Sensors: A Novel Secure Iot-Based Smart Home Automation System Using A Wireless Sensor Network
Sensors: A Novel Secure Iot-Based Smart Home Automation System Using A Wireless Sensor Network
Article
A Novel Secure IoT-Based Smart Home Automation
System Using a Wireless Sensor Network
Sandeep Pirbhulal 1,2,3,† , Heye Zhang 1,2,† , Md Eshrat E Alahi 4,5 , Hemant Ghayvat 4 ,
Subhas Chandra Mukhopadhyay 4,5, *, Yuan-Ting Zhang 6 and Wanqing Wu 1,2, *
1 Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China;
[email protected] (S.P.); [email protected] (H.Z.)
2 Research Center for Biomedical Information Technology, Shenzhen Institutes of Advanced Technology,
1068 Xueyuan Avenue, Shenzhen University Town, Shenzhen 518055, China
3 Shenzhen College of Advanced Technology, University of Chinese Academy of Sciences,
Shenzhen 518055, China
4 School of Engineering and Advanced Technology, Massey University, Palmerston North 4442, New Zealand;
[email protected] (M.E.E.A.); [email protected] (H.G.)
5 Department of Engineering, Macquarie University, Sydney 2109, Australia
6 Joint Research Centre for Biomedical Engineering, Chinese University of Hong Kong, Shatin N.T.,
Hong Kong, China; [email protected]
* Correspondence: [email protected] (S.C.M.); [email protected] (W.W.);
Tel.: +86-755-8639-2262 (W.W.); Fax: +86-755-8639-2066 (W.W.)
† These authors contributed equally to this work.
Abstract: Wireless sensor networks (WSNs) provide noteworthy benefits over traditional approaches
for several applications, including smart homes, healthcare, environmental monitoring, and homeland
security. WSNs are integrated with the Internet Protocol (IP) to develop the Internet of Things (IoT)
for connecting everyday life objects to the internet. Hence, major challenges of WSNs include:
(i) how to efficiently utilize small size and low-power nodes to implement security during data
transmission among several sensor nodes; (ii) how to resolve security issues associated with the harsh
and complex environmental conditions during data transmission over a long coverage range. In this
study, a secure IoT-based smart home automation system was developed. To facilitate energy-efficient
data encryption, a method namely Triangle Based Security Algorithm (TBSA) based on efficient key
generation mechanism was proposed. The proposed TBSA in integration of the low power Wi-Fi
were included in WSNs with the Internet to develop a novel IoT-based smart home which could
provide secure data transmission among several associated sensor nodes in the network over a long
converge range. The developed IoT based system has outstanding performance by fulfilling all the
necessary security requirements. The experimental results showed that the proposed TBSA algorithm
consumed less energy in comparison with some existing methods.
Keywords: energy-efficient; home automation; internet of things; security; wireless sensor networks
1. Introduction
In 21th century, the Internet of Things (IoT) is one of the most constructive and dominant
wireless communication models. It is the common conception of things that are identifiable, readable,
controllable, addressable, and locatable via the Internet. In the IoT surroundings, all entities of our
everyday life can be associated with the Internet owing to their computing and communication
capabilities. IoT enlarges the perception of the Internet and makes it more suitable for different
applications. Due to this reason, IoT has become more beneficial in numerous domains such as health
monitoring, assisted living monitoring, and smart home automation systems [1]. In these systems,
several kinds of sensors are connected wirelessly to develop distributed networks. The wireless
sensor networks (WSNs) is one of the most essential technologies utilized in IoT-based smart home
automation. These are distributed networks of tiny and light weighted wireless sensor nodes,
which could be extended depending on the requirement of physical parameters such as pressure,
temperature, and relative humidity. Each sensor node in the WSNs includes three subsystems i.e.,
sensor subsystem for environment sensing, processing subsystem for computation of the sensed
information, and a communication subsystem for exchanging the collected data between different
sensors [1–6]. Several studies have integrated WSNs with Internet Protocol (IP) to develop IoT for
offering real-time connectivity of all devices from everyday life at anytime and anywhere [7]. In the
IoT based applications, WSNs are considered as the most significant components which collect the
real-time sensed data from their surrounding environment [8,9]. The traditional WSNs offers a closed
system designed for specific applications, however, IoT-based applications are focused to develop a
large-scale WSNs infrastructure which could support open standard and are independent of specific
applications [10].
In most of the IoT-based home automation systems, the actuators and sensors are positioned
within the home environment to control and supervise its operations. Afterward, these devices are
connected to the local server via a wireless medium for data collection and analysis. One of the
most important issues is how to securely transmit the collected data from the sensor nodes to the
appropriate destination. Therefore, several mechanisms have been proposed to solve this challenging
issue including traditional encryption techniques and security methods developed for WSNs [11–14].
Sensor nodes in these networks have limited resources including restricted power supply, memory,
limited data processing capability, and range of communication [15,16]. Another major issue is how to
efficiently utilize these limited resources for several IoT based applications. Hence, security algorithms
which could consume less energy for data encryption should be utilized in order to make efficient
use of available resources in their networks. Additionally, in IoT based smart home, a large number
of devices are connected to the internet at a long distance. Third most significant issue is how to
increase coverage range to provide a communication framework combining the sensor and backhaul
networks [17]. Hence, highly secured IoT based smart home systems with could provide a balance
between level of security, energy-efficient security algorithm implementation based on efficient key
generation mechanism for data encryption, and capability of network to support communication
among large number of IoT nodes at wide coverage range is much needed.
In this study, a secured IoT based home automation platform was developed. The contribution
of this paper is in threefold; first, the development of novel IoT based hardware platform by using
Intel Galileo Board, TM936 sensor and N-2230 Intel Centrino Wi-Fi module for the collection of
environmental temperature. Second, an energy-efficient security algorithm namely Triangle Based
Security Algorithm (TBSA) on basis of simple and efficient key generation mechanism was proposed
for data encryption. Third, the performance of proposed TBSA is compared with traditional encryption
ciphers and security methods designed for WSNs in terms of energy efficiency.
This research paper is organized as follows: Section 2 comprises of related works. In Section 3,
security requirements in IoT based home automation using WSNs are discussed. Section 4 presents the
methods and implementation while the experimental results and discussion are described in Section 5.
The paper is concluded in Section 6.
