4. Internet of Things
N number of definitions available………..
• Def. 1 : “Internet of things is network of interconnected
networks which are build by interconnected “objects” or
“things” ”
• Def. 2 : Internet of things is connecting “Any things, Any time
and Any where ”
• Def. 3 : IoT enables physical objects to see, hear, think and
perform jobs by having them “talk” together, to share
information and to coordinate decision.
5. • IoT smart objects : Expected to reach 212 billion entities deployed by 2020
• M2M traffic will cover more than 45% of Internet traffic by 2020
• Mckinsey reported that number of machines grow 300% over in last 5 years.
• $2.7 to 6.3 trillion economy by 2025
6.
7.
8.
9.
10. PERCEPTION LAYER
PHYSICAL LAYER
OBJECT LAYER
USER LAYER
APPLICATION LAYER
DATA PROCESSING
SERVICE LAYER
NETWORK LAYER
COMMUNICATION
LAYER
S
E
C
U
R
I
T
Y
INTERNET OF THINGS
LAYERED ARCHITECTURE
11. PERCEPTION LAYER
PHYSICAL LAYER
OBJECT LAYER
USER LAYER
APPLICATION LAYER
DATA PROCESSING
SERVICE LAYER
NETWORK LAYER
COMMUNICATION
LAYER
S
E
C
U
R
I
T
Y
INTERNET OF THINGS
LAYERED ARCHITECTURE
12. • Identification:
– EPC (Electronic Product code)
– uCode (ubiquitous code)
– RFID tagid
– IPv6 (6LoWPaN)
• Sensing:
– Gathering the data
– Sending to data warehouse or cloud via gateway or fog device.
– Sensors can be simple sensor, actuator, wearable device, mobile
device.
– Examples: Temperature sensors, Smart boards with integrated sensors
like Arduino, Raspberry PI.
13. • Communication:
– Goal: Connecting heterogeneous devices together to deliver specific service.
– Protocols: Wi-Fi, Bluetooth, IEEE 802.15.4, Z-Wave, RFID and Ultra wide
bandwidth.
– RFID Tag : 10 cm to 200 m range
– NFC: High frequency band in 10 cm range.
– Wi-Fi: 100 m range
– Bluetooth 4.1: Low energy Bluetooth (BLE)
– LTE: Long term evolution
• Computation:
– Processing units and Applications
– Processing units like Micro controllers, Micro processors.
– Examples: Arduino, Intel Galileo, Raspberry PI, Gadgeteer, WiSense and so
on.
– Real time operating systems like contiki with cooja simulator, tiny OS, LiteOS,
Riot OS.
14. • Services:
– Identity Aware service : Object identification
– Information aggregation service: Collecting and summarizing row data
– Collaborative aware service: Any time, Any one, Any where
– Ubiquitous service:
• Semantics:
– Knowledge extraction : Recognizing and analysing data to make sense of
right decision to provide exact service.
– Use of semantic web technologies like resource description frame work, web
ontology network, Efficient XML interchange.
15. IoT QoS Criteria and security challenges
Availability
Reliability
Mobility
Performance
Management
Scalability
Inter-
operability
Security
and
Privacy
16. Fog computing: An IoT “Smart” Edge
FOG DEVICES
CLOUD / BIG DATA
STORAGE/INFORMATION
MINING
SENSOR DEVICES
[COMMUNICATION LAVEL – 1]
[0 – 100 m]
[COMMUNICATION LAVEL – 2 ]
[100-1000 m]
[COMMUNICATION LAVEL – 3 ]
[5 km to 100 km]
17. • Fog computing: Bridge between smart devices and large scale cloud computing
and storage devices
• Extending cloud computing services to edge devices of network
• Cloud has massive storage and computation capability while fog has limited
storage, battery and computation capability.
• Fog services:
– Location : Batter delay performance
– Distribution: Large number of Micro small cloud services
– Scalability: Deployment of new fog device is easy
– Density of devices: Better replicated services
– Mobility:
– Real time services:
– Standardization:
– Bird eye view:
19. • Identification / Authentication:
– Object Identification
– Communication identification
– Application identification
• “Authentication is the process of confirming entity’s identity using login and
additional information to sign in such as password, PIN, smart card, digital
certificates, biometrics”
• Minimalistic cryptography:
– Cryptographic algorithm requires memory, processing and energy
capabilities.
