485 research outputs found

    Demo Abstract: Securing Communication in 6LoWPAN with Compressed IPsec

    Get PDF
    With the inception of IPv6 it is possible to assign a unique ID to each device on planet. Recently, wireless sensor networks and traditional IP networks are more tightly integrated using IPv6 and 6LoWPAN. Real-world deployments of WSN demand secure communication. The receiver should be able to verify that sensor data is generated by trusted nodes and/or it may also be necessary to encrypt sensor data in transit. Available IPv6 protocol stacks can use IPsec to secure data exchanges. Thus, it is desirable to extend 6LoWPAN such that IPsec communication with IPv6 nodes is possible. It is beneficial to use IPsec because the existing end-points on the Internet do not need to be modified to communicate securely with the WSN. Moreover, using IPsec, true end-to-end security is implemented and the need for a trustworthy gateway is removed. In this demo we will show the usage of our implemented lightweight IPsec. We will show how IPsec ensures end-to-end security between an IP enabled sensor networks and the traditional Internet. This is the first compressed lightweight design, implementation, and evaluation of a 6LoWPAN extension for IPsec. This demo complements the full paper that will appear in the parent conference, DCOSS’11

    A Low-Power CoAP for Contiki

    Get PDF
    Internet of Things devices will by and large be battery-operated, but existing application protocols have typically not been designed with power-efficiency in mind. In low-power wireless systems, power-efficiency is determined by the ability to maintain a low radio duty cycle: keeping the radio off as much as possible. We present an implementation of the IETF Constrained Application Protocol (CoAP) for the Contiki operating system that leverages the ContikiMAC low-power duty cycling mechanism to provide power efficiency. We experimentally evaluate our low-power CoAP, demonstrating that an existing application layer protocol can be made power-efficient through a generic radio duty cycling mechanism. To the best of our knowledge, our CoAP implementation is the first to provide power-efficient operation through radio duty cycling. Our results question the need for specialized low-power mechanisms at the application layer, instead providing low-power operation only at the radio duty cycling layer

    A BLE-based multi-gateway network infrastructure with handover support for mobile BLE peripherals

    Get PDF
    Bluetooth Low Energy (BLE) is a popular technology within the Internet of Things. It allows low-power, star networks to be set up between a BLE gateway and multiple, power-constrained BLE devices. However, these networks tend to be static, not supporting BLE devices that can freely move around in an environment of multiple interconnected BLE gateways and perform handovers whenever necessary. This work proposes two alternative network architectures for mobile BLE peripherals. One leverages on IPv6 over BLE, whereas the other combines default BLE mechanisms with an additional custom controller. On top, we study in detail the handover mechanism that must be present in both architectures and compare the performance of both a passive and active handover approach. The passive handover approach can be set up without any extra implementation, but an active handover approach offers more proactive handover decisions and can provide a much lower handover latency. All proposed solutions have been implemented and validated on real hardware, showing the feasibility of having future infrastructures with support for mobile BLE devices

    Development of a wireless sensor network for agricultural monitoring for Internet of Things (IoT)

    Get PDF
    Monitoring of the agricultural environment has become an important area of control and protection which provides real-time system and control communication with the physical world. This thesis focuses on Development ofa wireless Sensor Network for agricultural monitoring for Internet of things (IoT) to monitor environmental condition. Among the various technologies for Agriculture monitoring, Wireless Sensor Networks (WSNs) are perceived as an amazing one to gather and process information in the agricultural area with low-cost and low-energy consumption. WSN is capable of providing processed field data in real time from sensors which are physically distributed in the field. Agriculture and farming are one of the industries which have a late occupied their regards for WSNs, looking for this financially acute innovation to improve its production and upgrade agribusiness yield standard. Wireless Sensor Networks (WSNs) have pulled in a lot consideration in recent years.The proposed system uses WSN sensors to capture and track information pertaining to crop growth condition outside and inside greenhouses. 6LowPAN network protocol is used for low power consumption and for transmitting and receiving of data packets.This thesis introduces the agricultural monitoring system's hardware design, system architecture, and software process control. Agriculture monitoring system set-up is based on Contiki OS while device testing is carried out using real-time farm information and historical dat