2. Related Work
Recently, IoT has been applied in numerous applications including smart home monitoring
systems for assisted living to predict the wellness of residents through the monitoring of several
home appliances [4], building management framework to support energy-saving applications [18],
and human activity patterns monitoring [19,20] among others. As the Internet communications
infrastructure develops to include sensing objects, suitable mechanisms are needed to secure
Sensors 2017, 17, 69 3 of 19
communications with such entities, in the context of IoT applications. In real world IoT applications,
security threats and attacks are becoming a major issue with respect to data transmission. Hence,
it is extremely crucial that the IoT based system should include security mechanism that could
resist possible security threats and attacks in the form of data modification, impersonation,
and eavesdropping, among others. According to [21], IEEE 802.15.4 standard based IPv6 over Low
power Wireless Personal Area Networks (6LoWPAN) in the integration of WSNs with internet is
used for providing secure data transmission in IoT. However, despite of fact that 6LoWPAN-based
IoT systems require less energy for implementing security, it is still not appropriate for smart homes
due to two major issues: (1) An efficient key generation mechanism is not included in IEEE 802.15.4
sandard so how to securely add a new device into the network or to manage the cryptographic
keys is also not explained in that standard [22]. One possible solution for efficient key generation
and management in 6LoWPAN is Lightweight IKEv2, but it requires more resources and energy for
its implementation [23,24]; (2) It is not an appropriate standard for smart homes, since it does not
facilitate communication among a large number of IoT nodes and it also does not have a wide coverage
range [17]. The first issue can be resolved by developing an energy-efficient security algorithm based on
an efficient key generation mechanism for secure data transmission in IoT applications. To resolve the
second problem, recently low-power Wi-Fi systems optimized for sensing applications are available due
to the growing industry requirements for smart objects having IP connectivity [25]. According to [17],
the latest Wi-Fi standard fills this gap by combining the advantages of Wi-Fi and low-power sensor
network communication technologies. The emerging Wi-Fi standard is a promising communication
standard that supports a massive number of heterogeneous devices in the IoT. A comparison between
the latest 802.11 ah and 802.15.4 standards is described in detail in [17]; 802.11 ah performs better
in terms of association time, throughput, delay, and coverage range. Due to all these advantages,
Wi-Fi is the preferred standard over 6LoWPAN for several IoT applications such as smart cities and
smart homes. Therefore, along with the low power Wi-Fi module to support large number of IoT
nodes and to increase coverage range, security algorithm for data encryption based on efficient key
generation mechanism need to be included in WSNs with internet to develop novel secured IoT based
smart home.
Several IoT based systems are developed which includes integration of security mechanisms
within WSNs to provide efficient security for different applications [26–28]. Generally, hash functions,
symmetric and asymmetric encryption algorithms are utilized to offer data security. The asymmetric
algorithms are not suitable for implementing security in sensor networks, due to the limited
computational power of the tiny sensor nodes [6]. Thus, hash functions, symmetric algorithms
including message digest 4 (MD4) [29], message digest 5 (MD5) [30], secure hash algorithm 1
(SHA-1) [31], hash message authentication code (HMAC) [32], Data Encryption Standard (DES) [33],
Advanced Encryption Standard (AES) [34], Rivest Cipher 4 (RC4) [35], blowfish [36], are utilized to
secure the sensor networks. Since, these mentioned techniques are not precisely developed by keeping
in view the specification of WSNs; so these networks require more energy for their implementation.
Therefore, security mechanisms specifically designed for WSNs could be the optimal solution for IoT
applications. Mandal et al. developed a hybrid scheme of both symmetric-key and asymmetric-key
based cryptographic functions for securing WSNs. However, their scheme has not considered all
the major security requirements [16]. Aakash et al. proposed a novel hybrid lightweight security
method namely; PRESENT-GRP for secure data transmission in IoT based applications and it was
implemented on an Intel Galileo Gen 2 board. It follows a complex permutation boxes-based strategy,
which requires more processing time and resources [26]. Wood et al. proposed an alarm-net system to
monitor residential and assisted-living by query protocols. Their system is vulnerable to adversarial
data confidentiality attacks which may reveal the location of the resident, and also it requires several
resources that need more execution time for data encryption [27]. Mian et al. designed a lightweight
payload based mutual authentication method namely; PAWN for cluster based hierarchical WSNs.
Their proposed method is based on two steps: firstly, an election of cluster heads for coordinating the
Sensors 2017, 17, 69 4 of 19
neighboring nodes in the network. Secondly, each cluster head acts as server for valid authentication
of the nodes to initiate data transmission. The major drawback of their approach is that more resources
are required to accomplish the cluster heads election procedure [37].
The challenging problem with all of the aforementioned traditional security mechanisms designed
for WSNs in providing data security methods is that they utilize complex strategies in their respective
system, so more resources are required. Therefore, in this research security algorithm based on the
simple and efficient key generation mechanism is proposed namely; TBSA, it consumes less processing
time and energy for data encryption. The low-power Wi-Fi optimized for sensing applications has
advantages of better association time, throughput, delay, and coverage range; therefore it is preferred in
this research. This study develops a IoT based home automation system by integrating the low power
Wi-Fi and proposed TBSA in WSNs with internet, it increases the coverage range and has the capability
to support a large number of IoT devices. Additionally, the proposed IoT system accomplishes all the
necessary security requirements including confidentiality, privacy, integrity, data freshness, secure
localization, non-repudiation, availability, access control, trustworthiness, and authentication for
protecting the network from critical security attacks and threats.
3.1. Authentication
Authentication is one of the requirements in any IoT-based application; it usually deals with the
impersonating threats. In IoT-based automation systems using WSNs, all the sensor nodes transmit
data to the server by the wireless medium. An attacker can effortlessly insert messages into the system,
thus the destination node needs to confirm that the information utilized in any decision making
procedure is initiated from the proper source node. Basically, authentication permits the destination
node to verify if the information was transmitted from the appropriate source node.
3.2. Trustworthiness
It is the ability of a system to authenticate the identity and ascertain trust in a third party.
Third-party trust is a situation in which the source and destination nodes in IoT-based application
can implicitly trust each other although they have not established communication paths for data
transmission beforehand.
data. This eavesdropping phenomenon can lead to severe damage since the adversary can utilize
the captured information for numerous illegal purposes. Therefore, confidentiality ensures that only
verified users can receive the information. Along with that, privacy is also an important concern to
guarantee that all sensor nodes in the system fulfill the privacy policies and help them to manage their
specific data.
