Skip to main content
Log in

Safe Data Transmission Architecture Based on Cloud for Internet of Things

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Nowadays, cloud computing technology, and IoT technology are one of the inevitable core trends. These technologies are key technology of various ICT convergence services, and it will create a value-added business and market. Although it is in its infancy, there is no doubt that it will be a game changer. However, cloud computing technology and IoT technology have some limitations especially in openness and standardization because they have been independently evolved. This is why they expose some weak-points, which are difficult to expand to various services, and it also has some problems to interwork other devices or services. In the safe network case, current safe network service has a restriction because it is based on closed networks. In addition, the key technology in the safe networking has an independent scheme or architecture. Due to the fact that we need new architecture to integrate entire networks, there are no certain alternatives so far. It is because most of related works are focused on the providing to just the safety in the networks. To solve these problems, we propose a safe data transmission architecture for the IoT ecosystems. The proposed architecture is a kind of software defined network base cloud, and it can provide the safe data transmission with QoS/QoE. Basically, the proposed architecture has three states, install, start and working, and four phase, negotiation, initialization, configuration and execution. In the install state, the devices set some parameters such as a synchronization time between node in cloud and IoT device. Based on the install state, data transmission will be started in the start state. In the start state, the nodes start data transmission by the set parameters in the install state. And then, the nodes keep the working state. However, it can be changed whenever user’s request to upgrade the transmission security. The proposed architecture has some enhanced synchronization algorithms to provide a safe data transmission and to guarantee a QoS/QoE. Based on the architecture, we verified that the proposed architecture outperforms than legacy architectures in various aspects, and we are shown these simulation results by using OPNET.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Prasad, A. S., & Rao, S. (2014). A mechanism design approach to resource procurement in cloud computing. IEEE Transactions on Computers, 63(1), 17–30.

    Article  MathSciNet  Google Scholar 

  2. Qu, L., Wang, Y., Orgun, M. A., Liu, L., Liu, H., & Bouguettaya, A. (2015). CCCloud: Context-aware and credible cloud service selection based on subjective assessment and objective assessment. IEEE Transactions on Services Computing, 8(3), 369–383.

    Article  Google Scholar 

  3. Yin, Z., Yu, F. R., Bu, S., & Han, Z. (2015). Joint cloud and wireless networks operations in mobile cloud computing environments with telecom operator cloud. IEEE Transactions on Wireless Communications, 14(7), 4020–4033.

    Article  Google Scholar 

  4. Wang, S., & Dey, S. (2013). Adaptive mobile cloud computing to enable rich mobile multimedia applications. IEEE Transactions on Multimedia, 15(4), 870–883.

    Article  Google Scholar 

  5. Abolfazli, S., Sanaei, Z., Ahmed, E., Gani, A., & Buyya, R. (2014). Cloud-based augmentation for mobile devices: Motivation, taxonomies, and open challenges. IEEE Communications Surveys & Tutorials, 16(1), 337–368.

    Article  Google Scholar 

  6. Parashar, M., AbdelBaky, M., Rodero, I., & Devarakonda, A. (2013). Cloud paradigms and practices for computational and data-enabled science and engineering. Computing in Science & Engineering, 15(4), 10–18.

    Article  Google Scholar 

  7. Pandey, V., Singh, S., & Tapaswi, S. (2015). Energy and time efficient algorithm for cloud offloading using dynamic profiling. Wireless Personal Communications, 80(4), 1687–1701.

    Article  Google Scholar 

  8. Wang, Y., Chen, I.-R., & Wang, D.-C. (2015). A survey of mobile cloud computing applications: Perspectives and challenges. Wireless Personal Communications, 80(4), 1607–1623.

    Article  Google Scholar 

  9. Kim, S., Kim, G.-J., & Chung, K.-Y. (2014). Performance analysis of non-PC/SC based mini-WiMAX connection manager. Cluster Computing, 17(3), 775–789.

    Article  Google Scholar 

  10. Xu, B., Da Xu, L., Cai, H., Xie, C., Hu, J., & Bu, F. (2014). Ubiquitous data accessing method in IoT-based information system for emergency medical services. IEEE Transactions on Industrial Informatics, 10(2), 1578–1586.

    Article  Google Scholar 

  11. Papagianni, C., Leivadeas, A., Papavassiliou, S., Maglaris, V., Cervello-Pastor, C., & Monje, A. (2013). On the optimal allocation of virtual resources in cloud computing networks. IEEE Transactions on Computers, 62(6), 1060–1071.

