A standardized approach to deal with firewall and mobility policies in the IoT

Internet of Things (IoT) is intended to provide a network where information flows could easily be set up between any kinds of products, devices, users and information systems in general. This vision is getting closer to become real due to the continuous development of new information system concepts and technologies. Nonetheless, this new reality requires special attention on particular aspects of the IoT such as security and mobility. First, people and companies want to secure their assets/data using firewalls, which inevitably leads to a challenging conflict between data security and usability. Second, products are becoming increasingly mobile, operating in environments where it can be difficult to contact them directly using their IP address (e.g., due to the presence of NAT or to access restrictions). It might therefore be necessary in some IoT applications to enable two-way communications through any type of firewall, e.g. to enable real-time control and maintenance. Quantum Lifecycle Management (QLM) messaging standards have been designed to provide generic and standardized application-level interfaces for the IoT that make it possible, among other things, to achieve such two-way communication. This paper provides a high-level description of QLM messaging standards with a particular focus on this QLM feature, along with proofs-of-concept through real-life implementations in building and automotive domains. A high-level description of new IoT standard named QLM ?is introduced.The QLM piggybacking property to deal with firewall and mobility policies is presented.A home automation case study dealing with firewall policies and using QLM is presented.A car automation case study dealing with mobility policies and using QLM is presented.

[1]  Vipul Gupta,et al.  Sizzle: a standards-based end-to-end security architecture for the embedded Internet , 2005, Third IEEE International Conference on Pervasive Computing and Communications.

[2]  Yu-Chee Tseng,et al.  Pervasive and Mobile Computing ( ) – Pervasive and Mobile Computing Review from Wireless Sensor Networks towards Cyber Physical Systems , 2022 .

[3]  K. Thoben,et al.  Extended Products: Evolving Traditional Product Concepts , 2001 .

[4]  Vassilis Kostakos,et al.  rfid in pervasive computing: State-of-the-art and outlook , 2009, Pervasive Mob. Comput..

[5]  Jan Holmström,et al.  Sustainable PLM through Intelligent Products , 2013, Eng. Appl. Artif. Intell..

[6]  Jan Holmström,et al.  Intelligent Products: A survey , 2009, Comput. Ind..

[7]  Arkady B. Zaslavsky,et al.  Sensing as a service model for smart cities supported by Internet of Things , 2013, Trans. Emerg. Telecommun. Technol..

[8]  Pedro Oliveira,et al.  Understanding Information Security Culture: A Survey in Small and Medium Sized Enterprises , 2014, WorldCIST.

[9]  Dimitris Kiritsis,et al.  Closed-loop PLM for intelligent products in the era of the Internet of things , 2011, Comput. Aided Des..

[10]  James Brusey,et al.  Requirements on unique identifiers for managing product lifecycle information: comparison of alternative approaches , 2007, Int. J. Comput. Integr. Manuf..

[11]  Sanjay E. Sarma,et al.  THE INTELLIGENT PRODUCT IN MANUFACTURING CONTROL AND MANAGEMENT , 2002 .

[12]  Athanasios V. Vasilakos,et al.  A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..

[13]  J Zhong Enforcing privacy via access control and data perturbation. , 2013 .

[14]  Paolo Bellavista,et al.  A survey of context data distribution for mobile ubiquitous systems , 2012, CSUR.

[15]  Mani B. Srivastava,et al.  Inference management, trust and obfuscation principles for quality of information in emerging pervasive environments , 2014, Pervasive Mob. Comput..

[16]  Erich M. Nahum,et al.  A study of Internet instant messaging and chat protocols , 2006, IEEE Network.

[17]  Ralph Johnson,et al.  design patterns elements of reusable object oriented software , 2019 .

[18]  Kary Främling,et al.  Tracking and tracing parcels using a distributed computing approach , 2003 .

[19]  Jan Holmström,et al.  Design patterns for managing product life cycle information , 2007, CACM.

[20]  Mukesh Taneja An analytics framework to detect compromised IoT devices using mobility behavior , 2013, 2013 International Conference on ICT Convergence (ICTC).

[21]  Xin Jin,et al.  SoftCell: scalable and flexible cellular core network architecture , 2013, CoNEXT.

[22]  Billy Rios,et al.  Hacking: The Next Generation , 2009 .

[23]  Sam Ruby,et al.  RESTful Web Services , 2007 .

[24]  Alexander Schill,et al.  A service infrastructure for the Internet of Things based on XMPP , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[25]  Ralph Barthel,et al.  Mobile interactions with digital object memories , 2013, Pervasive Mob. Comput..

[26]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[27]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[28]  Arie van Deursen,et al.  A Comparison of Push and Pull Techniques for AJAX , 2007, 2007 9th IEEE International Workshop on Web Site Evolution.

[29]  N. Gershenfeld,et al.  The Internet of Things , 2016 .

[30]  Hongming Cai,et al.  IoT-Based Configurable Information Service Platform for Product Lifecycle Management , 2014, IEEE Transactions on Industrial Informatics.

[31]  Sajal K. Das,et al.  Adaptive and context-aware privacy preservation exploiting user interactions in smart environments , 2014, Pervasive Mob. Comput..

[32]  Frank Salim,et al.  The Definitive Guide to HTML5 WebSocket , 2013, Apress.

[33]  Max Mühlhäuser,et al.  MundoCore: A light-weight infrastructure for pervasive computing , 2007, Pervasive Mob. Comput..

[34]  Zoran Budimac,et al.  Radigost: Interoperable web-based multi-agent platform , 2014, J. Syst. Softw..

[35]  Daniele Sgandurra,et al.  A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.

[36]  Ling Chen Application Perspectives for Active Safety System Based on Internet of Vehicles , 2013 .

[37]  Paul W. P. J. Grefen,et al.  A reference architecture for managing dynamic inter-organizational business processes , 2014, Data Knowl. Eng..

[38]  Franco Zambonelli,et al.  Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence , 2012, Pervasive Mob. Comput..

[39]  Anne-Marie Kermarrec,et al.  The many faces of publish/subscribe , 2003, CSUR.

[40]  Zoe Antoniou,et al.  P2P social networking for the rest of US , 2010, Pervasive Mob. Comput..

[41]  Bradford G. Nickerson,et al.  Communicating and Displaying Real-Time Data with WebSocket , 2012, IEEE Internet Computing.

[42]  Edith C. H. Ngai,et al.  Quality-of-information aware data collection for mobile sensor networks , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.

[43]  Kary Främling,et al.  QLM Messaging Standards: Introduction and Comparison with Existing Messaging Protocols , 2014, Service Orientation in Holonic and Multi-Agent Manufacturing and Robotics.

[44]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[45]  Lisa Veasman,et al.  Piggy Backing on the Web 2.0 Internet: Copyright Liability and Web 2.0 Mashups , 2008 .

[46]  John Stark,et al.  Product lifecycle management : 21st century paradigm for product realisation , 2005 .

[47]  Dong Zhou,et al.  Translation techniques in cross-language information retrieval , 2012, CSUR.

[48]  Diane J. Cook,et al.  Pervasive computing at scale: Transforming the state of the art , 2012, Pervasive Mob. Comput..

[49]  Arvind Meniya,et al.  Next Generation Mobile Application in Cloud Computing: using RESTful Web Service , 2012 .

[50]  Kary Främling,et al.  Standardized Communication Between Intelligent Products for the IoT* , 2013 .

[51]  Lida Xu,et al.  Internet of Things for Enterprise Systems of Modern Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[52]  Mohammed Samaka,et al.  Application delivery in multi-cloud environments using software defined networking , 2014, Comput. Networks.