Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (49)

Search Parameters:
Keywords = publisher subscriber model

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
24 pages, 2001 KiB  
Article
Reliable Low-Latency Multicasting in MANET: A DTN7-Driven Pub/Sub Framework Optimizing Delivery Rate and Throughput
by Xinwei Liu and Satoshi Fujita
Information 2025, 16(6), 508; https://doi.org/10.3390/info16060508 - 18 Jun 2025
Viewed by 409
Abstract
This paper addresses the challenges of multicasting in Mobile Ad Hoc Networks (MANETs), where communication relies exclusively on direct interactions between mobile nodes without the support of fixed infrastructure. In such networks, efficient information dissemination is critical, particularly in scenarios where an event [...] Read more.
This paper addresses the challenges of multicasting in Mobile Ad Hoc Networks (MANETs), where communication relies exclusively on direct interactions between mobile nodes without the support of fixed infrastructure. In such networks, efficient information dissemination is critical, particularly in scenarios where an event detected by one node must be reliably communicated to a designated subset of nodes. The highly dynamic nature of MANET, characterized by frequent topology changes and unpredictable connectivity, poses significant challenges to stable and efficient multicasting. To address these issues, we adopt a Publish/Subscribe (Pub/Sub) model that utilizes brokers as intermediaries for information dissemination. However, ensuring the robustness of broker-based multicasting in a highly mobile environment requires novel strategies to mitigate the effects of frequent disconnections and mobility-induced disruptions. To this end, we propose a framework based on three key principles: (1) leveraging the Disruption-Tolerant Networking Implementations of the Bundle Protocol 7 (DTN7) at the network layer to sustain message delivery even in the presence of intermittent connectivity and high node mobility; (2) dynamically generating broker replicas to ensure that broker functionality persists despite sudden node failures or disconnections; and (3) enabling brokers and their replicas to periodically broadcast advertisement packets to maintain communication paths and facilitate efficient data forwarding, drawing inspiration from Named Data Networking (NDN) techniques. To evaluate the effectiveness of our approach, we conduct extensive simulations using ns-3, examining its impact on message delivery reliability, latency, and overall network throughput. The results demonstrate that our method significantly reduces message delivery delays while improving delivery rates, particularly in high-mobility scenarios. Additionally, the integration of DTN7 at the bundle layer proves effective in mitigating performance degradation in environments where nodes frequently change their positions. Our findings highlight the potential of our approach in enhancing the resilience and efficiency of broker-assisted multicasting in MANET, making it a promising solution for real-world applications such as disaster response, military operations, and decentralized IoT networks. Full article
(This article belongs to the Special Issue Wireless IoT Network Protocols, 3rd Edition)
Show Figures

Graphical abstract

25 pages, 5891 KiB  
Article
Discrete Event System Specification for IoT Applications
by Iman Alavi Fazel and Gabriel Wainer
Sensors 2024, 24(23), 7784; https://doi.org/10.3390/s24237784 - 5 Dec 2024
Cited by 1 | Viewed by 1070
Abstract
The Internet of Things (IoT) has emerged as a transformative technology with a variety of applications across various industries. However, the development of IoT systems is hindered by challenges such as interoperability, system complexity, and the need for streamlined development and maintenance processes. [...] Read more.
The Internet of Things (IoT) has emerged as a transformative technology with a variety of applications across various industries. However, the development of IoT systems is hindered by challenges such as interoperability, system complexity, and the need for streamlined development and maintenance processes. In this study, we introduce a robust architecture grounded in discrete event system specification (DEVS) as a model-driven development solution to overcome these obstacles. Our proposed architecture utilizes the publish/subscribe paradigm, and it also adds to the robustness of the proposed solution with the incorporation of the Brooks–Iyengar algorithm to enhance fault tolerance against unreliable sensor readings. We detail the DEVS specification that is used to define this architecture and validate its effectiveness through a detailed home automation case study that integrates multiple sensors and actuators. Full article
(This article belongs to the Special Issue Wireless Sensor Networks: Signal Processing and Communications)
Show Figures