3.6. Integrity
Beside confidentiality and privacy, integrity is also an important security factor during the
transmission of data in WSNs. An attacker can always change the information by inserting some
fragments of fake information within the transmitted message to alter the originally meaning.
This altered data can be sent to the destination node. Therefore, an integrity mechanism is very
significant to protect the original data from external attacks.
3.7. Non-Repudiation
It is the ability of a system to validate occurrence or non-occurrence of an action from the source
nodes. In IoT-based smart home automation, it is important to ensure that the source nodes should not
deny their authenticity when sending the messages that are originated from them.
3.8. Availability
This property allows reliable access of system resource in timely manner to valid sensor nodes in
the network. In IoT-based applications, it is very essential that network resources should be available
to the appropriate nodes.
In this study, WSN was developed at School of Engineering and Advanced Technology (SEAT),
Sensors 2017, 17, 69 6 of 19
Sensors 2017, 17, 69 6 of 19
Massey University, Palmerston North, New Zealand. The TMP36 temperature sensors were used for
capturing
capturing environmental
environmental temperature which
temperature which served
served as as the dataset
thethe
dataset in
in the study.
thethe
study. The
The components
components used
capturing environmental temperature which served as dataset in study. The components
to build
used to the sensor
build the nodes
sensor are are
nodes shown
shown in Figure
in Figure 1. 1.The
The temperature
temperature sensor
sensor is presentedininFigure
presented Figure 1a,
used to build the sensor nodes are shown in Figure 1. The temperature sensor is presented in Figure
and Figure
1a,1a,
andand 1b shows
Figure
Figure 1b 1b the
shows Wi-Fi
shows thethemodule
Wi-Fi
Wi-Fi (Intel
module
module Centrino
(Intel
(Intel Wireless
Centrino
Centrino N-2230)
Wireless
Wireless which
N-2230)
N-2230)were
which both
which integrated
werewere bothbothon
an Intel Galileo
integrated
integrated onon anbased
Intel
an microcontroller
Galileo
Intel Galileobased
based board as demonstrated
microcontroller
microcontroller boardboardas as in Figure 1c.inThe
demonstrated
demonstrated Galileo
Figure
in Figure board
1c.1c.
TheThe includes
Galileo
Galileo
aboard
32-bit includes
Intel a 32-bit
Pentium-class Intel Pentium-class
system mounted system
on a chip mounted
that on
contains a
board includes a 32-bit Intel Pentium-class system mounted on a chip that contains an Arduino chip
an that
Arduino contains
Software an Arduino
Development
Software
Environment
Software Development
(IDE), together
Development Environment
with an(IDE),
Environment Intel together
(IDE),processor
together withfor
withan
fastIntel
an processor
processing
Intel processoroffor fastfast
data.
for processing
This board is
processing ofused
of
data.
to data.This
develop board
Thisan board is used
intelligent to develop
is usedwireless
to develop an intelligent
sensor wireless
node. Also,
an intelligent sensor
the Wi-Fi
wireless node.
sensormodule Also,
node. Also, the
wasthe Wi-Fi
mounted module was
on the was
Wi-Fi module board
mounted
alongside
mounted on
theonthe theboard
temperature
boardalongside
sensor to
alongside theproduce
thetemperature
a sensor
temperature sensor
node.
sensor to In
produce
to smart
produce a sensor
home-based
a sensor node. In Insmart
applications,
node. smart it is
home-based
very applications,
important that
home-based it
sensor nodes
applications, is very
it is be important
updated
very that sensor
with information
important nodes
that sensor received be
nodes befromupdated with
the remote
updated information
server located
with information
received
at an
received from
extensive
from the remote
distance
the remoteserver
with goodlocated
server speed
located at
andanreliability.
at anextensive
extensive distance
Therefore,
distance with
Intel
with good speed
Centrino
good and
Wireless
speed reliability.
and N-2230 was
reliability.
Therefore, Intel Centrino
Therefore,
utilized in our Intel
research forWireless
Centrino WirelessN-2230
transmitting the was
N-2230 wasutilized
informationutilized in inourourresearch
over a wide research forfortransmitting
coverage transmitting
range. thethe
This module
information
information over a
over andwide
a widecoverage
coverage range. This module enhances reliability and speeds up to 300
enhances reliability speeds up torange.
300 Mbps Thisformodule enhances reliability and speeds up to 300
data transmission.
Mbps for data transmission.
Mbps for data transmission.
Figure
Figure 1.
Figure1.The
The
1. components
The forfor
components
components thethe
for sensor
the node:
sensor
sensor (a) (a)
node:
node: temperature
(a) Sensor;
temperature
temperature (b)(b)
Wi-Fi
Sensor;
Sensor; (b)Module
Wi-Fi
Wi-Fi (N-2320);
Module
Module (c) (c)
(N-2320);
(N-2320);
Intel Galileo
(c) Intel Board.
IntelGalileo
GalileoBoard.
Board.
The architecture
The of of
architecture WSNs
WSNs including
including three tiers
three for data
tiers transmission between the source and
The architecture of WSNs including three tiers for data
data transmission
transmissionbetween
betweenthe thesource
source and
and
destination nodes
destination nodesis shown
is shownin Figure
in Figure 2. In
2. tier
In 1,
tier the
1, sensor
the nodes
sensor were
nodes weredesigned
designed to collect
to data
collect databyby
destination nodes is shown in Figure 2. In tier 1, the sensor nodes were designed to collect data
using Wi-Fi as a wireless medium, thethe
sensed data is then stored onon
thethe
server in tiertier
2. In this study,
byusing
usingWi-Fi
Wi-Fiasasa wireless medium,
a wireless medium, sensed
the data
sensed is then
data is stored
then stored server
on the in
server2.inIntier
this2.study,
In this
a ThingSpeak
a ThingSpeak server was
server wasused
usedto store
to storethe recorded
the recorded data. Finally
data. in
Finally tier
in 3,
tier the
3, stored
the data
stored was
data was
study, a ThingSpeak server was used to store the recorded data. Finally in tier 3, the stored data was
transmitted to to
transmitted thethe
destination node
destination node after proper
after properauthentication.
authentication.
transmitted to the destination node after proper authentication.
Figure 2. The
Figure hardware implementation of WSNs.
Figure 2.2.The
The hardware
hardware implementation
implementation of
ofWSNs.
WSNs.
