<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Security Implementation and Verification in Smart Buildings</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>1st Walid Miloud Dahmane</string-name>
          <email>walid.miloud.dahmane@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>2nd Ouchani Samir</string-name>
          <email>souchani@cesi.fr</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>3rd Hafida Bouarfa</string-name>
          <email>dabouarfa@hotmail.com</email>
          <email>hafidabouarfa@hotmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>LINEACT</institution>
          ,
          <addr-line>École d'Ingénieur CESI</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>saad dahlab university</institution>
          ,
          <addr-line>Blida</addr-line>
          ,
          <country country="DZ">Algeria</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-The homes are dangerous environments like outside since it contains risks affect on the life of the inhabitant (humidity, temperature, noise, light, etc.), especially with the increase of the attention on smart homes and buildings in the previous few years where studies focused on the IoT domain exclude partially these risks. Smart homes/buildings are equipped with IoT objects that capture the conflicting changes in a controlled manner and introduce actions that stop or declare the existing threats. A mechanism that guarantees to the inhabitant a stable and comfortable life is more than mandatory. In this context, we propose a global approach that defines the architecture of a smart home/building by formalizing the main nodes (sensors, actuator, server, etc.) and the technologies that bind them. Further, we define the characteristics and the functioning of nodes by a formal representation in the form of state machines, the applicable norms to build a secure environment, and further the security measures that must respect them in order to guarantee a protected environment. We finished our study by experimentation with Uppaal, a verification and validation tool, to ensure the accuracy of the system operations that showed a satisfactory results. Index Terms-Smart Home, Smart Building, Home risks, IoT, MQTT Protocol, Formal verification, Simulation, Uppaal.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>I. INTRODUCTION</title>
      <p>
        For a better living quality, the smart spaces paradigm aims
at constructing advanced service infrastructures that follow
the ubiquitous computing approaches where smart objects
are executed on a variety of digital devices and services are
constructed as interaction of agents in a communication
environment [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Recent advances in intelligent computer systems
and communications have created the necessary conditions for
the networking of a wide variety of heterogeneous devices.
This led to the integration of short-range mobile transceivers
into everyday life objects and has enabled new forms of
communication between objects and even between people and
objects. The concept of smart devices, i.e. the inclusion of
software, identifiers and networking to devices typically not
computerized, led to the “Internet of Things” (IoT) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. The
main feature of this technology is the integration of
heterogeneous and action elements (actuators) in a distributed system
which performs different actions based on the information
gathered by the sensors combined with the requirements of
the particular application [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        The inside environment has several factors that can affect it
or the life of inhabitants or both at the same time (temperature,
humidity, noise, light, etc). Nowadays different numerical
models are available to describe the vapor balance of transient
water in a room and predict indoor humidity. A typical
room moisture balance includes water vapour production by
moisture sources (humans, plants,. . . ), convective water vapour
transfer with ventilation air, and water vapour exchange with
the building fabric and furniture.The water vapour exchange
between room air and surrounding materials (walls and
furniture) is governed by three physical processes: the transfer
of water vapour between the air and the material surface, the
moisture transfer within the material and the moisture storage
within the material. The existing models mainly differ in the
way this last part of the moisture balance is described [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ]. In
general, sensors communicate directly with the home gateway
and feed the system information with regards to the obtained
environment measures, for example light intensity inside a
particular room, temperature inside and outside the home and
motion sensing to name a few [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>In this paper, we propose a smart living framework by
modeling the different components needed for an indoor
environment and developing a trustworthy architecture that
ensure the well functioning correctness of such system, and
also its configuration and control. First, we rely on the existing
limitations and the requirements for a home that can affect
the inhabitant like humidity which causes corrosion coating
of the wall and household furniture, the appearance of molds
and bacteria, the temperature also has to be regulated in the
home according to the outside climate, loud noise especially
at night, the handicapped can not open the doors of the
room, natural and artificial phenomena such as the earthquake
and fire that threatens the life of the human. The proposed
solutions consider all indoor issues, implement sensors for
each measure, collect data in real time and make reactions
to prevent risks.</p>
      <p>
        The proposed framework is a web service based solution
where sensitive nodes are indoor planted and their measures
change in real time. The architecture proposed for the
framework considers different classes of nodes. A database node
containing the collected data by sensors, a server node that
ensures the communication and the reliability between nodes,
and reacts when necessary by sending the appropriate control
commands; the actuator node executes the received commands
from the server and/or external actors who can extract or
edit home data. The architecture uses MQTT protocol [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ]
to ensure a reliable communication between the predefined
internal nodes. Further, the architecture implements a precise
constraints and requirements for the communication and
during executing actions. Otherwise, the nodes do not respecting
certain conditions are considered as unacceptable nodes.