Figure 1

18 pages, 3424 KiB  
Article
Architecture for Enhancing Communication Security with RBAC IoT Protocol-Based Microgrids
by SooHyun Shin, MyungJoo Park, TaeWan Kim and HyoSik Yang
Sensors 2024, 24(18), 6000; https://doi.org/10.3390/s24186000 - 16 Sep 2024
Cited by 4 | Viewed by 1704
Abstract
In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced. The components of a microgrid utilize various [...] Read more.
In traditional power grids, the unidirectional flow of energy and information has led to a decrease in efficiency. To address this issue, the concept of microgrids with bidirectional flow and independent power sources has been introduced. The components of a microgrid utilize various IoT protocols such as OPC-UA, MQTT, and DDS to implement bidirectional communication, enabling seamless network communication among different elements within the microgrid. Technological innovation, however, has simultaneously given rise to security issues in the communication system of microgrids. The use of IoT protocols creates vulnerabilities that malicious hackers may exploit to eavesdrop on data or attempt unauthorized control of microgrid devices. Therefore, monitoring and controlling security vulnerabilities is essential to prevent intrusion threats and enhance cyber resilience in the stable and efficient operation of microgrid systems. In this study, we propose an RBAC-based security approach on top of DDS protocols in microgrid systems. The proposed approach allocates roles to users or devices and grants various permissions for access control. DDS subscribers request access to topics and publishers request access to evaluations from the role repository using XACML. The overall implementation model is designed for the publisher to receive XACML transmitted from the repository and perform policy decision making and enforcement. By applying these methods, security vulnerabilities in communication between IoT devices can be reduced, and cyber resilience can be enhanced. Full article
(This article belongs to the Special Issue IoT Cybersecurity)
Show Figures

Figure 1

24 pages, 4205 KiB  
Article
Using Mixed Reality for Control and Monitoring of Robot Model Based on Robot Operating System 2
by Dominik Janecký, Erik Kučera, Oto Haffner, Erika Výchlopeňová and Danica Rosinová
Electronics 2024, 13(17), 3554; https://doi.org/10.3390/electronics13173554 - 6 Sep 2024
Cited by 1 | Viewed by 2037
Abstract
This article presents the design and implementation of an innovative human–machine interface (HMI) in mixed reality for a robot model operating within Robot Operating System 2 (ROS 2). The interface is specifically developed for compatibility with Microsoft HoloLens 2 hardware and leverages the [...] Read more.
This article presents the design and implementation of an innovative human–machine interface (HMI) in mixed reality for a robot model operating within Robot Operating System 2 (ROS 2). The interface is specifically developed for compatibility with Microsoft HoloLens 2 hardware and leverages the Unity game engine alongside the Mixed Reality Toolkit (MRTK) to create an immersive mixed reality application. The project uses the Turtlebot 3 Burger model robot, simulated within the Gazebo virtual environment, as a representative mechatronic system for demonstration purposes. Communication between the mixed reality application and ROS 2 is facilitated through a publish–subscribe mechanism, utilizing ROS TCP Connector for message serialization between nodes. This interface not only enhances the user experience by allowing for the real-time monitoring and control of the robotic system but also aligns with the principles of Industry 5.0, emphasizing human-centric and inclusive technological advancements. The practical outcomes of this research include a fully functional mixed reality application that integrates seamlessly with ROS 2, showcasing the potential of mixed reality technologies in advancing the field of industrial automation and human–machine interaction. Full article
(This article belongs to the Special Issue Advanced Industry 4.0/5.0: Intelligence and Automation)
Show Figures

