- Open Access
- Total Downloads : 10
- Authors : Venkatesha S
- Paper ID : IJERTCONV4IS29051
- Volume & Issue : ICIOT – 2016 (Volume 4 – Issue 29)
- Published (First Online): 24-04-2018
- ISSN (Online) : 2278-0181
- Publisher Name : IJERT
- License: This work is licensed under a Creative Commons Attribution 4.0 International License
Dual Synchronization Algorithm for Internet of Things Communication Security
Venkatesha S
E&C Department, 7th Semister BNMIT, Banashankari Bangalore, India
AbstractThis paper aims to incorporate Dual Synchronization security algorithm in Internet Of Things (IOT) to control smart home appliances using Bluetooth connectivity and android phone. The IOT incorporate Bluetooth enabled smart phone to connect with Bluetooth master module which drives the connected appliances. This IoT infrastructure adopts dual synchronization algorithm to eliminate any Cyber\Embedded security risks involved within communication networks.
KeywordsBluetooth,Embedded,security, Bluetooth connectivity, android, Secured IoT.
-
INTRODUCTION TO IOT
The Internet of Things (IoT) is a framework and infrastructure created between remote objects which are connected and controlled using internet media, the connection and communication can be
Infrastructure to Infrastructure objects Infrastructure to moving objects like vehicle
Vehicle to vehicle (Intra vehicle and Inter vehicle)The
IOT has 2 major parts The cloud\Web side The Embedded side
The cloud side connectivity establishes internet based infrastructure for longer distance connectivity for monitoring and controlling the devices, whereas the embedded\physical objects side implements the electronic\electrical hardware components along with built-in intelligent algorithms to perform the specific activity based on the supervisory commands either from remote devices or connected internal devices.
The Whole system becomes a complex structure (Fig1 and Fig2) of infrastructure, electronics hardware, software, sensors, actuators, and network connectivity (either wired or wireless media telecom services) enabling objects to excha nge the information.
This global infrastructure connects multiple logical devices present at different geographic location to perform specified activity either monitoring or controlling from remote distance by exchanging information over internet and Wi-Fi connectivity. This advanced infrastructure framework will enable less physical systems.
The connectivity is majorly by Internet for cloud side, where as the embedded connectivity can be by any wireless media.
communication media requirements, which help society in lesser nfrastructure over heads and more efficient Bluetooth wireless communication is used for the demonstration.
Fig1 IOT Fig2 IOT
-
THE CHALLENGES
The cyber security and embedded security is becoming a critical challenge in modern world, where most of the populous security algorithms are becoming obsolete. This challenge is throwing lot of innovation openings in the cyber security space.
The organizations across the world are already moving ahead with the On The Air (OTA) programming for embedded devices using boot code modules, to make the embedded product more configurable to perform multiple operations as against earlier days of implementation where the device performs specific operations. This concept is also throwing a bigger challenge for more robust cyber security implementation.
-
THE IDEA
This paper explains and demonstrates a basic dual synchronization security algorithm to secure from cyber\embedded hacking.
The Dual synchronization algorithm performs 2 levels of handshaking before the device performs any operation for a specific command.
-
A synchronization counter will be implemented in Transmitter and Receiver devices.
-
Both the transmitter and receiver devices will be incrementing the synchronization counter on every communication transaction (Tx\Rx)
-
The embedded device (Slave) receives the command from transmitter (Master).
-
The slave sends back the Tx command along with the synchronization counter.
-
The Master again send the command along with synchronization counter value and total count of the commands from Master.
-
The Slave device checks against the received value and performs the operation if it is a valid command value.
-
-
SYSTEM IMPLEMENTATION AND OPERATION
The demonstrator project considers 8 peripherals (4 lights and 4 more house hold equipments),
The demonstrator project considers 8 peripherals (4 lights and 4 more house hold equipments), of which 4 light controls are implemented for demonstration purpose.
The 4 lights are controlled by a custom App runs on hand held device (Android based smart phone – Control master), which synchronizes with Peripheral master using Bluetooth protocol. The hand held device commands the peripheral master to control the peripherals using simple commands.
Dual Synchronization algorithm in use:
Both Master control and Peripheral control device runs synchronization counters from 1-4
Use case1:
-
Control master sends command 1 to control light 1 & increment the sync counter 2.
-
Peripheral master receives command and increments sync counter to 2, and sends back value 3 (1+2) to control master.
-
The control master checks received value against internally calculated value (1+2) if matches, then sends the value 7 (3+4, value + total command count for 4 peripheral)
-
The Peripheral master receives value 7&subtracts counter value and total command count value (4) from received value (7-2-4 = 1), and performs operation based on the resulted command, in this case it is light 1.
Use case2: (subsequent operation)
-
Control master sends command 3 to control light 3& increment the sync counterto 3.
-
Peripheral master receives command and increments sync counter to 3, and sends back value 6 (3+3) to control master.
-
The control master checks received value against internally calculated value (3+3) if matches, then sends the value 10 (6+4, value + total command count for 4 peripheral).
-
The Peripheral master receives value 10 & subtracts counter value & total command count number (4) from received value (10-2-4 = 3), and performs operation based on the resulted command, in this case it is light 3.