    Routing and Mobility on IPv6 over LoWPAN

    Get PDF
    The IoT means a world-wide network of interconnected objects based on standard communication protocols. An object in this context is a quotidian physical device augmented with sensing/actuating, processing, storing and communication capabilities. These objects must be able to interact with the surrounding environment where they are placed and to cooperate with neighbouring objects in order to accomplish a common objective. The IoT objects have also the capabilities of converting the sensed data into automated instructions and communicating them to other objects through the communication networks, avoiding the human intervention in several tasks. Most of IoT deployments are based on small devices with restricted computational resources and energy constraints. For this reason, initially the scientific community did not consider the use of IP protocol suite in this scenarios because there was the perception that it was too heavy to the available resources on such devices. Meanwhile, the scientific community and the industry started to rethink about the use of IP protocol suite in all IoT devices and now it is considered as the solution to provide connectivity between the IoT devices, independently of the Layer 2 protocol in use, and to connect them to the Internet. Despite the use of IP suite protocol in all devices and the amount of solutions proposed, many open issues remain unsolved in order to reach a seamless integration between the IoT and the Internet and to provide the conditions to IoT service widespread. This thesis addressed the challenges associated with the interconnectivity between the Internet and the IoT devices and with the security aspects of the IoT. In the interconnectivity between the IoT devices and the Internet the problem is how to provide valuable information to the Internet connected devices, independently of the supported IP protocol version, without being necessary accessed directly to the IoT nodes. In order to solve this problem, solutions based on Representational state transfer (REST) web services and IPv4 to IPv6 dual stack transition mechanism were proposed and evaluated. The REST web service and the transition mechanism runs only at the border router without penalizing the IoT constrained devices. The mitigation of the effects of internal and external security attacks minimizing the overhead imposed on the IoT devices is the security challenge addressed in this thesis. Three different solutions were proposed. The first is a mechanism to prevent remotely initiated transport level Denial of Service attacks that avoids the use of inefficient and hard to manage traditional firewalls. It is based on filtering at the border router the traffic received from the Internet and destined to the IoT network according to the conditions announced by each IoT device. The second is a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes. The third is a network admission control framework that prevents IoT unauthorized nodes to communicate with IoT authorized nodes or with the Internet, which drastically reduces the number of possible security attacks. The network admission control was also exploited as a management mechanism as it can be used to manage the network size in terms of number of nodes, making the network more manageable, increasing its reliability and extending its lifetime.A IoT (Internet of Things) tem suscitado o interesse tanto da comunidade acadĂ©mica como da indĂșstria, uma vez que os campos de aplicação sĂŁo inĂșmeros assim como os potenciais ganhos que podem ser obtidos atravĂ©s do uso deste tipo de tecnologia. A