Figure 1

27 pages, 5217 KiB  
Article
A Blockchain-Driven Smart Broker for Data Quality Assurance of the Tagged Periodic IoT Data in Publisher-Subscriber Model
by Rabbia Idrees and Ananda Maiti
Appl. Sci. 2024, 14(13), 5907; https://doi.org/10.3390/app14135907 - 5 Jul 2024
Viewed by 1952
Abstract
The Publisher-Subscriber model of data exchange has been a popular method for many Internet-based applications, including the Internet of Things (IoT). A traditional PS system consists of publishers, subscribers, and a broker. The publishers create new data for a registered topic, and the [...] Read more.
The Publisher-Subscriber model of data exchange has been a popular method for many Internet-based applications, including the Internet of Things (IoT). A traditional PS system consists of publishers, subscribers, and a broker. The publishers create new data for a registered topic, and the data broker relays the data to the corresponding subscribers. This paper introduces a blockchain-based smart broker for the publisher-subscriber (PS) framework for the IoT network. As IoT data comes from devices operating in various environments, it may suffer from multiple challenges, such as hardware failures, connectivity issues, and external vulnerabilities, thereby impacting data quality in terms of accuracy and timeliness. It is important to monitor this data and inform subscribers about its quality. The proposed smart broker is composed of multiple smart contracts that continuously monitor the quality of the topic data by assessing its relationship with other related topics and its drift or delay in publishing intervals. It assigns a reputation score to each topic computed based on its quality and drifts, and it passes both the original data and the reputation score as a measure of quality to the subscriber. Furthermore, the smart broker can suggest substitute topics to subscribers when the requested topic data are unavailable or of very poor quality. The evaluation shows that a smart broker efficiently monitors the reputation of the topic data, and its efficiency increases notably when the data quality is worse. As the broker is run inside the blockchain, it automatically inherits the advantages of the blockchain, and the quality scoring is indisputable based on immutable data. Full article
Show Figures

Figure 1

16 pages, 459 KiB  
Article
End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption
by Shi Lin, Li Cui and Niu Ke
Sensors 2024, 24(2), 438; https://doi.org/10.3390/s24020438 - 10 Jan 2024
Cited by 6 | Viewed by 3121
Abstract
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking [...] Read more.
In light of the existing security vulnerabilities within IoT publish–subscribe systems, our study introduces an improved end-to-end encryption approach using conditional proxy re-encryption. This method not only overcomes limitations associated with the reliance on a trusted authority and the challenge of reliably revoking users in previous proxy re-encryption frameworks, but also strengthens data privacy against potential collusion between the broker and subscribers. Through our innovative encryption protocol, unauthorized re-encryption by brokers is effectively prevented, enhancing secure communication between publisher and subscriber. Implemented on HiveMQ, an open-source MQTT platform, our prototype system demonstrates significant enhancements. Comparison to the state-of-the-art end-to-end encryption work, encryption overhead of our scheme is comparable to it, and the decryption cost is approximately half of it. Moreover, our solution significantly improves overall security without compromising the asynchronous communication and decentralized authorization foundational to the publish–subscribe model. Full article
(This article belongs to the Special Issue IoT Network Security)
Show Figures