Sensors 2017, 17, 69 7 of 19
In our IoT-based system, when a sensor node needs to transmit the periodical information to
In
theour IoT-based
server, then the system,
serverwhen
needsatosensor
verifynode needs tooftransmit
the identity the source thenode.
periodical information
The next step is theto the
server, then the server needs to verify the identity of the source node. The
anonymous confirmation phase where the communication to be initiated from the source node next step is the anonymous
to
confirmation phase where the communication to be initiated from the source node
server is validated. A unique key (KAPI) is assigned to each sensor node for accessing the channel to server is validated.
of
the server
A unique key (Kthrough
API ) is the securedtomedium.
assigned The communication
each sensor node for accessing can be theinitiated
channelonofthethebasis
serverof K
through
API
confirmation
the secured medium. in order
Thetocommunication
develop proper trust
can bebetween the on
initiated source
the and
basisdestination nodes. After this,
of KAPI confirmation in order
the server
to develop produces
proper trust abetween
tracking the
sequence
source(Ts),
andwhich is a sequence
destination nodes.valueAfterofthis,
32-bit.
theThis sequence
server produces
value was arbitrarily generated on the basis of observing the location of the source node. In
a tracking sequence (Ts), which is a sequence value of 32-bit. This sequence value was arbitrarily
particular, for each request of the sensor node, the server produces arbitrary value n and then locates
generated on the basis of observing the location of the source node. In particular, for each request
Ts = n and maintains a record in its database, which can assist the server to observe and record the
of themost
sensor node,
current theeach
Ts for server produces
unique arbitrary
KAPI of every sensorvalue
node inn the
andnetwork.
then locates Ts = n and
This sequence valuemaintains
can be a
record in its database, which can assist the server to observe and record the most
utilized to accelerate the authentication procedure as well as to avoid any replay endeavor from any current Ts for each
unique KAPI ofand
attacker, everyby sensor
lookingnode in the
at the network.
Ts value This sequence
in comparison withvalue can be utilized
the accumulated numberto accelerate
in the the
authentication
database, theprocedure
server ascanwell as toout
figure avoid
the any replay
source endeavor
node. from any
Now, source attacker,
nodes cannot and by looking
deny their at
the Tsauthenticity of the message
value in comparison with thesent from them.number
accumulated Now, during the execution
in the database, of thecan
the server anonymous
figure out the
sourceauthentication
node. Now, phase, sourceifnodes
the Tscannot
provideddenyby their
any sensor node doofnot
authenticity thematch
messagewithsent
the from
accumulated
them. Now,
value in the server then the server instantly ends the connection. In the
during the execution of the anonymous authentication phase, if the Ts provided by any sensor case where the server cannotnode
locate any Ts, the server will need to validate the reserved key (KID) for emergency data
do not match with the accumulated value in the server then the server instantly ends the connection.
transmission, thereafter it attempts to identify the tracking sequence number for emergency data
In the case where the server cannot locate any Ts, the server will need to validate the reserved key (KID )
(Te). If successfully validated, then data transmission between the source node and the server can be
for emergency data transmission, thereafter it attempts to identify the tracking sequence number for
emergency data (Te). If successfully validated, then data transmission between the source node and the
server can be started. Furthermore, the next level of authentication for the network involves service
Sensors 2017, 17, 69 8 of 19
Consider a sensor node that transmits the specific data collected form TMP36 at time (t) by using
the proposed TBSA, and sensor’s unique identification (ID) is represented as (u). Furthermore, t and u
are given as input to the square-sum and multiplicative operators. The multiplicative operator simply
multiplies the t and u, and the outcome of this operator is denoted by m as shown in Equation (1).
The square-sum operator initially squares the t and u values independently and then the squared
values are summed to produce the final output (A) as shown in Equation (2):
m = ( u ) ∗ (t) (1)
A = t2 + u2 (2)
The triangular logical function is further used to produce logical parameter, the input to this
function includes three values such as t, u, and α. Consider a STU triangle, which does not include a
right angle. The t and u are acting as two sides of the STU triangle as shown in Figure 5, where addition
of these two values is acting as the corresponding angle (α) for the third side (s) of triangle STU as
shown in Equation (3), and the line UW drawn from the vertex U is perpendicular to ST. Now,
SUW is a right angle triangle, l and d are its two sides, the values of these sides can be calculated
by Equations (4) and (5). Furthermore, l, u and d are used to calculate third side (s) of triangle STU
by applying Pythagoreans theorem as shown in Equation (6). By substituting values of l and d in
Equation (6), we get Equation (7). By expanding the right hand side of Equation (7), we obtained
Equations (8) and (9):
α = (t + u)/2 (3)
s2 = l 2 + (u − d )2 (6)
As sin2 ∠ α + cos2 ∠ α = 1, by putting this value in Equation (9), we get Equation (10):
Triangular cosine function is applied to the angle (α) as demonstrated in Equation (11):
By inserting the output values from Equations (1), (2) and (11) into Equation (10) to generate
triangular logical parameter (s2 ) as shown in Equation (12):
s2 = A − 2m ∗ (alpha) (12)
Sensors 2017, 17, 69 10 of 19
The squaring operator is applied to the logical triangular parameter, and the output of this
operator is expressed in Equation (13). Equation (14) represents the final key (K) which is utilized for
data authentication between the source and destination nodes, where n is the number of hours per day:
Suppose M represents the original message from the source node to be encrypted and
authenticated, K is the authentication key, t is the transmission time and u represent the unique sensor
identification. The encryption for the TBSA takes in M, K, t and u, and generates the cipher-text C by
using Equation (15) and it is expanded in Equation (16). At the same time, using M, TBSA generates the
Sensors 2017, 17, 69 10 of 19
cipher-text C and a Tag of length TL . Moreover, this pair (C, TL ) is transmitted to the receiver. The M
can be variable, unlike
Suppose M other traditional
represents symmetric
the original message ciphers
from the where
source the
nodedata
to belength needs
encrypted andto be fixed.
authenticated,
This unique feature makes K is the
ourauthentication
proposed TBSA key, t algorithm
is the transmission time and u represent
more energy-efficient. the unique
Because sometime the
sensor identification. The encryption for the TBSA takes in M, K, t and u, and generates the
source node has less information than their block size of message, fixing this challenge is a mandatory
cipher-text C by using Equation (15) and it is expanded in Equation (16). At the same time, using M,
requirement
TBSA forgenerates
many symmetric algorithms.