IoT significa uma rede global de objetos ligados entre si atravĂ©s de uma rede de comunicaçÔes baseada em protocolos standard. Neste contexto, um objeto Ă© um objeto fĂ­sico do dia a dia ao qual foi adicionada a capacidade de medir e de atuar sobre variĂĄveis fĂ­sicas, de processar e armazenar dados e de comunicar. Estes objetos tĂȘm a capacidade de interagir com o meio ambiente envolvente e de cooperar com outros objetos vizinhos de forma a atingirem um objetivo comum. Estes objetos tambĂ©m tĂȘm a capacidade de converter os dados lidos em instruçÔes e de as comunicar a outros objetos atravĂ©s da rede de comunicaçÔes, evitando desta forma a intervenção humana em diversas tarefas. A maior parte das concretizaçÔes de sistemas IoT sĂŁo baseados em pequenos dispositivos autĂłnomos com restriçÔes ao nĂ­vel dos recursos computacionais e de retenção de energia. Por esta razĂŁo, inicialmente a comunidade cientĂ­fica nĂŁo considerou adequado o uso da pilha protocolar IP neste tipo de dispositivos, uma vez que havia a perceção de que era muito pesada para os recursos computacionais disponĂ­veis. Entretanto, a comunidade cientĂ­fica e a indĂșstria retomaram a discussĂŁo acerca dos benefĂ­cios do uso da pilha protocolar em todos os dispositivos da IoT e atualmente Ă© considerada a solução para estabelecer a conetividade entre os dispositivos IoT independentemente do protocolo da camada dois em uso e para os ligar Ă  Internet. Apesar do uso da pilha protocolar IP em todos os dispositivos e da quantidade de soluçÔes propostas, sĂŁo vĂĄrios os problemas por resolver no que concerne Ă  integração contĂ­nua e sem interrupçÔes da IoT na Internet e de criar as condiçÔes para a adoção generalizada deste tipo de tecnologias. Esta tese versa sobre os desafios associados Ă  integração da IoT na Internet e dos aspetos de segurança da IoT. Relativamente Ă  integração da IoT na Internet o problema Ă© como fornecer informação vĂĄlida aos dispositivos ligados Ă  Internet, independentemente da versĂŁo do protocolo IP em uso, evitando o acesso direto aos dispositivos IoT. Para a resolução deste problema foram propostas e avaliadas soluçÔes baseadas em web services REST e em mecanismos de transição IPv4 para IPv6 do tipo pilha dupla (dual stack). O web service e o mecanismo de transição sĂŁo suportados apenas no router de fronteira, sem penalizar os dispositivos IoT. No que concerne Ă  segurança, o problema Ă© mitigar os efeitos dos ataques de segurança internos e externos iniciados local e remotamente. Foram propostas trĂȘs soluçÔes diferentes, a primeira Ă© um mecanismo que minimiza os efeitos dos ataques de negação de serviço com origem na Internet e que evita o uso de mecanismos de firewalls ineficientes e de gestĂŁo complexa. Este mecanismo filtra no router de fronteira o trĂĄfego com origem na Internet Ă© destinado Ă  IoT de acordo com as condiçÔes anunciadas por cada um dos dispositivos IoT da rede. A segunda solução, Ă© uma framework de network admission control que controla quais os dispositivos que podem aceder Ă  rede com base na autorização administrativa e que aplica polĂ­ticas de conformidade relativas Ă  segurança aos dispositivos autorizados. A terceira Ă© um mecanismo de network admission control para redes 6LoWPAN que evita que dispositivos nĂŁo autorizados comuniquem com outros dispositivos legĂ­timos e com a Internet o que reduz drasticamente o nĂșmero de ataques Ă  segurança. Este mecanismo tambĂ©m foi explorado como um mecanismo de gestĂŁo uma vez que pode ser utilizado a dimensĂŁo da rede quanto ao nĂșmero de dispositivos, tornando-a mais fĂĄcil de gerir e aumentando a sua fiabilidade e o seu tempo de vida

