Utilising the Tor Network for IoT Addressing and Connectivity

For Internet of Things (IoT) devices and cyber-physical systems (CPS), it is required to connect them securely and reliably to some form of cloud environment or computing entity for control, management and utilisation. The Internet is a suitable, standardized, and proven means for the connection of IoT devices in various scenarios. Connection over the Internet utilises existing protocols, standards, technologies and avoids investment in new, specialised concepts. Thereby, this connection requires a transparent addressing schema which is commonly TCP/IP, using domain names and IP addresses. However, in industrial, commercial and private networks, the addressability and connectability/connectivity is often limited by firewalls, proxies and router configurations utilising NAT. Thus, the present network configurations hinder the establishment of connections between IoT devices across different locations. Therefore, the method for connecting IoT devices in a client-server configuration proposed herein utilises the Tor (previously: The onion router/routing) network for addressing of and secured communication to IoT and CPS devices. It is an overlay protocol that was designed to allow for robust and anonymous communication. The benefit of this approach is to enable addressability and connectivity of IoT devices in firewalled and potentially unknown and changing network environments, thus allowing for IoT devices to be used reliably behind firewalls as long as outgoing communication is not

[1]  Mohamed Ali Kâafar,et al.  Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.

[2]  Frank Leymann,et al.  Comparison of IoT platform architectures: A field study based on a reference architecture , 2016, 2016 Cloudification of the Internet of Things (CIoT).

[3]  Frank Leymann,et al.  Internet of Things Patterns for Devices , 2017 .

[4]  Frank Leymann,et al.  OpenTOSCA for the 4th Industrial Revolution: Automating the Provisioning of Analytics Tools based on Apache Flink , 2016, IOT.

[5]  Roger Dingledine,et al.  Methodically Modeling the Tor Network , 2012, CSET.

[6]  Frank Leymann,et al.  From Pattern Languages to Solution Implementations , 2014 .

[7]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[8]  Frank Leymann,et al.  Internet of things patterns , 2016, EuroPLoP.

[9]  Ramzi A. Haraty,et al.  The TOR data communication system , 2014, Journal of Communications and Networks.

[10]  Jie Wu,et al.  Survey on anonymous communications in computer networks , 2010, Comput. Commun..

[11]  Wolfgang Mahnke,et al.  OPC UA - Service-oriented Architecture for Industrial Applications , 2006, Softwaretechnik-Trends.

[12]  Frank Leymann,et al.  Requirements and Enforcement Points for Policies in Industrial Data Sharing Scenarios , 2017 .

[13]  Dieter Roller,et al.  Universal API for 3D printers , 2016, GI-Jahrestagung.

[14]  Dieter Roller,et al.  Abstract API for 3D printing hardware and software resources , 2017 .

[15]  Sebastian Hudert,et al.  Industrial Data Sharing with Data Access Policy , 2017, CDVE.