the cipher-text C and a Tag Even forTless
of length information, fixed block sizes are sent in the
L. Moreover, this pair (C, TL) is transmitted to
traditionalthe
encryption
receiver. Thealgorithms. Thisunlike
M can be variable, wastes a lot
other of resources
traditional and
symmetric power
ciphers during
where data
the data transmission
length
needs
between the to be fixed.
source This unique feature
and destination nodes.makes our proposed
Therefore, TBSA algorithm
our proposed more energy-efficient.
algorithm takes advantage of the
Because sometime the source node has less information than their block size of message, fixing this
variable block sizes for data encryption in order to provide energy-efficient security:
challenge is a mandatory requirement for many symmetric algorithms. Even for less information,
fixed block sizes are sent in the traditional encryption algorithms. This wastes a lot of resources and
power during data transmission between C =the ⊕ t) ∗and
(usource M/ (K )
destination nodes. Therefore, our proposed (15)
algorithm takes advantage of the variable block sizes for data encryption in order to provide
n
energy-efficient security: C = ( M ∗ (u ⊕ t ))/ ( ∑ t =1
(s + t + u)/2) (16)
C (u t ) * M / ( K ) (15)
The receiver performs decryption on C to obtain M by using Equation (17) and it is expanded
in Equation (18). Subsequently, the C receiver t )) / (tn1(s that
(M *(u guarantees t u)the
/ 2) received Tag is anticipated.
(16) If the
destination node calculates dissimilar Tag then the cipher message will be unacceptable. In this case,
The receiver performs decryption on C to obtain M by using Equation (17) and it is expanded in
if the M involves n blocks of data, then TBSA requires only n + 1 encryption to sustain both the
Equation (18). Subsequently, the receiver guarantees that the received Tag is anticipated. If the
confidentiality and integrity:
destination node calculates dissimilar Tag then the cipher message will be unacceptable. In this case,
= C ∗requires
M TBSA
if the M involves n blocks of data, then K/(u ⊕ t) n + 1 encryption to sustain both the
only (17)
confidentiality and integrity:
n
M = C ∗ (∑t=1 (s + t + u)/2)/(u ⊕ t) (18)
M C*K/ (u t) (17)
The proposed TBSA, apart from data confidentiality, privacy, and integrity, also guarantees the
M C *(tn1(s t u) / 2) / (u t) (18)
data freshness by utilizing the incremental operator (Io) with limit up to N. The Io constantly gives
an updated additional
The proposedvalue
TBSA, similar to adata
apart from counter, which privacy,
confidentiality, is obtained from an
and integrity, incrementing
also guarantees the operation.
data freshness
Consequently, by utilizing
it is very the incremental
much essential thatoperator
both the (Io)source
with limit up to
and N. The Io constantly
destination nodesgives an a distinct
utilize
updated additional value similar to a counter, which is obtained from an incrementing operation.
fresh nonce N for every transmission. Now, the proposed IoT-based home automation system includes
Consequently, it is very much essential that both the source and destination nodes utilize a distinct
the TBSA fresh
mechanism
nonce N using
for everythetransmission.
unique authentication
Now, the proposed key KIoT-based
and fresh nonce
home N for data
automation systemencryption.
Furthermore, the the
includes server
TBSAobtains
mechanism the periodic updates
using the unique from the source
authentication node
key K and to nonce
fresh checkNthefor confidentiality,
data
encryption.
privacy, integrity, Furthermore,
and freshnesstheofserver obtains theinformation.
the collected periodic updates from the source node to check the
confidentiality, privacy, integrity, and freshness of the collected information.
Figure
Figure5. TriangleSTU.
5. Triangle STU.
In smart home
In smart home automation
automation applications,
applications, the the assessment
assessment of of the
the source
source nodenode location
location is is very
very
significant. In real-time applications, if there is no smart tracking method
significant. In real-time applications, if there is no smart tracking method available, this can permit available, this can permit
the
the hacker
hacker to transmit
to transmit erroneous
erroneous location location
by theby the initiating
initiating false signals.
false signals. Our proposed
Our proposed IoT-based IoT-based
system
system
can easily cansolve
easilythis
solve this problem.
problem. When the When the desires
server server desires to recognize
to recognize the sourcethe source node location,
node location, then it
then it will exercise the tracking sequence number Ts identity
will exercise the tracking sequence number Ts identity which is the physical association betweenwhich is the physical association
the
between
sensor node the and
sensor
the node
serverand the server
(secured (securedConsequently,
localization). localization). the Consequently,
server will also the inquire
server will also
the node
inquire
to present theitsnode to present
identity. its identity.
After that, the server After that, the server
substantiates substantiates
the Ts provided by the the Ts provided
node by the
by contrasting it
node by contrasting it with the accumulated value of its record, and
with the accumulated value of its record, and subsequently figures out the source node. Now, if the subsequently figures out the
source node.isNow,
verification if the verification
successful, then the server is successful,
can trust then
on the theauthenticity
server can trustof the onnode
the authenticity of the
(trustworthiness).
node (trustworthiness). Once the source entity identity is recognized, the
Once the source entity identity is recognized, the source node cannot deny its authenticity for sending source node cannot deny
its authenticity for sending the originated messages thus fulfilling one
the originated messages thus fulfilling one of the major non-repudiation security requirements of IoT.of the major non-repudiation
security requirements
At level of IoT. of channel ID and field ID are used to decide either to send data from
2, the verification
the server to destination or not.ofFirstly,
At level 2, the verification channelatID and
this field
level ofID are used to decide
authentication, securityeither to send
service setdata from
identifier
the server
(SSID) andtonetwork
destination or not.validation
password Firstly, at will
this be
level of authentication,
checked. After proper security service
validation set SSID
of the identifier
and
(SSID) and network password validation will be checked. After proper
password, the server will check the channel and field IDs. The cipher text generated from source node validation of the SSID and
password, the server will check the channel and field IDs. The cipher
using the proposed TBSA is transmitted to the server if there is a match in IDs. In cases where there is text generated from source
node usingthe
no match, thereceiving
proposednode(s)
TBSA is transmitted
will not be given to the server
access if there
to the is a match
network (accessincontrol).
