Middleware Approach to Enhance the Security and Privacy in the Internet of Things

Middleware Approach to Enhance the Security and Privacy in the Internet of Things

Vikash (Indian Institute of Information Technology, Allahabad, India), Lalita Mishra (Indian Institute of Information Technology, Allahabad, India), and Shirshu Varma (Indian Institute of Information Technology, Allahabad, India)
Copyright: © 2020 |Pages: 24
DOI: 10.4018/978-1-7998-0373-7.ch007
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Internet of things is one of the most rapidly growing research areas. Nowadays, IoT is applicable in various diverse areas because of its basic feature i.e., anything would be available to anyone at anytime. Further, IoT aims to provide service in a pervasive environment, although different problems crop up when the researchers move towards pervasiveness. Security and Privacy are the most intense problems in the field of IoT. There are various approaches available to handle these issues: Architectural security, Database security, Secure communication, and Middleware approaches. This chapter's authors concentrate on middleware approach from the security and privacy perceptive. Middleware can provide security by separating the end user from the actual complex system. Middleware also hides the actual complexity of the system from the user. So, the user will get the seamless services with no threats to security or privacy. This chapter provides a brief overview of secure middlewares and suggests the current research gaps as future directions.
Chapter Preview
Top

Introduction

Internet of Things (IoT) is a combination of various technologies including sensors, actuators, embedded systems, cloud computing, next-generation of cheaper and smaller devices, objects, and things. Moreover, the researchers define IoT on the basis of its common characteristics, which involve the objects in the IoT scenario should be instrumented and interconnected to process anything intelligently and should be available to the end users anyhow, anywhere, anytime in anyway. Further, on the basis of IoT characteristics world can be categorize in four fundamental building blocks i.e., Radio Frequency IDentification (RFID), Machine to Machine communication (M2M), Wireless Sensor Networks (WSN), and Supervisory Control and Data Acquisition (SCADA), as shown in Figure 1 along with Internet. Further, these technologies are the building blocks of IoT. So, IoT automatically inherits the features and challenges existing in these technologies. Moreover, IoT evolved with various challenges as we move towards pervasiveness like Heterogeneity, Interoperability, Security, Privacy, Reliability etc., along with the preexisting issues.

IoT is the glue that tightens these four pillars through a common set of characteristics, networking methodology, and an abstract software layer middleware platform. The authors lend an abstracted view of these pillars along with level of applicability chronologically in IoT, which are as follows:

  • WSN (Internet of Objects): RFID is a low-cost, disposable contactless smartcard. RFID use radio waves for transmission of data from electronic chip attached to object to a dedicated system via a reader for tracking and identification the object. RFID tags are further categorized into two types of tags active and passive (Fujisaki, 2019).

  • Active RFID Tags: Active RFID tags are used to transmit the data continuously by using ID tags which are self-powered. These types of tags have their own battery, and use it to emit a signal with predefined strength in a time interval of about one second. Further, it can be divided into two types 1. Transponders awake and communicate when it come in the range of the reader. 2. Beacons used to broadcast its visibility continuously. So, the reader can communicate when it comes in the range.

  • Passive RFID Tags: These tags do not have any battery; the power is supplied by the reader for communication hence they have a long lifespan. Further, the radio waves from the reader are reflected to a passive RFID tag, the coiled antenna form a magnetic field within the tag, which draw a power from reader to energizing the circuits in the tag.

  • M2M (Internet of Devices): The Internet is just not only to communicate with people; it's more than the people percept. Nowadays, it is used intelligently to connect machines which must be able to communicate and interact with speeds, scales and capabilities beyond the original need and use of people. Further, IoT slowly unlock the various capabilities of Internet and making the world more agile and functional via M2M and other protocols. It uses devices (e.g., vehicle, mobile gadget) to collect the data through the networks and forward to central processing unit, which translate this data into meaningful information to provide knowledge about the system. Additionally, the technology has developed into the mobile environment to further improvement in various areas of communications (Althumali, 2018).

Figure 1.

Building blocks of IoT

978-1-7998-0373-7.ch007.f01

Complete Chapter List

Search this Book:
Reset