Inside the Internet of Things (Iot)

Total Page:16

File Type:pdf, Size:1020Kb

Inside the Internet of Things (Iot) Inside the Internet of Things (IoT) A primer on the technologies building the IoT Inside the Internet of Things (IoT) About the authors Jonathan Holdowsky Jonathan Holdowsky is a senior manager with Deloitte Services LP and part of Deloitte’s Eminence Center of Excellence. In this role, he has managed a wide array of thought leadership initiatives on issues of strategic importance to clients within consumer and manufacturing sectors. Monika Mahto Monika Mahto is a senior analyst with Deloitte Services India Pvt. Ltd and part of Deloitte’s Eminence Center of Excellence. Over the last seven years, she has been involved in various strategic research assignments for clients in the consumer and industrial products industry. Michael E. Raynor Michael E. Raynor is a director with Deloitte Services LP and the director of the Center for Integrated Research (CIR). In collaboration with a broad cross-section of Deloitte professionals from many different industries, the CIR designs, executes, and supports research into some of the most important issues facing companies today. Mark Cotteleer Mark Cotteleer is a research director with Deloitte Services LP, affiliated with Deloitte’s Center for Integrated Research. His research focuses on operational and financial performance improvement, in particular, through the application of advanced technology. Acknowledgements The authors would like to thank Sadashiva S.R. (Deloitte Services India Pvt. Ltd.), Dhaval Modi (Deloitte Consulting India Pvt. Ltd.), and Joe Mariani (Deloitte Services LP) for their research con- tributions; Gaurav Kamboj and Kritarth Suri (both with Deloitte Consulting LLP) for their con- tributions to the IoT technology architectures; and Athappan Balasubramanian (Deloitte Support Services India Pvt. Ltd.) for his graphics contributions to this report. Deloitte’s Internet of Things practice enables organizations to identify where the IoT can poten- tially create value in their industry and develop strategies to capture that value, utilizing IoT for operational benefit. To learn more about Deloitte’s IoT practice, visit http://www2.deloitte.com/us/en/pages/technol- ogy-media-and-telecommunications/topics/the-internet-of-things.html. Read more of our research and thought leadership on the IoT at http://dupress.com/collection/ internet-of-things. A primer on the technologies building the IoT Contents The Information Value Loop | 2 Sensors | 5 Networks | 10 Standards | 16 Augmented intelligence | 21 Augmented behavior | 26 The IoT technology architecture | 33 Closing thoughts | 38 Glossary | 39 Endnotes | 44 1 Inside the Internet of Things (IoT) The Information Value Loop F you’ve ever seen the “check engine” light Something about your car’s operation—an Icome on in your car and had the requisite action—triggered a sensor,1 which communi- repairs done in a timely way, you’ve benefited cated the data to a monitoring device. The sig- from an early-stage manifestation of what nificance of these data was determined based today is known as the Internet of Things (IoT). on aggregated information and prior analysis. Figure 1. The Information Value Loop Augmented ACT Sensors behavior MAGNITUDE Scope Scale Frequency ANALYZE CREATE RISK Security Reliability Accuracy TIME Augmented Latency Timeliness intelligence Network COMMUNICATE AGGREGATE Standards VALUE DRIVERS STAGES TECHNOLOGIES CREATE: The use of sensors to generate information about a physical event or state. COMMUNICATE: The transmission of information from one place to another. AGGREGATE: The gathering together of information created at different times or from different sources. ANALYZE: The discernment of patterns or relationships among phenomena that leads to descrip- tions, predictions, or prescriptions for action. ACT: Initiating, maintaining, or changing a physical event or state. Source: Deloitte analysis. Graphic: Deloitte University Press | DUPress.com 2 A primer on the technologies building the IoT The light came on, which in turn triggered a us—not thanks to any one technological trip to the garage and necessary repairs. advance or even breakthrough but, rather, due In 1991 Mark Weiser, then of Xerox to a confluence of improvements to a suite of PARC, saw beyond these simple applica- technologies that collectively have reached tions. Extrapolating trends in technology, he levels of performance that enable complete described “ubiquitous computing,” a world in systems relevant to a human-sized world. which objects of all kinds could sense, commu- As illustrated in figure 2 below, each stage nicate, analyze, and act or react to people and of the value loop is connected to the subse- other machines autonomously, in a manner quent stage by a specific set of technologies, no more intrusive or noteworthy than how we defined below. currently turn on a light or open a tap. The business implications of the IoT are One way of capturing the process implicit explored in an ongoing series of Deloitte in Weiser’s model is as an Information Value reports. These articles examine the IoT’s Loop with discrete but connected stages. An impact on strategy, customer value, analyt- action in the world allows us to create informa- ics, security, and a wide variety of specific tion about that action, which is then commu- applications. Yet just as a good chef should nicated and aggregated across time and space, have some understanding of how the stove allowing us to analyze those data in the service works, managers hoping to embed IoT- of modifying future acts. enabled capabilities in their strategies are well Although this process is generic, it is served to gain a general understanding