290 research outputs found

    Novel Cryptographic Authentication Mechanisms for Supply Chains and OpenStack

    Get PDF
    In this dissertation, first, we studied the Radio-Frequency Identification (RFID) tag authentication problem in supply chains. RFID tags have been widely used as a low-cost wireless method for detecting counterfeit product injection in supply chains. We open a new direction toward solving this problem by using the Non-Volatile Memory (NVM) of recent RFID tags. We propose a method based on this direction that significantly improves the availability of the system and costs less. In our method, we introduce the notion of Software Unclonability, which is a kind of one-time MAC for authenticating random inputs. Also, we introduce three lightweight constructions that are software unclonable. Second, we focus on OpenStack that is a prestigious open-source cloud platform. OpenStack takes advantage of some tokening mechanisms to establish trust between its modules and users. It turns out that when an adversary captures user tokens by exploiting a bug in a module, he gets extreme power on behalf of users. Here, we propose a novel tokening mechanism that ties commands to tokens and enables OpenStack to support short life tokens while it keeps the performance up

    Criptografía ligera en dispositivos de identificación por radiofrecuencia- RFID

    Get PDF
    Esta tesis se centra en el estudio de la tecnología de identificación por radiofrecuencia (RFID), la cual puede ser considerada como una de las tecnologías más prometedoras dentro del área de la computación ubicua. La tecnología RFID podría ser el sustituto de los códigos de barras. Aunque la tecnología RFID ofrece numerosas ventajas frente a otros sistemas de identificación, su uso lleva asociados riesgos de seguridad, los cuales no son fáciles de resolver. Los sistemas RFID pueden ser clasificados, atendiendo al coste de las etiquetas, distinguiendo principalmente entre etiquetas de alto coste y de bajo coste. Nuestra investigación se centra fundamentalmente en estas últimas. El estudio y análisis del estado del arte nos ha permitido identificar la necesidad de desarrollar soluciones criptográficas ligeras adecuadas para estos dispositivos limitados. El uso de soluciones criptográficas estándar supone una aproximación correcta desde un punto de vista puramente teórico. Sin embargo, primitivas criptográficas estándar (funciones resumen, código de autenticación de mensajes, cifradores de bloque/flujo, etc.) exceden las capacidades de las etiquetas de bajo coste. Por tanto, es necesario el uso de criptografía ligera._______________________________________This thesis examines the security issues of Radio Frequency Identification (RFID) technology, one of the most promising technologies in the field of ubiquitous computing. Indeed, RFID technology may well replace barcode technology. Although it offers many advantages over other identification systems, there are also associated security risks that are not easy to address. RFID systems can be classified according to tag price, with distinction between high-cost and low-cost tags. Our research work focuses mainly on low-cost RFID tags. An initial study and analysis of the state of the art identifies the need for lightweight cryptographic solutions suitable for these very constrained devices. From a purely theoretical point of view, standard cryptographic solutions may be a correct approach. However, standard cryptographic primitives (hash functions, message authentication codes, block/stream ciphers, etc.) are quite demanding in terms of circuit size, power consumption and memory size, so they make costly solutions for low-cost RFID tags. Lightweight cryptography is therefore a pressing need. First, we analyze the security of the EPC Class-1 Generation-2 standard, which is considered the universal standard for low-cost RFID tags. Secondly, we cryptanalyze two new proposals, showing their unsuccessful attempt to increase the security level of the specification without much further hardware demands. Thirdly, we propose a new protocol resistant to passive attacks and conforming to low-cost RFID tag requirements. In this protocol, costly computations are only performed by the reader, and security related computations in the tag are restricted to very simple operations. The protocol is inspired in the family of Ultralightweight Mutual Authentication Protocols (UMAP: M2AP, EMAP, LMAP) and the recently proposed SASI protocol. The thesis also includes the first published cryptanalysis of xi SASI under the weakest attacker model, that is, a passive attacker. Fourthly, we propose a new protocol resistant to both passive and active attacks and suitable for moderate-cost RFID tags. We adapt Shieh et.’s protocol for smart cards, taking into account the unique features of RFID systems. Finally, because this protocol is based on the use of cryptographic primitives and standard cryptographic primitives are not supported, we address the design of lightweight cryptographic primitives. Specifically, we propose a lightweight hash function (Tav-128) and a lightweight Pseudo-Random Number Generator (LAMED and LAMED-EPC).We analyze their security level and performance, as well as their hardware requirements and show that both could be realistically implemented, even in low-cost RFID tags

