Please use this identifier to cite or link to this item: http://hdl.handle.net/10125/60158

cOOKie, a Tool for Developing RF Communication Systems for the Internet of Things

File Size Format  
0718.pdf 495.54 kB Adobe PDF View/Open

Item Summary

Title:cOOKie, a Tool for Developing RF Communication Systems for the Internet of Things
Authors:Miller, Kevin
Leberknight, Chris
Keywords:Cyber-Assurance for the Internet of Things, Software-Defined Networks and Fog Computing Architectures
Software Technology
Internet of Things
Security
Software Defined Radio
show 1 moreSystem Design
show less
Date Issued:08 Jan 2019
Abstract:There is a need for high-efficiency short-range wireless communications to connect IoT devices that have low to medium security requirements. A hardware/software tool was developed to help IoT product developers quickly and easily develop radio frequency (RF) communication systems for IoT devices where previously this was a manual, one-off process. The tool uses Software Defined Radio (SDR) and focuses on On-Off-Keying (OOK) modulation. It can be used by persons with limited knowledge of RF to analyze existing devices and capture its characteristics, which can be used to create and transmit new messages, in effect spoofing it. New device definitions can be implemented in low-cost off-the-shelf hardware for production. OOK has been found to be very efficient at binary RF communications because the transmitter is only powered when a “1” is being transmitted. This efficiency translates into a battery life of up to one year. Implementations of this system could include arrays of sensors that periodically transmit data to a traditionally-powered Internet-connected receiver. Another possible use of this system could be low-cost small transmitters to track animal movements in a defined area. Receivers placed around the area could record the time and signal strength of the transmissions. Software would be used to analyze the data and plot the animal’s movements. Because the RF transmissions have a specific range, the opportunity to intercept, modify or spoof communications is highly variable. For sensitive data, rolling codes and/or public/private key encryption could be used for encoding before modulating with OOK.
Pages/Duration:6 pages
URI:http://hdl.handle.net/10125/60158
ISBN:978-0-9981331-2-6
DOI:10.24251/HICSS.2019.866
Rights:Attribution-NonCommercial-NoDerivatives 4.0 International
https://creativecommons.org/licenses/by-nc-nd/4.0/
Appears in Collections: Cyber-Assurance for the Internet of Things, Software-Defined Networks and Fog Computing Architectures


Please email libraryada-l@lists.hawaii.edu if you need this content in ADA-compliant format.

This item is licensed under a Creative Commons License Creative Commons