A Lightweight Architecture for Hardware-Based Security in the Emerging Era of Systems of Systems

2021 ◽  
Vol 17 (3) ◽  
pp. 1-25
Author(s):  
Nico Mexis ◽  
Nikolaos Athanasios Anagnostopoulos ◽  
Shuai Chen ◽  
Jan Bambach ◽  
Tolga Arul ◽  
...  

In recent years, a new generation of the Internet of Things (IoT 2.0) is emerging, based on artificial intelligence, the blockchain technology, machine learning, and the constant consolidation of pre-existing systems and subsystems into larger systems. In this work, we construct and examine a proof-of-concept prototype of such a system of systems, which consists of heterogeneous commercial off-the-shelf components, and utilises diverse communication protocols. We recognise the inherent need for lightweight security in this context, and address it by employing a low-cost state-of-the-art security solution. Our solution is based on a novel hardware and software co-engineering paradigm, utilising well-known software-based cryptographic algorithms, in order to maximise the security potential of the hardware security primitive (a Physical Unclonable Function) that is used as a security anchor. The performance of the proposed security solution is evaluated, proving its suitability even for real-time applications. Additionally, the Dolev-Yao attacker model is considered in order to assess the resilience of our solution towards attacks against the confidentiality, integrity, and availability of the examined system of systems. In this way, it is confirmed that the proposed solution is able to address the emerging security challenges of the oncoming era of systems of systems.

Agronomy ◽  
2021 ◽  
Vol 11 (6) ◽  
pp. 1069
Author(s):  
Shibbir Ahmed ◽  
Baijing Qiu ◽  
Fiaz Ahmad ◽  
Chun-Wei Kong ◽  
Huang Xin

Over the last decade, Unmanned Aerial Vehicles (UAVs), also known as drones, have been broadly utilized in various agricultural fields, such as crop management, crop monitoring, seed sowing, and pesticide spraying. Nonetheless, autonomy is still a crucial limitation faced by the Internet of Things (IoT) UAV systems, especially when used as sprayer UAVs, where data needs to be captured and preprocessed for robust real-time obstacle detection and collision avoidance. Moreover, because of the objective and operational difference between general UAVs and sprayer UAVs, not every obstacle detection and collision avoidance method will be sufficient for sprayer UAVs. In this regard, this article seeks to review the most relevant developments on all correlated branches of the obstacle avoidance scenarios for agricultural sprayer UAVs, including a UAV sprayer’s structural details. Furthermore, the most relevant open challenges for current UAV sprayer solutions are enumerated, thus paving the way for future researchers to define a roadmap for devising new-generation, affordable autonomous sprayer UAV solutions. Agricultural UAV sprayers require data-intensive algorithms for the processing of the images acquired, and expertise in the field of autonomous flight is usually needed. The present study concludes that UAV sprayers are still facing obstacle detection challenges due to their dynamic operating and loading conditions.


2021 ◽  
Author(s):  
Benjamin Secker

Use of the Internet of Things (IoT) is poised to be the next big advancement in environmental monitoring. We present the high-level software side of a proof-of-concept that demonstrates an end-to-end environmental monitoring system,<br><div>replacing Greater Wellington Regional Council’s expensive data loggers with low-cost, IoT centric embedded devices, and it’s supporting cloud platform. The proof-of-concept includes a Micropython-based software stack running on an ESP32 microcontroller. The device software includes a built-in webserver that hosts a responsive Web App for configuration of the device. Telemetry data is sent over Vodafone’s NB-IoT network and stored in Azure IoT Central, where it can be visualised and exported.</div><br>While future development is required for a production-ready system, the proof-of-concept justifies the use of modern IoT technologies for environmental monitoring. The open source nature of the project means that the knowledge gained can be re-used and modified to suit the use-cases for other organisations.


Author(s):  
Lennert Wouters ◽  
Eduard Marin ◽  
Tomer Ashur ◽  
Benedikt Gierlichs ◽  
Bart Preneel

The security of immobiliser and Remote Keyless Entry systems has been extensively studied over many years. Passive Keyless Entry and Start systems, which are currently deployed in luxury vehicles, have not received much attention besides relay attacks. In this work we fully reverse engineer a Passive Keyless Entry and Start system and perform a thorough analysis of its security.Our research reveals several security weaknesses. Specifically, we document the use of an inadequate proprietary cipher using 40-bit keys, the lack of mutual authentication in the challenge-response protocol, no firmware readout protection features enabled and the absence of security partitioning.In order to validate our findings, we implement a full proof of concept attack allowing us to clone a Tesla Model S key fob in a matter of seconds with low cost commercial off the shelf equipment. Our findings most likely apply to other manufacturers of luxury vehicles including McLaren, Karma and Triumph motorcycles as they all use the same system developed by Pektron.