Finally we ensure the functional correctness of the nodes and
their secure communication by simulation and verification in
Uppaal tool [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The results show that the proposed framework
is a deadlock free, secure, and respecting the indoor living
requirements.
      </p>
      <p>The remainder of this paper is organized as follows. Section
II presents the related work and compares it with the proposed
framework detailed in Section III. Then, the implementation
with the experimental results are shown in Section IV. Finally,
Section V concludes the paper and provides hints on the future
works.</p>
    </sec>
    <sec id="sec-2">
      <title>II. RELATED WORK</title>
      <p>In literature, we review the existing work related to IoT
modeling, functional analysis, network architectures, and
application in real life with concrete cases.</p>
      <p>
        Ouchani [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] proposes a security analysis framework for
IoT that covers the probability and costs of actions, formalizes
IoT, analyzes the correctness and measures their security level
by relying on the probabilistic model checking PRISM. To
ensure the functional correctness of an IoT-based system,
Ouchani develops five steps: defines the IoT components,
formalizes the architecture in a process algebra expression. Then,
it expresses the IoT requirements in PCTL and transforms the
IoT model into the PRISM input language. Finally, PRISM
checks how much a requirement is ensured on the IoT model.
However, the proposed framework involves a large amount
of data and messages which make the probabilistic model
checking expensive in terms of time and memory.
      </p>
      <p>
        Moreno-Salinas [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] proposes a method that detects the
optimal position of sensors to receive information from several
targets. To find the perfect place, they rely on FIM1 to measure
the amount of information that a random variable (sensor)
carries about a parameter that is sometimes unknown (target).
After several progressive tests, they use two separated tests, the
first tries to find the optimal position for a sensor that receives
data from a target transmitter with a known placement. This
first test considers one sensor and one target, eight sensors and
one target, four sensors and two targets, and five sensors and
three targets. The second one finds the optimal positions of
sensors with unknowns positions experimenting five sensors
and two targets, then five sensors and three targets. However,
FIM showed significant results for a small amount of objects
but the cost of time computing is expensive when the target
is unknown in a known area.
      </p>
      <p>
        Centenaro [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] studies a start topology of LPWANs2 in
smart cities where the used network LoRaTM belongs to the
1Fisher Information Matrix.
2LowPower Wide Area Networks.
same family of LPWANs. The goal is to know the number of
gateways needed to cover the city (inexpensive or not), and
to know the benefits in return after deployment. They
experimented two tests, the first installs LoRaTM network in a
19history building to measure temperature and humidity, using
one single gateway and 32 nodes. The second estimates the
number of gateways required to cover the city of Padova.They
placed a gateway with no antenna gain at the top of two history
buildings to assess the ‘worst case’ coverage of the topology
since LoRaTM technology allows to cover a cell of about 2
km of radius. With simple calculations they concluded that
to cover Padova city that has about 100 square kilometers, it
needs 30 gateways. At the present, LoRaTM has an acceptable
coverage in worst cases, but the number of gateway ports
is limited and does not satisfy progressive evolution of IoT
technology.
      </p>
      <p>
        A. Zanella [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] apply the principles of smart cities for
Padova city to collect environmental data. The architecture is
composed of constrained IoT sensors, a database server which
use technologies CoAP3, 6LoWPAN4, unconstrained devices
that use traditional technologies like HTML. The
interconnection between users and sensors is made by an intermediary
gateway and HTTP-CoAP proxy-grown that plays the role
of translator between the two sides. During a week of tests,
the results show how do people react with different situations
and phenomena, for example benzene consumption at the end
of weeks. This architecture allows the compatibility between
constrained and unconstrained devices through a cross proxy.
In general, the constrained physical and link layer technologies
are characterized by a low energy consumption, the transfer
rate and data processing in constrained devices is relatively
low, but the dependence on unconstrained ones increase in
cost.
