scholarly journals Proof of concept for lightweight PUF-based authentication protocol using NodeMCU ESP8266

Author(s):  
Mohd Syafiq Mispan ◽  
Aiman Zakwan Jidin ◽  
Muhammad Raihaan Kamaruddin ◽  
Haslinah Mohd Nasir

Wireless sensor node is the foundation for building the next generation of ubiquitous networks or the so-called internet of things (IoT). Each node is equipped with sensing, computing devices, and a radio transceiver. Each node is connected to other nodes via a wireless sensor network (WSN). Examples of WSN applications include health care monitoring, and industrial monitoring. These applications process sensitive data, which if disclosed, may lead to unwanted implications. Therefore, it is crucial to provide fundamental security services such as identification and authentication in WSN. Nevertheless, providing this security on WSN imposes a significant challenge as each node in WSN has a limited area and energy consumption. Therefore, in this study, we provide a proof of concept of a lightweight authentication protocol by using physical unclonable function (PUF) technology for resource-constrained wireless sensor nodes. The authentication protocol has been implemented on NodeMCU ESP8266 devices. A server-client protocol configuration has been used to verify the functionality of the authentication protocol. Our findings indicate that the protocol used approximately 7% of flash memory and 48% of static random-access memory (SRAM) in the sensor node during the authentication process. Hence, the proposed scheme is suitable to be used for resource-constrained IoT devices such as WSN.

A wireless sensor network holds a large amount of nodes. These nodes will contact themselves by utilizing some of the radio signals. wireless sensor networks (WSNs) has develop some applications during a huge selection areas, in the time of which external side users ought to straightly attach with sensors to get a perceived information. But, WSNs (wireless sensor node) are open to numerous attacks for wireless links, like eavesdropping and meddling. Two-factor authentication combining password and ID utterly like this demand due to password and ID usefulness. Then, a bucket of two-factor authentication protocol was advised in present research works. Because of the difficult assignment of adjustable potency and privacy requirements, still it’s difficult to introduce a privacyaware two-factor protocol that's potential of giving different safety features whereas take care of proper potency. in this paper the proposed work tend to suggests a privacy aware two-factor authentication protocol depend on ECC for wireless sensor nodes(WSNs). In this another convention performs distinctive wellbeing highlights need fully for the application situations, all things considered, though deal with appropriate power. So in this we will in general demonstrate that the presented convention accomplishes intelligent in the Burrows–Abadi– Needham judgment to boot, through manner of unofficial security statistics, the work show the introduced protocol will face up to a range of attacks and supply fascinating safety features.


2013 ◽  
Vol 347-350 ◽  
pp. 1920-1923
Author(s):  
Yu Jia Sun ◽  
Xiao Ming Wang ◽  
Fang Xiu Jia ◽  
Ji Yan Yu

The characteristics and the design factors of wireless sensor network node are talked in this article. According to the design factors of wireless sensor network, this article will mainly point out the design of wireless sensor nodes based a Cortex-M3 Microcontroller STM32F103RE chip. And the wireless communication module is designed with a CC2430 chip. Our wireless sensor node has good performance in our test.


Sensors ◽  
2019 ◽  
Vol 19 (21) ◽  
pp. 4625 ◽  
Author(s):  
Km Renuka ◽  
Sachin Kumar ◽  
Saru Kumari ◽  
Chien-Ming Chen

Wireless sensor networks (WSNs) are of prominent use in unmanned surveillance applications. This peculiar trait of WSNs is actually the underlying technology of various applications of the Internet of Things (IoT) such as smart homes, smart cities, smart shopping complexes, smart traffic, smart health, and much more. Over time, WSNs have evolved as a strong base for laying the foundations of IoT infrastructure. In order to address the scenario in which a user wants to access the real-time data directly from the sensor node in wireless sensor networks (WSNs), Das recently proposed an anonymity-preserving three-factor authentication protocol. Das’s protocol is suitable for resource-constrained sensor nodes because it only uses lightweight cryptographic primitives such as hash functions and symmetric encryption schemes as building blocks. Das’s protocol is claimed to be secure against different known attacks by providing formal security proof and security verification using the Automated Validation of Internet Security Protocols and Applications tool. However, we find that Das’s protocol has the following security loopholes: (1) By using a captured sensor node, an adversary can impersonate a legal user to the gateway node, impersonate other sensor nodes to deceive the user, and the adversary can also decrypt all the cipher-texts of the user; (2) the gateway node has a heavy computational cost due to user anonymity and thus the protocol is vulnerable to denial of service (DoS) attacks. We overcome the shortcomings of Das’s protocol and propose an improved protocol. We also prove the security of the proposed protocol in the random oracle model. Compared with the other related protocols, the improved protocol enjoys better functionality without much enhancement in the computation and communication costs. Consequently, it is more suitable for applications in WSNs


