Skip to main content

WS3H: Webified Self-Sovereign Smart Home

  • Conference paper
  • First Online:
Web Engineering (ICWE 2023)

Abstract

The Web of Things (WoT) concept proposes to integrate the existing Web ecosystem with Things to provide an interoperable infrastructure which goes beyond basic network connectivity. Existing approaches unify the process to integrate the devices into the Web by automatically generating Web APIs based on semantic device descriptions. However, they are either limited to specific protocols or do not address transport security and authorization. In this paper, we demonstrate our approach on a Webified Self-Sovereign Smart Home that uses self-sovereign identity to establish transport security and authorization in a webified smart home. Our solution provides end user support with easy deployment and addresses the local scope of a smart home due to its self-sovereignty.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://www.w3.org/WoT/wg/.

  2. 2.

    https://buildwithmatter.com/.

  3. 3.

    https://www.google.com/intl/en/ipv6/statistics.html.

  4. 4.

    https://github.com/hyperledger/aries-rfcs.

  5. 5.

    https://youtu.be/-jrfGlrHfAc.

References

  1. Antonakakis, M., April, T., Bailey, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093–1110. USENIX Association, Vancouver, BC (2017). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis

  2. Donenfeld, J.A.: Wireguard: next generation kernel network tunnel. In: NDSS, pp. 1–12 (2017). https://doi.org/10.14722/ndss.2017.23160

  3. Emami-Naeini, P., Dixon, H., Agarwal, Y., et al.: Exploring how privacy and security factor into IoT device purchase behavior. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1–12. CHI 2019, Association for Computing Machinery, New York, NY, USA (2019). https://doi.org/10.1145/3290605.3300764

  4. Fedrecheski, G., Rabaey, J.M., Costa, L.C.P., et al.: Self-sovereign identity for IoT environments: a perspective. In: 2020 Global Internet of Things Summit (GIoTS), pp. 1–6. IEEE, Dublin, Ireland (2020). https://doi.org/10.1109/GIOTS49054.2020.9119664

  5. Noura, M., Heil, S., Gaedke, M.: Webifying heterogenous internet of things devices. In: Bakaev, M., Frasincar, F., Ko, I.-Y. (eds.) ICWE 2019. LNCS, vol. 11496, pp. 509–513. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-19274-7_36

    Chapter  Google Scholar 

  6. Rescorla, E.: The transport layer security (TLS) protocol version 1.3. Technical report (2018). https://www.rfc-editor.org/rfc/rfc8446

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Valentin Siegert .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Siegert, V., Albrecht, C., Noura, M., Gaedke, M. (2023). WS3H: Webified Self-Sovereign Smart Home. In: Garrigós, I., Murillo Rodríguez, J.M., Wimmer, M. (eds) Web Engineering. ICWE 2023. Lecture Notes in Computer Science, vol 13893. Springer, Cham. https://doi.org/10.1007/978-3-031-34444-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34444-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34443-5

  • Online ISBN: 978-3-031-34444-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics