PERFORMANCE ANALYSIS OF CRYPTO FUNCTIONS OVER LORAWAN MOTES FOR IOT APPLICATIONS  

1 of
Published on Video
Go to video
Download PDF version
Download PDF version
Embed video
Share video
Ask about this video

Page 1 (0s)

PERFORMANCE ANALYSIS OF CRYPTO FUNCTIONS OVER LORAWAN MOTES FOR IOT APPLICATIONS.

Page 2 (16s)

INTRODUCTION. 1. Background of Study 2. Problem Statement 3. Significance of Study 4. Objective of Study.

Page 3 (24s)

BACKGROUNF OF STUDY. The Internet of Things (IoT) allows anyone, at any time and in any location, to connect to anything, at any time and in any location ( Rafiullah Khan, 2012 ) . As a result of the rapid development of new technologies, our society is progressing toward one in which everything and everyone will be linked ( J. Zheng, 2011 ) . The Internet of Things (IoT) is sometimes referred to as the "future evaluation" of the Internet since it enables machine-to-machine learning (M2M) ) (Li Y. H., 2010). The Internet of Things was conceptualized with the goal of facilitating the independent and safe connection and interchange of data between apps and devices that exist in the real world. The Internet of Things brings together real life and actual activities with the online world (Chen,2010). The main drawbacks arise in the field of security and privacy. As a result, improved security methods for the internet of things are required.

Page 4 (1m 11s)

PROBLEM STATEMENT. We can notice that the current hype surrounding the Internet of Things (IoT) is a significant amount. The ability of an object to interact with other entities and to gather data about its surrounding environment offers a diverse array of application markets. The most significant challenge that the Internet of Things must overcome is maintaining the privacy and integrity of the data that is generated by the various connected devices. The device layer presents the greatest obstacle to designers of security systems for the internet of things. This is because the device layer is made up of devices with limited resources, which explains why this is the case . This research focuses on the implementation, testing, and performance evaluation of our proprietary crypto function (LNMNT) over LoRaWAN motes for the Internet of Things (IoT) security applications ..

Page 5 (2m 3s)

OBJECTIVE OF THE STUDY. To know how the lightweight hash functions works and the evaluation of their circuits Implementing the crypto function LNMNT in the LoRaWAN motes. Implementing, stress testing and performance evaluation of the crypto function in an IoT application..

Page 6 (2m 27s)

SCOPE OF THE PROJECT. In order to accomplish the goals of this study, the research directions will be limited to the lightweight hash functions that are used for resource constrained devices. The hash functions will be implemented using low level C language in the LoRaWAN motes. An IoT application will be fully evaluated in every category by the selective crypto function and will be stress tested to know it’s limitations..

Page 7 (2m 52s)

SIGNIFICANCE OF THE STUDY. The capacity of an item to communicate with other entities and acquire environmental data opens up several application industries. Safety and security of IoT data is its biggest challenge. The device layer is the biggest security challenge for IoT. The device layer contains limited-resource devices. Lightweight cryptographic functions were designed for resource-limited devices. To stress test IoT devices like Zolertia motes, Arduino Boards, ESP8266, ESP32, and Raspberry Pi, we'll employ the LMNNT crypto function, one of several lightweight cryptographic methods available today..

Page 8 (3m 39s)

LITERATURE REVIEW. Security of IoT Applications Lightweight Cryptographic Hash Functions LPWAN, LoRa, LoRaWAN Security of LoRaWAN LoRaWAN in IoT Applications.

Page 9 (3m 42s)

Security of IoT Applications. The Internet of Things ecosystem provides several obstacles , the most major of which are information storage and management , as well as privacy , authorization , verification , access control , and system setup (Jing, 2014). In many cases the security is not guaranteed . When a user's signal is disrupted or intercepted, there is a risk that the user's privacy will be violated , and there is also a risk that information about the user will be disclosed. This issue should be addressed to provide user confidence in terms of privacy and control of personal information before widespread adoption of the internet of things (IoT) can occur (Li S. T., 2016). The growth of IoT depends heavily on overcoming security problems (S. Sicari , 2015)..