Author(s):  
Zhenhuan Zhu ◽  
S. Olutunde Oyadiji

This paper proposes a structure of energy harvester that is used to scavenge environment energy to power wireless sensor nodes. The ambient energy usually is from sunlight, wind, vibration, and so on. As the size of a sensor node is limited, the energy converted is normally small and has a prodigious random fluctuation. In order to improve the conversion efficiency of energy harvester, the paper proposes a power conversion circuit to collect rapidly paroxysmal energy generated by external environment. The circuit, as a power conditioner, bridges between energy transducers and the load of a wireless sensor node, and the power output of transducers are either AC or DC. The power conditioner implements AC-DC conversion, voltage adjusting and energy storage. A design model is developed to describe the dynamic behavior of the power conditioner under the different excitation from ambient energy sources, and energy conversion efficiency can be evaluated with the model. The proposed system architecture can be applied in the design of solar, wind or stochastic vibration energy harvesters.


Repositor ◽  
2020 ◽  
Vol 2 (1) ◽  
pp. 79
Author(s):  
Rino Nugroho ◽  
Mahar Faiqurahman ◽  
Zamah Sari

Wireless Sensor Network (WSN) is a wireless network consisting of one or more nodes even numbering thousands. The nodes in the wireless sensor network (WSN) consist of sensor nodes and sink nodes. The use of wireless sensors on the network can form a node that can communicate with each other. The communication process generally uses a pull mechanism that precedes the data query process from the node to node sensor that provides sensing data. In some wireless sensor node architecture, this pull mechanism is considered less effective because the node sink must first request data to the sensor node. Alternative, a push message mechanism can be used to transmit sensed data within specified or determined time intervals.In this research is implemented push message mechanism by using restful web service in wireless sensor communications. Test results on the delivery of data by push data transmission obtained to sink nodes alternately in accordance with the order of destination address listed or stored in memory sensor node. And in doing data delivery to be efficient in the absence of data requests at any time.


2018 ◽  
Vol 7 (1) ◽  
pp. 267-280
Author(s):  
Yi Huang ◽  
Clemens Gühmann

Abstract. In this paper, a fourth-order Kalman filter (KF) algorithm is implemented in the wireless sensor node to estimate the temperatures of the stator winding, the rotor cage and the stator core in the induction machine. Three separate wireless sensor nodes are used as the data acquisition systems for different input signals. Six Hall sensors are used to acquire the three-phase stator currents and voltages of the induction machine. All of them are processed to root mean square (rms) in ampere and volt. A rotary encoder is mounted for the rotor speed and Pt-1000 is used for the temperature of the coolant air. The processed signals in the physical unit are transmitted wirelessly to the host wireless sensor node, where the KF is implemented with fixed-point arithmetic in Contiki OS. Time-division multiple access (TDMA) is used to make the wireless transmission more stable. Compared to the floating-point implementation, the fixed-point implementation has the same estimation accuracy at only about one-fifth of the computation time. The temperature estimation system can work under any work condition as long as there are currents through the machine. It can also be rebooted for estimation even when wireless transmission has collapsed or packages are missing.


