CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Secure Internet of Things Environment using XMPP Protocol

by Prince Shekhar Valluri
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 106 - Number 4
Year of Publication: 2014
Authors: Prince Shekhar Valluri
10.5120/18511-9589

Prince Shekhar Valluri . Secure Internet of Things Environment using XMPP Protocol. International Journal of Computer Applications. 106, 4 ( November 2014), 34-36. DOI=10.5120/18511-9589

@article{ 10.5120/18511-9589,
author = { Prince Shekhar Valluri },
title = { Secure Internet of Things Environment using XMPP Protocol },
journal = { International Journal of Computer Applications },
issue_date = { November 2014 },
volume = { 106 },
number = { 4 },
month = { November },
year = { 2014 },
issn = { 0975-8887 },
pages = { 34-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume106/number4/18511-9589/ },
doi = { 10.5120/18511-9589 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:38:32.834301+05:30
%A Prince Shekhar Valluri
%T Secure Internet of Things Environment using XMPP Protocol
%J International Journal of Computer Applications
%@ 0975-8887
%V 106
%N 4
%P 34-36
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is an effort to electronically connect everyday physical objects so that communication to all devices can be centralized and handled without any hassles. A centralized control is setup which is not connected to any outside network thus, making it completely secure from intrusion. XMPP is Extensible Messaging and Presence Protocol that will allow the devices to communicate with the user with help of a smartphone. Communication with the devices will be with the help of standard controls broadcasted by each device. A user connects to the hub (router) using a WPA2 encrypted Wi-Fi Network thereby eliminating the threat of intrusion and misuse. Each device that is logged into the network will broadcast its general set of instructions that can be used to manipulate its controls, movements etc. An app on the user's smartphone will be used to identify all the devices currently available, fetch the instruction set of each and show it to the user in an interactive user interface.

References
  1. Mohamed Ali Feki, Fahim Kawsar, Mathieu Boussard, Lieven Trappeniers, "The Internet of Things: The Next Technological Revolution", Computer, vol. 46, no. 2, pp. 24-25, Feb. 2013, doi:10. 1109/MC. 2013. 63
  2. Hodges, S. ; Taylor, S. ; Villar, N. ; Scott, J. ; Bial, D. ; Fischer, P. T. , "Prototyping Connected Devices for the Internet of Things," Computer , vol. 46, no. 2, pp. 26,34, Feb. 2013, doi: 10. 1109/MC. 2012. 394.
  3. P. Saint-Andre. (March 2011). Extensible Messaging and Presence Protocol (XMPP): Core. IETF. RFC 3920.
  4. XMPP, http://xmpp. org.
  5. IEEE 802. 11n-2009—Amendment 5: Enhancements for Higher Throughput. IEEE-SA. 29 October 2009. doi:10. 1109/IEEESTD. 2009. 5307322.
  6. IEEE 802. 11, http:// en. wikipedia. org/wiki/IEEE_802. 11
  7. Instruction Set, http://en. wikipedia. org/wiki/Instruction_set.
  8. Internet of Things, http://en. wikipedia. org/wiki/Internet_of_Things.
  9. Future of Internet of Things, http://microsoft. com.
Index Terms

Computer Science
Information Sciences

Keywords

Internet of Things connected devices home automation XMPP encrypted network