Increasing the pervasiveness of the IoT: fog computing coupled with pub&sub and security

People are increasingly surrounded by a connected world, where they can gather and share information everywhere, at anytime, and by means of a variety of devices, belonging to the so-called Internet of Things (IoT) network. IoT technologies and applications are spreading in different scenarios, ranging from every-day life activities to business ones. The presence of a huge amount of data, continuously transmitted over the network, brings relevant issues in terms of scalability. Hence, a proper network infrastructure must be put in action, in order to efficiently manage the information. A middleware layer could be a potential solution for overcoming such an issue, and to cope with interoperability. In literature, many architectures have been proposed in the last years, but little attention has been paid to how to decentralize as much as possible all the network’s components and tasks, in order to cover a wider area, avoiding single points of failure, while guaranteeing efficiency. Moreover, the interest of different stakeholders is not adequately considered yet. In this sense, fog computing represents a viable approach, which is adopted in this paper for the realization of a highly distributed and security-aware IoT middleware, aimed at operating without the need of a central coordinating unit and at allowing the participation of multiple stakeholders in the same IoT infrastructure. The proposed solution exploits the functionalities provided by the MQTT protocol, and its potentialities, besides the architectural features, are evaluated by means of a simple yet real test-bed, in terms of computing effort and latency.

[1]  Daniele Miorandi,et al.  Internet of Things: Security in the Keys , 2016, Q2SWinet@MSWiM.

[2]  Mingzhe Jiang,et al.  Exploiting smart e-Health gateways at the edge of healthcare Internet-of-Things: A fog computing approach , 2018, Future Gener. Comput. Syst..

[3]  Omar H. Alhazmi,et al.  Performance Analysis of the Hybrid IoT Security Model of MQTT and UMA , 2020, ArXiv.

[4]  Jeannie R. Albrecht,et al.  Smart * : An Open Data Set and Tools for Enabling Research in Sustainable Homes , 2012 .

[5]  Panita Pongpaibool,et al.  Authorization mechanism for MQTT-based Internet of Things , 2016, 2016 IEEE International Conference on Communications Workshops (ICC).

[6]  Daniele Miorandi,et al.  Dynamic Policies in Internet of Things: Enforcement and Synchronization , 2017, IEEE Internet of Things Journal.

[7]  Rong Yu,et al.  Privacy-Preserved Pseudonym Scheme for Fog Computing Supported Internet of Vehicles , 2018, IEEE Transactions on Intelligent Transportation Systems.

[8]  Giovanni Emanuele Corazza,et al.  Introducing the QEST broker: Scaling the IoT by bridging MQTT and REST , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[9]  Raja Lavanya,et al.  Fog Computing and Its Role in the Internet of Things , 2019, Advances in Computer and Electrical Engineering.

[10]  Schahram Dustdar,et al.  EMMA: Distributed QoS-Aware MQTT Middleware for Edge Computing Applications , 2018, 2018 IEEE International Conference on Cloud Engineering (IC2E).

[11]  Mohsen Guizani,et al.  Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.

[12]  Guojun Wang,et al.  Secure VANETs: Trusted Communication Scheme Between Vehicles and Infrastructure Based on Fog Computing , 2019, Studies in Informatics and Control.

[13]  Hannu Tenhunen,et al.  End-to-end security scheme for mobility enabled healthcare Internet of Things , 2016, Future Gener. Comput. Syst..

[14]  Ricardo Neisse,et al.  Enforcement of security policy rules for the Internet of Things , 2014, 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[15]  Daniele Miorandi,et al.  Security towards the edge: Sticky policy enforcement for networked smart objects , 2017, Inf. Syst..

[16]  Roch H. Glitho,et al.  A Comprehensive Survey on Fog Computing: State-of-the-Art and Research Challenges , 2017, IEEE Communications Surveys & Tutorials.

[17]  Daniele Miorandi,et al.  A secure and quality-aware prototypical architecture for the Internet of Things , 2016, Inf. Syst..

[18]  Daniele Miorandi,et al.  AUPS: An Open Source AUthenticated Publish/Subscribe system for the Internet of Things , 2016, Inf. Syst..

[19]  Sridhar Radhakrishnan,et al.  Towards SDN-based fog computing: MQTT broker virtualization for effective and reliable delivery , 2016, 2016 8th International Conference on Communication Systems and Networks (COMSNETS).

[20]  Victor-Valeriu Patriciu,et al.  Secure Threat Information Exchange across the Internet of Things for Cyber Defense in a Fog Computing Environment , 2016 .

[21]  Victor I. Chang,et al.  A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments , 2018, Comput. Secur..

[22]  Gunasekaran Manogaran,et al.  Centralized Fog Computing Security Platform for IoT and Cloud in Healthcare System , 2018 .