      </p>
      <p>Based on the reviewed literature, we found few works that
detail well the components of an indoor environment and their
formal semantics, and less of them discussing a trustworthy
communication between components. The proposed
contribution considers these issues and we believe it is easy to extend
and deploy a more secure smart building/home system.</p>
    </sec>
    <sec id="sec-3">
      <title>III. FRAMEWORK</title>
      <p>Figure 1 illustrates the steps to how construct a secure smart
building/home system and analyze it. The system’s
architecture is composed from a set of nodes, security constraints and
management mechanism, and the communication protocols.
The nodes are active/passive objects to collect the needed
environment measures. The communication protocols ensure
how well the connection between nodes is established and
the measured data are packed and encrypted. The security
management mechanism reinforces the architecture in order
to create a protected system. It develops a set of security rules
including the authentication and identification of nodes, the
control access, and how to keep the availability of services.</p>
    </sec>
    <sec id="sec-4">
      <title>3Constrained Application Protocol 4IPv6 Low power Wireless Personal Area Networks</title>
      <p>The analysis step enables the verification of the accuracy of
the implemented architecture with respect to the security rules.
Finally, the results show the different scenarios, traces, or
errors that might affect the security and the well functioning
of the architecture in order to decide or not its deployment.</p>
      <p>SecurCiotyntmroalnagement</p>
      <p>Authentication</p>
      <p>Availability
Object</p>
      <p>Attributes
Behavior
Type</p>
      <p>Applicability
ComPmruotnoiccoaltsion</p>
      <p>Data</p>
      <p>Reinforcement,</p>
      <p>Application
Formulation,
Composition</p>
      <p>Formulation
Establishment</p>
      <p>ArchSitmecatrutrheome</p>
      <p>Smart building
Transformation
AnalVyseirsification</p>
      <p>Simulation</p>
      <p>ResuSltcsenarios</p>
      <p>Traces
Errors
Correct</p>
      <p>Secure
Outputs
Fig. 1: A Security and Analysis Framework for Smart Homes and
Buildings.
(the evaluation of dynamic attributes) to another one Sj . The
following lists the set of possible actions.</p>
      <p>
        turnOn/turnOff to turn on/off the smart object [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
send/receive to send/receive data to/from another IoT
node [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
collectData to collect the received information [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
applyAction apply an action after getting command
[
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
encrypt/decrypt to encrypt/decrypt a message.
authenticate grants the possibility to send data.
We define in Definition 1 a smart node that can be a sensor,
actuator, broker, database, server, or smartphone.
      </p>
      <p>Definition 1 (Smart node). A smart object SoT 2 SoT is a
tuple hID; Att; ; Bi where:
1) ID is a finite set identifiers idi 2 ID{Oi, i 2 N where
id? 2 id is an empty object.
2) Att : ID ! 2T is a function that assigns for each object
a sequence of attributes.</p>
      <sec id="sec-4-1">
        <title>3) is the set of possible actions for an objects,</title>
        <p>4) Beh : ID ! B returns the expression that precises
the behavior of an object in the dominant case where :
B ::= Start:actions +g actions:End where actions =
j :actions such as 2 and +g is a deterministic
choice with respect to a guard g.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Example 1 (Smart object). Based on Definition 1, the se</title>
        <p>mantics of a general sensor is the state machine depicted
in Figure 2 where states s0; s1; s2; s3 stand respectively
for Is_On, detection, declaration, Is_Of f . The attributes
values specifying a state change regarding the executed action.
The actions 1, 2, 3, 4, and 5 represent respectively
turn_on, detect , send,turn_off, and initialize.The dynamic
attributes (d and f) of a sensor are: d1 evaluates the energy,
d2 measures other properties (smoke, noise, temperature,...),
f1: detection, f2: availability, f3: alerte_msg. Each state is
presented by the following predicates where M ax_V al is the
maximum for the measure related to the smart object.
1) Js0K = (d1 &gt; 0)^(d2 &lt; M ax_V al)^(f1)^(f2)^(:f3)
2) Js1K = (d1 &gt; 0) ^ (d2 &gt;= M ax_V al) ^ (f1) ^ (f2) ^
(:f3)
3) Js2K = (d1 &gt; 0)^(d2 &gt;= M ax_V al)^(f1)^(f2)^(f3)
4) Js3K = (d1 = 0) ^ (d2 = 0) ^ (:f1) ^ (:f2) ^ (:f3)
2
1</p>
        <p>s1
4
s3
3
4
start
s0
5
4</p>
        <p>s2
Fig. 2: The state machine of a sensor.</p>
      </sec>
      <sec id="sec-4-3">
        <title>B. Smart environment</title>
        <p>We define a smart environment sEnv as a structured
physical infrastructure, building or home, that carries smart nodes.
sEnv is composed of at least two smart rooms/locations
disjointed by separators like walls, doors, and windows. To collect
information and sensitive data, smart nodes are connected
with a precise architecture mechanism that helps them to
communicate easily through a dedicated protocols.
