define scenarios and evaluate the performance of the
proposed solutions.
ACKNOWLEDGEMENTS
Luis Pacheco is supported by CAPES (Brazil). This
work is partially supported by CNPq (Brazil) and
RNP/CTIC (Brazil) through projects FREESTORE
(457272/2014-7) and EUBrasilCloudForum, respec-
tively.
REFERENCES
Aazam, M., Khan, I., Alsaffar, A. A., and Huh, E.-N.
(2014). Cloud of things: Integrating internet of things
and cloud computing and the issues involved. In Pro-
ceedings of 11th International Bhurban Conference
on Applied Sciences & Technology, pages 414–419.
Akyildiz, I. F. and Vuran, M. C. (2010). Wireless sensor
networks, volume 4. John Wiley & Sons.
Botta, A., de Donato, W., Persico, V., and Pescap
´
e, A.
(2016). Integration of cloud computing and internet
of things: a survey. Future Generation Computer Sys-
tems, 56:684–700.
Chui, M., L
¨
offler, M., and Roberts, R. (2010). The internet
of things. McKinsey Quarterly, 2(2010):1–9.
Deering, S. E. (1998). Internet protocol, version 6 (ipv6)
specification. RFC 2460.
Dierks, T. (2008). The transport layer security (tls) protocol
version 1.2. RFC 5246.
Eggert, M., H
¨
außling, R., Henze, M., Hermerschmidt, L.,
Hummen, R., Kerpen, D., P
´
erez, A. N., Rumpe, B.,
Thißen, D., and Wehrle, K. (2014). Sensorcloud: To-
wards the interdisciplinary development of a trustwor-
thy platform for globally interconnected sensors and
actuators. In Trusted Cloud Computing.
Fox, G. C., Kamburugamuve, S., and Hartman, R. D.
(2012). Architecture and measured characteristics of
a cloud based internet of things. In International Con-
ference on Collaboration Technologies and Systems.
Granjal, J., Monteiro, E., and Silva, J. S. (2015). Security
in the integration of low-power wireless sensor net-
works with the internet: A survey. Ad Hoc Networks,
24:264–287.
Group, W. W. (2006). Wireless Medium Access Control
(MAC) and Physical Layer (PHY) Specifications for
Low-Rate Wireless Personal Area Networks (WPANs).
IEEE Standard for Information Technology.
Hardt, D. (2012). The oauth 2.0 authorization framework.
RFC 6749.
Henze, M., Großfengels, M., Koprowski, M., and Wehrle,
K. (2013a). Towards data handling requirements-
aware cloud computing. In IEEE International Con-
ference on Cloud Computing Technology and Science.
Henze, M., Hermerschmidt, L., Kerpen, D., H
¨
außling, R.,
Rumpe, B., and Wehrle, K. (2016). A comprehen-
sive approach to privacy in the cloud-based inter-
net of things. Future Generation Computer Systems,
56:701–718.
Henze, M., Hummen, R., and Wehrle, K. (2013b). The
cloud needs cross-layer data handling annotations. In
IEEE Security and Privacy Workshops (SPW).
Hummen, R., Shafagh, H., Raza, S., Voig, T., and Wehrle,
K. (2014). Delegation-based authentication and au-
thorization for the ip-based internet of things. In
Annual IEEE International Conference on Sensing,
Communication, and Networking.
Kushalnagar, N., Montenegro, G., and Schumacher, C.
(2007). Ipv6 over low-power wireless personal area
networks (6lowpans): overview, assumptions, prob-
lem statement, and goals. Technical report.
McGrew, D. and Rescorla, E. (2010). Datagram transport
layer security (dtls) extension to establish keys for se-
cure real-time transport protocol (srtp).
Nadeem, Q., Rasheed, M. B., Javaid, N., Khan, Z., Maq-
sood, Y., and Din, A. (2013). M-gear: gateway-based
energy-aware multi-hop routing protocol for wsns.
In Broadband and Wireless Computing, Communica-
tion and Applications (BWCCA), 2013 Eighth Inter-
national Conference on, pages 164–169. IEEE.
Roman, R., Zhou, J., and Lopez, J. (2013). On the features
and challenges of security and privacy in distributed
internet of things. Computer Networks, 57(10):2266–
2279.
Salomaa, A. (2013). Public-key cryptography. Springer
Science & Business Media.
Sautner, B. (2016). Nimbits. http://bsautner.github.
io/com.nimbits/. Accessed at 2017-01-19.
Sethi, M., Arkko, J., and Ker
¨
anen, A. (2012). End-to-end
security for sleepy smart object networks. In IEEE
Conference on Local Computer Networks Workshops.
Shelby, Z., Hartke, K., and Bormann, C. (2014). The con-
strained application protocol (coap). RFC 7275.
Sundmaeker, H., Guillemin, P., Friess, P., and Woelffl
´
e, S.
(2010). Vision and challenges for realising the internet
of things. Cluster of European Research Projects on
the Internet of Things, European Commision.
Tschofenig, H. and Fossati, T. (2016). Transport layer secu-
rity (tls)/datagram transport layer security (dtls) pro-
files for the internet of things. RFC 7925.
Winter, T. (2012). Rpl: Ipv6 routing protocol for low-power
and lossy networks. RFC 6550.
Zhu, Q., Wang, R., Chen, Q., Liu, Y., and Qin, W. (2010).
Iot gateway: Bridgingwireless sensor networks into
internet of things. In IEEE/IFIP 8th International
Conference on Embedded and Ubiquitous Computing.
ICEIS 2017 - 19th International Conference on Enterprise Information Systems
494