-
-
-
CONTROL FLOW CHART
START
CONTROL MASTER sends peripheral control command to PERIPHERAL MASTER
CONTROL MASTER sends peripheral control command to PERIPHERAL MASTER
PERIPHERAL MASTER Receives peripheral control command from CONTROL MASTER
PERIPHERAL MASTER Receives peripheral control command from CONTROL MASTER
PERIPHERAL MASTER Modifies synchronization counter and patches with first synchronization packet and sends back to CONTROL MASTER
PERIPHERAL MASTER Modifies synchronization counter and patches with first synchronization packet and sends back to CONTROL MASTER
CONTROL MASTER Receives first synchronization message from PERIPHERAL MASTER and evaluates for correctness
CONTROL MASTER Receives first synchronization message from PERIPHERAL MASTER and evaluates for correctness
ABORT CONTROL
ABORT CONTROL
Is First NO
synchronization
packet is right?
YES
CONTROL MASTER Modifies synchronization counter and patches with first synchronization packet and sends back the second synchronization packet to PERIPHERAL MASTER
CONTROL MASTER Modifies synchronization counter and patches with first synchronization packet and sends back the second synchronization packet to PERIPHERAL MASTER
PERIPHERAL MASTER Calculates second synchronization packet internally an compares with Received control command packet from CONTROL MASTER
PERIPHERAL MASTER Calculates second synchronization packet internally and compares with Received control command packet from CONTROL MASTER
ABORT CONTROL COMMAND
ABORT CONTROL COMMAND
Is Second NO
synchronization
packet is right?
YES
PERIPHERAL MASTER Commands the output peripherals for its operation
PERIPHERAL MASTER Commands the output peripherals for its operation
END
-
HARDWARE SPECIFICATION OF DEMONSTRATOR PROJECT
Wpan (802.15.4), WiMAX (802.16e). Wireless USB.
Arduino uno[5] board fig(e)and IDE C programming language
HC05 module fig(i)spp module (csr(California Silicon Radio) bluecore 04-external single chip Bluetooth system with cmos technology)
A relay, fig(f) switch
-
ADVANTAGES
The IoT is an advanced concept to connect the devices remotely and shall be controlled.
The entire IoT concept with wireless connectivity is highly configurable with little software changes, which can be adopted to different applications, like Smart cities, smart transportation, Agricultural automation.
Bluetooth is a low cost wireless technology which is widely used in electronic devices. It is also energy efficient.
Using Bluetooth, data can be transmitted fasterat around 2 mbps speed.
Instead of using ir remotes or rf remotes a multipurpose devices can be configured for control purpose, E.g. smartphones.
Reduces wiring harnesses and physical connectivity switch boards not required
-
LIMITATIONS OF DEMONSTRATOR PROJECT
-
RESULTS AND CONCLUSION
The demonstrator project exercises the basic security algorithm built on a dynamic behavior of the system from booth peripheral control modules and Master control module, which eliminated most of the hacking problems.
The industries and entire eco system is moving towards Internet of Things adaptation for larger, integrated and remote applications. The applications ranging from simple home automation system, traffic management to controlling of power grids, nuclear power plants, which demands a greater security challenges. The most dynamic and non- predictable algorithms will be future need for secure communication.
-
INTERFACING DIAGRAM
Fig(a)
-
ANDROID APP IMAGE
Fig(b)
Cyber and embedded security is a critical factor for the IoT applications. There is need for stronger and multi-level security algorithms for complex systems like nuclear power plant controls to protect the system.
Cyber and embedded security is a critical factor for the IoT applications. There is need for strongerand multi-level security algorithms for complex systems like nuclear power plant controls to protect the system.
Improper encryption can lead to unauthorized access to wireless commands.
Using Bluetooth, we can only connect to devices within the range of 10 mts.
The speed of execution is reduced due to dual acknowledge mechanism of protocol security.
Fig(c)
PE AL C IMA
-
SPECIFICATION AND WIRING IMAGES
Fig(d) Fig(e)
Fig(f) Fig(g)
Fig(h) Fig(i)
Fig(j)
-
REFERENCES
-
Books: internet of things with the arduino yun by macro Schwartz, Arduino uno:a hands on guide for beginner by aguskurniawan
-
Smart home system via Wireless Bluetooth y R. A. Ramlee; D. H. Z. Tang; M. M. Ismail System Engineering and Technology (ICSET),
Year: 2012
-
Electrical home appliances control system over Bluetooth with android by
H. Kanma; N. Wakabayashi; R. Kanazawa; H. Ito IEEE Transactions on Consumer Electronics Year: 2003
-
Bluetooth technology a viable solution for IoT by Kuor-Hsin Chang IEEE Wireless CommunicationsYear:2004
-
Arduino Uno to digital control of power electronics Lukas Müller;
Masihuddin Mohammed; Jonathan W. Kimb all, Year: 2015
-
The Capacity of Relay Channels. Hon-Fah Chong; MehulMotani IEEE Transactions on Information Theory, Year: 2011
-
Websites:
arduino.cc, engineers garage.com, electronicshub.org,electronicsforu.com, m.instructables.com