Definition 2 (Smart Environment). A smart environment sEnv
is a tuple of hE; L; SoT; pl; dli, where:
1) E is the environment name/id,
2) L ={R1; :::; Ri; :::; Rnji; n 2 N } is the set of
locations/rooms (Ri) composing E,
3) SoT = { SoT1; :::; SoTmjm 2 N} is the set of smart nodes
in E,
4) PL = { pl1; :::; plnjn 2 N} is the set of physical structure
that defines E,
5) DL = { dl1; :::; dlnjn 2 N} is the set of logical architecture
that connects SoT.
access the internet connection. The third level is IP objects
use wireless technology like Wi-Fi, Bluetooth, 4G...
The fourth level has processing devices like router, firewall
and switch, they are used to make an interconnection between
smart home objects and they are like a point between the
outdoor and indoor smart home.</p>
        <p>The fifth level is the set of APIs and devices outside smart
home that can access the smart home interior objects.</p>
      </sec>
      <sec id="sec-4-4">
        <title>D. Communication</title>
        <p>In this part we will present some protocols that can be
used in the proposed framework that deals with architecture
as the one showed in Figure 6. Herein we present the adopted
protocols by the framework.</p>
        <p>Ri
&lt;DL&gt;
Rj
&lt;DL&gt;
&lt;DL&gt;
SoT1</p>
        <p>SoTm</p>
        <p>SoT1</p>
        <p>SoTm</p>
        <p>The architecture is grouped into five main levels depicted
in Figure 5:
The first is the most important because it contains sensors
that capture the state of smart home periodically then they
report if there is a contradictory case (fire, humidity, high
temperature, ...), the analysis devices as the database, web
server and broker save or process the signals of the sensors
then give the actuators the commands to do the necessary
actions.</p>
        <p>The second level is the set of objects referenced by an IP
address linked with the router by a network wire; they can</p>
        <p>
          MQTT: It is a machine-to-machine connectivity protocol
designed as an extremely lightweight publish/subscribe
messaging transport [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ]. The operations of this protocol passes
through steps shown in Figure 6, where it is applied on Smart
room, and it is the first level represented in the architecture.
1) A sensor collects information (temperature, fire, humidity,
etc.) then it publishes the data to the broker.
2) The database subscribes into the Broker that is
periodically keep track of the retrieved data.
3) The web server subscribes into the Broker and receives
the published sensors data.
4) The web server, including smart applications, presents the
appropriate command, and pulls it into the MQTT Broker.
5) The actuators subscribe in the Broker then it receive and
execute the commands.
6) The application retrieves or updates the database values.
7) External actors, through web and smart applications,
communicate securely with web server.
        </p>
        <p>ONVIF: It is used to establish a communication between
the network camera and a point outside the building in order
to monitor its status in real time.</p>
        <p>Http: People authenticated in the web server can access
through an API that uses this protocol to view or edit
information about the building.</p>
        <p>VoIP: Phones equipped with a network card can make calls
using this protocol.</p>
        <p>Ethernet: It is a data link layer protocol in the Open
Systems Interconnection (OSI) model that allows objects affiliated
with the same LAN to interchange data.</p>
      </sec>
      <sec id="sec-4-5">
        <title>E. Security</title>
        <p>The digital environment always at risk, for this we rely on
the security side in our approach to avoid information theft,
data interception or disservice. We consider the following five
concepts in order to stop or decrease threats.</p>
        <p>
          Confidentiality: ensure that each data access only by
objects (people, devices) that we define them through
encrypting data with a strong encryption method. Ignoring
this principle can cause a destruction of information.
Authentication: Some smart home objects (such as the
server) request objects that want to access it to define its
identification in order to prevent unauthorized access.
Data Integrity: Man in the middle [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] can intercept the
flow of data between IoT objects, change it then send
it back to the receiver. So we use some mechanisms like
hashing [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] (MD5 and SHA-2) and electronic signatures
[
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] to control if the message is changed or no.