IDs. In cases
To keepwhere
out
there is no match, the receiving node(s) will not be given access to the
potential attackers, it is needed to recognize each user and each device on the network so as to enforcenetwork (access control). To
keep out potential attackers, it is needed to recognize each user and each
security policies. After proper access control, all the network resources will be available in timely device on the network so as
to enforce
manner tosecurity
the validpolicies. After proper access
nodes (availability). Finally,control, all the network
at the receiver end, by resources
using the will be availablekey,
authentication in
timely manner to the valid nodes (availability). Finally, at
the original medical information can be recovered. Hence, WSN implemented based on the proposed the receiver end, by using the
authentication
TBSA provideskey, the original
a secured, medical information
less computationally can beand
complex, recovered. Hence, WSN
energy-efficient implemented
data encryption to
based on the proposed TBSA provides a secured,
monitor data remotely from between the source and destination nodes. less computationally complex, and energy-efficient
data encryption to monitor data remotely from between the source and destination nodes.
Pss =
P VVss ∗
* IIss (19)
(19)
EEss= PPss ∗* T
Ts
s
(20)
(20)
Figure
Figure 7.
7. Experimental
Experimental setup
setup for
for investigating
investigating the energy consumption.
the energy consumption.
5. Experiment
5. Experiment Results
Results and
and Discussion
Discussion
This section
This sectionmainly includes
mainly the temperature
includes measurement
the temperature using a using
measurement TMP36a sensor
TMP36(Sparkfun
sensor
Electronics, Niwot, CO, USA), proposed TBSA-based data encryption to provide secure
(Sparkfun Electronics, Niwot, CO, USA), proposed TBSA-based data encryption to provide secure data
transmission, and performance comparisons of proposed TBSA with traditional symmetric
data transmission, and performance comparisons of proposed TBSA with traditional symmetric and and hash
ciphers,
hash and security
ciphers, mechanisms
and security developed
mechanisms for WSNs
developed including
for WSNs Alarm-Net,
including PRESENT-GRP
Alarm-Net, PRESENT-GRPand
PAWN
and PAWNin terms of energy-efficiency.
in terms of energy-efficiency.
5.1. Temperature
5.1. Measurement
Temperature Measurement
In this
In this study,
study, low low voltage
voltage temperature
temperature (TMP36)(TMP36) sensors
sensors were
were used
used toto sense
sense the
the environment
environment
temperature. The TMP36 utilizes a solid-state method to measure the temperature
temperature. The TMP36 utilizes a solid-state method to measure the temperature in C, and in °C,
◦ and it
it does
does
not require
not requireany anyexternal
external calibration
calibration to deliver
to deliver characteristic
characteristic accuracies
accuracies for different
for different temperature
temperature levels.
levels. This sensor is operated by a single power supply having
This sensor is operated by a single power supply having a range of 2.7 to 5.5 V. a range of 2.7 to 5.5 V.
The actual
The actual output
output fromfrom TMP36
TMP36 is is in
in ADC;
ADC; the the ADC
ADC value
value should
should bebe converted
converted intointo the
the correct
correct
voltage (V
voltage (VTMP
TMP).).The
TheADC ADCvalue
value (ADC
(ADCoutput ) is initially compared with the reference voltage of 5 V as
output ) is initially compared with the reference voltage of 5 V as
shown in Equation (20) and then the characteristics
shown in Equation (20) and then the characteristics of of the
the TMP36
TMP36 are used to
are used to obtain
obtain the
the temperature
temperature
(T) as
(T) as represented
represented by by the
the Equation
Equation (21).
(21). The
The linear
linear relationship
relationship between
between voltage
voltage andand temperature
temperature isis
shown in Figure
shown in Figure 8: 8:
Figure 8. Temperature
Figure 8. Temperaturevalues
values against corresponding
against corresponding voltage
voltage values.
values.
Figure
Figure
Further, the proposed 9. Original
9. Original
TBSA message
message
is applied from
tofrom sensor node
sensor
the original node 1 1and
messages and sensor node
sensor
from 2.
node
both 2. nodes in order
sensor
to obtain the cipher messages as shown in Figure 10, which were later uploaded to the server. The
Further,
received data the proposed
at the server TBSAa is
from appliednode
different to thecan
original messages
be stored from both
in different sensor
in thenodes in order
Further,
to obtain
the proposed
thefields
TBSA
cipherinmessages
is applied toFigure
the original messages from fields
both sensor same
nodes channel
inThe
order to
or different differentaschannels.
shown inThe 10, which
different fieldswere later uploaded
separate to the server.
the information from each
obtain the cipher
received datamessages
at the as shown in Figurenode
10, which were
storedlater uploaded to the server. The received
subject, through thisserver fromfrom
way; data a different
each node can can
bebeunderstood in different
easily. Infields in the
this research,same channel
channel ID
data at the
or 110980server
different from a different node can be stored in different fields in the same channel or different
is forfields in different
both sensor nodes.channels. The
The single different
channel canfields
have separate
maximumthe information
support up to 8from each
different
fieldssubject,
in different
through channels.
this way;Thedatadifferent
from eachfields
node canseparate the information
be understood from
easily. In this each subject,
research, channelthrough
ID
is 110980
this way; data for
fromboth
eachsensor
nodenodes.
can beThe single channel
understood canInhave
easily. this maximum support ID
research, channel up is
to 110980
8 different
for both
sensor nodes. The single channel can have maximum support up to 8 different fields by using the
ThingSpeak server. The field ID assigned for sensor node 1 is “1” and for a sensor node 2 is “5”.
Sensors 2017, 17, 69 14 of 19
Figure 11.Figure
Energy11. Energy consumption comparison of proposed TBSA (a) with Hash Functions; (b) with
consumption comparison of proposed TBSA (a) with Hash Functions; (b) with
Symmetric Cipher.
Symmetric Cipher.
Sensors
Sensors 2017,
2017, 17,
17, 69
69 16
16 of
of 19
19
Figure 12.
Figure Energy consumption
12. Energy consumption comparison
comparison of
of proposed
proposed TBSA
TBSA with
with security
security mechanisms
mechanisms developed
developed
for WSNs.
for WSNs.
It
It has
has been
been observed
observed from
from Figures
Figures 11
11 and
and 12
12 that
that the
the proposed
proposed TBSA
TBSA algorithm
algorithm requires
requires less
less
energy
energy for its implementation in comparison with traditional security methods. As a simple
for its implementation in comparison with traditional security methods. As a simple and
and
efficient
efficient key
key generation
generation mechanism
mechanism is is used
used in
in TBSA,
TBSA, therefore
therefore less
less energy
energy is
is consumed.
consumed. Therefore,
Therefore,
the
the proposed secure IoT-based home automation incorporates the proposed TBSA and
proposed secure IoT-based home automation incorporates the proposed TBSA and low
low power
power
Wi-Fi in WSNs with internet for providing efficient and secure data transmission among several
nodes at wide coverage range.