2018 ◽  
Author(s):  
Fernando Alvarez-Lopez ◽  
Marcelo Fabián Maina ◽  
Francesc Saigí-Rubió

BACKGROUND The increasingly pervasive presence of technology in the operating room (OR) raises the need to study the interaction between the surgeon and the computer system. A new generation of tools known as commercial off-the-shelf (COTS) devices that enable non-contact gesture-based human-computer interaction (HCI) are currently being explored as a solution in surgical environments. OBJECTIVE The aim of this systematic review was to provide an account of the state-of-the-art of COTS devices in the detection of manual gestures in surgery, and to identify their use as a simulation tool for teaching motor skills in minimally invasive surgery (MIS). METHODS A systematic literature review was conducted in PubMed, Embase, ScienceDirect and IEEE for articles published between January 2000 and 2016 on the use of COTS devices for gesture detection in surgical environments, and in simulation for surgical skills learning in MIS RESULTS A total of 2709 studies were identified, 76 of which met the search selection criteria. The Microsoft KinectTM and the Leap Motion ControllerTM were the most widely used COTS devices. The most common intervention was image manipulation in surgical and interventional radiology environments, followed by interaction with virtual reality environments for educational or interventional purposes; the possibility of using this technology to develop portable, low-cost simulators for skills learning in MIS was also examined. Given that the vast majority of articles found in this systematic review were proof-of-concept or prototype user and feasibility testing, we can conclude that this is a field that is still in the exploration phase in areas that require touchless manipulation in environments and settings that must adhere to asepsis and antisepsis protocols, such as angiography suites and operating rooms. CONCLUSIONS COTS devices applied to hand and instrument GBIs in the field of simulation for skills learning and training in MIS could open up a promising field to achieve the ubiquitous training and pre-surgical warm-up.


Mathematics ◽  
2021 ◽  
Vol 9 (20) ◽  
pp. 2569
Author(s):  
Xavier Salleras ◽  
Vanesa Daza

Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to another party that the former knows some information while keeping it secret. Such a premise can lead to the development of numerous privacy-preserving protocols in different scenarios, like proving knowledge of some credentials to a server without leaking the identity of the user. Even when the applications of ZKPs were endless, they were not exploited in the wild for a couple of decades due to the fact that computing and verifying proofs was too computationally expensive. However, the advent of efficient schemes (in particular, zk-SNARKs) made this primitive to break into the scene in fields like cryptocurrencies, smart-contracts, and more recently, self-sovereign scenarios: private-by-design identity management and authentication. Nevertheless, its adoption in environments like the Internet of Things (IoT) remains unexplored due to the computational limitations of embedded systems. In this paper, we introduce ZPiE, a C library intended to create ZKP applications to be executed in embedded systems. Its main feature is portability: it can be compiled, executed, and used out-of-the-box in a wide variety of devices. Moreover, our proof-of-concept has been proved to work smoothly in different devices with limited resources, which can execute state-of-the-art ZKP authentication protocols.


10.2196/11925 ◽  
2019 ◽  
Vol 21 (5) ◽  
pp. e11925 ◽  
Author(s):  
Fernando Alvarez-Lopez ◽  
Marcelo Fabián Maina ◽  
Francesc Saigí-Rubió

Background The increasingly pervasive presence of technology in the operating room raises the need to study the interaction between the surgeon and computer system. A new generation of tools known as commercial off-the-shelf (COTS) devices enabling touchless gesture–based human-computer interaction is currently being explored as a solution in surgical environments. Objective The aim of this systematic literature review was to provide an account of the state of the art of COTS devices in the detection of manual gestures in surgery and to identify their use as a simulation tool for motor skills teaching in minimally invasive surgery (MIS). Methods For this systematic literature review, a search was conducted in PubMed, Excerpta Medica dataBASE, ScienceDirect, Espacenet, OpenGrey, and the Institute of Electrical and Electronics Engineers databases. Articles published between January 2000 and December 2017 on the use of COTS devices for gesture detection in surgical environments and in simulation for surgical skills learning in MIS were evaluated and selected. Results A total of 3180 studies were identified, 86 of which met the search selection criteria. Microsoft Kinect (Microsoft Corp) and the Leap Motion Controller (Leap Motion Inc) were the most widely used COTS devices. The most common intervention was image manipulation in surgical and interventional radiology environments, followed by interaction with virtual reality environments for educational or interventional purposes. The possibility of using this technology to develop portable low-cost simulators for skills learning in MIS was also examined. As most of the articles identified in this systematic review were proof-of-concept or prototype user testing and feasibility testing studies, we concluded that the field was still in the exploratory phase in areas requiring touchless manipulation within environments and settings that must adhere to asepsis and antisepsis protocols, such as angiography suites and operating rooms. Conclusions COTS devices applied to hand and instrument gesture–based interfaces in the field of simulation for skills learning and training in MIS could open up a promising field to achieve ubiquitous training and presurgical warm up.


