Provide an algorithm for connecting bootstrap-based smart objects to the cloud, using asymmetric encryption

Document Type : Research Paper


Department of Electrical and Computer Engineering, Isfahan University Of Technology, Isfahan, Iran


Cloud computing and the Internet of Things have both experienced rapid and independent evolution. These two technologies are very different from each other and most of their features complement each other. These properties, which complement other technologies, are the main reason why researchers propose to integrate these two technologies, which in certain cases can be of great benefit. Therefore, the present study aimed to provide an algorithm for the connection of smart objects based on bootstrapping with the cloud, using asymmetric cryptography. In terms of purpose, this research is in the category of applied research. All relevant documents from written sources, including books, articles published in reputable scientific-research journals, research reports on the subject and academic dissertations, and valid Internet resources, and Related to the subject are studied and used. Using the public key on a resource-limited smart device with CoAP, we learn how to obtain a 3GPP-based public bootstrap architecture to ensure authentication and connectivity across a variety of devices. Then, with the help of standard protocols, including RADIUS and EAP, without the need to install new software on the phone, it is possible to automatically set up a wireless network with content to communicate with the cloud. Improved protocols meet the requirements of key IoT security services such as privacy, publicity, and credibility, and can achieve better performance with lower communication costs. On the other hand, the goal of most methods is to increase the scalability and performance of the system and control access to prevent unauthorized access.


[1] M. Antikainen, M. Sethi, S. Matetic and T. Aura, Commitment-based device-pairing protocol with synchronized drawings and comparison metrics, Pervasive Mobile Comput. 16 (2015), 205–219.
[2] M. Chen, S. Gonzalez, Q. Zhang and M.V.C. Leung, Software agent-based intelligence for code-centric RFID systems, IEEE Intell. Syst. 25 (2010), 12–19.
[3] U. Gasser, R. Faris and R. Heacock, Internet monitor 2013: Reflections on the digital world, Berkman Center Res. Pub. 27 (2013).
[4] G. Giaretta, J. Kempf and V. Devarapalli, Mobile IPv6 bootstrapping in split scenario (No. RFC 5026), Network Working Group, 2007.
[5] J. Gubbi, R. Buyya, S. Marusic and M. Palaniswami, Internet of things (IoT): A vision, architectural elements, and future directions, Future Gen. Comput. Syst. 29 (2013), no. 7, 1645–1660.
[6] S. Hartman and J. Howlett, A GSS-API mechanism for the extensible authentication protocol, JANET(UK), 2013.
[7] T. Hannes, Enriching bootstrapping with authorization information, IETF 2005 (2005), 1-26.
[8] I. Ishaq, D. Carels, G. K. Teklemariam, J. Hoebeke, F.V.D. Abeele, E.D. Poorter and P. Demeester, IETF standardization in the field of the internet of things (IoT): Asurvey, J. Sensor Actuator Networks 2 (2013), no. 2, 235–287.
[9] V. Karagiannis, P. Chatzimisios, F. Vazquez-Gallego and J. Alonso-Zarate, A survey on application layer protocols
for the internet of things, Trans. IoT Cloud Comput. 3 (2015), no. 1, 11–17.
[10] Y. Liao and Ch. Hsiao, A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol, Ad Hoc Networks. 18 (2014), 133–146.
[11] G. Marsh, A.P. Sampat, S. Potluri and D.K. Panda, Scaling advanced message queuing protocol (AMQP) architecture with broker federation and infiniband, Ohio State University, Tech. Rep. 38 (2008).
[12] P. Mell and T. Grance, The NIST definition of cloud computing, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Gaithersburg, 2011.
[13] M. Nakhjiri, AAA and network security for mobile access: Radius, diameter, EAP, PKI and IP mobilit, John Wiley and Sons, Hoboken, NJ, USA, 2005.
[14] A. Neto, H. Patil, L. Oliveira, A. Souza, I. Cunha and M. Nogueira, Aot: Authentication and access control for the entire iot device life-cycle, Proc. 14th ACM Conf. Embedded Network Sensor Syst. CD-ROM, 2016, pp. 1–15.
[15] J. Nieminen, T. Savolainen, M. Isomaki, B. Patil, Z. Shelby and C. Gomez, IPv6 over bluetooth(r) low energy, IETF, RFC7668, 2015.
[16] K. Rose, S. Eldridge and L. Chapin, The internet of things: An overview, Internet Soc. 80 (2015), 1–50.
[17] H. Shuai and X. Jianchuan, Ensuring data storage security through a novel third party auditor scheme in cloudcomputing, IEEE Int. Conf. Cloud Comput. Intell. Syst. IEEE, 2011, pp. 264–268.
[18] Z. Shelby and C. Bormann, 6LoWPAN: The wireless embedded internet, Vol. 43, John Wiley and Sons, 2011.
[19] G. Suciu, A. Vulpe, S. Halunga, O. Fratu, G. Todoran and V. Suciu, Smart cities built on resilient cloud computing and secure internet of things, 19Th Int. Conf. Control Syst. Comput. Sci., 2013.
[20] D. Thaler, H. Tschofenig and M. Barnes, Architectural considerations in smart object networking, Tech. RFC 7452 (2015).
[21] J.R. Vacca, Computer and information security handbook, 2nd ed., Morgan Kaufmann: San Francisco, CA, USA, 2013.
[22] K. Vamsee and R. Sriram, Data security in cloud computing, J. Comput. Math. Sci. 2 (2011), 1–169.
[23] M. Vuˇcini´c, B. Tourancheau, F. Rousseau, A. Duda, L. Damon and R. Guizzetti, OSCAR: Object security architecture for the internet of things, Ad Hoc Networks 32 (2015), 3–16.
[24] R.H. Weber, Internet of Things–New security and privacy challenges, Comput. Law Security Rev. 26 (2010), no. 1, 23–30.
[25] R. Westerholt and B. Resch, Asynchronous Geospatial Processing: An Event-Driven Push-Based Architecture for the OGC Web Processing Service, Trans. GIS 19 (2015), no. 3, 455–479.
[26] Q. Zhang, L. Cheng and R. Boutaba, Cloud computing: state-of-the-art and research challenges, J. Internet Serv. Appl. 1 (2010), no. 1, 7–18.
Volume 14, Issue 1
January 2023
Pages 2101-2110
  • Receive Date: 15 February 2022
  • Revise Date: 19 March 2022
  • Accept Date: 25 May 2022