    Energy efficiency in short and wide-area IoT technologies—A survey

    Get PDF
    In the last years, the Internet of Things (IoT) has emerged as a key application context in the design and evolution of technologies in the transition toward a 5G ecosystem. More and more IoT technologies have entered the market and represent important enablers in the deployment of networks of interconnected devices. As network and spatial device densities grow, energy efficiency and consumption are becoming an important aspect in analyzing the performance and suitability of different technologies. In this framework, this survey presents an extensive review of IoT technologies, including both Low-Power Short-Area Networks (LPSANs) and Low-Power Wide-Area Networks (LPWANs), from the perspective of energy efficiency and power consumption. Existing consumption models and energy efficiency mechanisms are categorized, analyzed and discussed, in order to highlight the main trends proposed in literature and standards toward achieving energy-efficient IoT networks. Current limitations and open challenges are also discussed, aiming at highlighting new possible research directions

    COMPLEX PULSE FORMING TEACHNIQUE USING AM DETECTOR TYPE CIRCUITRY AND THE APPLICATION OF CDMA TO RFID FOR THE SIMULTANEOUS READING OF MULTIPLE TAGS

    Get PDF
    A novel complex ultra wideband RF pulse forming technique has been implemented in this research, using the coefficients derived from discrete Fourier transform of a virtual pulse train. Incorporated in this technique is a multiple frequency communication systems designed such that transmitter receiver proximity and the fading effect of the individual frequencies make part of a corresponding modulation technique. A code division multiple access (CDMA) application to RFID to greatly reduce read time, while at the same time eliminating inter tag interference, has been investigated with the analysis of a typical cart aisle scenario. With the current rate of growth of inventory world wide there is a tremendous need for more efficient method of data gathering, data storage, and data retrieval. In this dissertation, the application of the CDMA RFID technology has been analyzed to demonstrate the potentials of integrating the RFID technology to the EPC global numbering system

    Design de circuitos RFID multi-ressonantes sem chip como substitutos dos códigos de barras

    Get PDF
    The chipless RFID technology , appears from an e ort to design low-cost RFID tags without the use of traditional silicone Application Specific Integrated Circuits (ASICs) that are the price bottleneck of the typicall RFID technology. In this way, tags become fully passive and without any active processing unit, thus the Chipless RFID system have more similarities with the Radio Detection And Ranging (RADAR) systems than with the common RFID systems. This dissertation sheds light on the problems and challenges that the RFID technology has as replacement of the optical barcode labels, discuss the state of the art of the chipless RFID technology and presents a model to describe the relationship between the multi-resonant circuit resonant frequency and the resonant spirals length. Finally, a chipless RFID system is simulated making use of the fractional Fourier Transform as means to separate linear frequency modulated signals that collide in both time and frequency domain. The results achieved with dissertation not only aid designers with the synthesis of multi-resonant circuits but also prove the reliability of the use of the fractional Fourier Transform as a means of manipulating the time-frequency domain and successfully recovering individual tags' ID from a signal containing more than one collided backscattered signal.A tecnologia de RFID sem chip, surgiu de um esforço para obter etiquetas RFID de baixo custo sem o uso de circuitos integrados de aplicação especifica (ASICs) que são a restrição à diminuição dos preço dos tipicos sistemas RFID. Desta forma, as tags tornam-se totalmente passivas e sem nenhuma unidade de processamento ativa, passando, os sistemas RFID sem chip a ter mais semelhanças com os sistemas de Radio Detection And Ranging (RADAR) do que com os sistemas RFID comuns. Esta dissertação esclarece os problemas e desafios que a tecnologia RFID enfrenta enquanto substituta das etiquetas de código de barras apresentando também o estado da arte da tecnologia RFID sem chip. Também apresenta e propõe um modelo para descrever a relação entre a frequência de ressonância do circuito multi-ressonante e o comprimento das espirais ressonantes. Finalmente, um sistema RFID sem chip é simulado usando a transformada fracionária de Fourier como meio de separar sinais modulados linearmente em frequência que colidem simultaneamente no domínio do tempo e da frequência. Os resultados alcançados com esta dissertação por um lado ajudam os projetistas com a síntese de circuitos multi-ressonantes e por outro provam a confiabilidade do uso da transformada fracionária de Fourier como um meio de manipular o domínio tempo-frequência para recuperar com sucesso informa ção individual de ID a partir de um sinal que contém mais de um sinal transmistido de uma etiqueta sem chip.Mestrado em Engenharia Eletrónica e Telecomunicaçõe

