[PDF] Leveraging Blockchain-based Protocols in IoT Systems





Previous PDF Next PDF



NARROWBAND IoT SOLUTION DEVELOPER PROTOCOLS GUIDE

Optimized IoT applications however





A latency comparison of IoT protocols in MES

As stated the UWP (see section below) IoT Azure libraries do not support connecting to an Azure IoT. Hub with the MQTT protocol. This limitation obviously 



Leveraging Blockchain-based Protocols in IoT Systems

protocols in IoT systems. Konstantinos Kolias Angelos Stavrou. Irena Bojanova



Unit – 4 IoT Protocols and Security

though it is M2M architecture. • M2M and IoT sometimes are used interchangeably in the United States. 20 March 2018. Unit 4 - IoT Protocols and Security.



RUCKUS IoT Suite data sheet

I100 serves as a single connectivity point between disparate IoT devices using different protocols and a RUCKUS IoT-ready AP.



Comparison of IoT Application Layer Protocols

In this thesis we study four application layer protocols: MQTT



Securing the IoT Ecosystem with Fortinet

May 31 2021 Fortinet IoT security capabilities are delivered via the most ... All commonly used IoT protocols such as MQTT



IoT Protocols

Protocols of IoT (ZigBee IEEE 802.11ah



A Survey of Protocols and Standards for the Internet of Things

These standards include communications routing



[PDF] IoT Protocols

Protocols of IoT (ZigBee IEEE 802 11ah ) Energy-efficient WiFi for IoT Long range wide area network for IoT Fog Computing Architecture for IoT



[PDF] 11 Internet of Things (IoT) Protocols You Need to Know About

Many communication technologies are well known such as WiFi Bluetooth ZigBee and 2G/3G/4G cellular but there are also several new emerging networking 



[PDF] A Study of Communication Protocols for Internet of Things (IoT

Wireless IoT protocol solutions standards and technologies for data communications and connectivity come in various kinds for many potential cases of IoT



(PDF) IoT Protocols - ResearchGate

20 déc 2022 · PDF On Dec 19 2022 Nitin Shivsharan published IoT Protocols Find read and cite all the research you need on ResearchGate



[PDF] UNIT – I – IoT Architecture and its Protocols– SCSA1408

With the rise of IoT and standards-based protocols such as IPv6 the IT and We can access the report export it in pdf excel or any preferred format



[PDF] IOT

IoT is enabled by several technologies including Wireless Sensor Networks Cloud Computing Big Data Analytics Embedded Systems Security Protocols and 



[PDF] TECHNOLOGIES & PROTOCOLS FOR IOT

16 fév 2021 · Communication Protocols for IoT The following communication protocols have immediate importance to consumer and industrial IoTs:



[PDF] INTERNET OF THINGS & ITS APPLICATIONS - mrcetacin

IoT network technologies to be aware of toward the bottom of the protocol stack include cellular Wifi and Ethernet as well as more specialized solutions such 



[PDF] Networking Protocols and Standards for Internet of Things

30 nov 2015 · In this paper we highlight IoT protocols that are operating at http://standards ieee org/getieee802/download/802 15 4-2011 pdf



[PDF] IoT Protocols And Security - WordPresscom

Internet Protocol for Smart Objects (IPSO) • Aim to form an open group of companies to market and educate about how to use IP for IoT smart objects based 

  • What are IoT protocols?

    IoT protocols: How IoT devices communicate with the network
    Internet protocol (IP) is a set of rules that dictates how data gets sent to the internet. IoT protocols ensure that information from one device or sensor gets read and understood by another device, a gateway, a service.
  • What are the 4 protocols of IoT?

    Dive deeper into the Internet of Things (IoT) communication through a brief overview of the different IoT data protocols.

    Message Queue Telemetry Transport (MQTT)HyperText Transfer Protocol (HTTP)Constrained Application Protocol (CoAP)Data Distribution Service (DDS)WebSocket.Advanced Message Queue Protocol (AMQP)
  • What is the most used protocol in IoT?

