WuKong: Secure Run-Time environment and data-driven IoT

applications for Smart Cities and Smart Buildings

Chi-Sheng Shih
1+, Jyun-Jhe Chou1, and Kwei-Jay Lin1, 2
 

1National Taiwan University, Taipei, Taiwan 10617

2University of California, Irvine, CA, US

kjlin@uci.edu

 

Abstract

Applying IoT technologies to cities and buildings can not only provide intelligent services to the users but also better utilize resources. While developing applications for these two domains, there are several challenges. Manageability, connectivity, and programmability are three of the major challenges. This paper presents the design and study of programming applications for smart cities and smart buildings. Data-driven programming model is designed to simplify the complexity on programming applications on large scale devices. To reduce the complexity of inter-connecting large numbers of devices, three message exchange models supported at WuKong, an intelligent virtual middleware for IoT applications, are studied in this paper: cloud-based, NDN-based, and peer-to-peer message exchange models. Cloud-based model is the most intuitive model but is only suitable for time-insensitive applications. The other two models can support time sensitive applications: NDN-based model can support large scale deployment but leads to higher hardware cost; peer-to-peer model can be employed to the applications in the scale of building without heavy hardware cost. Our evaluation results show that cloud-based model performs worse than the other two models when the number of senders/receivers in the order of magnitude. Last but not the least, security is the foundation of the smart city/building applications. CapeVM, the core of WuKong virtual middleware, takes the advantage of ahead-of-time complier to prevent illegal memory access and execution order without excessive performance overhead.

 

Keywords: Data-Driven IoT applcations, Smart Cities, Named Data Networkcipher

 

+: Corresponding author: Chi-Sheng Shih,

cshih@csie.ntu.edu.tw, Department of Computer and Information Sciences,
National Taiwan University, 10617 Taipei, Taiwan
 

 

Journal of Internet Services and Information Security (JISIS), 8(2): 1-17, May 2018
DOI: 10.22667/JISIS.2018.05.31.001 [
pdf]