Sensors 2017, 17, 69 17 of 19
Wi-Fi in WSNs with internet for providing efficient and secure data transmission among several nodes
at wide coverage range.
Table 3. Energy consumption comparison with security methods designed for WSNs.
6. Conclusions
This paper proposed secured IoT-based home automation applications using WSNs. In WSNs,
because of the limited computational power of sensor nodes, an efficient security mechanism based
on effective key generation mechanism which could accomplish all major data security requirements
and consumes less processing time for data encryption is well needed. In this study a security
algorithm, namely TBSA, based on a simple and efficient key generation procedure is developed.
The proposed IoT integrates low power Wi-Fi and the proposed TBSA in WSNs with internet to
provide additional benefits of increased coverage range and capability of supporting large number
of sensor nodes due to usage of low power Wi-Fi module; it also consumes less processing time for
data encryption because of the utilization of the proposed TBSA algorithm. The experimental results
obtained from the hardware implementation have elaborated that the proposed algorithm TBSA is
more energy-efficient for data encryption than all compared approaches. Furthermore, it has been
verified in this study that developed IoT platform fulfills all major security requirements including
network security (secure localization, non-repudiation, availability, access control, trustworthiness and
authentication) and data security (confidentiality, privacy, integrity, and data freshness).
In near future, proposed IoT platform will be implemented for different applications such
as medical monitoring and emergency response, agriculture, healthcare, energy management,
and industrial automation. Additionally, we will develop an efficient biometric-based security
algorithm based on Heart Rate Variability (HRV) to secure modern healthcare system using
Wireless Body Sensor Networks (WBSNs). The time-domain parameters of HRV such as Standard
Deviation of NN interval (SDNN) and Root-Mean Squared of the Successive Differences (RMSSD)
along with TBSA will be used for key generation or entity identifications in WBSNs.
Acknowledgments: This work was supported in part by the Science Technology and Innovation Committee of
Shenzhen for research projects (Grant CXZZ20140909004122087, JYJC20130327093948937, JCYJ20140416141331483,
JCYJ20150529164154046 and JCYJ20130401164750005), Guangdong Image-guided Therapy Innovation Team
(2011S013), the Guangzhou Science and Technology Planning Project (No. 2014J4100153 & No. 2016A030310129).
Author Contributions: Pirbhulal, S., Zhang, H. and Alahi, M.E. illustrated the research theme and fulfilled the
literature study; Pirbhulal, S., Ghayvat, H. and Wu, W. scrutinized the data, developed Methods and Experiments;
Pirbhulal, S., Zhang, H. and and Wu, W. interpreted the results and wrote the paper; Pirbhulal, S. and Zhang, H.
and carried out the whole experiments; and Mukhopadhyay, S.C. and Zhang, Y.T. assisted to supervise the field
activities and formulated the study’s systematic strategy.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Ghayvat, H.; Mukhopadhyay, S.; Liu, J.; Babu, A.; Alahi, M.E.E.; Gui, X. Internet of things for smart homes
and buildings. Aust. J. Telecommun. Digit. Econ. 2015, 3, 33–47. [CrossRef]
2. He, D.; Chan, S.; Guizani, M.; Yang, H.; Zhou, B. Secure and distributed data discovery and dissemination in
wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 2015, 26, 1129–1139. [CrossRef]
Sensors 2017, 17, 69 18 of 19
3. Ghormare, S.; Sahare, V. Implementation of data confidentiality for providing high security in wireless sensor
network. In Proceedings of the 2015 International Conference on Innovations in Information, Embedded
and Communication Systems (ICIIECS), Coimbatore, India, 19–20 March 2015.
4. Ghayvat, H.; Liu, J.; Mukhopadhyay, S.C.; Gui, X. Wellness sensor networks: A proposal and implementation
for smart home for assisted living. IEEE Sens. J. 2015, 15, 7341–7348. [CrossRef]
5. Venkatasubramanian, K.K.; Banerjee, A.; Gupta, S.K.S. Pska: Usable and secure key agreement scheme for
body area networks. IEEE Trans. Inf. Technol. Biomed. 2010, 14, 60–68. [CrossRef] [PubMed]
6. Poon, C.C.Y.; Zhang, Y.T.; Bao, S.D. A novel biometrics method to secure wireless body area sensor networks
for telemedicine and m-health. IEEE Commun. Mag. 2006, 44, 73–81. [CrossRef]
7. Zinonos, Z.; Vassiliou, V. Inter-Mobility support in controlled 6LoWPAN networks. In Proceedings of the
2010 IEEE Globecom Workshops, Miami, FL, USA, 5–10 December 2010.
8. Jiang, Y.; Zhang, L.; Wang, L. Wireless sensor networks and the internet of things. Int. J. Distrib. Sens. Netw.
2013, 2013, 1578–1584. [CrossRef]
9. Ghaleb, S.M.; Subramaniam, S.; Zukarnain, Z.A.; Muhammed, A. Mobility management for IoT: A survey.
EURASIP J. Wirel. Commun. Netw. 2016, 2016, 1–25. [CrossRef]
10. Li, J.; Zhang, Y.; Chen, Y.-F.; Nagaraja, K.; Li, S.; Raychaudhuri, D. A mobile phone based WSN infrastructure
for IoT over future internet architecture. In Proceedings of the IEEE International Conference on and IEEE
Cyber, Physical and Social Computing, Beijing, China, 20–23 August 2013.
11. Sana, J.H.; Imran, J.A.; Andew, K.H. Light-weight framework for security-sensitive wireless sensor networks
applications. IET Wirel. Sens. Syst. 2013, 3, 298–306.