        </p>
        <p>
          Access control: Smart home objects with their security
levels allow functions according to a predefined
authorization and prevention rules. The architecture supports
firewalls [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ] at the gateway level that manage the input
and output packets. Further, for security policies we are
interested in access control mechanisms [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] (RBAC) and
adapting the router by an access control list ACL [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ].
Non-repudiation: Since IoT objects always in contact it
is important to check the legitimacy of the sender and
the receiver. The most able method to realize that is the
electronic certificate [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ].
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>IV. EXPERIMENTAL RESULTS</title>
      <p>To test the accuracy of the proposed, we built it within
the validation and verification tool Uppaal, by integrating the
machine states of smart objects and create the smart home
architecture where the smart home objects (composition of
states machines) react. The logic behind this composition
ensures that the proposed framework does not oppose the
requirements. First we ensure through simulation then
verification. The simulation is partitioned in four phases, the
first tests the operations of MQTT protocol, the second tests
the connectivity with a external point, the third tests for
exceptional cases where IoT devices can not connect to each
other and finally we verify the satisfaction of the security rules
that we must respect in the proposed system.</p>
      <sec id="sec-5-1">
        <title>A. MQTT protocol test</title>
        <p>We test the MQTT protocol via a scenario simulates the case
of fire in smart home, the first scenario steps are presented in
the figure 7, our system function without deadlock.</p>
        <p>Fig. 7: MQTT Simulation Scenario.</p>
      </sec>
      <sec id="sec-5-2">
        <title>B. Connection with distant points</title>
        <p>The distant smart home users use IoT nodes to access smart
home objects via the internet connection. In this point we will
study two examples, the first is a user that accesses by his
smartphone to the smart home server in order to extract data
from the database, and the second is a web API accesses to a
Webcam Home, system operation does not give errors.</p>
      </sec>
      <sec id="sec-5-3">
        <title>C. Exceptional cases:</title>
        <p>The nature of these tests simulates contradictory cases that
affect the exchange of messages, in this test we check the
operation of system with three cases contradictory with the
natural operation(Webcam not linked, Firewall prevents
webcam contact and The API does not authenticate the webcam),
the resulat was that the test procedure is not finished.</p>
      </sec>
      <sec id="sec-5-4">
        <title>D. Security rules verification</title>
        <p>Uppaal has a language called ’query language’ which allows
to edit rules after the construction of states machines of the
objects to test the accuracy of these objects. The language is
written according to specific norms and symbols.To verify the
security rules, we express the query language to check these
goals Confidentiality, Authentication, Data Integrity, Access
control and Non-repudiation. The verification results show that
all the security rules are checked and satisfied.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>V. CONCLUSION</title>
      <p>The approach suggests to deploy a complete theoretical
and practical framework that builds secure smart homes and
buildings in order to protect the inhabitants, the environment,
and to optimize the standard of living for an inhabitant.
The proposed formalization considers the characteristics and
the behavior of smart nodes and facilitates the expression
of their operations. The flexibility of the architecture makes
it applicable on different structures so it is not affected by
the number of rooms, doors, style of construction, nature of
wall, etc. The framework covers a number of technologies,
and fit the compatibility between them. Further we propose
a set of security rules in order to reinforce the architecture
and to check how much it is secure. For the security and
the correctness analysis that helps to reduces the error rate
after deployment, we rely on the simulation and the formal
verification that showed the strong and the weak points of the
a defined architecture. The results show that the implemented
architecture is free from deadlocks, simulate the reality, and
respect the security rules.</p>
      <p>As a future work, we intend to extend the framework to
support smart cites as first step. Then we look to how to
optimize the architecture features such as minimizing energy
consumption, large-scale coverage by limited number of
gateways. Further, from a security perspective we will increase
the security level by relying on a distributed architecture
”Blockchain”.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] Iot sensors</article-title>
          . https://fiware-tutorials.readthedocs.io/en/latest/iot-sensors/,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Mqtt</surname>
          </string-name>
          . http://mqtt.org/, May
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Uppaal home</article-title>
          . http://www.uppaal.org/,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Aazam</surname>
          </string-name>
          and
          <string-name>
            <given-names>E.</given-names>
            <surname>Huh</surname>
          </string-name>
          .
          <article-title>Fog computing micro datacenter based dynamic resource estimation and pricing model for iot</article-title>
          .
          <source>In 2015 IEEE 29th International Conference on Advanced Information Networking and Applications</source>
          , pages
          <fpage>687</fpage>
          -
          <lpage>694</lpage>
          ,
          <year>March 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Al-Fuqaha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guizani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Mohammadi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Aledhari</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Ayyash</surname>
          </string-name>
          .
