The Industrial Internet of Things (IIoT) consists of sensors, networks, and services to connect and control production systems. Its benefits include supply chain monitoring and machine failure detection. However, it has many vulnerabilities, such as industrial espionage and sabotage. Furthermore, many IIoT devices are resource-constrained, which impedes the use of traditional security services for them. Authentication allows devices to be confident of each other’s identity, preventing some security attacks. Many authentication protocols have been proposed for IIoT; however, they have high computing requirements not viable to resource-constrained devices, or they have been found insecure. In this paper, an authentication protocol for resource-constrained IIoT devices is proposed. It is based on the lightweight operations xor, addition, and subtraction, and a hash function. Also, only four messages are exchanged between the principals to authenticate. It has a low execution-time and communication-cost. Its security was successfully assessed with the formal methods Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and Burrows–Abadi–Needham (BAN) logic, together with an informal analysis of its resistance to known attacks. Its performance and security were compared with state-of-the-art protocols, resulting in a good performance for resource-constrained IIoT devices, and higher security similar to computational expensive schemes.
Health-care centers have been meeting challenges due to the increase in the aging population and chronic diseases that need continuous medical monitoring. Wireless body area network (WBAN) is a non-invasive technology consisting of diverse connected bio-medical sensors placed in the human body, which measure physiological parameters and make the information accessible to health-care professionals ubiquitously. However, a major problem in WBAN is the security and privacy of the patient's medical information. An essential security method to protect the physiological data is authentication. Several authentication protocols have been proposed for WBANs; however, some require many computing resources, and some have security vulnerabilities. In this article, the Two-Party Lightweight Authentication Protocol (TLAP) for WBANs is proposed. It uses self-certified public keys based on Elliptic Curve Cryptography (ECC), scalar point multiplication, symmetric key encryption, and the lightweight operations xor and conventional hash function to reduce the computational cost of the protocol. Formal and informal analyses were made to demonstrate that TLAP provides mutual authentication and resists potential attacks in WBANs. The security and performance of TLAP and similar existing protocols were analyzed and compared. The analyzes showed TLAP supports more security features and has lower execution time and communication cost than the other protocols, which is significant to decrease the energy consumption in WBANs.
The Internet of Things (IoT) paradigm envisions a world where everyday things interchange information between each other in a way that allows users to make smarter decisions in a given context. Even though IoT has many advantages, its characteristics make it very vulnerable to security attacks. Ciphers are a security primitive that can prevent some of the attacks; however, the constrained computing and energy resources of IoT devices impede them from implementing current ciphers. This article presents the stream cipher Generador de Bits Pseudo Aleatorios (GBPA) based on Salsa20 cipher, which is part of the eSTREAM project, but designed for resource-constrained IoT devices of Class 0. GBPA has lower program and data memory requirements compared with Salsa20 and lightweight ciphers. These properties allow low-cost resource-constrained IoT devices, 29.5% of the embedded systems in the market, to be able to implement a security service that they are currently incapable of, to preserve the user’s data privacy and protect the system from attacks that could damage it. For the evaluation of its output, three statistical test suites were used: NIST Statistical Test Suite (STS), DIEHARD and EACirc, with good results. The GBPA cipher provides security without having a negative impact on the computing resources of IoT devices.
A ubiquitous sensor in embedded systems is the accelerometer, as it enables a range of applications. However, accelerometers experience nonlinearities in their outputs caused by error terms and axes misalignment. These errors are a major concern because, in applications such as navigations systems, they accumulate over time, degrading the position accuracy. Through a calibration procedure, the errors can be modeled and compensated. Many methods have been proposed; however, they require sophisticated equipment available only in laboratories, which makes them complex and expensive. In this article, a simple, practical, and low-cost calibration method is proposed. It uses a 3D printed polyhedron, benefiting from the popularisation and low-cost of 3D printing in the present day. Additionally, each polyhedron could hold as much as 14 sensors, which can be calibrated simultaneously. The method was performed with a low-cost sensor and it significantly reduced the root-mean-square error (RMSE) of the sensor output. The RMSE was compared with the reported in similar proposals, and our method resulted in higher performance. The proposal enables accelerometer calibration at low-cost, and anywhere and anytime, not only by experts in laboratories. Compensating the sensor’s inherent errors thus increases the accuracy of its output.
No abstract
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.