2011 ◽  
Vol 63-64 ◽  
pp. 978-982 ◽  
Author(s):  
Wen Si Wang ◽  
Ning Ning Wang ◽  
Michael Hayes ◽  
Brendan O'Flynn ◽  
Cian O'Mathuna

Wireless sensor networks are frequently used to monitor temperature and other manufacturing parameters in recent years. However, the limited battery life posts a constraint for large sensor networks. In this work, thermoelectric energy harvester is designed to effectively convert the heat into electrical energy to power the wireless sensor node. Bismuth telluride thermoelectric modules are optimized for low temperature conditions. Charge pump and switching regulator based power management module is designed to efficiently step up the 500mV thermoelectric voltage to 3.0V level for wireless sensor nodes. This design employs electric double-layer capacitor based energy storage with considerations on practical wireless sensor node operation. The implemented energy harvester prototype is proposed for Tyndall wireless sensor system to monitor temperature and relative humidity in manufacturing process. The prototype was tested in various conditions to discover the issues in this practical design. The proposed prototype can expect a 15 years operative lifetime instead of the 3-6 months battery lifetime.


2018 ◽  
Vol 210 ◽  
pp. 03011
Author(s):  
Masahiro Okuri ◽  
Hiroaki Higaki

In wireless sensor networks, data messages containing sensor data achieved by a sensor module in a wireless sensor node is transmitted to a stationary wireless sink node along a wireless multihop transmission route in which wireless sensor nodes themselves forward the data messages. Each intermediate wireless sensor node broadcast data messages in its wireless transmission range to forward them to its next-hop intermediate wireless sensor node. Hence, eavesdropper wireless nodes within the wireless transmission range easily overhear the data messages. In order to interfere with the eavesdropper wireless nodes illegally overhearing the data messages in transmission, wireless sensor nodes whose wireless transmission ranges overlap and their next-hop intermediate wireless sensor nodes are out of the wireless transmission ranges each other forward data messages in transmission concurrently and cause collisions between these two data messages at any possible eavesdropper wireless nodes intentionally. To enhance regions where concurrently forwarded data messages intentionally collide to prevent their overhearing and to realize concurrent forwarding of data messages, this paper designes an algorithm for TDMA transmission slot assignments for more opportunities to interfere the eavesdropper wireless nodes.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3137
Author(s):  
Vytautas Ostasevicius ◽  
Paulius Karpavicius ◽  
Agne Paulauskaite-Taraseviciene ◽  
Vytautas Jurenas ◽  
Arkadiusz Mystkowski ◽  
...  

There are many tool condition monitoring solutions that use a variety of sensors. This paper presents a self-powering wireless sensor node for shank-type rotating tools and a method for real-time end mill wear monitoring. The novelty of the developed and patented sensor node is that the longitudinal oscillations, which directly affect the intensity of the energy harvesting, are significantly intensified due to the helical grooves cut onto the conical surface of the tool holder horn. A wireless transmission of electrical impulses from the capacitor is proposed, where the collected electrical energy is charged and discharged when a defined potential is reached. The frequency of the discharge pulses is directly proportional to the wear level of the tool and, at the same time, to the surface roughness of the workpiece. By employing these measures, we investigate the support vector machine (SVM) approach for wear level prediction.


2021 ◽  
Vol 11 (4) ◽  
pp. 2836-2849
Author(s):  
K. Raghava Rao ◽  
D. Sateesh Kumar ◽  
Mohiddin Shaw ◽  
V. Sitamahalakshmi

Now a days IoT technologies are emerging technology with wide range of applications. Wireless sensor networks (WSNs) are plays vital role in IoT technologies. Construction of wireless sensor node with low-power radio link and high-speed processors is an interesting contribution for wireless sensor networks and IoT applications. Most of WSNs are furnished with battery source that has limited lifetime. The maximum operations of these networks require more power utility. Nevertheless, improving network efficiency and lifetime is a curtail issue in WSNs. Designing a low powered wireless sensor networks is a major challenges in recent years, it is essential to model its efficiency and power consumption for different applications. This paper describes power consumption model based on LoRa and Zigbee protocols, allows wireless sensor nodes to monitor and measure power consumption in a cyclic sleeping scenario. Experiential results reveals that the designed LoRa wireless sensor nodes have the potential for real-world IoT application with due consideration of communicating distance, data packets, transmitting speed, and consumes low power as compared with Zigbee sensor nodes. The measured sleep intervals achieved lower power consumption in LoRa as compared with Zigbee. The uniqueness of this research work lies in the review of wireless sensor node optimization and power consumption of these two wireless sensor networks for IoT applications.


Sign in / Sign up

Export Citation Format

Share Document