    WiFi. This is the most famous IoT protocol. A Wifi network can be created with the intervention of a device or product that can send wireless signals (phones, computers, routers). Wifi uses frequencies like 2.4 GHz and 5 GHz channels to transmit data.
  • Some of the major IoT technology and protocol (IoT Communication Protocols) are Bluetooth, Wifi, Radio Protocols, LTE-A, and WiFi-Direct. These IoT communication protocols cater to and meet the specific functional requirement of an IoT system.

LeveragingBlockchainͲbased

protocolsinIoT systems KonstantinosKolias,Angelos Stavrou IrenaBojanova,JeffVoas,TimGrance ComputerScienceDepartment InformationTechnologyLaboratory GeorgeMasonUniversity NationalInstituteofStandards&Technology 1

TalkOutline•IoT Scale&Scope

•UnderstandingtheIoT CryptoNeeds •ShortBlockchain Primer •Blockchain inIoT:Whatarethepotentialusecases? •WhydirectuseofBlockchain isnotpracticalforIoT 2

InternetofThingsDefined

•Humanisnotthecenterofthesystem •Fact: 3

WhattheFutureHolds

4

DrivablesFlyables

Scannables Wearables

TheGrowthofIoT

5

SectorsofIoT Applications

Smart Home

Home automation

Energy

efficiency

Home security

Transportation

Road safety

Traffic

regulation Law enforcement

Retail

Automatic

payments

Efficient

cataloguing

Shipment

tracking

Industry

Quality

assurance

Failure

prediction

Productivity

improvement

Healthcare

Condition

monitoring

Remote

treatment

Personalized

advices 6

Sensors&Actuators

Sensors

Actuators

7

Connectivity

WAN

PANLAN

IPv6 8

CommonSecurityIncidents

90%

Private Data Collection

Insecure Interfaces

Unencrypted

Communications

Weak Requirements

60%
70%
80%
9

Top10Vulnerabilities(OWASP)

Insecure Web InterfacesDefault accounts, XSS, SQL injection Inefficient Authentication/AuthorizationWeak passwords, no two-factor authentication Insecure Network ServicesPorts open, use of UPnP, DoSattacks Lack of Transport EncryptionNo use of TLS, misconfigured TLS, custom encryption Private DataUnnecessary private information collected Insecure Cloud InterfacesDefault accounts, no lockout Inefficient Mobile InterfacesWeak passwords, no two-factor authentication Insufficient Security ConfigurabilityPorts open, use of UPnP, DoSattacks Insecure Software/FirmwareOld device firmware, unprotected device updates Poor Physical SecurityExposed USB ports, administrative accounts 10

UseCase:HomeAutomation

connectedtoaHome

Network

•Devicescommunicate directlytoan"aggregator" gateway 11

WhatCanGoWrong?

•Attackerintroducesa softͲAPorSensorswith thesamecharacteristics •CustomCrypto •Becausewecandofaster •NoAuthentication •NoEncryption 12

EvilTwinAggregator

WhyCanGoWrong?•BadlyDesignedSystem

•BadlyImplementedCrypto •Gain:Useofevencheaperhardware •Caveat:possiblesecurityholes 13

HowCanGoWrong?

ProtocolHackedatDefCon 2015•Connectstogooglecalendartoshownoteson screen certificates •UnleashMiM attack •StealUser'sCredentials

CustomCryptoImplementationnotasolution

14

WhyUseCustomCrypto?

15

RSA1024RuntimeOverhead:

SurveyofCryptoSupportinIoT

16

Brand Name CPU Frequency Sram Flash Crypto

AccelerationEnergy PublicKey

Encryption

Belkin

WeMoSwitch RalinkRT5350F(MIPS) 360MHz 32MiB 16MiBNoWallsocket Yes

Samsung

SmarthingsHub PIC32MX695FͲ512H32Bit 80Mhz 128KB 512KNoWall socket/BatteryYes Nest Thermostat TexasInstrumentsAM3703CUSSitara(ARMCortexA8) 1Ghz 512Mb 2Gb Yes Wallsocket Yes LIFX Color1000 KinetisK22(ARMCortexͲM4) 120Mhz 128KB 512KNoWallsocketNo

Amazon

Echo TexasInstrumentsDM3725CUS100(ARMCortexA8) 1Ghz 256MB 4GB Yes Wallsocket Yes

Philips

HueLights STMicroelectronicsSTM32F217VE(ARMCortexͲM3) 120Mhz 128KB 1MB Yes Wallsocket Yes

