2. Presentation outlines:
1. Abstract
2. Problem Definition
3. Definition IoT
4. IoT Platform, operating systems, development tools
5. Challenges in IoT
6. Key IoT Security Technology
7. Cryptography
8. One time pad
9. DNA
10. Hardware and Software tools
11. Implementation in Python (Encryption) & (Decryption)
12. MQTT Protocol
13. RASPBERRY PI
14. Case Study
3. Abstract
Internet of Things (IoT) is a rapid technology that enables devices to
communicate and share information between them. It consists of things
"devices" with ability of internet connectivity and networking. Due to increasing
needs of secure environment in IoT application, the security is becoming an
attractive field for the researchers. Connecting devices to the internet will
facilitate the hackers attack since they can reach the data from anywhere in the
globe. The weaknesses in security causes serious economic and privacy loss . In
this work, an encryption-decryption process based stream cipher has been used.
The messages between IoT nodes (Raspberry Pi) is encrypted using linear
feedback shift register as a pseudo number key generator for one time pad
stream cipher, along with a DNA computing. A vihcle network would be taken as
a case study for this work.
4. Problem Definition
IoT security is the technology area concerned with safeguarding connected
devices and networks in the internet of things (IoT). IoT security has become the
subject of scrutiny after a number of high-profile incidents where a common IoT
device was used to infiltrate and attack the larger network. Implementing security
measures is critical to ensuring the safety of networks with IoT devices connected
to them. Information security such as messages between these nodes is now
critical issue since any intruder can reach these nodes and change or insert any
messages.
The objective of this work is to design and implement a secure messages
between IoT nodes by using a stream cipher such that it maintain the lite weight
payload such that it would not affect the overall performance of the system.
5. Definition
IoT is basically an interconnection of sensors, actuators, and
computing devices. It emphasizes that “things” (devices) are
connected and communicate rather than peoples.
6. Internet of Things
The technology of IoT is relatively new and had open a numerous
challenges applications in different fields of life.
9. IPV4:
the internet implies that devices will use the IP address as a unique identifier. due to
the limited address space of IPv4 (which allows for 4.3 billion unique addresses),
objects and solution in the IoT will have to use IPv6 to accommodate the extremely
large address space required.
Bandwidth :
Due to high amount of devices connected to internet, the bandwidth is a critical
point since there are extremely high data traffic; therefore, 5G is the solution for this
challenge.
Challenges in IoT
10. Quality of Service (QoS) :
sharing workload between different nodes will offer more available resources, hence
improving QoS. Such collaborative work is a promising mechanism in IoT.
Security and privacy:
When devices are connected to internet, then location would not be an important issue
for intruders where they can attack these devices from anywhere in the globe ,The
solution ,The first solution Data security is to protect the data protected by one of the
encryption methods according to the application I work on ,The second solution is to
protect the network means the devices are connected to how to protect it.
Challenges in IoT
12. Cryptography
These are two main important part of cryptography. The cryptography also posses two main process.
I. Private key/symmetric key: This posse’s only one key.
II. Public key/asymmetric key: This key posses two different key means we will encrypt our information
from one key while decrypt our information from another different key.
13. A powerful method of data encryption is the one-time-pad
algorithm, where each single piece of data is encrypted individually
with a unique key. The disadvantage of this method is that it
requires a vast number of keys; a Pseudo Random Number
Generator (PRNG) could be used to generate the required keys,
but it is problematic in terms of the key repetition.
One Time Pad
14. For example, the key sequence generated by a random generator is as
follows:
pad = ki = k1,k2,k3,...,kn, ki ∈[0,1]
The original message which will be encrypted by the pad keys is as follows:
message = mi = m1,m2,m3,...,mn, mi ∈[0,1]
Then the cipher is as follows:
ci = mi ⊕ki
To decrypt the cipher in the receiver side, the following function is used:
mi = (mi ⊕ki)⊕ki
One Time Pad
15. DNA Deoxyribo Nucleic Acid (DNA) is a biochemical macromolecule that
contains genetic information for the living beings. A genomic molecule
consists of a nucleotides structure with double stranded chains, bonded
together between bases A-T and G-C .Four types of bases are found in two
strands: Adenine A, Thymine T , Cytosine C , and Guanine G. A single strand
have a specific pattern sequence of bases. The other strand will have the
complement nucleotides of the other strand.
DNA
16. Hardware and Software tools
Hardware:
A raspberry pi platform would be used in this work, since it is
powerful, small size, cheap, and has good connectivity to internet. But
the main advantage of this platform is that it is installed with
operating system(Raspian one of Linux ditrbutions).
Software:
A Python 2.7 is used for encryption and decryption since it is open
source and it is one of the most development programming tools used
in IoT.
19. MQTT Protocol
Message Queuing Telemetry Transport (MQTT) is a publish-
subscribe server- client messaging protocol which has been
designed for machine –to- machine (M2M) lightweight
communications uses TCP communication protocol and
enables real time data transfer between connected devices.
20. Data Encryption and Decryption over
MQTT Protocol:
Decrypt msg
(OTP+DNA)
sub
pub
Encrypt msg
(OTP+DNA)
MQTT
21. Several generations of Raspberry Pis have been released. All models feature a Bord
Computer on Chip (SoC) with an integrated ARM-compatible. Processor speed
ranges from 700 MHz to 1.4 GHz for the Pi 3 Model B+; on-board memory ranges
from 256 MB to 1 GB RAM. SD cards are used to store the operating system and
program memory. The boards have one to four USB ports. For video output,
HDMI. Also a WiFi and Bluetooth are available making this bourd one of the most
useful connectivity device in IoT .
RASPBERRY PI