Author(s):  
Anchitaalagammai J. V. ◽  
Kavitha S. ◽  
Murali S. ◽  
Hemalatha P. R. ◽  
Subanachiar T.

Blockchains are shared, immutable ledgers for recording the history of transactions. They substitute a new generation of transactional applications that establish trust, accountability, and transparency. It enables contract partners to secure a deal without involving a trusted third party. The internet of things (IoT) is rapidly changing our society to a world where every “thing” is connected to the internet, making computing pervasive like never before. It is increasingly becoming a ubiquitous computing service, requiring huge volumes of data storage and processing. The stable growth of the internet of things (IoT) and the blockchain technology popularized by cryptocurrencies has led to efforts to change the centralized nature of the IoT. Adapting the blockchain technology for use in the IoT is one such efforts. This chapter focuses on blockchain-IoT research directions and to provide an overview of the importance of blockchain-based solutions for cloud data manipulation in IoT.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ziwang Wang ◽  
Yi Zhuang ◽  
Zujia Yan

With the widespread use of mobile embedded devices in the Internet of Things, mobile office, and edge computing, security issues are becoming more and more serious. Remote attestation, one of the mobile security solutions, is a process of verifying the identity and integrity status of the remote computing device, through which the challenger determines whether the platform is trusted by discovering an unknown fingerprint. The remote attestation on the mobile terminal faces many security challenges presently because there is a lack of trusted roots, devices are heterogeneous, and hardware resources are strictly limited. To ARM’s mobile platform, we propose a mobile remote attestation scheme based on ARM TrustZone (TZ-MRAS), which uses the highest security authority of TrustZone to implement trusted attestation service. Compared with the existing mobile remote attestation scheme, it has the advantages of wide application, easy deployment, and low cost. To defend against the time-of-check-to-time-of-use (TOC-TOU) attack, we propose a probe-based dynamic integrity measurement model, ProbeIMA, which can dynamically detect unknown fingerprints that generate during kernel and process execution. Finally, according to the characteristics of the improved dynamic measurement model, that is, the ProbeIMA will expand the scale of the measurement dataset, an optimized stored measurement log construction algorithm based on the locality principle (LPSML) is proposed, which has the advantages of shortening the length of the authentication path and improving the verification efficiency of the platform configuration. As a proof of concept, we implemented a prototype for each service and made experimental evaluations. The experimental results show the proposed scheme has higher security and efficiency than some existing schemes.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 64
Author(s):  
A S M Touhidul Hasan ◽  
Shabnam Sabah ◽  
Rakib Ul Haque ◽  
Apubra Daria ◽  
Abdur Rasool ◽  
...  

Supply chain management (SCM) is essential for a company’s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of the products based on the Internet of Things (IoT) and blockchain technology. The IoT-enabled Quick Response (QR) scanner and the blockchain-integrated distributed system will allow all the SCM stakeholders to begin secure and private transactions for their products or services. Resulting, the consumer will receive an authentic and genuine product from the original producer. A lightweight asymmetric key encryption technique, i.e., elliptic curve cryptography (ECC) and Hyperledger Fabric-based blockchain technology with on-chain smart contracts are applied for distributed IoT devices to make the authentication process faster and lighter. Each SCM stakeholder is registered by the service provider and receives corresponding public and private keys, which will be used for the authentication process of the participants and IoT devices. The authenticated QR scanner records all transactions on the blockchain. Consequently, there will be no human intervention for the SCM transactions. The security and scalability analysis demonstrates that the proposed system is more secure and robust than other state-of-the-art techniques.


2019 ◽  
Vol 11 (10) ◽  
pp. 213 ◽  
Author(s):  
Spyros Voulgaris ◽  
Nikos Fotiou ◽  
Vasilios A. Siris ◽  
George C. Polyzos ◽  
Mikael Jaatinen ◽  
...  

In the last few years, we have been witnessing the convergence of the physical with the digital world. The Internet of Things (IoT) is progressing at a fast pace, and IoT devices are becoming pervasive in our physical environments, bringing the vision of Intelligent Environments closer to reality. At the same time, the newly-introduced blockchain technology is offering for the first time ever cryptographically proven trust based on a set of mutually untrusted nodes. Blockchain technology thus has the potential to become a key component of many IoT systems, offering them an unprecedented level of accountability, transparency, and reliability. This paper first lays out the principles on which blockchain systems are operating, along with descriptions of the most noteworthy blockchain implementations. It then presents a number of systems through which blockchains may interact with external systems and third-party data sources. Finally, it provides a survey of the state-of-the-art blockchain-based systems targeting IoT applications.


Sign in / Sign up

Export Citation Format

Share Document