Design and Realization of the Intelligent System for Identification of the IoT Devices


  • J. Horalek University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republi.c
  • F. Holik University of Pardubice, Faculty of Electrical Engineering and Informatics, Pardubice, Czech Republi.c


Internet of Things, IoT Security, Authorization and Authentication, DS2401, IoT Identification,


This paper presents a unique solution for identification and verification of IoT devices. The solution is based on actual security threats in the IoT design. For this reason, the unique identification chip DS2401 is used and devices are monitored from the centralized system. The paper introduces this system for authentication and authorization of IoT devices. These functions use the unique identification number. The whole system, including the management of identities and the user server, is realized with Raspberry Pi devices.


R. Van Der Meulen, “Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015,” in: Gartner. Stamford, 2015.

J. Horalek, and V. Sobeslav, “Measuring of Electric Energy Consumption in Households by Means of Arduino Platform,” in: Advanced Computer and Communication Engineering Technology, 2016, pp. 819-830. DOI: 10.1007/978-3-319-24584-3_69

Hewlett Packard Enterprise, “Internet of things research study: 2015 report,” 2015 [online] Available:, Accessed: 2016-11-05.

J. Brozek, V. Fiala, J. Fikejz, and P. Pich, “Use of industrial control unit in intelligent homes,” in: ELEKTRO, 2016. Pp. 489-494. DOI: 10.1109/ELEKTRO.2016.7512124

O. Vermesan, D. Ovidiu, and P. Friess, “Internet of things: converging technologies for smart environments and integrated ecosystems,” 2013, ISBN 9788792982964.

S. Babar, P. Mahalle, A. Stango, N. Prasad, and R. Prasad, “Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT),” DOI: 10.1007/978-3-642-14478-3_42.

S. Babar, A. Stango, N. Prasad, J. Sen, and R. Prasad, “Proposed embedded security framework for Internet of Things (IoT),” in: 2011 2nd International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011, pp. 1-5. DOI: 10.1109/WIRELESSVITAE.2011.5940923.

J. Yang, and B. Fang, “Security model and key technologies for the Internet of things,” in: The Journal of China Universities of Posts and Telecommunications. 2011, pp. 109-112. DOI: 10.1016/S1005- 8885(10)60159-8. ISSN 10058885.

M. Kelley, “The Stuxnet Attack On Iran's Nuclear Plant Was 'Far More Dangerous' Than Previously Thought,” 2013, [online] Available:, Accessed: 2016-10-01

R. Weber, “Internet of Things – New security and privacy challenges,” in: Computer Law & Security Review. 2010, DOI: 10.1016/j.clsr.2009.11.008.

Q. Jing, A.Vasilakos, J. Wan, J. Lu, and D. Qiu, “Security of the Internet of Things: perspectives and challenges,” in: Wireless Networks. 2014, pp. 2481-250. DOI: 10.1007/s11276-014-0761-7. ISSN 1022-0038.

C. Medaglia, and A. Serbanati, “An Overview of Privacy and Security Issues in the Internet of Things,” In: The Internet of Things. 2010. pp. 389. DOI: 10.1007/978-1-4419-1674-7_38.

S. Sicari, A. Rizzardi, L. Grieco, and A. Coen-Porisini, “Security, privacy and trust in Internet of Things: The road ahead,” in: Computer Networks, 2015, pp. 146-164. DOI: 10.1016/j.comnet.2014.11.008. ISSN 13891286.

L. Xu, W. He, and S. Li, “Internet of Things in Industries: A Survey,” in: IEEE Transactions on Industrial Informatics. 2014 pp. 2233-2243. DOI: 10.1109/TII.2014.2300753. ISSN 1551-3203.

J. Horalek, and V. Sobeslav, “IPv6 firewall functions analysis,” in: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2016, pp. 219-228. DOI: 10.1007/978-3-319-45246-3_21.

T. Svoboda, and J. Horalek, “Analysis of security possibilities of platforms for 3D graphics,” in: Journal of Telecommunication, Electronic and Computer Engineering, 2016. pp. 43-47.

F. Holik, J. Horalek, O. Marik, S. Neradova, and S. Zitta, “Effective penetration testing with Metasploit framework and methodologies,” in: CINTI 2014 - 15th IEEE International Symposium on Computational Intelligence and Informatics, Proceedings, 2014, pp. 237-242. DOI: 10.1109/CINTI.2014.7028682.

DS2401 Silicon Serial Number. 2015. Maxim Integrated [online] available: Accessed: 2016-09-17.

J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami, “Internet of Things (IoT): A vision, architectural elements, and future directions” in: Future Generation Computer Systems, 2013, pp. 1645-1660. DOI:




How to Cite

Horalek, J., & Holik, F. (2018). Design and Realization of the Intelligent System for Identification of the IoT Devices. Journal of Telecommunication, Electronic and Computer Engineering (JTEC), 10(1-8), 83–87. Retrieved from