of internet of things children’s toys. IEEE Internet Things J. 2019, 6, 1978–1985. [Google Scholar] [CrossRef] [Green Version]
- Apthorpe, N.; Reisman, D.; Sundaresan, S.; Narayanan, A.; Feamster, N. Spying on the smart home: Privacy attacks and defenses on encrypted IoT traffic. arXiv 2017, arXiv:1708.05044. [Google Scholar]
- Hamza, A.; Ranathunga, D.; Gharakheili, H.H.; Benson, T.A.; Roughan, M.; Sivaraman, V. Verifying and monitoring IoTs network behavior using MUD profiles. arXiv 2019, arXiv:1902.02484. [Google Scholar]
- Thangavelu, V.; Divakaran, D.M.; Sairam, R.; Bhunia, S.S.; Gurusamy, M. DEFT: A distributed IoT fingerprinting technique. IEEE Internet Things J. 2019, 6, 940–952. [Google Scholar] [CrossRef]
- Ntuli, N.; Abu-Mahfouz, A. A simple security architecture for smart water management system. Procedia Comput. Sci. 2016, 83, 1164–1169. [Google Scholar] [CrossRef] [Green Version]
- Singh, J.; Thomas, F.J.-M.; Pasquier, J.B.; Ko, H.; Eyers, D.M. Twenty security considerations for cloud-supported internet of things. IEEE Internet Things J. 2016, 3, 269–284. [Google Scholar] [CrossRef] [Green Version]
- Tawalbeh, L.; Muheidat, F.; Tawalbeh, M.; Quwaider, M. IoT privacy and security: Challenges and solutions. Appl. Sci. 2020, 10, 4102. [Google Scholar] [CrossRef]
- Singh, V.; Pandey, S.K. Revisiting Cloud Security Threats: Replay attack. In Proceedings of the 2018 4th International Conference on Computing Communication and Automation (ICCCA), Greater Noida, India, 14–15 December 2018; pp. 1–6. [Google Scholar]
- Liyanage, M.; Braeken, A.; Kumar, P.; Ylianttila, M. IoT Security: Advances in Authentication; John Wiley &Sons: West Sussex, UK, 2020. [Google Scholar]
- Creswell, J.W. Research Design: Qualitative, Quantitative, and Mixed Methods Approaches; Sage Publications: Thousand Oaks, CA, USA, 2013. [Google Scholar]
- Rossman, G.B.; Wilson, B.L. Numbers and words: Combining quantitative and qualitative methods in a single large-scale evaluation study. Eval. Rev. 1985, 9, 627–643. [Google Scholar] [CrossRef]
- Baxter, P.; Jack, S. Qualitative case study methodology: Study design and implementation for novice researchers. Qual. Rep. 2008, 13, 544–559. [Google Scholar]
- Merriam, S.B.; Tisdell, E.J. Qualitative Research: A Guide to Design and Implementation; John Wiley: San Francisco, CA, USA, 2015. [Google Scholar]
- Strauss, A.L.; Corbin, J.M. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory; Sage: Thousand Oaks, CA, USA, 1998. [Google Scholar]
- Rashid, Y.; Rashid, A.; Warraich, M.; Sabir, S.; Waseem, A. Case study method: A step-by-step guide for business researchers. Int. J. Qual. Methods 2019, 18, 160940691986242. [Google Scholar] [CrossRef] [Green Version]
- Denzin, N.K.; Lincoln, Y.S. Collecting and Interpreting Qualitative Materials; Sage: London, UK, 1998. [Google Scholar]
- Scotland, J. Exploring the philosophical underpinnings of research: Relating ontology and epistemology to the methodology and methods of the scientific, interpretive, and critical research paradigms. Engl. Lang. Teach. 2012, 5, 9–16. [Google Scholar] [CrossRef] [Green Version]
- Wilson, J. Essentials of Business Research: A Guide to Doing Your Research Project; Sage: Thousand Oaks, CA, USA, 2014. [Google Scholar]
- Brynard, D.J.; Hanekom, S.X.; Brynard, P. Introduction to Research, 3rd ed.; Van Schaik: Pretoria, South Africa, 2014. [Google Scholar]
- Orlikowski, W.J.; Baroudi, J.J. Studying information technology in organizations: Research approaches and assumptions. Inf. Syst. Res. 1991, 2, 1–28. [Google Scholar] [CrossRef] [Green Version]
- Verdouwab, C.; Sundmaeker, H.; Tekinerdogana, B.; Conzon, D.; Montanaro, T. Architecture framework of IoT-based food and farm systems: A multiple case study. Comput. Electron. Agric. 2019, 165, 104939. [Google Scholar] [CrossRef]
- Baskarada, S. Qualitative case study guidelines. Qual. Rep. 2014, 19, 1–18. [Google Scholar]
- Bansal, S.; Kumar, D. IoT ecosystem: A Survey on devices, gateways, operating systems, middleware and communication. Int. J. Wirel. Inf. Netw. 2020, 27, 340–364. [Google Scholar]
- Ferdowsi, A.; Saad, W. Deep learning for signal authentication and security in massive Internet-of-Things systems. IEEE Trans. Commun. 2019, 67, 1371–1387. [Google Scholar] [CrossRef] [Green Version]
- Farris, I.; Taleb, T.; Khettab, Y.; Song, J. A survey on emerging SDN and NFV security mechanisms for IoT systems. IEEE Commun. Surv. Tuts. 2019, 21, 812–837. [Google Scholar] [CrossRef]
- Parvin, S.; Venkatraman, S.; de Souza-Daw, T.; Fahd, K.; Jackson, J.; Kaspi, S.; Cooley, N.; Saleem, K.; Gawanmeh, A. Smart Food Security System Using IoT and Big Data Analytics. In Proceedings of the 16th International Conference on Information Technology-New Generations (ITNG 2019); Advances in Intelligent Systems and Computing; Latifi, S., Ed.; Springer: Berlin/Heidelberg, Germany, 2019; Volume 800, pp. 253–258. [Google Scholar]
- Karmakar, K.K.; Varadharajan, V.; Tupakula, U.; Hitchens, M. Policy based security architecture for software defined networks. In Proceedings of the 31st Annual ACM Symposium on Applied Computing; ACM: New York, NY, USA, 2016; pp. 658–663. [Google Scholar]
- Pal, S.; Hitchens, M.; Varadharajan, V. Towards A Secure Access Control Architecture for the Internet of Things. In Proceedings of the IEEE 42nd Conference on Local Computer Networks (LCN), Singapore, 9–12 October 2017. [Google Scholar]
- Capellupo, M.; Liranzo, J.; Bhuiyan, M.Z.A.; Hayajneh, T.; Wang, G. Security and attack vector analysis of IoT devices. In Proceedings of the International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage; Springer: Berlin/Heidelberg, Germany, 2017; pp. 593–606. [Google Scholar]
- Fang, H.; Wang, X.; Hanzo, L. Learning-aided physical layer authentication as an intelligent process. IEEE Trans. Commun. 2019, 67, 2260–2273. [Google Scholar] [CrossRef] [Green Version]
- Xu, T.; Gao, D.; Dong, P.; Zhang, H.; Foh, C.H.; Chao, H.C. Defending against new-flow attack in sdn-based internet of things. IEEE Access 2017, 5, 3431–3443. [Google Scholar] [CrossRef]
- Parvin, S.; Gawanmeh, A.; Venkatraman, S.; Alwadi, A.; Al-Karak, J. Efficient Lightweight Mechanism for Node Authentication in WBSN. In Proceedings of the Advances in Engineering Technology & Sciences Multi-Conferences (ASET 2018), Dubai, UAE, 6–7 February 2018. [Google Scholar]
- Pongle, P.; Chavan, G. A survey: Attacks on RPL and 6LoWPAN in IoT. In Proceedings of the IEEE International Conference on Pervasive Computing (ICPC), Pune, India, 8–10 January 2015; pp. 1–6. [Google Scholar]
- Khan, F.I.; Hameed, S. Understanding security requirements and challenges in internet of things (IoTs): A review. J. Comp. Netw. Communic 2019, 9629381:1–9629381:14. [Google Scholar]
- Anirudh, M.; Thileeban, S.A.; Nallathambi, D.J. Use of honeypots for mitigating DoS attacks targeted on IoT networks. In Proceedings of the 2017 International Conference on Computer, Communication and Signal Processing (ICCCSP), Chennai, India, 10–11 January 2017; pp. 1–4. [Google Scholar]
- Lyu, M.; Sherratt, D.; Sivanathan, A.; Gharakheili, H.H.; Radford, A.; Sivaraman, V. Quantifying the reflective DDoS attack capability of household IoT devices. In Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks; ACM: New York, NY, USA, 2017; pp. 46–51. [Google Scholar]
- Pal, S.; Hitchens, M.; Varadharajan, V. Modeling Identity for the Internet of Things: Survey, Classification and Trends. In Proceedings of the 12th International Conference on Sensing Technology (ICST), Limerick, Ireland, 4–6 December 2018. [Google Scholar]