Philips

HueLights(Bulb) STM32F100RBT6B(ARMCortexͲM3) 24Mhz 8KB 128KBNoWallsocketNo Nest Smoke/CarbonAlarm FreescaleSCK60DN512VLL10customKinetisK60(ARM

Mhz+48Mhz128KB 512K Yes Wall

socket/BatteryYes

Pebble

Time STMicroSTM32F439ZG(ARMCortexM4) 180Mhz 256KB 2MB Yes BatteryNo

Fitbit

Surge SiliconLabsEFM32GiantGecko(ARMCortexͲM3)

EFM32GG395F102448Mhz 128KB 1MB Yes BatteryNo

Fitbit

One STMicroelectronics32L151C6UltraLowPower(ARM

CortexM3)32Mhz 16KB 128KBNoBatteryNo

Whatdowereallyneed?

17 •IoT SystemOperationalRequirements(Empirical) •Authentication&Dataintegrity aggregators

PotentialSolutions

18 •LightweightCryptography •Sizeofkeymaterialcannotbelowered

Blockchain Primer

19 •Public •Allparticipantsgainaccessto"read" •Distributed •Cryptographic •Ledger •VerifiableTransactionalDatabase

Blockchain Primer

Blockchain Primer

21

Blockchain Blocks

Sequencesofsignedandverifiedtransactions

Publishedanddistributedglobally

Magicnumber,Size

Header•Hashofpreviousblock(chain)

•Merkle roothashofblock •Timestamp •Target,nonce(mining)

Numberandlistoftransactions

Blockchain Primer

IsBlockchain DirectlyApplicableinIoT?

23

DesirableProperties

UndesirableProperties

•Requiresproofof"work" •RequiresPKI

Whatcanwedo?

24

Eliminateundesirableproperties

•Requiresproofof"work" •RequiresPKI

HashͲChain

25EfficientQuantumͲImmuneKeylessSignatureswithIdentity,Risto Laanoja

HashͲChain:PreImage Path

26EfficientQuantumͲImmuneKeylessSignatureswithIdentity,Risto Laanoja

TypicalIoT AggregationNetworks

27

Sensor

Sensor

Sensor

Aggregator

Sensor

Sensor

Aggregator

Sensor

Sensor

Sensor

Aggregator

Aggregator

Sensor

Sensor

Aggregator

BlockchainͲbasedProtocolforIoT?

28
x i

H(Data||K

G ||H(z i n ),H(z i n1

HHash,K

G group Key, z i sensor i "public key"

BlockchainͲbasedProtocolforIoT?

DoestheSchemeMeettheRequirements?

30
•IoT SystemOperationalRequirements(Empirical) •Toaddanode,anadversarywillhaveto: a)Compromisethegroupkey b)Issuean"addnode"transaction c)

Addasensornode

DoestheSchemeMeettheRequirements?

31
•IoT SystemOperationalRequirements(Empirical) nodeLamport signatures •AnodeuseshisLamport publickeytovalidateinsertedDATA,transmits

DATAtoaggregator(s)

resources •Noneedforencryption

DoestheSchemeMeettheRequirements?

32
•IoT SystemOperationalRequirements(Empirical) predecessorsforLamport Signatures •Aggregatorsfully,otherspartial x i

H(Data||K

G ||H(z i n ),k,H(z i nk where nk is smaller than thelast signature fromi

Conclusions

•IoT Scale,Vendors,Technologiesincreaseexponentially •IoT Deviceswillalwayshavediversecapabilities&Resources theimplications •Blockchain inspiredprotocolscombinedwithnew chryptographic primitivesmightbethepathforward 33

Questions?

34
quotesdbs_dbs14.pdfusesText_20
[PDF] iot protocols pdf

[PDF] iowa courts online

[PDF] iowa department of public health

[PDF] iowa flu map 2019

[PDF] iowa governor

[PDF] iowa population

[PDF] iowa population by race

[PDF] iowa state

[PDF] iowa state courses

[PDF] iowa state fall 2020

[PDF] iowa state transfer credits

[PDF] iowa unemployment

[PDF] iowa workforce

[PDF] ip address and subnetting pdf

[PDF] ip address planning