Professional Documents
Culture Documents
Un Hogar Inteligente Seguro Con Internet de Las Cosas
Un Hogar Inteligente Seguro Con Internet de Las Cosas
ABSTRACT to early 2000, but the last 4-5 years has seen enormous growth in
Internet-of-Things (IoT) has recently been the biggest innovation, the smart home industry with new technology coming in. The
which promises to enhance our daily life and activities through development of the Internet-of-Things (IoT) has led to enormous
intelligent sensors and smart devices working together. With IoT applications such as intelligent transport systems, smart
Internet protocol connectivity, these devices can be connected to shopping systems, and smart home systems [5]. Smart home
the Internet which allow users to control, read and manage them applications have considerably gotten more attention because of
from anywhere at any given time. As security is one of the main their closeness to people’s lives and comfortability. For instance, a
concerns in IoT, this work proposes and implements a secure IoT washing machine (i.e., things or remote devices) can be easily
framework using TLS/SSL protocol. To develop the proposed connected to Internet and remotely controlled. To make it easier
framework, we have programmed the sensors through Arduino for almost all the home appliances for creating and developing a
board and uploaded the sensory data into the cloud storage for smart home, IoT has been integrated with Cloud computing
accessing to the connected devices in a smart home. The platforms as the basis of future technologies, creating a smart
experimental results show the outcome of the online monitoring world [6].
and analysis of sensory data remotely stored in the cloud. The past five years to present, home appliance providers and
manufacturers are widening the knowledge of IoT by producing
CCS Concepts more smart devices for homes that makes a smart home. In a
• Computer engineering and network technology smart home, heterogeneous devices are remotely controlled
through smart phones or the web without distance and human
Keywords restrictions. These devices that make up the smart home have the
Internet-of-Things (IoT); Smart Home; Sensor; Arduino; Cloud possibility of sharing data within themselves with the aid of
Storage; Secure Connection, TLS/SSL Internet connection. However, the existing architectures and
frameworks pay less attention to the important system design
1. INTRODUCTION issue as cloud-based IoT connectivity through a secure channel for
One cutting-edge vision of connected devices at home is a full of
online monitoring and analysis. An efficient and effective security
smart gadgets that anticipate our needs, monitor remotely
mechanism is required to secure data against attacks such as
incidents, keep us healthy, and save us money is slowly taking
spoofing and eavesdropping [7, 8]. An important question is how
shape [1]. Smart home is an ambiguous term used in referring to
to increase the speed and the agility of secure and online access to
applications or devices for controlling, observing and automating
massive data captured from sensors for end user(s)? The main
day to day functions at home [2]. A smart home is an information
contribution of this work is fourfold: (a) successfully connect
and communication-technology term for organized technologies
home sensors to Arduino board (b) program the sensors to capture
in a home where the components communicate through a local
data (c) send sensory data to the cloud over the Internet through a
network [3, 4]. The programmed alarms, programmed doors and
secured mechanism using the TLS/SSL (a cryptographic protocol
windows, entertainment units, heating systems, motion light
for secure communication) (d) and the captured data will be used
sensors, while all these inventions are nothing new, but the
for data analysis for future usage. The proposed framework allows
centralized communication between these devices is the smart
users to securely access to the cloud and make online data
aspect and the possibility of generating automatic action [3].
monitoring and analysis. End users will be able to employ data
Although smart home or home automation started as early as 1998
analysis platform such as MATLAB simultaneously for real-time
Permission to make digital or hard copies of all or part of this work for data analysis purposes.
personal or classroom use is granted without fee provided that copies are
not made or distributed for profit or commercial advantage and that The rest of the paper is organized as follows. Section 2 provides
copies bear this notice and the full citation on the first page. Copyrights the background about IoT and cloud storages. Section 3 discusses
for components of this work owned by others than ACM must be the related work on IoT and some of existing issues. Section 4
honored. Abstracting with credit is permitted. To copy otherwise, or explains the proposed framework. Section 5 presents experimental
republish, to post on servers or to redistribute to lists, requires prior results. Finally, conclusion is given in Section 6.
specific permission and/or a fee. Request permissions from
Permissions@acm.org. 2. BACKGROUND
ICIME 2017, October 9–11, 2017, Barcelona, Spain 2.1. IoT: an emerging approach
© 2017 Association for Computing Machinery.