    Intelligent Sensor Networks

    Get PDF
    In the last decade, wireless or wired sensor networks have attracted much attention. However, most designs target general sensor network issues including protocol stack (routing, MAC, etc.) and security issues. This book focuses on the close integration of sensing, networking, and smart signal processing via machine learning. Based on their world-class research, the authors present the fundamentals of intelligent sensor networks. They cover sensing and sampling, distributed signal processing, and intelligent signal learning. In addition, they present cutting-edge research results from leading experts

    Modeling and simulation of an IoT enabled cold Chain Logistics management system

    Get PDF
    06.03.2018 tarihli ve 30352 sayılı Resmi Gazetede yayımlanan “Yükseköğretim Kanunu İle Bazı Kanun Ve Kanun Hükmünde Kararnamelerde Değişiklik Yapılması Hakkında Kanun” ile 18.06.2018 tarihli “Lisansüstü Tezlerin Elektronik Ortamda Toplanması, Düzenlenmesi ve Erişime Açılmasına İlişkin Yönerge” gereğince tam metin erişime açılmıştır.Dünya ekonomisinin etkileyici bir şekilde büyümesi, soğuk zincirde izlenmesi ve yönetilmesi gereken özellikle sıcaklık duyarlı ürünler için belirsizlik durumları karşısında etkin, esnek ve duyarlı olabilmek amacıyla lojistik hizmetleri talep eden tedarik zincirinde artış sağlamıştır. Bunun gerçekleştirilebilmesi için Lojistik şirketerinin uygun bilişim teknolojileri ile desteklenmesi gerekmektedir. İnternet kullanımı ile müşteri ve lojistik sağlayıcı arasında etkili bir bilgi akışı ortamı sağlanmaktadır; ancak lojistik hizmetindeki bilgi ve ürün akışı arasındaki mevcut açıklık, sıcaklık duyarlı nesneler hakkında gerçek zamanlı bilginin elde edilmesinde karar vericiler için lojistik yönetimini daha zor duruma getiren bir problem oluşturmaktadır. Nesnelerin İnterneti alanındaki gelişmeler soğuk zincir sanayilerinde izleme, yönetme ve gerçek zamanlı görünürlük sağlama ve uygun zeka seviyesi ile bilgi paylaşımı alanında potensiyel çözümler sunmaktadır. Bu çalışmada soğuk zincirin gerçek zamanlı ortam sıcaklığını izleme, yönetme ve soğuk zincir içerisindeki sıcaklık duyarlı ürünlerin raf ömrünün tahmin edilmesi aracılığıyla tüm karar vericilerin karar desteklerini geliştirmeye yardımcı olan IoT erişimli soğuk zincir lojistiği gösterilemektedir. Çalışma içerisinde, gerçek zamanlı ortam verileri IEEE 802.15.4 kablosuz algılayıcı ağ yapısı kullanılarak elde edilmiş ve toplanan veriler bir ağ geçidi aracılığıyla sunucuya, ürünlerin raf ömürlerinin geliştirilen karar destek sistemi yardıyla tahmin edilebilmesini sağlamak üzere, gönderilmiştir. Ayrıca, soğuk zincir içerisindeki bozulabilir ürünlerin tespiti için Radyo Frekanslı Tanıma (Radio Frequency Identification-RFID) kullanılmıştır. Çalışma içerisinde kullanılan tüm cihazlar ve protokoller olay-güdümlü Riverbed Modeler yazılımıyla modellenerek benzetimleri yapılmıştır.The Dramatic growth of world economy results growth in the supply chain which demands logistics service to be agile, flexible and responsive in the face of uncertainty, especially for temperature sensitive products that need to be monitored and managed in the cold chain. To achieve this, Logistics companies must be supported by appropriate information technologies. Internet provides an effective means of driving information between customer and logistics provider, however, existing gap between products flow and information flow in logistic service has created a problem in getting real-time information about temperature sensitive items which make logistics management more challenging for decision makers. The growth of internet of things (IoT) gives a potential solution for monitoring, managing, and achieving real-time visibility and sharing information with the appropriate level of intelligence in cold chain industries. This paper demonstrates IoT enabled cold chain logistics that helps to enhance the decision support of all actors through managing, monitoring the real-time ambient temperature of the cold chain and predicting the shelf-life of temperature sensitive products inside the cold chain. In the study, real-time data of ambient parameters are gathered using IEEE 802.15.4 based wireless sensor networks and sent to the remote server through a gateway so that the shelf life of the products can be predicted by the decision support system developed. Radio Frequency Identification (RFID) is also used for identification of perishable goods inside the cold chain. All the devices and protocols employed in the study are modeled and simulated using event-driven Riverbed Modeler software