Page 10 (4m 13s)

Lightweight Cryptographic Hash Functions. Lightweight (LW) Cryptography can be implemented in where the storage space , energy resources and information network are limited ( Shancang Li, 2017). In comparison to cryptographic approaches such as public key cryptography and SHA, LW cryptography is both lighter and faster. PHOTON(PH) (Gilles Brassard, 2000), QUARK(QK) (Galbraith, 2001), SPONGENT(SPT) ( Nubila et al., 2019), GLUON(GL) ( Nubila et al., 2019), and SPN-HASH(SPH) ( Nubila et al., 2019) are only a few of the LW hashing algorithms available today. Newest addition to the crypto function library is the LNMNT which was developed in “IoT and Wireless Communication Protocols Lab” of IIUM.

Page 11 (4m 55s)

LPWAN, LoRa, LoRaWAN. A Low-Power Wide Area Network (LPWAN) technology known as LoRaWAN (Jonathan de Carvalho Silva J. J., 2017), or "Long Range Wide Area Network“, has seen fast adoption over the last few years. As an open standard, it was created by the LoRa (Long Range) Alliance , which runs in an unlicensed band (Stefano Milani, 2021). Using the ISM (industrial, scientific, and medical) radio band , LoRa may be described as a platform for long-range wireless technology that runs on a minimal amount of power and uses unlicensed radio airwaves (ISM band) (A. J. Wixted P. K., 2016). The goal of LoRa is to do away with repeaters, lower the cost of devices, extend the amount of time batteries can last on devices, increase network capacity, and provide support for many devices ( Oratile , 2017)..

Page 12 (5m 38s)

Security of LoRaWAN. LoRaWAN contains several different safeguards to ensure the complete safety of the network. The application layer and the network layer both utilize data encryption in their respective functions (de Carvalho Silva, 2017). Each end-device has a key configured for the network layer ( NwkKey ), as well as another key configured for the application layer ( AppKey ) ( Riberio , 2020). Both the MAC layer (Sha Liu, 2009) and the application layer of a LoRaWAN network are protected by the Advanced Encryption Standard (AES) (Heron, 2009) encryption algorithm, which was developed by the National Institute of Standards and Technology. Message Integrity Codes are another tool used in conjunction with AES to guarantee frame integrity (MIC) (Rajeev Singh, 2013)..

Page 13 (6m 0s)

LoRaWAN in IoT Applications. There are some devices when LoRaWAN technology has been already used such as- LoRaSIM , Mobile LoRaWAN , LoRa Indoor Deployment, LoRaWAN Wi-Fi..

Page 14 (6m 13s)

METHODOLOGY. New Approach to Lightweight Crypto Hash Design Tools Evaluation Tools Parameters Performance Analysis.

Page 15 (6m 14s)

New Approach to Lightweight Crypto Hash. Simplifying the currently available techniques is not a good practice, so we need a new implementation technique instead. As a result, we choose to implement the New Mersenne number transform, also known as NMNT, in the design of the lightweight hash function..

Page 16 (6m 34s)

Design Tools. When it comes to the design of new hash functions, there are a lot of different options available. It is generally agreed that certain types of sponge constructions are more effective than others . Sponge construction is used in our newly developed LW hash function..

Page 17 (6m 52s)

Evaluation Tools. There are different tools for the simulation of LNMNT over LoRaWAN , security analysis tools and randomness analysis. Operating systems with a concentration on low power Internet of Things devices include Contiki and RIOT . The Contiki and RIOT network data will be simulated in COOJA..

Page 18 (7m 12s)

Parameters. Timing Parameters Radio Duty Cycle Message Latency Packet Delivery Radio The average Power/Energy Consumption The accuracy parameter (%).

Page 19 (7m 28s)

Performance Analysis. To perform the analytical calculation for the energy consumption model, the following specific metrics for energy consumption in the end devices would be used: Low Power Mode (LPM) Central Processing Unit (CPU) Radio Transmit Radio Listening.

Page 20 (7m 31s)

Conclusion. The use of IoT applications will be increased in daily basis and its security issues will be much more of an important part of its evolution. There are so many crypto hashing functions are presented today but many of them has many faults in terms of totally securing the data. In this area, newly invented LNMNT crypto hash function can be a big step forward for the security mechanism of the IoT applications and its performance analysis results of LoRaWAN motes of various IoT application can be a way of jumping to the next step of cryptography. This study can be part of the upcoming evolution of the cryptography of the IoT devices which uses long range wide area network technology..

Page 21 (8m 24s)

Gantt Chart for FYP-2. Week Activities 1 2 3 4 5 6 7 8 9 10 11 12 13 14 Design and simulate the model Analysis the functions of model Testing in lab Data analysis Results and discussion write-up Correction and completion of final draft Report submission Presentation.