ACM ISBN 978-1-4503-5337-3/17/10…$15.00 The Internet-of-Things is a developing topic with special and
critical point in technical, social and economic aspect. The IoT
DOI: https://doi.org/10.1145/3149572.3149577
69
devices are connected to provide big data analytics that guarantee iCloud, Amazon Cloud drive, Google Drive, and hybrid services
to change the way we live. The projections for the effect of IoT on like Box, Dropbox and SugarSync. The cloud-computing feature
the Internet and economy are looking great, with Gartner in this paper comes with the use of ThingSpeak platform, which
suggesting a possible 21 billion devices by 2020 [9]. Internet-of- has a cloud-based architecture. ThingSpeak is the open IoT
Things is a generally used term for set of systems, design platform with data analytics powered by MATLAB in order to
techniques and technologies, which are the developing approach analyse captured data in real-time, while none of above-mentioned
of Internet-connected things that are based on the physical services have these advantages.
environment. The whole idea behind Internet-of-Things is the
devices that we use in our daily life embedded with identifiers and 3. RELATED WORK
wireless Internet connectivity where these devices will
communicate with each other and be managed by a central unit. In Skouby and Lynggard [13] proposed a futuristic model that
a nutshell, Internet-of-Things is generally situations where devices, connects smart cities, smart home and IoTs into one large
sensors are provided with network connectivity and computing infrastructure. The proposed model has four main layers that join
ability to consume, generate and exchange data and communicate and interface the smart city, smart home and IoT elements by
with minimal human intervention [10]. The idea behind IoT is a deploying fifth generation (5G), IoTs, cloud of things and
great topic at the moment but it is not a new concept. IoT is a distributed artificial intelligence. The proposed system uses 5G
world of devices with sensors connected together to capture and technology which is not ready to be used in the industry now and
also share data through specific platforms, the sensor data can anytime soon. Recent unfortunate situation made the industry and
provide business and knowledge insights that were not available. academia in general more interested and willing to look deeper in
The Internet-of-Things is about the technology, obscure general IoT development and security. Keoh et al. [14] made
monitoring and control of the sensors also where the technology efforts in showing overview of IoT security solutions that will
can be applied in the todays’ world. The view of connecting make devices communicate with each other in a secured manner.
sensors and other devices to the ICT system through the wired or The solution, which as was first proposed by the Internet
wireless networks can be applied in many aspects of the world Engineering Task Force (IETF), in order to regulate security
like the ecosystem, health sector, home, and cities which in turn solutions in for IoT ecosystems, the IETF, proposed the use of
make this known as smart health system, smart home or smart Constrained Application Protocol (CoAP). The authors went
cites. There are potential positivity and advantages you can take further to examine datagram transport layer security, which by
away from current smart home applications, but they still have default is bound to CoAP. Through their performance evaluation
some weaknesses, which can be exploited, among them can be and analysis, they were able to produce a lightweight Datagram
privacy and security, authentication and traffic encryption. With Transport Layer Security (DTLS) that provide a more security
smart home technology, the central controlled unit is mostly on a function for IoT devices as well as analysing IETF proposed
mobile app that connects to a cloud-based server and the concern compression scheme to reduce message fragmentation issues in
here is if you can control your smart home devices using the DTLS. Moreover, there were weaknesses in which they figure out
Internet then there are chances that someone else can control and from device bootstrapping, authorization, key management, and
have access to them as well as a result of weak authentication privacy in IoT in general. Yeh [15] introduced an IoT-based
system. Most of the mobile applications where smart home healthcare system that functions with a body sensor architecture,
devices are controlled from do not use a secure connection for with the aid of a vigorous crypto primitives a two-way
data transfer to the cloud this research will aim to address one of communication mechanism was developed to ensure system
these weaknesses. efficiency is attained as well as secured transmission between the
IT devices is maintained. The communication mechanism
2.2. Cloud Computing proposed by Yeh [15] involves two communication channels,
which are communication from the sensors to local processing
Cloud computing has been defined in many ways over the years unit i.e. the intelligent device, and communication from local
by different scholars and organizations. Griffith (2016) defines processing unit to BSN server. The author was able to point out
cloud computing as the general process of storing data, storing security issues within communication channel, however
programs, accessing the data and programs over the Internet communications between devices and data transmissions are not
instead of the computer’s hard drive. Cloud computing is just the all secured which can lead to data eavesdropping and spoofing.
