Secure Data Exchange For Internet of Things Devices
IoT devices are mostly used in our houses and various sensors in IoT device is performing different tasks or combination of tasks e.g. that device is sensing the environmental temperature, sensing the humidity level, sensing the level of carbon dioxide and carbon mono oxide and detecting the light o
2025-06-28 16:34:55 - Adil Khan
Secure Data Exchange For Internet of Things Devices
Project Area of Specialization Internet of ThingsProject SummaryIoT devices are mostly used in our houses and various sensors in IoT device is performing different tasks or combination of tasks e.g. that device is sensing the environmental temperature, sensing the humidity level, sensing the level of carbon dioxide and carbon mono oxide and detecting the light or objects.
In recent development, IoT devices are being used to collect data (in the form of objects) about the environment which is used in various analyses to improve the life of citizens. The generated data is normally sent over the internet for storing collected objects at centralized environment. The sensed data can be temperature of specific area, humidity level of the house, blood pressure of elderly people or current level of CO2. Some of the collected data is common in nature but it also contains confidential information, which reveals personnel information about a building or person and considered a serious threat to the privacy of the users. For example, by analyzing CO2 level of a meeting room, a person (who has access of that data) can predict that the room is empty or a meeting is going on in that room. Similarly, some sensors are used to monitor blood pressure, sugar level and heartbeat of elderly people, which possess privacy challenges. In order to protect such sensitive information from attackers, we need security services like authentication, confidentiality and data integrity. In addition to that, such data must be available to the authorized person for performing various analyses to take decisions timely.
Project ObjectivesFollowing are the core objectives of the designed project:
Design and implement a multi-tier application (IoT device App, Web application, RESTful services, Persistent storage) which interacts with each other storing and analysis of IoT data.
IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality and integrity.
Collected data will be analyzed at RESTful services level and will provide various views to the end users for decisions.
Project Implementation Method- Methodology
Our project will be based on artifact development methodology in which we will follow following steps:
Design of architecture of our project
Design of Security and Data Protocols
Proof of the concept (PoC) of designed architecture
Testing and Verification of implemented PoC
IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality and integrity.
Collected data will be analyzed at RESTful services level and will provide various views to the end users for decisions
Tools: Angular JS, RESTful API, Hibernate, Database Server
Benefits of the ProjectConcept of business intelligence with efficient resource utilization.
- Security: The ability of the system to protect itself against accidental or deliberate intrusion.
- Authenticity: System should be able to communicate to the central database to verify the authenticity of IoT devices.
- Efficiency: System should be efficient that it will not get hang if heavy traffic on network will take place.
- User-friendly: System should be easily used by the customer in other words should be user-friendly.
Our basic purpose is to present the data generated by IoT device to the end users in effective manner. In this project, various components will maintain the history of generated data, analyze that data to generate meaningful information and present that data in graphical representation for easily understandability. Our basic responsibility is to maintain the security of data, apply various analytical schemes to extract meaningful information. For example, we have to transfer the data to the centralized location either deployed in our local data center or in the cloud environment. After transferring the data, we have to perform various analyses on the data and present the data in the form of graphs for decisions. In this project, our main motivation is to learn security concepts and new technologies such as RESTful APIs, analysis algorithms, authentication protocols, secure communication. In general, our aim is that the IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality, integrity and preserve user’s privacy.
Final Deliverable of the Project Hardware SystemType of Industry IT Technologies Internet of Things (IoT)Sustainable Development Goals Quality Education, Life on LandRequired Resources| Item Name | Type | No. of Units | Per Unit Cost (in Rs) | Total (in Rs) |
|---|---|---|---|---|
| Total in (Rs) | 39000 | |||
| sensor tag | Equipment | 3 | 5000 | 15000 |
| raspberry Pi 3 | Equipment | 2 | 4000 | 8000 |
| external hard disk 500GB | Equipment | 2 | 8000 | 16000 |