Figure 5 - uploaded by Diego Rivera
Content may be subject to copyright.
Sequence diagram for Requesting Party Token (RPT) validation. DB: Database; MRF: Manufacturer; SN: serial number. 

Sequence diagram for Requesting Party Token (RPT) validation. DB: Database; MRF: Manufacturer; SN: serial number. 

Source publication
Article
Full-text available
Internet growth has generated new types of services where the use of sensors and actuators is especially remarkable. These services compose what is known as the Internet of Things (IoT). One of the biggest current challenges is obtaining a safe and easy access control scheme for the data managed in these services. We propose integrating IoT devices...

Contexts in source publication

Context 1
... process will start with an IoT device which is not provided with a validated RPT, and will also be performed if the RPT is rejected when trying to stablish an authorized connection (see step 5 in Section 3.2.3). In Figure 5 we show the requests and responses used during this process, and they are further explained ...
Context 2
... process will start with an IoT device which is not provided with a validated RPT, and will also be performed if the RPT is rejected when trying to stablish an authorized connection (see step 5 in Section 3.2.3). In Figure 5 we show the requests and responses used during this process, and they are further explained ...

Similar publications

Conference Paper
Full-text available
A comprehensive design of the baseline control and navigation system for a single-jet-engined flutter demonstrator aircraft is presented in this paper. To facilitate the design task, a classical cascaded flight control structure is selected. Advanced robust control techniques are used to design and tune the individual feedback loops of the control...
Article
Full-text available
The model-based flight control system design for a highly flexible flutter demonstrator, developed in the European FLEXOP project, is presented. The flight control system includes a baseline controller to operate the aircraft fully autonomously and a flutter suppression controller to stabilize the unstable aeroelastic modes and extend the aircraft’...
Article
Full-text available
In this paper, the aerodynamic model, machine model, converter model and control model of Doubly-Fed Induction Generator (DFIG) are introduced. The simulation model of DFIG system is established in ADPSS by a self-defined mathematics module. The simulation results show that the control target is achieved and the best speed of rotor can still be mai...
Article
Full-text available
A design of industrial control system is a complex process which is usually divided into specific design steps. Results from antecedent step are generally inputs for the next step and there could be also other influences among steps. So there is a strong dataflow within an automation project especially if the range of designed system is large from...
Article
Full-text available
Active damping methods are used for resonance damping in grid-connected inverters with LCL filter. In microgrids, parallel grid-connected inverters are coupled due to grid impedance introducing multiple resonances. In general, such coupling effect is not taken into account for modeling and controller design. For single grid-connected inverter, desp...