oppose way of local computing where you store data and access Chakravorty et al. [16] proposed a data security and privacy
programs from the local computer hard drive. The National approach for data analytics for smart homes. They applied a
Institute for Standards and Technology (NIST) came up with the separate hashed identifier dictionary storage, using an heuristic-
definition of cloud computing that is widely accepted and used in based k-anonymization algorithm for authorization of identifiers.
the United States government and also in the industry as a model This method is not IoT-based and adds an additional
that enables omnipresent and convenient and on demand network computational costs into the system for mitigating security issues.
access to computers that share the same computing resources like
storage, networks, servers, which can be made available quickly 4. PROPOSED FRAMEWORK
with minimal management or consumer effort or service provider
interference [12]. IBM which is one the biggest cloud computing The proposed framework compromises of heterogeneous sensors
service providers defines cloud computing as the process of i.e. temperature sensors, flame sensors, sound sensors, raindrops
delivering on demand computer resources from data centers to sensor and human body induction sensor, which will be connected
computer applications over the Internet. For anything to be and programmed with Arduino Yun board to send the data to
considered as cloud computing, the data and programs need to be cloud. Table 1 illustrates a summary of used sensors.
accessed over the Internet, i.e. the cloud or in some cases have the
data synched with other information over the web. The examples Figure 1 shows the deployment of a secure IoT-based smart home
of cloud computing applications are Microsoft OneDrive, Apple framework which collects all the real-time captured sensory data
70
into ThingSpeak cloud platform for two main reasons: real-time
monitoring and data analysis timely and securely. After setting up
sensors with Arduino board, they are connected (wireless or wire
channel) securely using TLS/SSL protocol to the ThingSpeak
platform. Simultaneously, end users can connect to the
ThingSpeak for real-time accessing to sensory data and analyse
data securely through TLS/SSL protocol. TLS/SSL establishes a
strong encrypted session between source and destination so that
the encrypted data can only be read and understood by the
intended parties. In this work, the sources and the destinations are
between Arduino board and ThingSpeak, and between
ThingSpeak and end user(s). Algorithm 1 shows the incorporated
TLS/SSL protocol into the proposed system design through
Arduino board.
Figure 1. Proposed Framework
5. EXPERIMENTAL RESULTS
This section presents the output from some of sensors, sending
securely data into ThingSpeak cloud platform. End users can log
in into cloud and analyse the sensory data at real-time. For
instance, Figure 2 shows a temporal sensory data from sound
71
sensor that captures movement at home. As seen, there is no
movement because there is nobody at home. As soon as anyone
moves (i.e., an unauthorized access to a room or stealing), the
sensor captures new pattern of data and send them to cloud.
Figure 3 shows these temporal results when there is human
movement.
Figures 4 and 5 show flame detection in a certain area at home.
Figure 4 gives a visualized information to end user that there is no
flame and user can learn the pattern of safe condition. In contrast,
Figure 5 gives a visualized information about flame detection and
its pattern. End user is easily able to access remotely to home for
safety monitoring and react against events timely.