          <article-title>Internet of things: A survey on enabling technologies, protocols, and applications</article-title>
          .
          <source>IEEE Communications Surveys Tutorials</source>
          ,
          <volume>17</volume>
          (
          <issue>4</issue>
          ):
          <fpage>2347</fpage>
          -
          <lpage>2376</lpage>
          ,
          <year>Fourthquarter 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Andreev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Galinina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pyattaev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gerasimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Tirronen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Torsner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sachs</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dohler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Koucheryavy</surname>
          </string-name>
          .
          <article-title>Understanding the iot connectivity landscape: a contemporary m2m radio technology roadmap</article-title>
          .
          <source>IEEE Communications Magazine</source>
          ,
          <volume>53</volume>
          (
          <issue>9</issue>
          ):
          <fpage>32</fpage>
          -
          <lpage>40</lpage>
          , Sep.
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>Luigi</given-names>
            <surname>Atzori</surname>
          </string-name>
          , Antonio Iera, and
          <string-name>
            <given-names>Giacomo</given-names>
            <surname>Morabito</surname>
          </string-name>
          .
          <article-title>The internet of things: A survey</article-title>
          .
          <source>Comput. Netw.</source>
          ,
          <volume>54</volume>
          (
          <issue>15</issue>
          ):
          <fpage>2787</fpage>
          -
          <lpage>2805</lpage>
          ,
          <year>October 2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Sachin</given-names>
            <surname>Babar</surname>
          </string-name>
          , Parikshit Mahalle, Antonietta Stango, Neeli Prasad, and
          <string-name>
            <given-names>Ramjee</given-names>
            <surname>Prasad</surname>
          </string-name>
          .
          <article-title>Proposed security model and threat taxonomy for the internet of things (iot)</article-title>
          .
          <source>In Natarajan Meghanathan</source>
          , Selma Boumerdassi, Nabendu Chaki, and Dhinaharan Nagamalai, editors,
          <source>Recent Trends in Network Security and Applications</source>
          , pages
          <fpage>420</fpage>
          -
          <lpage>429</lpage>
          , Berlin, Heidelberg,
          <year>2010</year>
          . Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Jean-François Blanchette</surname>
          </string-name>
          .
          <article-title>The digital signature dilemma le dilemme de la signature numérique</article-title>
          .
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Dr. Lakshmi Devasena C.</surname>
          </string-name>
          <article-title>Ipv6 low power wireless personal area network (6lowpan) for networking internet of things (iot) - analyzing its suitability for iot</article-title>
          .
          <volume>9</volume>
          ,
          <issue>01</issue>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>M.</given-names>
            <surname>Centenaro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Vangelista</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Zanella</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zorzi</surname>
          </string-name>
          .
          <article-title>Long-Range Communications in Unlicensed Bands: the Rising Stars in the IoT and Smart City Scenarios</article-title>
          .
          <source>IEEE Wireless Communications</source>
          ,
          <volume>23</volume>
          ,
          <year>October 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Kunz</surname>
          </string-name>
          .
          <article-title>Performance evaluation of iot protocols under a constrained wireless access network</article-title>
          .
          <source>In 2016 International Conference on Selected Topics in Mobile Wireless Networking (MoWNeT)</source>
          , pages
          <fpage>1</fpage>
          -
          <lpage>7</lpage>
          ,
          <year>April 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Antonio</surname>
            <given-names>M. Pascoal</given-names>
          </string-name>
          <string-name>
            <surname>David</surname>
            Moreno-Salinas and
            <given-names>Joaquin</given-names>
          </string-name>
          <string-name>
            <surname>Aranda</surname>
          </string-name>
          .
          <article-title>Optimal sensor placement for multiple target positioning with range-only measurements in two-dimensional scenarios</article-title>
          .
          <source>Sensors</source>
          ,
          <volume>13</volume>
          (
          <issue>8</issue>
          ),
          <year>August 2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Desai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sheth</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Anantharam</surname>
          </string-name>
          .
          <article-title>Semantic gateway as a service architecture for iot interoperability</article-title>
          .