of the perhaps increasingly relevant, for the future technologies themselves. Weiser imagined is more and more upon Figure 2. The technologies enabling the Internet of Things Technology Definition Examples Sensors A device that generates The cost of an accelerometer has fallen to 40 cents from $2 in 2006.2 an electronic signal from Similar trends have made other types of sensors small, inexpensive, a physical condition or and robust enough to create information from everything from fetal event heartbeats via conductive fabric in the mother’s clothing to jet engines roaring at 35,000 feet.3 Networks A mechanism for Wireless networking technologies can deliver bandwidths of 300 communicating an megabits per second (Mbps) to 1 gigabit per second (Gbps) with near- electronic signal ubiquitous coverage.4 Standards Commonly accepted Technical standards enable processing of data and allow for prohibitions or interoperability of aggregated data sets. In the near future, we could prescriptions for action see mandates from industry consortia and/or standards bodies related to technical and regulatory IoT standards. Augmented Analytical tools that Petabyte-sized (1015 bytes, or 1,000 terabytes) databases can now be intelligence improve the ability to searched and analyzed, even when populated with unstructured (for describe, predict, and example, text or video) data sets.5 Software that learns might substitute exploit relationships for human analysis and judgment in a few situations. among phenomena Augmented Technologies and Machine-to-machine interfaces are removing reliably fallible human behavior techniques that improve intervention into otherwise optimized processes. Insights into compliance with human cognitive biases are making prescriptions for action based on prescribed action augmented intelligence more effective and reliable.6 Source: Deloitte analysis. 3 Inside the Internet of Things (IoT) To that end, this document serves as a technology architecture that guides the devel- technical primer on some of the technologies opment and deployment of Internet of Things that currently drive the IoT. Its structure fol- systems. Our intent, in this primer, is not to lows that of the technologies that connect the describe every conceivable aspect of the IoT or stages of the Information Value Loop: sensors, its enabling technologies but, rather, to provide networks, standards, augmented intelligence, managers an easy reference as they explore and augmented behavior. Each section in the IoT solutions and plan potential implementa- report provides an overview of the respec- tions. Our hope is that this report will help tive technology—including factors that drive demystify the underlying technologies that adoption as well as challenges that the tech- comprise the IoT value chain and explain how nology must overcome to achieve widespread these technologies collectively relate to a larger adoption. We also present an end-to-end IoT strategic framework. 4 A primer on the technologies building the IoT Augmented ACT Sensors behavior MAGNITUDE Scope Scale Frequency ANALYZE CREATE RISK Security Reliability Accuracy TIME Augmented Latency Timeliness Sensors intelligence Network COMMUNICATE AGGREGATE Standards An overview Figure 3. A temperature sensor OST “things,” from automobiles to MZambonis, the human body included, have long operated “dark,” with their location, position, and functional state unknown or Nonelectrical stimulus even unknowable. The strategic significance of LCD display the IoT is born of the ever-advancing ability to break that constraint, and to create infor- mation, without human observation, in all manner of circumstances that were previously Temperature Electronic sensor circuit invisible. What allows us to create informa- Electrical signal tion from action is the use of sensors, a generic term intended to capture the concept of a Graphic: Deloitte University
Recommended publications
  • EM Analysis in the Iot Context: Lessons Learned from an Attack on Thread∗
    EM Analysis in the IoT Context: Lessons Learned from an Attack on Thread∗ Daniel Dinu1 and Ilya Kizhvatov2 1 SnT, University of Luxembourg, [email protected] 2 Digital Security Group, Radboud University Nijmegen, [email protected] Abstract. The distinguishing feature of the Internet of Things is that many devices get interconnected. The threat of side-channel attacks in this setting is less understood than the threat of traditional network and software exploitation attacks that are perceived to be more powerful. This work is a case study of Thread, an emerging network and transport level stack designed to facilitate secure communication between heterogeneous IoT devices. We perform the first side-channel vulnerability analysis of the Thread networking stack. We leverage various network mechanisms to trigger manipulations of the security material or to get access to the network credentials. We choose the most feasible attack vector to build a complete attack that combines network specific mechanisms and Differential Electromagnetic Analysis. When successfully applied on a Thread network, the attack gives full network access to the adversary. We evaluate the feasibility of our attack in a TI CC2538 setup running OpenThread, a certified open-source implementation of the stack. The full attack does not succeed in our setting. The root cause for this failure is not any particular security feature of the protocol or the implementation, but a side-effect of a feature not related to security. We summarize the problems that we find in the protocol with respect to side-channel analysis, and suggest a range of countermeasures to prevent our attack and the other attack vectors we identified during the vulnerability analysis.
