|Baumann, Felix W.; Odefey, Ulrich; Hudert, Sebastian; Falkenthal, Michael; Breitenbücher, Uwe: Utilising the Tor Network for IoT Addressing and Connectivity. |
In: Proceedings of the 8th International Conference on Cloud Computing and Services Science.
Universität Stuttgart, Fakultät Informatik, Elektrotechnik und Informationstechnik.
S. 27-34, englisch.
SciTePress, März 2018.
DOI: 10.5220/0006591500270034; ISBN: 978-989-758-295-0.
Artikel in Tagungsband (Konferenz-Beitrag).
|CR-Klassif.||D.2.11 (Software Engineering Software Architectures)|
D.2.12 (Software Engineering Interoperability)
H.3.4 (Information Storage and Retrieval Systems and Software)
|Keywords||Tor Network; IoT Connectivity; Internet of Things; Addressing|
For Internet of Things (IoT) devices and cyber-physical systems (CPS), it is required to connect them securely and reliably to some form of cloud environment or computing entity for control, management and utilisation. The Internet is a suitable, standardized, and proven means for the connection of IoT devices in various scenarios. Connection over the Internet utilises existing protocols, standards, technologies and avoids investment in new, specialised concepts. Thereby, this connection requires a transparent addressing schema which is commonly TCP/IP, using domain names and IP addresses. However, in industrial, commercial and private networks, the addressability and connectability/connectivity is often limited by firewalls, proxies and router configurations utilising NAT. Thus, the present network configurations hinder the spread across different locations. Therefore, the method for connecting IoT devices in a client-server configuration proposed herein utilises the Tor (previously: The onion router/routing) network for addressing of and secured communication to IoT and CPS devices. It is an overlay protocol that was designed to allow for robust and anonymous communication. The benefit of this approach is to enable addressability and connectivity of IoT devices in firewalled and potentially unknown and changing network environments, thus allowing for IoT devices to be used reliably behind firewalls as long as outgoing communication is not blocked.
|Abteilung(en)||Universität Stuttgart, Institut für Architektur von Anwendungssystemen|
|Eingabedatum||8. Mai 2018|