Figure 1

16 pages, 5243 KiB  
Article
Publish/Subscribe Method for Real-Time Data Processing in Massive IoT Leveraging Blockchain for Secured Storage
by Mohammadhossein Ataei, Ali Eghmazi, Ali Shakerian, Rene Landry and Guy Chevrette
Sensors 2023, 23(24), 9692; https://doi.org/10.3390/s23249692 - 8 Dec 2023
Cited by 3 | Viewed by 5965
Abstract
In the Internet of Things (IoT) era, the surge in Machine-Type Devices (MTDs) has introduced Massive IoT (MIoT), opening new horizons in the world of connected devices. However, such proliferation presents challenges, especially in storing and analyzing massive, heterogeneous data streams in real [...] Read more.
In the Internet of Things (IoT) era, the surge in Machine-Type Devices (MTDs) has introduced Massive IoT (MIoT), opening new horizons in the world of connected devices. However, such proliferation presents challenges, especially in storing and analyzing massive, heterogeneous data streams in real time. In order to manage Massive IoT data streams, we utilize analytical database software such as Apache Druid version 28.0.0 that excels in real-time data processing. Our approach relies on a publish/subscribe mechanism, where device-generated data are relayed to a dedicated broker, effectively functioning as a separate server. This broker enables any application to subscribe to the dataset, promoting a dynamic and responsive data ecosystem. At the core of our data transmission infrastructure lies Apache Kafka version 3.6.1, renowned for its exceptional data flow management performance. Kafka efficiently bridges the gap between MIoT sensors and brokers, enabling parallel clusters of brokers that lead to more scalability. In our pursuit of uninterrupted connectivity, we incorporate a fail-safe mechanism with two Software-Defined Radios (SDR) called Nutaq PicoLTE Release 1.5 within our model. This strategic redundancy enhances data transmission availability, safeguarding against connectivity disruptions. Furthermore, to enhance the data repository security, we utilize blockchain technology, specifically Hyperledger Fabric, known for its high-performance attributes, ensuring data integrity, immutability, and security. Our latency results demonstrate that our platform effectively reduces latency for 100,000 devices, qualifying as an MIoT, to less than 25 milliseconds. Furthermore, our findings on blockchain performance underscore our model as a secure platform, achieving over 800 Transactions Per Second in a dataset comprising 14,000 transactions, thereby demonstrating its high efficiency. Full article
Show Figures

Figure 1

24 pages, 6283 KiB  
Article
E-MQTT: End-to-End Synchronous and Asynchronous Communication Mechanisms in MQTT Protocol
by Yerin Im and Mingyu Lim
Appl. Sci. 2023, 13(22), 12419; https://doi.org/10.3390/app132212419 - 16 Nov 2023
Cited by 4 | Viewed by 3213
Abstract
Message Queuing Telemetry Transport (MQTT) enables asynchronous confirmation of message reception by brokers but lacks a way for publishers to know when subscribers receive their messages without adding additional communication overhead. This paper addresses this problem by improving MQTT to establish end-to-end communication [...] Read more.
Message Queuing Telemetry Transport (MQTT) enables asynchronous confirmation of message reception by brokers but lacks a way for publishers to know when subscribers receive their messages without adding additional communication overhead. This paper addresses this problem by improving MQTT to establish end-to-end communication between a publisher and subscribers, reducing message exchanges, using what is called End-to-End MQTT (E-MQTT). In E-MQTT, a publisher sets the number of responses that it will wait for when it sends a message. After the broker collects the response messages from subscribers, it sends one aggregated response back to the publisher. The publisher also can receive the response message synchronously or asynchronously. Experimental results consistently show that E-MQTT outperforms traditional MQTT in terms of delay, especially when the publisher needs to monitor when its query message is received by subscribers. Although E-MQTT packets are slightly larger due to additional fields, the difference in packet size compared to MQTT is not significant. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes)
Show Figures

Figure 1

19 pages, 1456 KiB  
Article
Post-Quantum Authentication in the MQTT Protocol
by Juliet Samandari and Clémentine Gritti
J. Cybersecur. Priv. 2023, 3(3), 416-434; https://doi.org/10.3390/jcp3030021 - 31 Jul 2023
Cited by 11 | Viewed by 3431
Abstract
Message Queue Telemetry Transport (MQTT) is a common communication protocol used in the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to establish communication between multiple devices relying on the publish–subscribe model. However, the protocol does not provide authentication, [...] Read more.
Message Queue Telemetry Transport (MQTT) is a common communication protocol used in the Internet of Things (IoT). MQTT is a simple, lightweight messaging protocol used to establish communication between multiple devices relying on the publish–subscribe model. However, the protocol does not provide authentication, and most proposals to incorporate it lose their lightweight feature and do not consider the future risk of quantum attacks. IoT devices are generally resource-constrained, and postquantum cryptography is often more computationally resource-intensive compared to current cryptographic standards, adding to the complexity of the transition. In this paper, we use the postquantum digital signature scheme CRYSTALS-Dilithium to provide authentication for MQTT and determine what the CPU, memory and disk usage are when doing so. We further investigate another possibility to provide authentication when using MQTT, namely a key encapsulation mechanism (KEM) trick proposed in 2020 for transport level security (TLS). Such a trick is claimed to save up to 90% in CPU cycles. We use the postquantum KEM scheme CRYSTALS-KYBER and compare the resulting CPU, memory and disk usages with traditional authentication. We found that the use of KEM for authentication resulted in a speed increase of 25 ms, a saving of 71%. There were some extra costs for memory but this is minimal enough to be acceptable for most IoT devices. Full article
(This article belongs to the Section Security Engineering & Applications)
Show Figures

