Secure store and forward proxy for dynamic IoT applications over M2M networks Articles uri icon

publication date

  • November 2016

start page

  • 389

end page

  • 397

issue

  • 4

volume

  • 62

international standard serial number (ISSN)

  • 0098-3063

electronic international standard serial number (EISSN)

  • 1558-4127

abstract

  • Internet of Things (IoT) applications are expected to generate a huge unforeseen amount of traffic flowing from Consumer Electronics devices to the network. In order to overcome existing interoperability problems, several standardization bodies have joined to bring a new generation of Machine to Machine (M2M) networks as a result of the evolution of wireless sensor/actor networks and mobile cellular networks to converged networks. M2M is expected to enable IoT paradigms and related concepts into a reality at a reasonable cost. As part of the convergence, several technologies preventing new IoT services to interfere with existing Internet services are flourishing. Responsive, message-driven, resilient and elastic architectures are becoming essential parts of the system. These architectures will control the entire data flow for an IoT system requiring sometimes to store, shape and forward data among nodes of a M2M network to improve network performance. However, IoT generated data have an important personal component since it is generated in personal devices or are the result of the observation of the physical world, so rises significant security concerns. This article proposes a novel opportunistic flexible secure store and forward proxy for M2M networks and its mapping to asynchronous protocols that guarantees data confidentiality(1).

keywords

  • machine to machine; internet of things; iot; privacy; encryption; to-machine communications; smart; management; zigbee; system