    Performance of constrained wireless devices in the Internet of Things

    Get PDF
    The Internet of Things is an emerging concept where every device, regardless of size, have their own connection to the Internet. This thesis examines what possible limitations are imposed on the functionality of resource constrained, wireless devices. Several different technologies are evaluated and compared, before a set of them is chosen for inclusion in an implementation, for example: IEEE 802.15.4, 6LoWPAN and CoAP. The implementation uses the Contiki operating system, and runs on a Texas Instruments CC2530 SoC. We then examine several different performance aspects of our implementation: the amount of data sent, memory usage and energy consumption. The results are discussed together with security aspects applicable to the Internet of things. The memory usage and power consumption were found to be severe issues. Due to the small amount of memory on the chip, all features could not be used at the same time. In addition, the power consumption was found to be too high for battery-powered usage, giving a lifetime of only 27 hours using a button cell battery. The conclusion is that hardware with more memory, and lower power consumption is required. New protocols for radio power-saving should also be developed and implemented in software.Internet of Things – sakernas internet – Ă€r ett framvĂ€xande koncept dĂ€r varje enhet, oavsett storlek, har en anslutning till Internet. Detta examensarbete undersöker vilka möjliga begrĂ€nsningar i funktionalitet detta fĂ„r pĂ„ trĂ„dlösa enheter med begrĂ€nsade resurser. Flera olika teknologier undersöks och jĂ€mförs, innan ett antal vĂ€ljs ut för att ingĂ„ i en implementation, till exempel: IEEE 802.15.4, 6LoWPAN och CoAP. Implementationen anvĂ€nder operativsystemet Contiki och körs pĂ„ ett Texas Instruments CC2530 SoC. Flera prestandaaspekter undersöks: mĂ€ngden skickad data, minnesanvĂ€ndning och energiförbrukning. Resultaten diskuteras tillsammans med sĂ€kerhetsaspekter att ta hĂ€nsyn till i Internet of Things. MinnesanvĂ€ndningen och energiförbrukningen Ă€r de mest problematiska omrĂ„dena. PĂ„ grund av chippets begrĂ€nsade mĂ€ngd minne kan inte all funktionalitet anvĂ€ndas samtidigt. Dessutom Ă€r energiförbrukningen för hög för lĂ€ngre tids strömförsörjning med batteri, vilket ger en livslĂ€ngd pĂ„ enbart 27 timmar med ett knappcellsbatteri. Slutsatsen Ă€r att hĂ„rdvara med mer minne och lĂ€gre energiförbrukning behövs. Nya protokoll för energibesparande radioanvĂ€ndning behöver ocksĂ„ utvecklas och implementeras i mjukvara

    Development of a Personal Area Network for biomedical measurements for Internet of Things (IoT)

    Get PDF
    Internet of Things is a set of ever growing technologies and specialized devices that are increasingly influential in our everyday lives. IoT is all about connecting the physical and the digital worlds in one enabling the collection of real world data and the automation of processes. IoT turns your typical device into an smart, programmable one, more capable of interacting with humans and thus enabling users to better understand their surroundings through the data collected. This data collected by the IoT devices can then be used on all kinds of contemporary services and applications. This project aims to implement an IoT application for biomedical measurements, consisting of a WSN(Wireless Sensor Network), where three sensor nodes will collect physical world measurements. This collected information will be transmitted to a routing device, that further send the information to the internet, where the user will be able to access the data in real time through a web browser and schedule some events. In order to carry out the described scenario, a Raspberry Pi and four Zolertia Z1, three working as sensor nodes and one working as a routing node were used. The Z1 mote is powered by a low power MSP430 class microcontroller. Contiki was the operating system chosen to run the sensor nodes. In this scenario, Raspberry Pi plays the role of a router, enabling the connection of the WSN network and the internet. To send the information from the nodes, a high-speed program was developed, aiming to beat the default restrictions that Contiki OS imposes on high-speed networks. The transport protocol chosen is UDP. On the receiving end, an UDP server and a python script were developed with the intent to send the collected data to our ASP.NET web server and mySQL database. Finally connectivity tests and network speed tests of the deployed system are presented

    A network access control framework for 6LoWPAN networks

    Get PDF
    Low power over wireless personal area networks (LoWPAN), in particular wireless sensor networks, represent an emerging technology with high potential to be employed in critical situations like security surveillance, battlefields, smart-grids, and in e-health applications. The support of security services in LoWPAN is considered a challenge. First, this type of networks is usually deployed in unattended environments, making them vulnerable to security attacks. Second, the constraints inherent to LoWPAN, such as scarce resources and limited battery capacity, impose a careful planning on how and where the security services should be deployed. Besides protecting the network from some well-known threats, it is important that security mechanisms be able to withstand attacks that have not been identified before. One way of reaching this goal is to control, at the network access level, which nodes can be attached to the network and to enforce their security compliance. This paper presents a network access security framework that can be used to control the nodes that have access to the network, based on administrative approval, and to enforce security compliance to the authorized nodes
    • 

    corecore