    [Show full text]
  • Forwarding Strategies for 6Lowpan-Fragmented Ipv6 Datagrams
    Forwarding Strategies for 6LoWPAN-Fragmented IPv6 Datagrams Vom Promotionsausschuss der Technischen Universit¨atHamburg-Harburg zur Erlangung des akademischen Grades Doktor-Ingenieur (Dr.-Ing.) genehmigte Dissertation von Andreas Weigel aus Potsdam, Deutschland 2017 Date of Oral Examination September 05th, 2017 Chair of Examination Board Prof. Dr. Heiko Falk Institute of Embedded Systems Hamburg University of Technology First Examiner Prof. Dr. Volker Turau Institute of Telematics Hamburg University of Technology Second Examiner Prof. Dr. Andreas Timm-Giel Institute of Communication Networks Hamburg University of Technology Acknowledgment Several people supported me in the long, difficult and sometimes frustrating process of finishing this dissertation. I want to seize the opportunity to express my deeply felt gratitude towards them. First, I would like to thank my supervisor Prof. Turau for his guidance, encourage- ment and intellectual input, but also for being the kind of superior he is. I would like to thank my colleagues, who made everydays work at the institute a pleasant experience. Special thanks go to my \roommates" Bernd-Christian Renner, Martin Ringwelski and Florian Kauer for bearing with me and my curses and com- plains and for providing so much valuable input. Further, I'd like to thank Stefan Untersch¨utzand Martin Ringwelski for their implementation work on CometOS and its 6LoWPAN module and the numerous fruitful discussions. I want to thank my parents for their genes and the continuous support I experienced throughout my life. And finally: Thanks Susanne, for your encouragement and help and for taking on life together with me. Andreas Weigel L¨uneburg,November 2017 Abstract Recent efforts towards a fully standardized protocol stack (RPL, CoAP, 6LoWPAN) for \low power and lossy networks" (LLNs) contribute to realize the vision of the Internet of Things.
    [Show full text]
  • Semantic Service Provisioning for 6Lowpan: Powering Internet of Things Applications on Web
    Semantic service provisioning for 6LoWPAN : powering internet of things applications on Web Ngoc Son Han To cite this version: Ngoc Son Han. Semantic service provisioning for 6LoWPAN : powering internet of things applica- tions on Web. Other [cs.OH]. Institut National des Télécommunications, 2015. English. NNT : 2015TELE0018. tel-01217185 HAL Id: tel-01217185 https://tel.archives-ouvertes.fr/tel-01217185 Submitted on 19 Oct 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. DOCTORAT EN CO-ACCREDITATION TEL´ ECOM´ SUDPARIS - INSTITUT MINES-TEL´ ECOM´ ET L'UNIVERSITE´ PIERRE ET MARIE CURIE - PARIS 6 Sp´ecialit´e: Informatique et R´eseaux Ecole´ doctorale : Informatique, T´el´ecommunications et Electronique de Paris Pr´esent´eepar HAN Ngoc Son Semantic Service Provisioning for 6LoWPAN: Powering Internet of Things Applications on Web Soutenue le 08/07/2015 devant le jury compos´ede: No¨elCrespi Professeur HDR, Telecom SudParis Directeur de th`ese Roch H. Glitho Professeur, Concordia University, Canada Rapporteur Yacine Ghamri-Doudane Professeur HDR,
    [Show full text]
  • A Tale of Five Protocols
    A tale of five Ebook protocols The ultimate guide to the IoT wireless communication Revision 3.0 landscape February 2018 2018 EDITION Ebook by Silvair Table of Contents In pursuit of interoperability 3 Can we talk? 5 Why not Wi-Fi? 8 Riding the Z-Wave 13 ZigBee – is the sting still sharp? 19 THREADing the way through a connected home 24 Bluetooth: a technology in transition 30 And the winner is... 40 Copyright © 2018. All rights reserved. page 2 Ebook by Silvair Introduction: 1 In pursuit of interoperability Companies venturing into the IoT market are facing some difficult choices. One of the crucial de- cisions they need to make relates to the wireless communication technology their future smart products will employ. At the most basic level, the IoT is all about connectivity. The idea is that countless numbers of smart devices are able to communicate seamlessly, producing massive benefits across all aspects of our lives and having a remarkable impact on our society. The reality, however, is still far from that concept. At this early stage of market development, the Internet of Things is heavily fragmented and lacks interoperability. A recent report from McKinsey Global Institute predicts that the global economic impact of the IoT could reach even up to $11.1 trillion per year by 2025, representing 11% of the entire world economy. But at the same time, it identifies several major obstacles on the road to this IoT promised land. Topping the list is the problem of varying standards which prevent devices and systems from communicating with each other.
