Demo: Secure M2M cloud testbed

Heikki Mahkonen, Teemu Rinta-Aho, Tero Kauppinen, Mohit Sethi, Jimmy Kjällman, Patrik Salmela, Tony Jokikyyny

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

5 Citations (Scopus)


This demo presents a Machine-to-Machine (M2M) service platform running on an OpenStack cloud environment. Ac- cess to this platform is secured with authentication based on 3GPP standardized Generic Bootstrapping Architecture (GBA). The M2M network in this testbed consists of Rasp- berry Pi gateways and resource-constrained devices such as Arduinos. These devices have associated sensors, that report physical data such as temperature, and actuators such as LEDs, that respond to actuation commands. In this demo, the sensor data is authenticated and integrity protected end- To-end with public-key elliptic curve digital signature algo- rithm (ECDSA). Lastly, the demo testbed includes a web- based cloud management interface referred to as the \IoT Portal". This portal allows a system administrator to spec- ify pre-configured Virtual Machine (VM) images with cus- Tom applications. As an example, a M2M Web service is installed into the VMs. This web service collects and dis- plays authenticated and veried sensor data and can also be used to send actuator commands.

Original languageEnglish
Title of host publicationMobiCom 2013 - Proceedings of the 19th Annual International Conference on Mobile Computing and Networking
Number of pages3
Publication statusPublished - 11 Nov 2013
MoE publication typeA4 Article in a conference publication
EventAnnual International Conference on Mobile Computing and Networking - Miami, United States
Duration: 30 Sep 20134 Oct 2013
Conference number: 19


ConferenceAnnual International Conference on Mobile Computing and Networking
Abbreviated titleMobiCom
CountryUnited States


  • Cloud computing
  • Generic bootstrapping architecture
  • In- Ternet of things
  • Machine-to-machine
  • Openstack
  • Security


Dive into the research topics of 'Demo: Secure M2M cloud testbed'. Together they form a unique fingerprint.

Cite this