Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks

Longhua Guo, Jun Wu*, Zhengmin Xia, Jianhua Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

34 Citations (Scopus)

Abstract

The ISO/IEC/IEEE 21451 standards provide the communication and information models to facilitate the access of smart sensor to a network. ISO/IEC/IEEE 21451-1-4 standard aims to propose a solution using extensible messaging and presence protocol (XMPP) to transport message over sensor networks. Ensuring security of communications over XMPP is one of the most important issues in ISO/IEC/IEEE21451-1-4 sensor networks. In this paper, we propose a security mechanism that deals with the requirements of authentication, integrity, confidentiality, nonrepudiation, and access control. The XMPP-based communications in ISO/IEC/IEEE 21451 sensor networks utilize the username/password security token as well as integrated publish/subscribe (pub/sub) and role-based access control technologies. Based on the proposed mechanism, ISO/IEC/IEEE 21451 messages are exchanged based on the pub/sub model using an extended security simple object access protocol over XMPP until released. An instance is the model based on ISO/IEC/IEEE 21451-1-4 to secure the XMPP-based communication in sensor network. The result supports the feasibility of the security mechanism for XMPP-based ISO/IEC/IEEE 21451 sensor networks.

Original languageEnglish
Article number6971058
Pages (from-to)2577-2586
Number of pages10
JournalIEEE Sensors Journal
Volume15
Issue number5
DOIs
Publication statusPublished - 2015 May 1
Externally publishedYes

Keywords

  • Extensible Messaging and Presence Protocol (XMPP)
  • ISO/IEC/IEEE 21451
  • publish/subscribe (pub/sub)
  • sensor networks

ASJC Scopus subject areas

  • Instrumentation
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Proposed security mechanism for XMPP-based communications of ISO/IEC/IEEE 21451 sensor networks'. Together they form a unique fingerprint.

Cite this