- Hesham, A.; Sardis, F.; Wong, S.; Mahmoodi, T.; Tatipamula, M. A simplified network access control design and implementation for m2m communication using sdn. In Proceedings of the Wireless Communications and Networking Conference Workshops (WCNCW), San Francisco, CA, USA, 19–22 March 2017; pp. 1–5. [Google Scholar]
- Lu, Y.; Ling, Z.; Zhu, S.; Tang, L. Sdtcp: Towards datacenter TCP congestion control with SDN for IoT applications. Sensors 2017, 17, 109. [Google Scholar] [CrossRef]
- Sanchez-Iborra, R.; Sánchez-Gómez, J.; Pérez, S.; Fernández, P.J.; Santa, J.; Hernández-Ramos, J.L.; Skarmeta, A.F. Enhancing lorawan security through a lightweight and authenticated key management approach. Sensors 2018, 18, 1833. [Google Scholar] [CrossRef] [Green Version]
- Bist, P.K.; Mekade, A.S.; Nair, A.M.; Chatterjee, M. Secure VPN server deployed on raspberry pi. J. Netw. Commun. Emerg. Technol. (Jncet.) 2018, 8, 27–31. [Google Scholar]
- Caldas-Calle, L.; Jara, J.; Huerta, M.; Gallegos, P. QoS evaluation of VPN in a Raspberry Pi devices over wireless network. In Proceedings of the 2017 International Caribbean Conference on Devices, Circuits and Systems (ICCDCS), Cozumel Roo, Mexico, 5–7 June 2017; pp. 125–128. [Google Scholar] [CrossRef]
- Feilner, M.; Graf, N. Beginning OpenVPN 2.0.9. Build and Integrate Virtual Private Networks Using OpenVPN; Packt Publishing: Birmingham, UK, 2009. [Google Scholar]
- Qiu, W.; Saleem, K.; Pham, M.; Halpern, M.; Beresford-Smith, B.; Overmars, A.; Dassanayake, K.; Thoms, G. Robust multipath links for wireless sensor networks in irrigation applications. In Proceedings of the 2007 3rd International Conference on Intelligent Sensors, Melbourne, Australia, 3–6 December 2007; pp. 95–100. [Google Scholar]
- Overmars, A. Communications Apparatus, System and Method. International Patent Publication No. WO/2010/132929, 2020. Available online: https://patentscope.wipo.int/search/en/detail.jsf?docId=WO2010132929 (accessed on 10 January 2020).
- Moreau, L. Sump Pump Water Level. Available online: http://instructables.com/id/Sump-pump-water-level-The-software (accessed on 15 January 2020).
- Vishwasrao. SMART Water Tank Monitoring System. IBM Developer Recipes; IBM: Armonk, NY, USA, 2017. [Google Scholar]
- Github. Available online: https://github.com/paulknewton/pi-tank-watcher (accessed on 15 January 2020).
- Sanchez-Iborra, R.; Maria-Dolores, C. State of the art in LP-WAN solutions for industrial IoT services. Sensors 2016, 16, 708. [Google Scholar] [CrossRef] [PubMed]
Device | VPN | IP Address |
---|---|---|
Gateway #1 | Server #1 | 192.168.0.1 |
Mobile Phone Monitor #1 | Client | 192.168.0.2 |
Water Tank #0.1 | Client | 192.168.0.3 |
Water Tank #0.N | Client | 192.168.0.x |
Water Tank #0.250 | Client | 192.168.0.251 |
Gateway #2 | Server #2 | 192.168.1.1 |
Mobile Phone Monitor #2 | Client | 192.168.1.2 |
Water Tank #1.1 | Client | 192.168.1.3 |
Water Tank #1.N | Client | 192.168.1.x |
Water Tank #1.250 | Client | 192.168.1.251 |
Gateway #10 | Server #10 | 192.168.9.1 |
Mobile Phone Monitor #10 | Client | 192.168.9.2 |
Water Tank #9.1 | Client | 192.168.9.3 |
Water Tank #9.N | Client | 192.168.9.x |
Water Tank #9.250 | Client | 192.168.9.251 |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Overmars, A.; Venkatraman, S. Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System. Technologies 2020, 8, 50. https://doi.org/10.3390/technologies8040050
Overmars A, Venkatraman S. Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System. Technologies. 2020; 8(4):50. https://doi.org/10.3390/technologies8040050
Chicago/Turabian StyleOvermars, Anthony, and Sitalakshmi Venkatraman. 2020. "Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System" Technologies 8, no. 4: 50. https://doi.org/10.3390/technologies8040050
APA StyleOvermars, A., & Venkatraman, S. (2020). Towards a Secure and Scalable IoT Infrastructure: A Pilot Deployment for a Smart Water Monitoring System. Technologies, 8(4), 50. https://doi.org/10.3390/technologies8040050