– Light weight operations includes binary operations as XOR,AND,OR and
rotation.
• Access control:
– Who can do what on which resource
– Access control list, Role based access control, capability based access
control, Trust based access control (Experience, Knowledge and
Recommendations)
20. M E D
KPUB
C = E[KPUB,M]
KPUB
KPRB
KPRB
M = D[KPRB,C]
CONFIDENTIALITY
M E D
KPRA
C = E[KPRA,M]
KPRA
KPUA
KPRA
M = D[KPUA,C]
AUTHENTICATION
22. Light weight cryptography
• In IoT, Billions of small device deployment created huge heterogeneity of
devices and complexity of designing.
• Challenge: Applying conventional cryptography to small and tiny resource
constrained devices.
• Lightweight cryptography: To provide cryptographic solutions for the resource
constrained devices.
• Conventional cryptography: Computers, servers, smart phones and tablets.
• Light weight cryptography: Embedded systems, RFID and sensor network,
micro controllers, micro processors.
• Micro controllers: 4 bit, 8 bit, 16 bit, 32 bit processing capabilities can
consume very huge battery power to implement DES, and AES.
• RFID: No battery power, so requires cryptographic algorithms which requires
small amount of gate equivalent and also meet timing and power requirement
• Light weight cryptography needs to implement at ground level and upper level
also for the support. So need to think about complete system.
• If one device is resource constrained, Every one need to implement light
weight cryptography.
23. Performance Metrics
• Five major system metrics:
– Power consumption :
• Major parameter in the battery operated devices, Battery recharging and
replacing is very critical point.
• Power consumption depends on algorithm, threshold voltage, clock
frequency and technology used.
– Resource consumption:
• Gate area, Gate equivalent, or logic blocks [Hardware]
• Registers, RAM and ROM.
– Latency:
• Requirement is low latency
• Example: Patient oxygen supply or automotive application.
• Encryption latency is time between the initial request for encryption of a
plain text and the reply that returns corresponding cipher text
– Throughput:
• Rate at which new output like cipher text is generated.
– Device costs:
• Lower device cost
24. • “It is not difficult to secure IoT, but actual difficulty is maintaining balance
between security, Performance and resource requirements.”
• Hardware specific metrics:
– Field programmable logic blocks: Basic reconfigurable unit that contains
number of look up tables, flip-flops, multiplexers.
– Gate Equivalent: Area that is required by two input NAND gate. Very from
technology to technology so direct comparison is not possible.
– RFID have total 1000 to 10000 gates, out of which only 200 to 2000 may be
used for security purposes.
• Software specific metrics:
– Resource requirement can be measured using numbers of registers, number
of bytes of RAM and ROM required.
25. Lightweight Block Cipher
• AES 128: Advanced encryption standard 128 bit
– 128 bit block size
– 128 bit key size
– 8 cycles or 10 Cycle of repetitions
• PRESENT : First light weight block cipher
– Substitution – permutation network
– 64 bit block size
– 80 bit or 128 bit key size
– 31 Regular rounds
• Performance Advantages:
– Smaller block sizes
– Smaller key sizes
– Simple rounds : 4 bit S-box preferred over 8 bit S-box
– Simple key schedule: Use key derivation Function
– Minimal Implementation: Only encryption or decryption based on
requirement
28. Light weight Hash function and Light weight MAC
• Hash function:
– Message digest to maintain integrity
– Hash function applied to message assures Integrity
– Light weight Hash function examples: PHOTON, Quark, SONGENT, Lesamnta-
LW.
– Goal: smaller internal state and smaller input - output size.
– Requirement: Pre-image resistant, second pre-image resistant, and Collision
attack.
• MAC Functions:
– Generating tag from message and secret key to ensure authenticity and
integrity.
– MAC function applied to message assures Integrity
– MAC function applied to identity assures authentication
– Lightweight MAC Function examples: Chaskey, TuLP, LightMAC.