Figure 1

26 pages, 4455 KiB  
Article
A Blockchain-Centric IoT Architecture for Effective Smart Contract-Based Management of IoT Data Communications
by Abdulsalam S. Albulayhi and Ibrahim S. Alsukayti
Electronics 2023, 12(12), 2564; https://doi.org/10.3390/electronics12122564 - 6 Jun 2023
Cited by 12 | Viewed by 5466
Abstract
The exponential growth of the Internet of Things (IoT) is being witnessed nowadays in different sectors. This makes IoT data communications more complex and harder to manage. Addressing such a challenge using a centralized model is an ineffective approach and would result in [...] Read more.
The exponential growth of the Internet of Things (IoT) is being witnessed nowadays in different sectors. This makes IoT data communications more complex and harder to manage. Addressing such a challenge using a centralized model is an ineffective approach and would result in security and privacy difficulties. Technologies such as blockchain provide a potential solution to enable secure and effective management of IoT data communication in a distributed and trustless manner. In this paper, a novel lightweight blockchain-centric IoT architecture is proposed to address effective IoT data communication management. It is based on an event-driven smart contract that enables manageable and trustless IoT data exchange using a simple publish/subscribe model. To maintain system complexity and overhead at a minimum, the design of the proposed system relies on a single smart contract. All the system operations that enable effective IoT data communication among the different parties of the system are defined in the smart contract. There is no direct blockchain–IoT-device interaction, making the system more useable in wide IoT deployments incorporating IoT devices with limited computing and energy resources. A practical Ethereum-based implementation of the system was developed with the ability to simulate different IoT setups. The evaluation results demonstrated the feasibility and effectiveness of the proposed architecture. Considering varying-scale and varying-density experimental setups, reliable and secure data communications were achieved with little latency and resource consumption. Full article
(This article belongs to the Special Issue IoT in the Industry Revolution 4.0)
Show Figures

Figure 1

20 pages, 8425 KiB  
Article
Formalizing the Semantics of DDS QoS Policies for Improved Communications in Distributed Smart Grid Applications
by Alaa Alaerjan
Electronics 2023, 12(10), 2246; https://doi.org/10.3390/electronics12102246 - 15 May 2023
Cited by 2 | Viewed by 1837
Abstract
Quality communication is a major challenges in large-scale and distributed smart grid applications. Several protocols and middleware have been proposed to address communication quality issues in those applications. DDS is a standard data-centric middleware for publish/subscribe communication. It has been proposed for smart [...] Read more.
Quality communication is a major challenges in large-scale and distributed smart grid applications. Several protocols and middleware have been proposed to address communication quality issues in those applications. DDS is a standard data-centric middleware for publish/subscribe communication. It has been proposed for smart grid to address both connectivity and communication quality issues. DDS provides multiple quality of service (QoS) policies to address reliability, latency, and data availability. One of the main challenges in adopting the standard in smart grids is the complexity of adopting and tailoring its QoS policies. This is because those policies are described informally introducing ambiguities, which hinders the precise implementation of DDS. To address this, we formalize the descriptions of DDS QoS policies using the object constraint language (OCL). We also clearly defined the design structural relations among DDS entities and QoS policies. In the process, we analyzed the dependencies among QoS policies and we built clear and concise structural relations. We then proposed feature modeling and a management layer to facilitate QoS tuning and to reduce development and configuration complexity. We implemented the proposed approach in a simulated power consumption domain. The results show that the approach improves the development process. They also show that the approach significantly improves the performance of DDS-enabled applications. Full article
(This article belongs to the Special Issue Internet of Things for Smart Grid)
Show Figures

Figure 1

19 pages, 639 KiB  
Article
Efficient Non-DHT-Based RC-Based Architecture for Fog Computing in Healthcare 4.0
by Indranil Roy, Reshmi Mitra, Nick Rahimi and Bidyut Gupta
IoT 2023, 4(2), 131-149; https://doi.org/10.3390/iot4020008 - 10 May 2023
Cited by 6 | Viewed by 2877
Abstract
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier [...] Read more.
Cloud-computing capabilities have revolutionized the remote processing of exploding volumes of healthcare data. However, cloud-based analytics capabilities are saddled with a lack of context-awareness and unnecessary access latency issues as data are processed and stored in remote servers. The emerging network infrastructure tier of fog computing can reduce expensive latency by bringing storage, processing, and networking closer to sensor nodes. Due to the growing variety of medical data and service types, there is a crucial need for efficient and secure architecture for sensor-based health-monitoring devices connected to fog nodes. In this paper, we present publish/subscribe and interest/resource-based non-DHT-based peer-to-peer (P2P) RC-based architecture for resource discovery. The publish/subscribe communication model provides a scalable way to handle large volumes of data and messages in real time, while allowing fine-grained access control to messages, thus enabling heightened security. Our two − level overlay network consists of (1) a transit ring containing group-heads representing a particular resource type, and (2) a completely connected group of peers. Our theoretical analysis shows that our search latency is independent of the number of peers. Additionally, the complexity of the intra-group data-lookup protocol is constant, and the complexity of the inter-group data lookup is O(n), where n is the total number of resource types present in the network. Overall, it therefore allows the system to handle large data throughput in a flexible, cost-effective, and secure way for medical IoT systems. Full article
(This article belongs to the Special Issue Cloud and Edge Computing Systems for IoT)
Show Figures

Figure 1

16 pages, 421 KiB  
Article
Efficient Data Delivery Scheme for Large-Scale Microservices in Distributed Cloud Environment
by Van-Nam Pham, Md. Delowar Hossain, Ga-Won Lee and Eui-Nam Huh
Appl. Sci. 2023, 13(2), 886; https://doi.org/10.3390/app13020886 - 9 Jan 2023
Cited by 4 | Viewed by 2902
Abstract
The edge computing paradigm has emerged as a new scope within the domain of the Internet of Things (IoT) by bringing cloud services to the network edge in order to construct distributed architectures. To efficiently deploy latency-sensitive and bandwidth-hungry IoT application services, edge [...] Read more.
The edge computing paradigm has emerged as a new scope within the domain of the Internet of Things (IoT) by bringing cloud services to the network edge in order to construct distributed architectures. To efficiently deploy latency-sensitive and bandwidth-hungry IoT application services, edge computing paradigms make use of devices on the network periphery that are distributed and resource-constrained. On the other hand, microservice architectures are becoming increasingly popular for developing IoT applications owing to their maintainability and scalability advantages. Providing an efficient communication medium for large-scale microservice-based IoT applications constructed from small and independent services to cooperate to deliver value-added services remains a challenge. This paper introduces an event-driven communication medium that takes advantage of Edge–Cloud publish/subscribe brokers for microservice-based IoT applications at scale. Using the interaction model, the involved microservices can collaborate and exchange data through triggered events flexibly and efficiently without changing their underlying business logic. In the proposed model, edge brokers are grouped according to their similarities in event channels and the proximity of their geolocations, reducing the data delivery latency. Moreover, in the proposed system a technique is designed to construct a broker-based utility matrix with constraints in order to strike a balance between delay, relay traffic, and scalability while arranging brokers into proper clusters for efficient data delivery. Rigorous simulation results prove that the proposed publish/subscribe model can provide an efficient interaction medium for microservice-based IoT applications to collaborate and exchange data with low latency, modest relay traffic, and high scalability at scale. Full article
Show Figures