          <source>In 2015 IEEE International Conference on Mobile Services</source>
          , pages
          <fpage>313</fpage>
          -
          <lpage>319</lpage>
          ,
          <year>June 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Xenofon</surname>
            <given-names>Fafoutis</given-names>
          </string-name>
          , Atis Elsts, Antonis Vafeas, George Oikonomou, and
          <string-name>
            <given-names>Robert</given-names>
            <surname>Piechocki</surname>
          </string-name>
          .
          <article-title>On predicting the battery lifetime of iot devices: Experiences from the sphere deployments</article-title>
          .
          <source>In Proceedings of the 7th International Workshop on Real-World Embedded Wireless Systems and Networks</source>
          ,
          <source>RealWSN'18</source>
          , pages
          <fpage>7</fpage>
          -
          <lpage>12</lpage>
          , New York, NY, USA,
          <year>2018</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>David</given-names>
            <surname>Ferraiolo</surname>
          </string-name>
          and
          <string-name>
            <given-names>D</given-names>
            <surname>Kuhn</surname>
          </string-name>
          .
          <article-title>Role-based access controls</article-title>
          .
          <source>03</source>
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>Arnold</given-names>
            <surname>Janssens and Michel De Paepe</surname>
          </string-name>
          .
          <article-title>Effect of moisture inertia models on the predicted indoor humidity in a room</article-title>
          .
          <source>Proceedings of the 26th AIVC Conference</source>
          ,
          <volume>01</volume>
          <fpage>2005</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>Amos</given-names>
            <surname>Kingatua</surname>
          </string-name>
          .
          <article-title>Iot system tests :: Checking for failure</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Dmitry</surname>
            <given-names>G.</given-names>
          </string-name>
          <string-name>
            <surname>Korzun</surname>
            ,
            <given-names>Sergey I. Balandin</given-names>
          </string-name>
          , and
          <string-name>
            <surname>Andrei</surname>
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Gurtov</surname>
          </string-name>
          .
          <article-title>Deployment of smart spaces in internet of things: Overview of the design challenges</article-title>
          . In Sergey Balandin, Sergey Andreev, and Yevgeni Koucheryavy, editors,
          <source>Internet of Things, Smart Spaces, and Next Generation Networking</source>
          , pages
          <fpage>48</fpage>
          -
          <lpage>59</lpage>
          , Berlin, Heidelberg,
          <year>2013</year>
          . Springer Berlin Heidelberg.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Avijit</surname>
            <given-names>Mallik</given-names>
          </string-name>
          , Abid Ahsan,
          <string-name>
            <given-names>Mhia</given-names>
            <surname>Md</surname>
          </string-name>
          . Zaglul Shahadat, and
          <string-name>
            <surname>Jia-Chi Tsou</surname>
          </string-name>
          .
          <article-title>Man-in-the-middle-attack: Understanding in simple words</article-title>
          .
          <volume>3</volume>
          :
          <fpage>77</fpage>
          -
          <lpage>92</lpage>
          ,
          <year>01 2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Mick</surname>
            <given-names>O</given-names>
          </string-name>
          <string-name>
            <surname>Brien and George Weir</surname>
          </string-name>
          .
          <source>Understanding digital certificates. 06</source>
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Samir</given-names>
            <surname>Ouchani</surname>
          </string-name>
          .
          <article-title>Ensuring the functional correctness of iot through formal modeling and verification</article-title>
          .
          <source>In Model and Data Engineering - 8th International Conference, MEDI 2018, Lecture Notes in Computer Science</source>
          , pages
          <fpage>401</fpage>
          -
          <lpage>417</lpage>
          . Springer International Publishing,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Luis</given-names>
            <surname>Sanchez</surname>
          </string-name>
          , Luis Muñoz, Jose Antonio Galache, Pablo Sotres,
          <string-name>
            <surname>Juan R. Santana</surname>
            , Veronica Gutierrez, Rajiv Ramdhany, Alex Gluhak, Srdjan Krco, Evangelos Theodoridis, and
            <given-names>Dennis</given-names>
          </string-name>
          <string-name>
            <surname>Pfisterer</surname>
          </string-name>
          . Smartsantander:
          <article-title>Iot experimentation over a smart city testbed</article-title>
          .
          <source>Computer Networks</source>
          ,
          <volume>61</volume>
          :
          <fpage>217</fpage>
          -
          <lpage>238</lpage>
          ,
          <year>2014</year>
          . Special issue on Future Internet Testbeds - Part I.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>A.</given-names>
            <surname>Sehgal</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Perelman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Kuryla</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Schonwalder</surname>
          </string-name>
          .