    Article  MathSciNet  Google Scholar 

  12. Jarschel, M., Zinner, T., Hossfeld, T., Tran-Gia, P., & Kellerer, W. (2014). Interfaces, attributes, and use cases: A compass for SDN. IEEE Communications Magazine, 52(6), 210–217.

    Article  Google Scholar 

  13. Kyoseva, T., Poulkov, V., Mihaylov, M., & Mihovska, A. (2014). Disruptive innovations as a driving force for the change of wireless telecommunication infrastructures. Wireless Personal Communications, 78(3), 1683–1697.

    Article  Google Scholar 

  14. Miao, W., Agraz, F., Peng, S., Spadaro, S., Bernini, G., Perello, J., … Calabretta, N. (2015). SDN-enabled OPS with QoS guarantee for reconfigurable virtual data center networks. IEEE/OSA Journal of Optical Communications and Networking, 7(7), 634–643.

    Article  Google Scholar 

  15. Tomovic, S., Pejanovic-Djurisic, M., & Radusinovic, I. (2014). SDN based mobile networks: Concepts and benefits. Wireless Personal Communications, 78(3), 1629–1644.

    Article  Google Scholar 

  16. Bontu, C. S., Periyalwar, S., & Pecen, M. (2014). Wireless wide-area networks for internet of things: An air interface protocol for IoT and a simultaneous access channel for uplink IoT communication. IEEE Vehicular Technology Magazine, 9(1), 54–63.

    Article  Google Scholar 

  17. oneM2M. (2014). oneM2M functional architecture baseline draft. oneM2M Technical Specification, oneM2M-TS-0001-V-2014-08

  18. Li, Q., Xu, M., Yang, Y., Gao, L., Cui, Y., & Wu, J. (2014). Safe and practical energy-efficient detour routing in IP networks. IEEE/ACM Transactions on Networking, 22(6), 1925–1937.

    Article  Google Scholar 

  19. Kang, W., Sha, L., Berlin, R. B., & Goldman, J. M. (2015). The design of safe networked supervisory medical systems using organ-centric hierarchical control architecture. IEEE Journal of Biomedical and Health Informatics, 19(3), 1077–1086.

    Google Scholar 

  20. Kang, K., Pang, Z., Da Xu, L., Ma, L., & Wang, C. (2014). An interactive trust model for application market of the internet of things. IEEE Transactions on Industrial Informatics, 10(2), 1516–1526.

    Article  Google Scholar 

  21. Ferrant, J.-L., & Ruffini, S. (2011). Evolution of the standards for packet network synchronization. IEEE Communications Magazine, 49(2), 132–138.

    Article  Google Scholar 

  22. Ouellette, M., Ji, J., Liu, S., & Li, H. (2011). Using IEEE 1588 and boundary clocks for clock synchronization in telecom networks. IEEE Communications Magazine, 49(2), 164–171.

    Article  Google Scholar 

  23. IEEE. (2011). IEEE standard profile for use of IEEE 1588 precision time protocol in power system applications. IEEE Standard, C37.238, 1–66.

  24. Li, C., & Li, L. (2014). Phased scheduling for resource-constrained mobile devices in mobile cloud computing. Wireless Personal Communications, 77(4), 2817–2837.

    Article  Google Scholar 

  25. Kim, S., & Ryoo, I. (2010). Packet forwarding scheme based on interworking architecture for future internet. IEICE Transactions on Communications, E93-B(3), 546–550.

    Article  Google Scholar 

  26. Kim, S. (2015). QoS-aware data forwarding architecture for multimedia streaming services in hybrid peer-to-peer networks. Peer-to-Peer Networking and Applications, 8(4), 557–566.

    Article  Google Scholar 

  27. Ryoo, I., Na, W., & Kim, S. (2015). Information exchange architecture based on software defined networking for cooperative intelligent transportation systems. Cluster Computing, 18(2), 771–782.

    Article  Google Scholar 

  28. Kim, S., & Suk, J. (2015). Efficient peer-to-peer context awareness data forwarding scheme in emergency situations. Peer-to-Peer Networking and Applications. doi:10.1007/s12083-015-0401-8.

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2060035).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wonshik Na.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, S., Na, W. Safe Data Transmission Architecture Based on Cloud for Internet of Things. Wireless Pers Commun 86, 287–300 (2016). https://doi.org/10.1007/s11277-015-3063-1

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-3063-1

Keywords

Navigation