    [Show full text]
  • Take Control of Apple Home Automation (1.3) SAMPLE
    EBOOK EXTRAS: v1.3 Downloads, Updates, Feedback TA K E C O N T R O L O F APPLE HOME AUTOMATION Get started with HomeKit-compatible smart home products by JOSH CENTERS $14.99 Click here to buy the full 169-page “Take Control of Apple Home Automation” for only $14.99! Table of Contents Read Me First ............................................................... 4 Updates and More ............................................................. 5 What’s New in Version 1.3 .................................................. 5 What Was New in Version 1.2 ............................................. 6 Introduction ................................................................ 8 HomeKit Quick Start .................................................. 10 Get Started with HomeKit .......................................... 11 Understand What HomeKit Is ............................................ 11 Understand What HomeKit Does ........................................ 12 Learn the HomeKit Hierarchy ............................................ 14 Understand HomeKit in Practice ......................................... 16 Plan Your HomeKit Home ........................................... 18 Learn the Types of Accessories .......................................... 18 Consider Your Needs ........................................................ 24 Choose Your First Accessories ........................................... 26 Set Up Accessories .................................................... 29 Configure Your Router with HomeKit .................................
    [Show full text]
  • Experimental Study of Thread Mesh Network for Wireless Building Automation Systems
    EXAMENSARBETE INOM ELEKTROTEKNIK, AVANCERAD NIVÅ, 30 HP STOCKHOLM, SVERIGE 2016 Experimental Study of Thread Mesh Network for Wireless Building Automation Systems DAPENG LAN KTH SKOLAN FÖR ELEKTRO- OCH SYSTEMTEKNIK i KTH ROYAL INSTITUTE OF TECHNOLOGY Abstract Master of Science Experimental Study of Thread Mesh Network for Wireless Building Automation Systems by Dapeng LAN Wireless sensor network technologies have gained significant popularity in home automation due to their scalability, system mobility, wireless connec- tivity, inexpensive and easy commissioning. Thread, a new wireless pro- tocol aiming for home automation, is proposed by Google Nest and stan- dardized by Thread Group. This thesis presents a thorough experimental evaluation of Thread wire- less protocol with the hardware platform from NXP. The test plan, imple- mentation, and analysis of the experiments is discussed in details, including signal coverage, unicast and multicast latency, reliability, and availability. Furthermore, a system level model considering the delay in different layers for the latency of Thread mesh network is presented, and validated by the experimental results. Finally, a friendly tool was developed for installers to estimate the latency of Thread mesh network. ! ! ! ! ! ! ! ! ! Sammanfattning) ! Trådlösa) sensornätverk) har) fått) betydande) popularitet) för) hemautomation) på) grund) av) deras) skalbarhet,) systemmobilitet,) trådlösa) konnektivitet,) låga) prisnivå) och) enkla) implementation.) Thread,)ett)nytt)trådlöst)protokoll)avsett)för)hemautomation,)är)
    [Show full text]
  • Benefits of IP in Iot and M2M Systems
    Benefits of IP In IoT and M2M systems Geoff Mulligan Principal – Proto6, LLC Chairman IPSO Alliance Chair 6LoWPAN Building the Internet of Things: New protocols need not apply IP is Essential Leverage existing knowledge, tools, protocols, experience Support for multiple PHYs End to end connectivity, security No gateways/translation But – Is v6 essential Need the address space SLAAC is good No NAT! Better header compression Speaking of Header Compression 6Lowpan is a mechanism to fit IPv6 into small data frames and improve transmission efficiency 6LowPAN Compression X X X X X X X X Not just for 15.4 Originally designed for IEEE 802.15.4 Draft to use with Bluetooth Low Energy Power Line Control (P1901.2, G3) Low Power WiFi Inventing new protocols Zigbee - delayed the market by years Only recently adopted IP (for Smart Energy) Multiple non-interoperable stacks COAP – interesting but not required HTTP can be made small TCP can be improved RPL – good for specific scenarios AODV, OLSR, DSR, even RIP work just fine “Premature optimization is the root of all evil” – Donald Knuth IPSO Application Framework IPSO Alliance –www.ipso-alliance.org 60+ member companies promoting IP in sensor/control, M2M and IoT applications Application Framework Application agnostic “Restful” compatible – COAP or HTTP License Free Promoters Contributors: Aidon Oy ~ Concept Reply ~ ConnodeCubic GTS ~ Econocom ~ ElectroTest Sweden ~ Eliko Elster ~ Emerson ~ EPRI ~ Google ~ Inria ~ ISMB ~ Lulea Univ of Tech ~ MAXFOR Maxim Integrated Products ~ Millennial Net ~ Nokia ~ Novo ~ Sensus ~ Synapse Wireless Tampere Univ of Tech ~ Texas Instruments ~ TMC ~ UTRC-I ~ Watteco ~ WISENET About IPSO: The IPSO Alliance is the leading organization promoting the use of Internet Protocol (IP) for smart object communications for use in energy, consumer, healthcare and industrial applications.
    [Show full text]
  • Thread and Zigbee for Home and Building Automation
    Thread and Zigbee for home and building automation Roberto Sandre Systems Engineer Texas Instruments Introduction The applications and services enabled by home automation technologies have inspired authors, screenwriters and cartoonists for decades. But finally, advances in wireless communication, combined with the increased penetration of distributed cloud computing and the launch of innovative user interfaces like voice, have popularized the adoption of smart devices in the home, controlled by digital assistants like the Amazon Echo. An interesting corollary to that adoption is the rebirth of home automation in a different application context. Rather than a “Jetsons”-like solution with home control at the user’s fingertips, smart home devices do things autonomously, providing convenience and cost savings. While more glamorous in the residential domain, the Today, many communication technologies enabling advantages that automation brings are not just for device-to-device, device-to-cloud and device-to- homeowners. Automation is even more important in mobile wireless infrastructures are at the heart of commercial and industrial building domain, where home and building automation, including Wi-Fi®, energy consumption and device maintenance have Bluetooth® and Bluetooth low energy, Sub-1 GHz, a larger cost impact. For instance, the amount Zigbee and Thread. of electricity used by heating, ventilation and Given the ubiquity of access points and air conditioning (HVAC) and lighting systems in smartphones, Bluetooth low energy and Wi-Fi office spaces can be managed efficiently with fully are popular for home and building automation autonomous devices that balance environmental devices like Internet protocol (IP) cameras and door conditions, space occupancy and instantaneous locks, as well as appliances and wearables.
    [Show full text]
  • Wi-Fi 6 and Matter: the Real Plug and Play Smart Home
    WHITE PAPER Wi-Fi 6 and Matter: The Real Plug and Play Smart Home Introduction The COVID-19 pandemic has more people working from home, and this has accelerated the adoption of the new Wi-Fi standard (Wi-Fi 6). Consumers are upgrading home networks with this new, higher speed Wi-Fi 6, and they are enjoying the additional key benefits of its distributed architecture – ease of setup for coverage all over the house and high capacity that serves the needs of all family members – from video conferencing in the home office, to binge watching a favorite show in the living room, to hours of online gaming in an upstairs bedroom. Until now, smart homes have been serviced by multiple, competing standards – Wi-Fi, Zigbee, Bluetooth® Low Energy, Thread, etc. This fragmentation, split over multiple standards, has kept smart homes – and the IoT itself – from living up to its potential. Matter (formerly Project CHIP) brings Zigbee, Thread, Bluetooth and Wi-Fi into one overarching standard. This paper addresses why this will enable truly smart homes. 1 Wi-Fi 6 Distributed Architecture and Pods Wi.- Fi 6’s distributed architecture brings a router and a set of satellites, or “pods,” that can be strategically positioned in the home. These pods connect themselves automatically to the main router, the one that connects to the outdoor internet, via a protocol called EasyMesh™. The result is high speed Wi-Fi through the whole house. Gone are the days when proximity to the router is crucial for performance, and repeaters and/or powerline adapters are needed to cover the dead zones.