Citations

... Concerns have been raised about privacy and the misuse of technology in smart homes [3]. Because smart homes are grid-compatible, electronic devices run on energy; additionally, smart grids are synchronized with internal power units [4]. In order to reduce the energy consumption of smart homes, the need and supply of electrical power must be synchronized. ...
Article
Full-text available
Electronic gadget advancements have increased the demand for IoT-based smart homes as the number of connected devices grows rapidly. The most prevalent connected electronic devices are smart environments in houses, grids, structures, and metropolises. Smart grid technology advancements have enabled smart structures to cover every nanosecond of energy use. The problem with smart, intelligent operations is that they use a lot more energy than traditional ones. Because of the growing growth of smart cities and houses, there is an increasing demand for efficient resource management. Energy is a valuable resource with a high unit cost. Consequently, authors are endeavoring to decrease energy usage, specifically in smart urban areas, while simultaneously ensuring a consistent terrain. The objective of this study is to enhance energy efficiency in intelligent buildings for both homes and businesses. For the comfort indicator ("thermal, visual, and air quality"), three parameters are used: temperature, illumination, and CO2. A hybrid rule-based Deep Neural Network (DNN) and Fire Fly (FF) algorithm are used to read the sensor parameters and to operate the comfort indication, as well as optimize energy consumption, respectively. The anticipated user attributes contributed to the system's enhanced performance in terms of the ease of use of the smart system and its energy usage. When compared to traditional approaches in expressions of Multi View with 98.23%, convolutional neural network (CNN) with 99.17%, and traffic automatic vehicle (AV) with 98.14%, the activities of the contributed approach are negligibly commanding.
... Krishnan et al. (2022) presented an affordable, competent, fully functional, innovative ventilator system using IoT [8]. Cruz-Piris et al. (2018) proposed an access control mechanism for IoT environments based on modeling communication procedures as resources [9]. Penzenstadler et al. (2018) introduced an affordable DIY resilient smart garden kit using IoT. ...
Article
Full-text available
Purpose: To trigger the electrical switchboard by the kids not only harmful but also life risk. We always keep our kids away from it. We take lots of precautions not to touch it anyway. However, sometimes we need to operate electrical loads like a fan, TV, etc., by our kids when we are engaged with another essential task. We know it is unsafe, but sometimes we do. Here we demonstrate how to create a switchboard for kids to turn on/off the bedroom electrical load safely. We created an electrically isolated switchboard for them. It operates using small batteries and has no electrical connection with high-voltage AC. It is fixed on the wall using glue inside the kid's reachable area. It is entirely IoT based. When Kids press any switch, the ESP module sense and upload the corresponding command to the AWS shadow register. Then, AWS sends the updated content to the MQTT client running in another ESP module connected to all electrical equipment. According to the command module, turn the equipment on/off. The Code is available on GitHub to continue the research work. Design/Methodology/Approach: we installed some feather-touch soft switches inside the system. All buttons are connected with NodeMcu (ESP Module) GPIO. The complete tiny module may be fixed beside the Bed. We need two nos. AAA battery as a power supply to run the miniature system. Turn on the system. It will try to communicate with the nearest configured wifi router. If the wifi connection is OK, it will try connecting with the AWS IoT server using the hardcoded configuration profile inside the “secret. h” file. After successfully connecting with the AWS IoT server, the ESP module is ready to send the command. On the other hand, another Wifi module is connected to all electrical equipment. When powered up, it tries to communicate with the AWS IoT server through the internet using connected Wifi. Once connected, it is ready to receive the command to trigger the load. Findings/Result: The described procedure is a unique application of an electrical switchboard that kids will use. We tested it in real life. It is working well. The AWS IoT is also a secure and robust, and cheap solution. So recurring cost to operate the device is as low as possible. The automation researcher or enthusiast can replace traditional switchboards with IoT-based intelligent devices for our daily life operations. Originality/Value: We designed a switchboard for kids differently using the latest emerging technology IoT. The traditional electrical switchboard is unsafe for kids, but this technology is better and completely safe. So we can quickly adapt to our modern lifestyle. Paper Type: Experimental-based Research.
... Krishnan et al. (2022) presented an affordable, competent, fully functional, innovative ventilator system using IoT [8]. Cruz-Piris et al. (2018) proposed an access control mechanism for IoT environments based on modeling communication procedures as resources [9]. Penzenstadler et al. (2018) introduced an affordable DIY resilient smart garden kit using IoT. ...
Article
Full-text available
Purpose: To trigger the electrical switchboard by the kids not only harmful but also life risk. We always keep our kids away from it. We take lots of precautions not to touch it anyway. However, sometimes we need to operate electrical loads like a fan, TV, etc., by our kids when we are engaged with another essential task. We know it is unsafe, but sometimes we do. Here we demonstrate how to create a switchboard for kids to turn on/off the bedroom electrical load safely. We created an electrically isolated switchboard for them. It operates using small batteries and has no electrical connection with high-voltage AC. It is fixed on the wall using glue inside the kid's reachable area. It is entirely IoT based. When Kids press any switch, the ESP module sense and upload the corresponding command to the AWS shadow register. Then, AWS sends the updated content to the MQTT client running in another ESP module connected to all electrical equipment. According to the command module, turn the equipment on/off. The Code is available on GitHub to continue the research work. Design/Methodology/Approach: we installed some feather-touch soft switches inside the system. All buttons are connected with NodeMcu (ESP Module) GPIO. The complete tiny module may be fixed beside the Bed. We need two nos. AAA battery as a power supply to run the miniature system. Turn on the system. It will try to communicate with the nearest configured wifi router. If