Page:Approaches on Internet of Things Solutions.pdf/5

Journal of Mobile, Embedded and Distributed Systems, vol. V, no. 3, 2013ISSN 2067 – 4074www.jmeds.eu The data and meta-data for products/things might be stored in files inside the file system memory layout and they will be encrypted with the session key negotiated during the authentication procedure.

We can mention also the need of security outside the authentication, especially in the banking field, where are some applications that do not require users' authentication. Generally, these applications are accessed internally, by the bank employees, and the access is provided from other applications, based on single-sign-on principles. In such situations, the security must be ensured through restricted access rights on mainly resources and by monitoring users' access with the help of log files.

In 2020 there is estimation that will be 50 billion IoT devices in the market. At least all the consumers of “Java enabled” and Embedded Linux smart objects will be in the main target group for open source solutions. The smart objects are processing the data collected from sensors and for instance, from RFID tags/cards. The authentication process is an important approach taking into account NFC and RFID domains expansion.

Besides the authentication process of RFID tags/cards by the IoT sensors, the paper represents the basic know-how for developing a proof of concept that will demonstrate how the RFID/NFC tags/cards are written with meta-data information, and then periodically tags/cards area read by RFID/NFC reader/writer devices (sensors), in order to do the things tracking. The obtained information is securely and collaborative aggregated into a unified data model and processed using distributed computing methodologies over “big data”.

The proof of concept project results may include:


 * 1) The formal models, architecture, REST/Web-services/communications protocols and M2M data-structures;
 * 2) The beta version of the software libraries that implement products/services tracking and clustering:


 * sensor control using devices SDKs; the reading/writing of the data formats from/in RFID vicinity/proximity tags/cards and optionally, reading 2D barcodes of the products/services;
 * “big data” processing and semantic parsing, via distributed computing model and implementation, using embedded devices/boards (Internet of Things „smart objects‟, e.g. Raspberry-PI board) for cloud micro-instance deployment and standard PCs/laptops;
 * secure communications from sensors to „smart-objects‟ via IoT Service Gateways.

During the development of the proof of concept project, we estimate that we will create pre-requisites to offer Java implementation for Smart Object API, to enhance the existing security and communications protocols for REST Interface/Web-services, and improvement of M2M/IoT data models plus value added services for existing and new IoT deployed “silos”-es.

Parts of this paper were presented by the authors at 6th International Conference on Security for Information Technology and Communications (SECITC'13), June 25-26, 2013, Bucharest, Romania.

128