Figure 1

12 pages, 676 KiB  
Article
HOsT: Towards a Low-Cost Fog Solution via Smart Objects to Deal with the Heterogeneity of Data in a Residential Environment
by Geraldo P. Rocha Filho, Artur H. Brandão, Renato A. Nobre, Rodolfo I. Meneguette, Heitor Freitas and Vinícius P. Gonçalves
Sensors 2022, 22(16), 6257; https://doi.org/10.3390/s22166257 - 20 Aug 2022
Cited by 4 | Viewed by 1917
Abstract
With the fast and unstoppable development of technology, the amount of available technological devices and the data they produce is overwhelming. In analyzing the context of a smart home, a diverse group of intelligent devices generating constant reports of its environment information is [...] Read more.
With the fast and unstoppable development of technology, the amount of available technological devices and the data they produce is overwhelming. In analyzing the context of a smart home, a diverse group of intelligent devices generating constant reports of its environment information is needed for the proper control of the house. Due to this demand, many possible solutions have been developed in the literature to assess the need for processing power and storage capacity. This work proposes HOsT (home-context-aware fog-computing solution)—a solution that addresses the problems of data heterogeneity and the interoperability of smart objects in the context of a smart home. HOsT was modeled to compose a set of intelligent objects to form a computational infrastructure in fog. A publish/subscribe communication module was implemented to abstract the details of communication between objects to disseminate heterogeneous information. A performance evaluation was carried out to validate HOsT. The results show evidence of efficiency in the communication infrastructure; and in the impact of HOsT compared with a cloud infrastructure. Furthermore, HOsT provides scalability about the number of devices acting simultaneously and demonstrates its ability to work with different devices. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

16 pages, 929 KiB  
Article
Privacy-Enhanced MQTT Protocol for Massive IoT
by Axelle Hue, Gaurav Sharma and Jean-Michel Dricot
Electronics 2022, 11(1), 70; https://doi.org/10.3390/electronics11010070 - 27 Dec 2021
Cited by 14 | Viewed by 4335
Abstract
The growing expectations for ubiquitous sensing have led to the integration of countless embedded sensors, actuators, and RFIDs in our surroundings. Combined with rapid developments in high-speed wireless networks, these resource-constrained devices are paving the road for the Internet-of-Things paradigm, a computing model [...] Read more.
The growing expectations for ubiquitous sensing have led to the integration of countless embedded sensors, actuators, and RFIDs in our surroundings. Combined with rapid developments in high-speed wireless networks, these resource-constrained devices are paving the road for the Internet-of-Things paradigm, a computing model aiming to bring together millions of heterogeneous and pervasive elements. However, it is commonly accepted that the Privacy consideration remains one of its main challenges, a notion that does not only encompasses malicious individuals but can also be extended to honest-but-curious third-parties. In this paper, we study the design of a privacy-enhanced communication protocol for lightweight IoT devices. Applying the proposed approach to MQTT, a highly popular lightweight publish/subscribe communication protocol prevents no valuable information from being extracted from the messages flowing through the broker. In addition, it also prevents partners re-identification. Starting from a privacy-ideal, but unpractical, exact transposition of the Oblivious Transfer (OT) technology to MQTT, this paper follows an iterative process where each previous model’s drawbacks are appropriately mitigated all the while trying to preserve acceptable privacy levels. Our work provides resistance to statistical analysis attacks and dynamically supports new client participation. Additionally the whole proposal is based on the existence of a non-communicating 3rd party during pre-development. This particular contribution reaches a proof-of-concept stage through implementation, and achieves its goals thanks to OT’s indistinguishability property as well as hash-based topic obfuscations. Full article
(This article belongs to the Special Issue 10th Anniversary of Electronics: Advances in Networks)
Show Figures

Figure 1

Back to TopTop