12. Mondal, B.; Priyadarshi, A.; Hariharan, D. An improved cryptography scheme for secure image
communication. Int. J. Comput. Appl. 2013, 67, 23–27. [CrossRef]
13. Roman, R.; Alcaraz, C.; Lopez, J.; Sklavos, N. Key management systems for sensor networks in the context of
the internet of things. Comput. Electr. Eng. 2011, 37, 147–159. [CrossRef]
14. Mandal, S.; Chaki, R. A secure encryption logic for communication in wireless sensor networks. Int. J.
Cryptogr. Inf. Secur. 2012, 2, 78–82. [CrossRef]
15. Dargie, W. Dynamic power management in wireless sensor networks: State-of-the-art. IEEE Sens. J. 2012, 12,
1518–1528. [CrossRef]
16. Castagnetti, A.; Pegatoquet, A.; Le, T.N.; Auguin, M. A joint duty-cycle and transmission power management
for energy harvesting WSN. IEEE Trans. Ind. Inform. 2014, 10, 928–936. [CrossRef]
17. Ahmed, N.; Rahman, H.; Hussain, M.I. A comparison of 802.11 AH and 802.15. 4 for IoT. ICT Express 2016, 2,
100–102. [CrossRef]
18. Antonio, G.; Ruzzelli, A.; Giancarlo, F.; Antonio, G.R.; Gregory, O.H. A WSN-based building management
framework to support energy-saving applications in buildings. Adv. Distrib. Comput. Internet Technol.
Trends Issues 2011, 1, 161–174.
19. Rashidi, P.; Cook, D.J. Com: A method for mining and monitoring human activity patterns in home-based
health monitoring systems. ACM Trans. Intell. Syst. Technol. 2013, 4, 64. [CrossRef]
20. Cicirelli, F.; Fortino, G.; Giordano, A.; Guerrieri, A.; Spezzano, G.; Vinci, A. On the design of smart homes:
A framework for activity recognition in home environment. J. Med. Syst. 2016, 40, 1–17. [CrossRef] [PubMed]
21. Granjal, J.; Edmundo, M.; Jorge, S.S. Security for the internet of things: A survey of existing protocols and
open research issues. IEEE Commun. Surv. Tutor. 2015, 17, 1294–1312. [CrossRef]
22. Hennebert, C.; Dos Santos, J. Security protocols and privacy issues into 6LoWPAN stack: A synthesis.
IEEE Inter. Things J. 2014, 1, 384–398. [CrossRef]
23. Raza, S.; Voigt, T.; Jutvik, V. Lightweight IKEv2: A key management solution for both the compressed ipsec
and the IEEE 802.15. 4 security. In Proceedings of the IETF Workshop on Smart Object Security, Paris, France,
23 March 2012.
24. Kasraoui, M.; Cabani, A.; Chafouk, H. Ikev2 authentication exchange model in ns-2. In Proceedings
of the 2014 International Symposium on Computer, Consumer and Control (IS3C), Taichung, Taiwan,
10–12 June 2014.
25. Rghioui, A.; Bouhorma, M.; Benslimane, A. Analytical study of security aspects in 6lowpan networks.
In Proceedings of the 5th International Conference Information and Communication Technology for the
Muslim World (ICT4M), Rabat, Morocco, 26–27 March 2013.
Sensors 2017, 17, 69 19 of 19
26. Aakash, D.; Shanthi, P. Lightweight security algorithm for wireless node connected with IoT. Indian J.
Sci. Technol. 2016, 9, 1–8. [CrossRef]
27. Wood, A.; Virone, G.; Doan, T.; Cao, Q.; Selavo, L.; Wu, Y.; Fang, L.; He, Z.; Lin, S.; Stankovic, J.
Alarm-net: Wireless sensor networks for assisted-living and residential monitoring. Univ. Va. Comput.
Sci. Dep. Tech. Rep. 2006, 2, 1–14.
28. Gope, P.; Hwang, T. Bsn-care: A secure IoT-based modern healthcare system using body sensor network.
IEEE Sens. J. 2016, 16, 1368–1376. [CrossRef]
29. Dobbertin, H. Cryptanalysis of MD4. In Proceedings of the International Workshop on Fast Software
Encryption, Cambridge, UK, 21–23 February 1996.
30. Deepakumara, J.; Heys, H.M.; Venkatesan, R. Fpga implementation of MD5 hash algorithm. In Proceedings
of the Canadian Conference on Electrical and Computer Engineering, Toronto, ON, Canada, 13–16 May 2001.
31. Zibin, D.; Ning, Z. Fpga implementation of SHA-1 algorithm. In Proceedings of the 5th IEEE International
conference on ASIC, Beijing, China, 21–24 October 2003.
32. Bellare, M.; Canetti, R.; Krawczyk, H. Message authentication using hash functions: The hmac construction.
RSA Lab. CryptoBytes 1996, 2, 12–15.
33. Horta, E.L.; Lockwood, J.W.; Taylor, D.E.; Parlour, D. Dynamic hardware plugins in an fpga with partial
run-time reconfiguration. In Proceedings of the 39th annual Design Automation Conference, New Orleans,
LA, USA, 10–14 June 2002.
34. Mandal, A.K.; Parakash, C.; Tiwari, A. Performance evaluation of cryptographic algorithms: Des and aes,
Electrical. In Proceedings of the 2012 IEEE Students’ Conference on Electronics and Computer Science
(SCEECS), Bhopal, India, 1–2 March 2012.
35. Chang, D.; Gupta, K.C.; Nandi, M. Rc4-hash: A new hash function based on RC4. In Proceedings of the
International Conference on Cryptology, Kolkata, India, 11–13 December 2006.
36. Schneier, B. Description of a new variable-length key, 64-bit block cipher (blowfish). In Proceedings of the
International Workshop on Fast Software Encryption, Cambridge, UK, 9–11 December 1993.
37. Mian, J.; Priyadarsi, N.; Muhammad, U.; Xiangjian, H. PAWN: A payload-based mutual authentication
scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 2016, 1, 1–10.
38. Nia, A.M.; Jha, N.K. A comprehensive study of security of internet-of-things. IEEE Trans. Emerg. Top. Comput.
2016, 1, 1–21.
39. Sicari, S.; Alessandra, R.; Luigi, A.G.; Alberto, C.P. Security, privacy and trust in Internet of Things: The road
ahead. Comput. Netw. 2015, 76, 146–164. [CrossRef]
40. Jing, Q.; Athanasios, V.V.; Wan, J.; Lu, J.; Qiu, D. Security of the internet of things: Perspectives and challenges.
Wirel. Netw. 2014, 8, 2481–2501. [CrossRef]
© 2016 by the authors; licensee MDPI, Basel, Switzerland. This article is an open access
article distributed under the terms and conditions of the Creative Commons Attribution
(CC-BY) license (http://creativecommons.org/licenses/by/4.0/).