Secure Data Exchange For Internet of Things Devices

IoT devices are mostly used in our houses and various sensors in IoT device is performing different tasks or combination of tasks e.g. that device is sensing the environmental temperature, sensing the humidity level, sensing the level of carbon dioxide and carbon mono oxide and detecting the light o

2025-06-28 16:34:55 - Adil Khan

Project Title

Secure Data Exchange For Internet of Things Devices

Project Area of Specialization Internet of ThingsProject Summary

IoT devices are mostly used in our houses and various sensors in IoT device is performing different tasks or combination of tasks e.g. that device is sensing the environmental temperature, sensing the humidity level, sensing the level of carbon dioxide and carbon mono oxide and detecting the light or objects.

In recent development, IoT devices are being used to collect data (in the form of objects) about the environment which is used in various analyses to improve the life of citizens. The generated data is normally sent over the internet for storing collected objects at centralized environment. The sensed data can be temperature of specific area, humidity level of the house, blood pressure of elderly people or current level of CO2. Some of the collected data is common in nature but it also contains confidential information, which reveals personnel information about a building or person and considered a serious threat to the privacy of the users. For example, by analyzing CO2 level of a meeting room, a person (who has access of that data) can predict that the room is empty or a meeting is going on in that room. Similarly, some sensors are used to monitor blood pressure, sugar level and heartbeat of elderly people, which possess privacy challenges. In order to protect such sensitive information from attackers, we need security services like authentication, confidentiality and data integrity. In addition to that, such data must be available to the authorized person for performing various analyses to take decisions timely.  

Project Objectives

Following are the core objectives of the designed project:

Design and implement a multi-tier application (IoT device App, Web application, RESTful services, Persistent storage) which interacts with each other storing and analysis of IoT data.

IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality and integrity.

Collected data will be analyzed at RESTful services level and will provide various views to the end users for decisions.

Project Implementation Method

Our project will be based on artifact development methodology in which we will follow following steps:

Design of architecture of our project

Design of Security and Data Protocols

Proof of the concept (PoC) of designed architecture

Testing and Verification of implemented PoC

IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality and integrity.

Collected data will be analyzed at RESTful services level and will provide various views to the end users for decisions

Tools: Angular JS, RESTful API, Hibernate, Database Server

Benefits of the Project

Concept of business intelligence with efficient resource utilization.

  1. Security: The ability of the system to protect itself against accidental or deliberate intrusion.
  2. Authenticity: System should be able to communicate to the central database to verify the authenticity of IoT devices.
  3. Efficiency: System should be efficient that it will not get hang if heavy traffic on network will take place.
  4. User-friendly: System should be easily used by the customer in other words should be user-friendly.
Technical Details of Final Deliverable

Our basic purpose is to present the data generated by IoT device to the end users in effective manner. In this project, various components will maintain the history of generated data, analyze that data to generate meaningful information and present that data in graphical representation for easily understandability. Our basic responsibility is to maintain the security of data, apply various analytical schemes to extract meaningful information. For example, we have to transfer the data to the centralized location either deployed in our local data center or in the cloud environment. After transferring the data, we have to perform various analyses on the data and present the data in the form of graphs for decisions. In this project, our main motivation is to learn security concepts and new technologies such as RESTful APIs, analysis algorithms, authentication protocols, secure communication. In general, our aim is that the IoT devices must be authenticated and should be able to exchange information securely to achieve confidentiality, integrity and preserve user’s privacy.

Final Deliverable of the Project Hardware SystemType of Industry IT Technologies Internet of Things (IoT)Sustainable Development Goals Quality Education, Life on LandRequired Resources
Item Name Type No. of Units Per Unit Cost (in Rs) Total (in Rs)
Total in (Rs) 39000
sensor tag Equipment3500015000
raspberry Pi 3 Equipment240008000
external hard disk 500GB Equipment2800016000

More Posts