    Weak-Unforgeable Tags for Secure Supply Chain Management

    Get PDF
    Given the value of imported counterfeit and pirated goods, the need for secure supply chain management is pertinent. Maleki et al. (HOST 2017) propose a new management scheme based on RFID tags (with 2-3K bits NVM) which, if compared to other schemes, is competitive on several performance and security metrics. Its main idea is to have each RFID tag stores its reader events in its own NVM while moving through the supply chain. In order to bind a tag\u27s identity to each event such that an adversary is not able to impersonate the tag\u27s identity on another duplicate tag, a function with a weak form of unforgeability is needed. In this paper, we formally dene this security property, present three constructions (MULTIPLY-ADD, ADD-XOR, and S-Box-CBC) having this security property, and show how to bound the probability of successful impersonation in concrete parameter settings. Finally, we compare our constructions with the light-weight hash function PHOTON used by Maleki et al. in terms of security and circuit area needed. We conclude that our ADD-XOR and S-Box-CBC constructions have approximately 1/4 - 1/3 of PHOTON\u27s total circuit area (this also includes the control circuitry besides PHOTON) while maintaining an appropriate security level which takes care of economically motivated adversaries

    Performance Assessment of Routing Protocols for IoT/6LoWPAN Networks

    Get PDF
    The Internet of Things (IoT) proposes a disruptive communication paradigm that allows smart objects to exchange data among themselves to reach a common goal. IoT application scenarios are multiple and can range from a simple smart home lighting system to fully controlled automated manufacturing chains. In the majority of IoT deployments, things are equipped with small devices that can suffer from severe hardware and energy restrictions that are responsible for performing data processing and wireless communication tasks. Thus, due to their features, communication networks that are used by these devices are generally categorized as Low Power and Lossy Networks (LLNs). The considerable variation in IoT applications represents a critical issue to LLN networks, which should offer support to different requirements as well as keeping reasonable quality-of-service (QoS) levels. Based on this challenge, routing protocols represent a key issue in IoT scenarios deployment. Routing protocols are responsible for creating paths among devices and their interactions. Hence, network performance and features are highly dependent on protocol behavior. Also, based on the adopted protocol, the support for some specific requirements of IoT applications may or may not be provided. Thus, a routing protocol should be projected to attend the needs of the applications considering the limitations of the device that will execute them. Looking to attend the demand of routing protocols for LLNs and, consequently, for IoT networks, the Internet Engineering Task Force (IETF) has designed and standardized the IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). This protocol, although being robust and offering features to fulfill the need of several applications, still presents several faults and weaknesses (mainly related to its high complexity and memory requirement), which limits its adoption in IoT scenarios. An alternative to RPL, the Lightweight On-demand Ad Hoc Distancevector Routing Protocol – Next Generation (LOADng) has emerged as a less complicated routing solution for LLNs. However, the cost of its simplicity is paid for with the absence of adequate support for a critical set of features required for many IoT environments. Thus, based on the challenging open issues related to routing in IoT networks, this thesis aims to study and propose contributions to better attend the network requirements of IoT scenarios. A comprehensive survey, reviewing state-of-the-art routing protocols adopted for IoT, identified the strengths and weaknesses of current solutions available in the literature. Based on the identified limitations, a set of improvements is designed to overcome these issues and enhance IoT network performance. The novel solutions are proposed to include reliable and efficient support to attend the needs of IoT applications, such as mobility, heterogeneity, and different traffic patterns. Moreover, mechanisms to improve the network performance in IoT scenarios, which integrate devices with different communication technologies, are introduced. The studies conducted to assess the performance of the proposed solutions showed the high potential of the proposed solutions. When the approaches presented in this thesis were compared with others available in the literature, they presented very promising results considering the metrics related to the Quality of Service (QoS), network and energy efficiency, and memory usage as well as adding new features to the base protocols. Hence, it is believed that the proposed improvements contribute to the state-of-the-art of routing solutions for IoT networks, increasing the performance and adoption of enhanced protocols.A Internet das Coisas, do inglês Internet of Things (IoT), propõe um paradigma de comunicação disruptivo para possibilitar que dispositivos, que podem ser