Journal of Mobile, Embedded and Distributed Systems, vol. V, no. 3, 2013ISSN 2067 – 4074www.jmeds.eu
The data and meta-data for products/things
might be stored in files inside the file system
memory layout and they will be encrypted with
the session key negotiated during the
authentication procedure.
We can mention also the need of security
outside the authentication, especially in the
banking field, where are some applications
that do not require users' authentication.
Generally, these applications are accessed
internally, by the bank employees, and the
access is provided from other applications,
based on single-sign-on principles. In such
situations, the security must be ensured
through restricted access rights on mainly
resources and by monitoring users' access
with the help of log files [1].
4. Conclusions
In 2020 there is estimation that will be 50
billion IoT devices in the market. At least all
the consumers of “Java enabled” and
Embedded Linux smart objects will be in the
main target group for open source solutions.
The smart objects are processing the data
collected from sensors and for instance, from
RFID tags/cards. The authentication process
is an important approach taking into account
NFC and RFID domains expansion.
Besides the authentication process of RFID
tags/cards by the IoT sensors, the paper
represents the basic know-how for developing
a proof of concept that will demonstrate how
the RFID/NFC tags/cards are written with
meta-data information, and then periodically
tags/cards
area
read
by
RFID/NFC
reader/writer devices (sensors), in order to do
the things tracking. The obtained information is
securely and collaborative aggregated into a
unified data model and processed using
distributed computing methodologies over “big
data”.
The proof of concept project results may
include:
- The formal models, architecture, REST/Web-services/communications protocols and M2M data-structures;
- The beta version of the software libraries that implement products/services tracking and clustering:
- sensor control using devices SDKs; the reading/writing of the data formats from/in RFID vicinity/proximity tags/cards and optionally, reading 2D barcodes of the products/services;
- “big data” processing and semantic parsing, via distributed computing model and implementation, using embedded devices/boards (Internet of Things „smart objects‟, e.g. Raspberry-PI board) for cloud micro-instance deployment and standard PCs/laptops;
- secure communications from sensors to „smart-objects‟ via IoT Service Gateways.
During the development of the proof of
concept project, we estimate that we will
create
pre-requisites
to
offer
Java
implementation for Smart Object API, to
enhance
the
existing
security
and
communications
protocols
for
REST
Interface/Web-services, and improvement of
M2M/IoT data models plus value added
services for existing and new IoT deployed
“silos”-es.
Acknowledgement
Parts of this paper were presented by the
authors at 6th International Conference on Security for Information Technology and Communications (SECITC'13), June 25-26,
2013, Bucharest, Romania.
References
128
- ↑ Ion Ivan, Cristian Ciurea – Security Aspects of Collaborative Banking Systems Applied in Economy, Journal of Mobile, Embedded and Distributed Systems, Vol. 3, No. 4, 2011, ISSN 2067–4074.