A Thesis Entitled a Secure and Low-Power Consumption

A Thesis Entitled a Secure and Low-Power Consumption

A Thesis Entitled A Secure and Low-Power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networks by Ashutosh Bandekar Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Electrical Engineering ________________________________________ Dr. Ahmad Y. Javaid, Committee Chair ________________________________________ Dr. Mansoor Alam, Committee Member ________________________________________ Dr. Hong Wang, Committee Member ________________________________________ Dr. Amanda Bryant-Friedrich, Dean College of Graduate Studies The University of Toledo August 2017 Copyright 2017, Ashutosh Bandekar This document is copyrighted material. Under copyright law, no parts of this document may be reproduced without the expressed permission of the author. An Abstract of A Secure and Low-Power Consumption Communication Mechanism for IoT (Internet of Things) and Wireless Sensor Networks by Ashutosh Bandekar Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Electrical Engineering The University of Toledo August 2017 Internet of Things (IoT), the newer generation of traditional wireless sensor network devices, offer wide variety of applications in various areas including military, medicine, home automation, remote monitoring, etc. Due to their wide usage and recent large-scale DDoS (distributed denial of service) attacks using millions of these devices, security of these devices have become an important aspect to address. Additionally, security implementation needs to be power efficient considering the limited power resource available to these wireless devices. Since users, as well as attackers, can control or access IoT devices remotely using smartphone or a computer, any attack on these devices can result in disasters. This thesis is directed towards development and implementation of a secure and power-efficient communication mechanism on these low-power devices. First, we performed a detailed analysis of the power consumption of these devices for different environment variables including temperature, lighting and location (in/outdoor), to understand effects of these parameters on device power consumption. Second, we proposed and implemented a novel security algorithm to detect and mitigate RPL (routing iii protocol layer) attacks in IoT networks. We evaluated changes in the behavior of IoT devices before and after the implementation of our proposed algorithm in terms of the change in battery life and power consumption. The proposed security implementation has the novel approach of using the RSSI (received signal strength indicator) tunneling to detect and mitigate RPL (routing protocol layer) attacks. Finally, we conducted experiments in simulation as well as on first generation real-world sensor nodes (Zolertia Z1 motes) to evaluate the power efficiency of our proposed algorithm. We conclude the thesis with insights on (a) the effect of interference present in the atmosphere on battery life, (b) security provided by the proposed algorithm, and (c) power-efficiency of the proposed security algorithm for IoT devices. iv Acknowledgements Every work is source which requires support from many people and areas. It gives me proud privilege to complete Thesis report on “A Secure and Low-Power Consumption Communication Mechanism for IoT(Internet of Things) and Wireless Sensor Networks” under valuable guidance Dr. Ahmad Y. Javaid. I appreciate his inputs and guidance, which are utterly important for thesis. I am also extremely grateful to our respected Department Chair (Electrical Engineering and computer science Dept.) Dr. Mansoor Alam and Dr. Hong Wang for to taking out time to sever as a thesis committee from their busy schedule. At last I would like to thank all the unseen authors of various articles on the Internet, helping me become aware of the research currently ongoing in this field and all my colleagues for providing help and support in my work. v Table of Contents Abstract .............................................................................................................................. iii Acknowledgements ..............................................................................................................v Table of Contents ............................................................................................................... vi List of Tables .................................................................................................................. vii List of Figures .................................................................................................................... ix List of Abbreviations ...........................................................................................................x 1 Introduction ........................................................................................................11 1.1 Wireless Sensor Networks (WSNs):-...............................................................11 1.1.1 Application of Wireless Sensor Networks (WSNs) ..........................14 1.2 Internet of Things .............................................................................................16 1.2.1 Application of IoT services ...............................................................17 1.3 Thesis Outline ..................................................................................................19 2 Internet of Things (IoT) Security Issues ................................................................20 2.1 A survey on IoT security Issues .......................................................................20 2.2 Overview of Received signal strength (RSSI) .................................................22 2.3 Proposed algorithm based on Received Signal Strength Indicator(RSSI) .......23 2.4 Chapter Summary ............................................................................................24 3 Analysis of secured low power consumption communication ..............................25 3.1 Proposed Methodology ....................................................................................25 vi 3.2 Power consumption analysis methodology ......................................................26 3.3 Implemented Attacks .......................................................................................28 3.4 Chapter Summary ............................................................................................31 4 Cyber-attack mitigation algorithm using RSSI tunneling mechanism ..................33 4.1 Overview ........................................................................................................33 4.2 Security analysis of proposed algorithm ..........................................................36 4.2.1 Analysis of Security algorithm ..............................................................36 4.2.2 Protocol layers in IoT and security analysis ..........................................38 4.3 Technological Approach ..................................................................................39 4.3.1 Hardware ...........................................................................................40 4.3.2 Software ............................................................................................41 4.3.3 Operating Environment .....................................................................43 4.3.4 Experiments Conducted ....................................................................44 4.3 Chapter Summary ............................................................................................47 5 Results and discussion ...........................................................................................48 5.1 Power Consumption Analysis ..........................................................................51 5.2 Battery Life Estimation ....................................................................................57 5.3 Discussion ........................................................................................................58 6 Conclusion and Future Work .................................................................................59 6.1 Publications ......................................................................................................60 References ..........................................................................................................................61 vii List of Tables 5.1 Table 1. Operating States of Zolertia Z1 [38]……………………………………40 viii List of Figures 1-1 Typical Architecture of Wireless sensor network devices [1] ...............................14 2-3 The general architecture of the proposed security [16]implementation ................24 3-3 General Topology of Wormhole Attack…………………………………………29 3-3 Brief working of flooding………………………………………………………………..31 4-2-1 Hardware used Zolertia Z1…………………...………………………………….41 4-2-2 Implementation in Regular Network, IoT network and Contiki layer…………..42 4-2-3 Topology used in real world environment [26]………………………………….49 4-2-4 Topology Used during Simulation [26]……………………………………….....47 4-2-4 Topology used in simulation during ongoing attack [16]……………………......47 5-1 Real-world energy consumption for broadcast application [16]…………………51 5-1 Energy consumption during real-world for one-to-one communication [16]……52 5-1 Energy consumption comparison between various real-world scenarios and simulation results [16]……………………………………………………………53

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    69 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us