the wifi connection is OK, it will try connecting with the AWS IoT server using the hardcoded configuration profile inside the “secret. h” file. After successfully connecting with the AWS IoT server, the ESP module is ready to send the command. On the other hand, another Wifi module is connected to all electrical equipment. When powered up, it tries to communicate with the AWS IoT server through the internet using connected Wifi. Once connected, it is ready to receive the command to trigger the load. Findings/Result: The described procedure is a unique application of an electrical switchboard that kids will use. We tested it in real life. It is working well. The AWS IoT is also a secure and robust, and cheap solution. So recurring cost to operate the device is as low as possible. The automation researcher or enthusiast can replace traditional switchboards with IoT-based intelligent devices for our daily life operations. Originality/Value: We designed a switchboard for kids differently using the latest emerging technology IoT. The traditional electrical switchboard is unsafe for kids, but this technology is better and completely safe. So we can quickly adapt to our modern lifestyle. Paper Type: Experimental-based Research.
... Communication protocols for IoT include HyperText Transfer Protocol (HTTP), Constrained Application Protocol (CoAP) and MQTT a client-server, broker-based publish/subscribe messaging protocol which are means for providing lightweight data transport [2], [4], [11], with several IoT protocols being published by the Organization for the Advancement of Structured Information Standards (OASIS) [8], [12]. ...
Chapter
Full-text available
The Internet of Things (IoT) is viewed as the umbrella under which heterogeneous devices are connected to form what is called the network of the future (NoF). In the IoT era, all objects and devices are instrumented, interconnected, and interacted with each other in a smart manner. Those smart Things gather huge amounts of data from the real world and stream them up to the digital services running in the cloud. This paper; however, attempts to demonstrate practically that the Internet of Things is more than just connecting the cyber and physical worlds, but it may also improve the performance of existing systems and applications drastically if its concepts were used efficiently. Many different types of communication systems and networks might benefit from the efficient utilization of IoT concepts, being architectural concepts, communication models, or key IoT-enabling technologies.
... AC rules outline the way a domain works with information and resources, and once they are created the domain's AC policy is customized [7,8]. In today's digital environment, IoT and industry 4.0, users need effective protection for their resources distributed everywhere, and their ability to access information anytime, and from anywhere [9][10][11][12]. Consequently, the evolution of AC policy languages should follow the development of computing environments and information systems (IS) [13,14]. ...
Article
Full-text available
Access to resources can take many forms: digital access via an onsite network, through an external site, website, etc., or physical access to labs, machines, information repositories, etc. Whether access to resources is digital or physical, it must be allowed, denied, revoked, or disabled using robust and coherent access control (AC) models. What makes the process of AC more complicated is the emergence of digital transformation technologies and pervasive systems such as the internet of things (IoT) and industry 4.0 systems, especially with the growing demand for transparency in users’ interaction with various applications and services. Controlling access and ensuring security and cybersecurity in IoT and industry 4.0 environments is a challenging task. This is due to the increasing distribution of resources and the massive presence of cyber-threats and cyber-attacks. To ensure the security and privacy of users in industry sectors, we need an advanced AC metamodel that defines all the required components and attributes to derive various instances of AC models and follow the new and increasing demand for AC requirements due to continuous technology upgrades. Due to the several limitations in the existing metamodels and their inability to answer the current AC requirements, we have developed a Hierarchical, Extensible, Advanced, Dynamic (HEAD) AC metamodel with significant features that overcome the existing metamodels’ limitations. In this paper, the HEAD metamodel is employed to specify the needed AC policies for two case studies inspired by the computing environment of Institut Technologique de Maintenance Industrielle (ITMI)-Sept-Îles, QC, Canada; the first is for ITMI’s local (non-IoT) environment and the second for ITMI’s IoT environment. For each case study, the required AC model is derived using the domain-specific language (DSL) of HEAD metamodel, then Xtend notation (an expressive dialect of Java) is utilized to generate the needed Java code which represents the concrete instance of the derived AC model. At the system level, to get the needed AC rules, Cypher statements are generated and then injected into the Neo4j database to represent the Next Generation Access Control (NGAC) policy as a graph. NGAC framework is used as an enforcement point for the rules generated by each case study. The results show that the HEAD metamodel can be adapted and integrated into various local and distributed environments. It can serve as a unified framework, answer current AC requirements and follow policy upgrades. To demonstrate that the HEAD metamodel can be implemented on other platforms, we implement an administrator panel using VB.NET and SQL.
... One of the major concerns of this model is its usability on mobile devices and not considering the context during the evaluation of the access permission process. Capability propagation and revocation are also an issue that needs to be tackled [2,5,6,18,34,38,46,48]. ...
Article
Full-text available
In the last few years, Internet of Things (IoT) and Blockchain (BC) technology have been ruling their respective research area. The integration of IoT and Blockchain enables delivering many effective and prominent services by incorporating in-built features like scalability, flexibility, and resilience along with availability and integrity. However, taking into account the constrained nature of IoT devices, it’s quite hard to implement BC peers on top of IoT devices. Additionally, the rate at which transactions are produced by a huge number of constrained devices, BC could not handle effectively. The proposed work presented a solution to cater to these challenges. It incorporates the Interplanetary File System (IPFS) for the distribution of resources generated by IoT devices. The proposed system is based on the Hyperledger Fabric BC framework and comprises smart contracts that are accountable for policy definition, policy enforcement, user identity management, and data retrieval. The experimental results illustrate that the running time taken by smart contract methods of the proposed solution is fairly less than the prominent work in the same domain. The performance evaluation clearly depicts how effectively the presented model achieves Confidentiality, Availability, Integrity, and prevents DoS and DDoS attacks.