          <article-title>Management of resource constrained devices in the internet of things</article-title>
          .
          <source>IEEE Communications Magazine</source>
          ,
          <volume>50</volume>
          (
          <issue>12</issue>
          ):
          <fpage>144</fpage>
          -
          <lpage>149</lpage>
          ,
          <year>December 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Giorgos</surname>
            <given-names>Sfikas</given-names>
          </string-name>
          , Charilaos Akasiadis, and
          <string-name>
            <given-names>Evaggelos</given-names>
            <surname>Spyrou</surname>
          </string-name>
          .
          <article-title>Creating a smart room using an iot approach</article-title>
          .
          <source>05</source>
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>Rajeev</given-names>
            <surname>Sobti</surname>
          </string-name>
          and
          <string-name>
            <given-names>Geetha</given-names>
            <surname>Ganesan</surname>
          </string-name>
          .
          <article-title>Cryptographic hash functions: A review</article-title>
          .
          <source>International Journal of Computer Science Issues</source>
          ,
          <string-name>
            <surname>ISSN</surname>
          </string-name>
          (Online):
          <fpage>1694</fpage>
          -
          <lpage>0814</lpage>
          , Vol
          <volume>9</volume>
          :
          <fpage>461</fpage>
          -
          <lpage>479</lpage>
          ,
          <year>03 2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>Shipra</given-names>
            <surname>Suman</surname>
          </string-name>
          and
          <string-name>
            <given-names>Aditi</given-names>
            <surname>Agrawal</surname>
          </string-name>
          .
          <article-title>Ip traffic management with access control list using cisco packet tracer</article-title>
          .
          <source>International Journal of Science, Engineering and Technology Research</source>
          ,
          <volume>5</volume>
          :
          <fpage>1556</fpage>
          -
          <lpage>1561</lpage>
          ,
          <year>05 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Konglong</surname>
            <given-names>Tang</given-names>
          </string-name>
          , Yong Wang, Hao Liu, Yanxiu Sheng,
          <string-name>
            <given-names>Xi</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Zhiqiang</given-names>
            <surname>Wei</surname>
          </string-name>
          .
          <article-title>Design and implementation of push notification system based on the mqtt protocol</article-title>
          .
          <source>In 2013 International Conference on Information Science and Computer Applications (ISCA</source>
          <year>2013</year>
          ). Atlantis Press,
          <year>2013</year>
          /10.
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Dhiren</surname>
            <given-names>Tejani</given-names>
          </string-name>
          , Ali Al-Kuwari, and
          <string-name>
            <given-names>Vidyasagar</given-names>
            <surname>Potdar</surname>
          </string-name>
          .
          <article-title>Energy conservation in a smart home</article-title>
          .
          <source>05</source>
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Wool</surname>
          </string-name>
          .
          <article-title>A quantitative study of firewall configuration errors</article-title>
          .
          <source>Computer</source>
          ,
          <volume>37</volume>
          (
          <issue>6</issue>
          ):
          <fpage>62</fpage>
          -
          <lpage>67</lpage>
          ,
          <year>June 2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>G.</given-names>
            <surname>Xiao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. D.</given-names>
            <surname>Xu</surname>
          </string-name>
          , and
          <string-name>
            <surname>Z. Gong.</surname>
          </string-name>
          <article-title>User interoperability with heterogeneous iot devices through transformation</article-title>
          .
          <source>IEEE Transactions on Industrial Informatics</source>
          ,
          <volume>10</volume>
          (
          <issue>2</issue>
          ):
          <fpage>1486</fpage>
          -
          <lpage>1496</lpage>
          , May
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>A.</given-names>
            <surname>Zanella</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Bui</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Castellani</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Vangelista</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Zorzi</surname>
          </string-name>
          .
          <article-title>Internet of things for smart cities</article-title>
          .
          <source>IEEE Internet of Things Journal</source>
          ,
          <volume>1</volume>
          (
          <issue>1</issue>
          ):
          <fpage>22</fpage>
          -
          <lpage>32</lpage>
          ,
          <year>Feb 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>W.</given-names>
            <surname>Qin</surname>
          </string-name>
          .
          <article-title>Iot gateway: Bridgingwireless sensor networks into internet of things</article-title>
          .
          <source>In 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing</source>
          , pages
          <fpage>347</fpage>
          -
          <lpage>352</lpage>
          ,
          <year>Dec 2010</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>