Internet of Things" (IOT) has become the everyday buzz words in recent years. As part and parcel of the Smart environment where human beings and things interact intelligently, trust and mobility becomes the basic prerequisites. However, to unify trust and mobility, a security protocol must be used for information exchanges among human and things; as well as between things and things (such as between Wi-Fi Client and Wi-Fi AP). In this paper, we present an enhancement of a security protocol for bulk data transfer amongst embedded devices (similar to the practices in IOT). We also proposed a security framework for enhancing security, trust and privacy (STP) for embedded system infrastructure. We suggested the use of lightweight symmetric encryption (for data) and asymmetric encryption (for key exchange) protocols in Trivial File Transfer Protocol (TFTP). The target implementation of TFTP is for embedded devices such as Wi-Fi Access Points (AP) and remote Base Stations (BS). We have chosen Das U-Boot (Universal Boot loader) as the horizontal security platform for this new security implementation which is suitable for Smart Environment.
<p>The revolution of the Internet of Things (IoT) has given a better way of monitoring things including anything that could gather data and share the information over the internet. Most of the connected things are using Device to Device (D2D) connection to make it available on the internet such as client to a broker or client to a server. However, when IoT devices such as embedded devices and sensors that are connected to the internet, it becomes an open path for attackers to acquire the data and data vulnerably will become an issue. Thus, data integrity might become an issue, or the attackers could temper the data and could cause a disastrous domino effect to the interconnected IoT devices. Therefore, the data security collected from the sensors is substantial even though it could be a single character transmitted. However, IoT sensors are low powered devices in term of CPU, storage, memory and batteries. Securing the devices such as integrating the encryption algorithm computations might give overhead to the sensors and draining the batteries even faster than it is predicted. Alternatively, this paper attempts to explore the capabilities of the asymmetric scheme on resource constrained devices for its communications. Thus, this paper presents an RF communication analysis of a low consumption asymmetric encryption, the AA<sub>β</sub> (AA-Beta) especially on encryption section that is likely to be feasible on IoT devices to preserve the data integrity. The design of RF transmission has been considered to suit the RF transceiver capability to prevent data losses and error from occurring. The result shows that 2.35 times of RF transmits runtime increased compared to RF simulation runtime. Meanwhile, at the receiver side, the runtime increases 60% compared to the simulation.</p>
Advances in embedded RF devices and sensor nodes have witnessed major expansion of end user services such as Internet of Things (IoT) and Cloud Computing. These prospective smart embedded and sensor devices normally interconnect to the internet using wireless technology (e.g. radio frequency, Wi-Fi) and run on top of CoAP and TFTP protocols. In this paper, we present a RF Simulator v1.1 which simulates lightweight security protocols for RF devices communications using Stop and Wait Automatic Repeat Request (SW-ARQ) protocol. The RF Simulator can be used for a quick trial and debugging for any new cryptography protocol in the simulator before actual implementation or experiment of the protocol in the physical embedded devices. We believe that the RF Simulator may provide an alternate way for a computer scientist, cryptographer or engineer to do a rapid product research and development of any cryptographic protocol for smart devices. The major advantage of the RF Simulator is that the source codes in the simulator can be used directly into its physical implementation of the embedded RF devices communication. We also presented simulation results of DHKE and AES encryption schemes using SW-ARQ protocol as a use case of the RF Simulator. The simulation was executed in ARM Raspberry Pi board and HP DC7800 PC as hardware platforms for the simulator setup.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.