2017
DOI: 10.7717/peerj-cs.114
|View full text |Cite
|
Sign up to set email alerts
|

A survey of secure middleware for the Internet of Things

Abstract: The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), is creating a new set of challenges to create secure, private infrastructures. This paper reviews the current literature on the challenges and approaches to security and privacy in the Internet of Things, with a strong focus on how these aspects are handled in IoT middleware. We focus on IoT middleware because many systems are built from existing middleware and these inherit the underlying security properties of the mi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
3
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 58 publications
(13 citation statements)
references
References 95 publications
0
13
0
Order By: Relevance
“…The prototype of the IG is called IGNITE (Intelligent Gateway for Network IoT Environments). 2 IGNITE runs in a Docker cloud container environment and has access to control this Docker environment. When a device or TPA initiates an MQTT connection with the CONNECT packet, IGNITE first validates the bearer token by calling the DIdP's introspection API.…”
Section: Ignitementioning
confidence: 99%
See 2 more Smart Citations
“…The prototype of the IG is called IGNITE (Intelligent Gateway for Network IoT Environments). 2 IGNITE runs in a Docker cloud container environment and has access to control this Docker environment. When a device or TPA initiates an MQTT connection with the CONNECT packet, IGNITE first validates the bearer token by calling the DIdP's introspection API.…”
Section: Ignitementioning
confidence: 99%
“…After the user authorises the Sample TPA to access IGNITE, the sample app is loaded. This uses MQTT over WebSockets to 2 Please note that there is another IoT framework with a similar name. These systems are unrelated and the system described here predates the other system: https://www.iot-ignite.com/ 3 https://github.com/eclipse/mosquitto.rsmb communicate and presents a simple UI, which allows users to interact with the device.…”
Section: Sample Third-party Applicationmentioning
confidence: 99%
See 1 more Smart Citation
“…To our knowledge, Fremantle and Scott [12] were the first authors that discussed IoT security and privacy, also considering blockchains. However, they merely remarked that blockchains may have potential in solving the cloud integrity and authentication problems for IoT, not considering the potential challenges.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, tiny objects, for instance light bulbs, may not be able to apply such techniques directly without some modifications due to their limited resources in terms of battery life, memory storage, and computational power [3,5]. To this end, several research proposals have been proposed in this regard, and they can be classified broadly into three categories: (i) gateway-based solutions [6][7][8], (ii) IoT stack-based solutions [9][10][11][12][13], and (iii) middleware-based solutions [14][15][16][17][18]. Despite the benefits of using such solutions for addressing some IoT security concerns (e.g., secure communication), they suffer from some shortcomings.…”
Section: Introductionmentioning
confidence: 99%