Figure 5. Flame detection, when there is flame
72
and humidity data in the usual and the unusual circumstances,
where there is a high fluctuation. As seen in Figure 8, the plot is
not a straight line, suggesting that the lifetime data for a sample of
sensed data during a timestamp does not follow a normal
distribution. Thus, end users need to make a decision regarding to
this gained knowledge.
7. REFERENCES
[1] Pretz, K. 2015. IEEE Provides the Keys to a Smarter Home.
Available at http://theinstitute.ieee.org/technology-
topics/smart-technology/ieee-provides-the-keys-to-a-smarter-
home. Accessed on 27-05-2017.
[2] Kurkinen, K. 2015. Smart Homes and Home Automation.
M2M Research Series. Available at
https://ec.europa.eu/research/innovation-union/pdf/active-
healthy-ageing/berg_smart_homes.pdf. Accessed on 27-05-
2017.
[3] Laberg, T. 2005. Smart Home Technology; Technology
supporting independent living - does it have an impact on
health? Technical Report. Ehealthresearch Noeway.
Figure 9. The regression of sensed data for human movement
[4] Krishna, M. B., and Verma, A. 2016. A framework of smart
homes connected devices using Internet of Things. 2nd
International Conference on Contemporary Computing and
Informatics (IC3I), Noida. pp. 810-815.
[5] Song, T., Li, R., Mei, B., Yu, J., Xing, X., and Cheng, X.
2017. A Privacy Preserving Communication Protocol for IoT
Applications in Smart Homes. IEEE Internet of Things
Journal, vol. PP, no.99.
73
[6] Josyula, S. K., and Gupta, D. 2016. Internet of things and [13] Skouby, K. E. and Lynggaard, P. 2014. Smart home and
cloud interoperability application based on Android. IEEE smart city solutions enabled by 5G, IoT, AAI and CoT
International Conference on Advances in Computer services. IEEE International Conference on Contemporary
Applications (ICACA), Coimbatore, pp. 76-81. Computing and Informatics (IC3I), pp. 874-878.
[7] Karami, A. and Guerrero-Zapata, M. 2015. A fuzzy anomaly [14] Keoh, S. L., Kumar, S. S., and Tschofenig, H. 2014. Securing
detection system based on hybrid PSO-Kmeans algorithm in the Internet-of-Things: A standardization perspective. IEEE
content-centric networks. Neurocomputing, Volume 149, Internet-of-Things Journal, 1(3), pp. 265-275.
Part C, pp. 1253-1269. [15] Yeh, K. H. 2016. A Secure IoT-Based Healthcare System
[8] Karami, A., and Guerrero-Zapata M. 2015. An anfis-based With Body Sensor Networks. IEEE Access, vol. 4, pp. 10288-
cache replacement method for mitigating cache pollution 10299.
attacks in named data networking. Computer Networks, [16] Chakravorty, A., Wlodarczyk, T., and Rong, Ch. 2013.
Volume 80, pp. 51-65. Privacy Preserving Data Analytics for Smart Homes. IEEE
[9] Stamford (2015) Gartner Says 6.4 Billion Connected Security and Privacy Workshops, pp. 23-27.
"Things" Will Be in Use in 2016, Up 30 Percent From 2015. [17] Karami, A. 2015. A Framework for Uncertainty-Aware
Available at: http://www.gartner.com/newsroom/id/3165317. Visual Analytics in Big Data. Third International Workshop
[10] Rose, K., Eldridge S., and Chapin L. 2015. The Internet of on Artificial Intelligence and Cognition (AIC), pp. 146-155.
Things: An Overview - Understanding the Issues and [18] Karami, A. 2015. ACCPndn: adaptive congestion control
Challenges of a More Connected World. The Internet Society. protocol in named data networking by learning capacities
[11] McFedries, P. 2012. Cloud computing: beyond the hype. San using optimized time-lagged feedforward neural network.
Francisco. Journal of Network and Computer Applications (JNCA),
[12] Mell, P. and Grance T. 2011. The NIST Definition of Cloud Volume 56, pp. 1-18.
Computing. NIST Special Publication 800-145. Gaithersburg.
74