Cyber-Assurance for the Internet of Things, Software-Defined Networks and Fog Computing Architectures

Permanent URI for this collection

Browse

Recent Submissions

Now showing 1 - 3 of 3
  • Item
    Gait-Based Identification Using Wearables in the Personal Fog
    (2019-01-08) Walter, Charles; Gamble, Rose
    Wearables are becoming more computationally powerful, with increased sensing and control capabilities, creating a need for accurate user authentication. Greater control and power allow wearables to become part of a personal fog system, but introduces new attack vectors. An attacker that steals a wearable can gain access to stored personal data on the wearable. However, the new computational power can also be employed to safeguard use through more secure authentication. The wearables themselves can now perform authentication. In this paper, we use gait identification for increased authentication when potentially harmful commands are requested. We show how the relying on the processing and storage inherent in the personal fog allows distributed storage of information about the gait of the wearer and the ability to fully process this data for user authentication locally at the edge. While gait-based authentication has been examined before, we show an additional, low-power method of verification for wearables.
  • Item
    cOOKie, a Tool for Developing RF Communication Systems for the Internet of Things
    (2019-01-08) Miller, Kevin; Leberknight, Chris
    There is a need for high-efficiency short-range wireless communications to connect IoT devices that have low to medium security requirements. A hardware/software tool was developed to help IoT product developers quickly and easily develop radio frequency (RF) communication systems for IoT devices where previously this was a manual, one-off process. The tool uses Software Defined Radio (SDR) and focuses on On-Off-Keying (OOK) modulation. It can be used by persons with limited knowledge of RF to analyze existing devices and capture its characteristics, which can be used to create and transmit new messages, in effect spoofing it. New device definitions can be implemented in low-cost off-the-shelf hardware for production. OOK has been found to be very efficient at binary RF communications because the transmitter is only powered when a “1” is being transmitted. This efficiency translates into a battery life of up to one year. Implementations of this system could include arrays of sensors that periodically transmit data to a traditionally-powered Internet-connected receiver. Another possible use of this system could be low-cost small transmitters to track animal movements in a defined area. Receivers placed around the area could record the time and signal strength of the transmissions. Software would be used to analyze the data and plot the animal’s movements. Because the RF transmissions have a specific range, the opportunity to intercept, modify or spoof communications is highly variable. For sensitive data, rolling codes and/or public/private key encryption could be used for encoding before modulating with OOK.