    [Show full text]
  • Take Control of Apple Home Automation (1.1) SAMPLE
    EBOOK EXTRAS: v1.1 Downloads, Updates, Feedback TA K E C O N T R O L O F APPLE HOME AU T O M AT I O N Get started with HomeKit-compatible smart home products by JOSH CENTERS $14.99 Click here to buy the full 157-page “Take Control of Apple Home Automation” for only $14.99! Table of Contents Read Me First ............................................................... 4 Updates and More ............................................................. 5 Basics .............................................................................. 5 What’s New in Version 1.1 .................................................. 6 Introduction ................................................................ 7 HomeKit Quick Start .................................................... 9 Get Started with HomeKit .......................................... 10 Understand What HomeKit Is ............................................ 10 Understand What HomeKit Does ........................................ 11 Learn the HomeKit Hierarchy ............................................ 13 Understand HomeKit in Practice ......................................... 15 Plan Your HomeKit Home ........................................... 18 Learn the Types of Accessories .......................................... 18 Consider Your Needs ........................................................ 24 Choose Your First Accessories ........................................... 25 Set Up Accessories .................................................... 28 Identify the HomeKit Code ...............................................
    [Show full text]
  • Coap Infrastructure for Iot
    CoAP infrastructure for IoT A Thesis Submitted to the College of Graduate and Postdoctoral Studies in Partial Fulfillment of the Requirements for the degree of Master of Science in the Department of Computer Science University of Saskatchewan Saskatoon By Heng Shi ©Heng Shi, April/2018. All rights reserved. Permission to Use In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree from the University of Saskatchewan, I agree that the Libraries of this University may make it freely available for inspection. I further agree that permission for copying of this thesis in any manner, in whole or in part, for scholarly purposes may be granted by the professor or professors who supervised my thesis work or, in their absence, by the Head of the Department or the Dean of the College in which my thesis work was done. It is understood that any copying or publication or use of this thesis or parts thereof for financial gain shall not be allowed without my written permission. It is also understood that due recognition shall be given to me and to the University of Saskatchewan in any scholarly use which may be made of any material in my thesis. Requests for permission to copy or to make other use of material in this thesis in whole or part should be addressed to: Head of the Department of Computer Science 176 Thorvaldson Building 110 Science Place University of Saskatchewan Saskatoon, Saskatchewan Canada S7N 5C9 i Abstract The Internet of Things (IoT) can be seen as a large-scale network of billions of smart devices.
    [Show full text]
  • State Machine Inference of Thread Networking Protocol
    Bachelor thesis Computer Science Radboud University State machine inference of Thread networking protocol Author: First supervisor/assessor: Bart van den Boom Dr. ir. Joeri de Ruiter S4382218 [email protected] Second supervisor: Dr. Ilya Kihzvatov [email protected] Second assessor: Dr. ir. Erik Poll [email protected] June 29, 2018 Abstract Thread is a recently deployed communication protocol stack specifically de- signed for home automation. Part of the protocol stack is Mesh Link Es- tablishment (MLE), which is extended for Thread. The aim of this paper is to obtain useful insights in the behaviour of the MLE implementation of OpenThread. To do so, we inferred state machines by using active Mealy machine inference. These behavioural models were then compared to the specification as given by Thread, resulting in the discovery of anomalies present in the OpenThread implementation. Contents 1 Introduction 3 2 Thread 5 2.1 Mesh networks . .6 2.2 Thread stack . .7 2.2.1 IPv6 . .8 2.2.2 MeshCoP . .8 2.2.3 MLE . .8 2.2.4 Security . .9 3 Automated state machine learning 10 3.1 Mealy machines . 10 3.2 Mealy machine inference . 11 3.2.1 Approach . 11 3.2.2 Active learning of Mealy machines . 12 3.2.3 Equivalence approximation algorithm . 12 4 Method 13 4.1 Scope of learning . 13 4.2 Experimental setup . 13 4.2.1 Learning process . 14 4.3 Implementation . 15 4.4 MLE messages and processes . 17 4.5 Learner Alphabet . 24 5 Results 25 5.1 Partial message set .
    [Show full text]