environment. An access rights management is applied
to limit the actions that can be performed by a user.
The security of the system is ensured by the exploita-
tion of some techniques such as token access, DTLS,
encryption of passwords and secure sessions. The
platform has been used to develop a smart home con-
trol mobile application, which has been extensively
tested. The results confirm realtime feature of the pro-
posed solution and show latency at the order of few
tens of milliseconds for building control actions. This
work open perspectives for future works in the appli-
cation we considered for the implementation. This
include the integration of a virtual assistant to facili-
tate interaction with the system, the integration of ma-
chine learning to allow the system to learn habits of
users and plan actions, and the use of artificial intel-
ligence algorithms to enable the system to make au-
tonomous decisions when necessary.
REFERENCES
Al-Fuqaha, A. I., Guizani, M., Mohammadi, M., Aledhari,
M., and Ayyash, M. (2015). Internet of things: A sur-
vey on enabling technologies, protocols, and applica-
tions. IEEE Communications Surveys and Tutorials,
17(4):2347–2376.
Chouali, S., Boukerche, A., and Mostefaoui, A. (2017). To-
wards a formal analysis of mqtt protocol in the con-
text of communicating vehicles. In Proceedings of the
15th ACM International Symposium on Mobility Man-
agement and Wireless Access, MobiWac ’17, pages
129–136, New York, NY, USA. ACM.
Dunkels, A., Gronvall, B., and Voigt, T. (2004). Contiki
- a lightweight and flexible operating system for tiny
networked sensors. In Proceedings of the 29th An-
nual IEEE International Conference on Local Com-
puter Networks, LCN ’04, pages 455–462, Washing-
ton, DC, USA. IEEE Computer Society.
Fernandes, E., Jung, J., and Prakash, A. (2016). Secu-
rity analysis of emerging smart home applications. In
2016 IEEE Symposium on Security and Privacy (SP),
pages 636–654, Los Alamitos, CA, USA. IEEE Com-
puter Society.
Granjal, J., Monteiro, E., and Silva, J. S. (2015). Security
for the internet of things: A survey of existing proto-
cols and open research issues. IEEE Communications
Surveys and Tutorials, 17(3):1294–1312.
Heimgaertner, F., Hettich, S., Kohlbacher, O., and Menth,
M. (2017). Scaling home automation to public build-
ings: A distributed multiuser setup for openhab 2. In
GIoTS, pages 1–6. IEEE.
Jia, Y. J., Chen, Q. A., Wang, S., Rahmati, A., Fernandes,
E., Mao, Z. M., and Prakash, A. (2017). Contexlot:
Towards providing contextual integrity to appified iot
platforms. In 24th Annual Network and Distributed
System Security Symposium, NDSS 2017, San Diego,
California, USA, February 26 - March 1, 2017.
Kovatsch, M., Lanter, M., and Shelby, Z. (2014). Cali-
fornium: Scalable cloud services for the internet of
things with coap. In 4th International Conference on
the Internet of Things, IOT 2014, Cambridge, MA,
USA, October 6-8, 2014, pages 1–6.
Miller, R. B. (1968). Response time in man-computer con-
versational transactions. In Proceedings of the Decem-
ber 9-11, 1968, Fall Joint Computer Conference, Part
I, AFIPS ’68 (Fall, part I), pages 267–277, New York,
NY, USA. ACM.
Shelby, C. Z., draft Sensinode, I., St, I. S., Frank,
A. T. B., and Sturek, D. (2011). Constrained
application protocol (coap. In IETF Internet-
Draft draft-ietf-core-coap-08, work in progress http://
tools.ietf.org/html/draft-ietf-core-coap-08.
Tanganelli, G., Vallati, C., and Mingozzi, E. (2015).
Coapthon: Easy development of coap-based iot ap-
plications with python. In 2015 IEEE 2nd World Fo-
rum on Internet of Things (WF-IoT), pages 63–68, Los
Alamitos, CA, USA. IEEE Computer Society.
Vu
ˇ
cini
´
c, M., Tourancheau, B., Rousseau, F., Duda, A., Da-
mon, L., and Guizzetti, R. (2015). Oscar. Ad Hoc
Netw., 32(C):3–16.
IoT-DMCP: An IoT Data Management and Control Platform for Smart Cities
583