The Internet of Things (IoT) is seen as one of the most ground breaking and game-changing evolutions of information technology in modern times. Modern factories utilize so-called cyber-physical systems: they create a virtual copy of the physical world in order to monitor physical processes and make decentralized decisions. Over the Internet of Things, cyber-physical systems communicate and cooperate with each other and with humans in real time.
More and more often IoT infrastructures become targets for (corporate) hackers and (industrial) spies. Therefore, security solutions are to be implemented in order to resist such attacks. It is important to guarantee authenticity and confidentiality of the data. Therefore, cryptographic primitives which allow to encrypt and authenticate the data is the essential part of IOT security. However, in many cases IoT devices have to cope with constrained resources, e.g., memory, computing power, and battery supply. Often this results into security problems as ”traditional” crypto algorithms are either too resource-consuming or, in the worst case, do not work at all on such devices.
The goal of this project is to evaluate the suitability of certain security protocols for lightweight IoT devices. This should be achieved by implementing them on Arduino Uno R3 and comparing the performance metrics of these implementations.
Below the links to the recommended material are given.
The current plan is to use a PicoScope, which is the modern alternative to the traditional benchtop oscilloscope.
The 2000 Series PicoScope of 100 MHz Bandwidth will be ordered soon
The user guide and the data sheet can be found on the device web-page
There also exists a youtube channel which demonstrates different tools and features
We recommend you to start with the following videos
Packet 1 (New protocols) - Hash functions.
Task: to implement and to evaluate.
Implemented in Arduino Cryptographic Library
Packet 2 (Protocols evaluated during previous team projects)
Task: to measure power and energy consumption properly (using an oscilloscope). We will provide you the source code and the results of the former evaluation
Authenticated encryption algorithms