... The operations permitted on an IoT device are accessing the data from the devices or sending new control messages to the devices. The sending of new control messages can also be called a "Write" operation while accessing the device data can be termed as a "read" operation [45]. The nature of access demanded by a user is mentioned in this access type (A) field. ...
Article
Full-text available
The connected or smart environment is the integration of smart devices (sensors, IoT devices, or actuator) into the Internet of Things (IoT) paradigm, in which a large number of devices are connected, monitoring the physical environment and processes and transmitting into the centralized database for advanced analytics and analysis. This integrated and connected setup allows greater levels of automation of smart systems than is possible with just the Internet. While delivering services to the different processes and application within connected smart systems, these IoT devices perform an impeccably large number of device-to-device communications that allow them to access the selected subsets of device information and data. The sensitive and private nature of these data renders the smart infrastructure vulnerable to copious attacks which threat agents exploit for cyberattacks which not only affect critical services but probably bring threat to people’s lives. Hence, advanced measures need to be taken for securing smart environments, such as dynamic access control, advanced network screening, and monitoring behavioural anomalies. In this paper, we have discussed the essential cyberthreats and vulnerabilities in smart environments and proposed ZAIB (Zero-Trust and ABAC for IoT using Blockchain), a novel secure framework that monitors and facilitates device-to-device communications with different levels of access-controlled mechanisms based on environmental parameters and device behaviour. It is protected by zero-trust architecture and provides dynamic behavioural analysis of IoT devices by calculating device trust levels for each request. ZAIB enforces variable policies specifically generated for each scenario by using attribute-based access control (ABAC). We have used blockchain to ensure anonymous device and user registrations and immutable activity logs. All the attributes, trust level histories, and data generated by IoT devices are protected using IPFS. Finally, a security evaluation shows that ZAIB satisfies the needs of active defence and end-to-end security enforcement of data, users, and services involved in a smart grid network.
... Most of the research articles discussed here are focused to Industry 4.0. Although there are other research articles [38][39][40][41][42][43][44][45][46][47][48][49][50][51] also, which focus on different applications like smart agriculture, smart grid, defense technology, and other promising areas. A discussion and analysis are presented in upcoming section to find out the promising applications of these protocols in Industry 4.0 and Industry 5.0. ...
Chapter
The Internet of things (IoT) has emerged into various application areas like agriculture, healthcare, defense, transportation, and manufacturing. The transformation of real things in the physical world to the Internet of things given a rise to industrial IoT (IIoT). IIoT applications are intended for the automation of the manufacturing industry, called Industry 4.0. Also, due to needs of end-user personalization, Industry 5.0 is becoming popular nowadays. Industry 5.0 is intended to inject artificial intelligence (AI) into human lives to improve capabilities and productivity. To make Industry 5.0 a successful revolution, IIoT must provide better efficiency, improved productivity, and better asset management. In this context, device-to-device communication plays an important role. IoT devices must be enabled with seamless communication technologies over heterogeneous networks. In this paper, communication standards, technologies, and various published research contributions are reviewed. Further, an analysis is presented to formulate challenges and opportunities for designing communication methods for IIoT. The paper also provides general directions for developing communication techniques in perspective to Industry 5.0.KeywordsIndustrial Internet of thingsCyber physical systemsDevice-to-device communicationIndustry 4.0Industry 5.0Fog computing
... Identities from different social networks can be aggregated and lead to one person. UMA manages to decouple identity resolution from the maintenance of identity information [44] [50] [52] and even one application for IoT by Cruz-Piris et al. [17] is published. Although UMA is based on OAuth, the principle can be applied to SAML as well [68]. ...
Preprint
Identity and access management (I&AM) is the umbrella term for managing users and their permissions. It is required for users to access different services. These services can either be provided from their home organization, like a company or university, or from external service providers, e.g., cooperation partners. I&AM provides the management of identifiers with the attributes, credentials, roles, and permissions the user has. Today, the requirements have evolved from simply accessing individual web services in the internet or at a company to the majority of all IT services from different service providers with various accounts. Several identity management models have been created with different approaches within. In order to adjust to heterogeneous environments, use cases, and the evolution of identity management, this paper extends known requirements for identity management. Existing models and approaches for identity management are mapped to the derived requirements. Based on the mapping, advantages, disadvantages, and gaps are identified. Current approaches suffer, as an example, from trustworthiness and liability issues. Interoperability issues are even more inherent as the approaches partly develop apart, forming an heterogeneous environment. The results from this analysis emphasize the need for one holistic identity management framework.
... Krishnan et al. (2022) presented an affordable, competent, fully functional, innovative ventilator system using IoT [8]. Cruz-Piris et al. (2018) proposed an access control mechanism for IoT environments based on modeling communication procedures as resources [9]. Penzenstadler et al. (2018) introduced an affordable DIY resilient smart garden kit using IoT. ...