A Cross-Device Architecture for Modelling Authentication Features in IoT Applications

The Internet of Things has presented a rapid development, due to the over-crowding of hardware and software platforms, greater deployment of communications networks, development of data analysis tools, among others. This development has led to a boom in applications focused on areas as varied as Smart Cities, Smart Agro, Smart Buildings, Smart Home, and Smart Health, in which people and things are interconnected. This is one of the reasons by which a review of the main technologies involved in the emergence of the Internet of Things must be carried out to determine those characteristics allowing that interconnection, but without neglecting security. This issue allows the user to feel con dent to use these new services. In this work, we propose a cross-device architecture that integrates technologies and implementations in homes, and uses basic authentication as a security scheme. To validate the cross-device proposal, a case study scenario has been designed, including and integrating digital-TV (DTV), Smart Phones and wearables devices for monitoring users physical activity.

[1]  Yue Xu,et al.  A unified face identification and resolution scheme using cloud computing in Internet of Things , 2018, Future Gener. Comput. Syst..

[2]  Mimoun Moussaoui,et al.  MDA Approach to Automate Code Generation for Mobile Applications , 2016 .

[3]  Alberto Rodrigues da Silva,et al.  Evaluation of XIS-Mobile, a Domain Specific Language for Mobile Application Development , 2014 .

[4]  Daladier Jabba,et al.  Applications Based on Service-Oriented Architecture (SOA) in the Field of Home Healthcare , 2017, Sensors.

[5]  Vicente García-Díaz,et al.  Midgar: Domain-Specific Language to Generate Smart Objects for an Internet of Things Platform , 2014, 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[6]  Andrea Bosin An SOA-Based Model for the Integrated Provisioning of Cloud and Grid Resources , 2012, Adv. Softw. Eng..

[7]  Mahmoud Ammar,et al.  Journal of Information Security and Applications , 2022 .

[8]  Yann Bachy,et al.  Smart-TV Security Analysis: Practical Experiments , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[9]  Darwin Alulema,et al.  A DSL for the Development of Heterogeneous Applications , 2017, 2017 5th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW).

[10]  Zuohua Ding,et al.  Online Prediction and Improvement of Reliability for Service Oriented Systems , 2016, IEEE Transactions on Reliability.

[11]  Luca Mainetti,et al.  A Software Architecture Enabling the Web of Things , 2015, IEEE Internet of Things Journal.

[12]  Marilyn Wolf,et al.  Safety and Security in Cyber-Physical Systems and Internet-of-Things Systems , 2018, Proceedings of the IEEE.

[13]  Luis E. Anido-Rifón,et al.  An Open Architecture to Support Social and Health Services in a Smart TV Environment , 2017, IEEE Journal of Biomedical and Health Informatics.

[14]  Alok Mishra,et al.  Simplified software inspection process in compliance with international standards , 2009, Comput. Stand. Interfaces.

[15]  Victor I. Chang,et al.  Computationally efficient privacy preserving authentication and key distribution techniques for vehicular ad hoc networks , 2017, Cluster Computing.

[16]  Antonio Vallecillo,et al.  Model-driven performance analysis of rule-based domain specific visual models , 2013, Inf. Softw. Technol..

[17]  Glenn R. Cook,et al.  New Pathways in Identity Management , 2010, IEEE Security & Privacy.

[18]  Chin-Yu Huang,et al.  Optimal Weighted Combinational Models for Software Reliability Estimation and Analysis , 2014, IEEE Transactions on Reliability.

[19]  Danilo Suiama,et al.  A Method for Identifying and Analyzing Authentication Mechanisms and a Case Study , 2011 .

[20]  Bin Ren,et al.  Medical Monitoring and Managing Application of the Information Service Cloud System Based on Internet of Things , 2014, J. Softw..

[21]  Jianli Pan,et al.  Future Edge Cloud and Edge Computing for Internet of Things Applications , 2018, IEEE Internet of Things Journal.

[22]  James M. Bieman,et al.  How Software Designs Decay: A Pilot Study of Pattern Evolution , 2007, First International Symposium on Empirical Software Engineering and Measurement (ESEM 2007).

[23]  N. Jeyanthi,et al.  Security Breaches and Threat Prevention in the Internet of Things , 2017 .

[24]  Mazliza Othman,et al.  Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..

[25]  Kyung Sup Kwak,et al.  An Internet of Things-based health prescription assistant and its security system design , 2017, Future Gener. Comput. Syst..

[26]  Alok Mishra,et al.  Software quality assurance models in small and medium organisations: a comparison , 2006, Int. J. Inf. Technol. Manag..