dotados de comportamentos autónomos ou inteligentes, troquem dados entre eles buscando alcançar um objetivo comum. Os cenários de aplicação do IoT são muito variados e podem abranger desde um simples sistema de iluminação para casa até o controle total de uma linha de produção industrial. Na maioria das instalações IoT, as “coisas” são equipadas com um pequeno dispositivo, responsável por realizar as tarefas de comunicação e processamento de dados, que pode sofrer com severas restrições de hardware e energia. Assim, devido às suas características, a rede de comunicação criada por esses dispositivos é geralmente categorizada como uma Low Power and Lossy Network (LLN). A grande variedade de cenários IoT representam uma questão crucial para as LLNs, que devem oferecer suporte aos diferentes requisitos das aplicações, além de manter níveis de qualidade de serviço, do inglês Quality of Service (QoS), adequados. Baseado neste desafio, os protocolos de encaminhamento constituem um aspecto chave na implementação de cenários IoT. Os protocolos de encaminhamento são responsáveis por criar os caminhos entre os dispositivos e permitir suas interações. Assim, o desempenho e as características da rede são altamente dependentes do comportamento destes protocolos. Adicionalmente, com base no protocolo adotado, o suporte a alguns requisitos específicos das aplicações de IoT podem ou não ser fornecidos. Portanto, estes protocolos devem ser projetados para atender as necessidades das aplicações assim como considerando as limitações do hardware no qual serão executados. Procurando atender às necessidades dos protocolos de encaminhamento em LLNs e, consequentemente, das redes IoT, a Internet Engineering Task Force (IETF) desenvolveu e padronizou o IPv6 Routing Protocol for Low Power and Lossy Networks (RPL). O protocolo, embora seja robusto e ofereça recursos para atender às necessidades de diferentes aplicações, apresenta algumas falhas e fraquezas (principalmente relacionadas com a sua alta complexidade e necessidade de memória) que limitam sua adoção em cenários IoT. Em alternativa ao RPL, o Lightweight On-demand Ad hoc Distance-vector Routing Protocol – Next Generation (LOADng) emergiu como uma solução de encaminhamento menos complexa para as LLNs. Contudo, o preço da simplicidade é pago com a falta de suporte adequado para um conjunto de recursos essenciais necessários em muitos ambientes IoT. Assim, inspirado pelas desafiadoras questões ainda em aberto relacionadas com o encaminhamento em redes IoT, esta tese tem como objetivo estudar e propor contribuições para melhor atender os requisitos de rede em cenários IoT. Uma profunda e abrangente revisão do estado da arte sobre os protocolos de encaminhamento adotados em IoT identificou os pontos fortes e limitações das soluções atuais. Com base nas debilidades encontradas, um conjunto de soluções de melhoria é proposto para superar carências existentes e melhorar o desempenho das redes IoT. As novas soluções são propostas para incluir um suporte confiável e eficiente capaz atender às necessidades das aplicações IoT relacionadas com suporte à mobilidade, heterogeneidade dos dispositivos e diferentes padrões de tráfego. Além disso, são introduzidos mecanismos para melhorar o desempenho da rede em cenários IoT que integram dispositivos com diferentes tecnologias de comunicação. Os vários estudos realizados para mensurar o desempenho das soluções propostas mostraram o grande potencial do conjunto de melhorias introduzidas. Quando comparadas com outras abordagens existentes na literatura, as soluções propostas nesta tese demonstraram um aumento do desempenho consistente para métricas relacionadas a qualidade de serviço, uso de memória, eficiência energética e de rede, além de adicionar novas funcionalidades aos protocolos base. Portanto, acredita-se que as melhorias propostas contribuiem para o avanço do estado da arte em soluções de encaminhamento para redes IoT e aumentar a adoção e utilização dos protocolos estudados

    A fog computing framework for scalable RFID systems in global supply chain management

    Get PDF
    With the rapid proliferation of RFID systems in global supply chain management, tracking every object at the individual item level has led to the generation of enormous amount of data that will have to be stored and accessed quickly to make real time decisions. This is especially critical for perishable goods supply chain such as fruits and pharmaceuticals which have enormous value tied up in assets and may become worthless if they are not kept in precisely controlled and cool environments. While Cloud-based RFID solutions are deployed to monitor and track the products from manufacturer to retailer, we argue that Fog Computing is needed to bring efficiency and reduce the wastage experienced in the perishable produce supply chain. This paper investigates in-depth: (i) the application of Fog Computing in perishable produce supply chain management using blackberry fruit as a case study; (ii) the data, computations and storage requirements for the fog nodes at each stage of the supply chain; (iii) the adaptation of the architecture to the general perishable goods supply chain; and (iv) the benefits of the proposed fog nodes with respect to monitoring and actuation in the blackberry supply chain
    corecore