Secure Control Protocols for Resource-Constrained Embedded Systems
نویسنده
چکیده
Koo, Jin Kyu Ph.D., Purdue University, August 2012. Secure Control Protocols for Resource-Constrained Embedded Systems. Major Professors: Saurabh Bagchi and Xiaojun Lin. Embedded systems are increasingly being deployed into the world around us. For example, they are used to monitor the environment around us, measure and control the electrical grid, and control vehicles on the road. As they are integrated in the real world, their security becomes increasingly important. However, due to their lower cost, energy constraints and slow computation speed, maintaining security for these systems is usually very challenging. In this work, we study a range of the important security issues in the operation of embedded systems, which includes reliable synchronization, timely event reporting, and privacy-preserving data transmission. First, we propose a fast and reliable clock synchronization protocol for wireless sensor networks, called CSOnet, which is for wastewater monitoring and is deployed city-wide in a mid-sized US city, South Bend, Indiana. The nodes in CSOnet have a low duty cycle (2% in current deployment) and use an external clock, called the Real Time Clock (RTC), for triggering the sleep and the wake-up. The RTC has a very low drift (2 ppm) over the wide range of temperature fluctuations that the CSOnet nodes operate at, and it has low power consumption (0.66 mW). However, there are two challenges to using RTC for synchronization. First, RTC has a coarse time granularity of only 1 second. Therefore, it is insufficient to synchronize the RTC itself, which would lead to a synchronization error of up to 1 second. Such a large error would be unacceptable for the low duty cycle operation when each node stays awake for only 6 seconds in a 5-minute time window. The second challenge is that the synchronization has to be extremely fast
منابع مشابه
Web Based Security Protocols for Embedded System
Security can mean resistance to casual or prankster attacks like most viruses and security can also mean resistance to DOS attacks. But in this paper, security will mean the embedded devices’ ability to contain sensitive information and to hold down its end of a secure communication. In this paper we also are studying about various types of protocols which are used in networks security. These a...
متن کاملMaking Password Authenticated Key Exchange Suitable for Resource-Constrained Industrial Control Devices
Connectivity becomes increasingly important also for small embedded systems such as typically found in industrial control installations. More and more use-cases require secure remote user access increasingly incorporating handheld based human machine interfaces, using wireless links such as Bluetooth. Correspondingly secure operator authentication becomes of utmost importance. Unfortunately, of...
متن کاملEmbedded Systems Security Challenges
In a world of pervasive computing, embedded systems can be found in a wide range of products and are employed in various heterogeneous domains. The abovementioned devices often need to access, store, manipulate and/or communicate sensitive or even critical information, making the security of their resources and services an important concern in their design process. These issues are further exac...
متن کاملPassword Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)
With the advancement of wireless technology and the increasing demand for resource-constrained mobile devices, secure and efficient password authenticated key exchange (PAKE) protocols are needed for various kinds of secure communications among low-power wireless devices. In this paper, we introduce an elliptic curve based password-keyed permutation family and use it to construct a PAKE in such...
متن کاملFormal modelling and analysis of routing protocol security in wireless sensor networks
Wireless Sensor Networks (WSN) are composed of small, low cost, resource-constrained computing nodes equipped with low power wireless transceivers. Generally, they are embedded in their environment to perform some specific monitoring and/or control function. Unlike wired networks that have dedicated routers for network connectivity and message forwarding, every node in a WSN can act as a router...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012