Change search
Link to record
Permanent link

Direct link
BETA
Publications (10 of 26) Show all publications
He, Z., Furuhed, M. & Raza, S. (2019). Indraj: Digital certificate enrollment for battery-powered wireless devices. In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks: . Paper presented at 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, 15 May 2019 through 17 May 2019 (pp. 117-127). Association for Computing Machinery, Inc
Open this publication in new window or tab >>Indraj: Digital certificate enrollment for battery-powered wireless devices
2019 (English)In: WiSec 2019 - Proceedings of the 2019 Conference on Security and Privacy in Wireless and Mobile Networks, Association for Computing Machinery, Inc , 2019, p. 117-127Conference paper, Published paper (Refereed)
Abstract [en]

A public key infrastructure (PKI) has been widely deployed and well tested on the Internet. However, this standard practice of delivering scalable security has not yet been extended to the rapidly growing Internet of Things (IoT). Thanks to vendor hardware support and standardization of resource-efficient communication protocols, asymmetric cryptography is no longer unfeasible on small devices. To migrate IoT from poorly scalable, pair-wise symmetric encryption to PKI, a major obstacle remains: how do we certify the public keys of billions of small devices without manual checks or complex logistics? The process of certifying a public key in form of a digital certificate is called enrollment. In this paper, we design an enrollment protocol, called Indraj, to automate enrollment of certificate-based digital identities on resource-constrained IoT devices. Reusing the semantics of the Enrollment over Secure Transport (EST) protocol designed for Internet hosts, Indraj optimizes resource usage by leveraging an IoT stack consisting of Constrained Application Protocol (CoAP), Datagram Transport Layer Security (DTLS) and IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN).We evaluate our implementation on a low power 32-bit MCU, showing the feasibility of our protocol in terms of latency, power consumption and memory usage. Asymmetric cryptography enabled by automatic certificate enrollment will finally turn IoT devices into well behaved, first-class citizens on the Internet.

Place, publisher, year, edition, pages
Association for Computing Machinery, Inc, 2019
Keywords
Contiki OS, Digital Certificate, Enrollment, EST, Internet of Things, PKI, Security, Constrained optimization, Digital devices, Electric batteries, Low power electronics, Mobile security, Mobile telecommunication systems, Network protocols, Personal communication systems, Public key cryptography, Semantics, Wireless networks, Constrained Application Protocol (CoAP), Contiki ossa, Digital certificates, IPv6 over low-power wireless personal area networks (6LoWPAN), Public-key infrastructure, Transport layer security, Network security
National Category
Natural Sciences
Identifiers
urn:nbn:se:ri:diva-39056 (URN)10.1145/3317549.3323408 (DOI)2-s2.0-85066759864 (Scopus ID)9781450367264 (ISBN)
Conference
12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, 15 May 2019 through 17 May 2019
Note

Funding details: VINNOVA; Funding text 1: This research has partly been funded by VINNOVA, Formas och Energimyndigheten under the Strategic Innovation Program on IoT (SIP-IoT), and partly by VINNOVA through the Eurostars SecureIoT project.

Available from: 2019-06-26 Created: 2019-06-26 Last updated: 2019-06-26Bibliographically approved
Raza, S., Misra, P., He, Z. & Voigt, T. (2017). Building the Internet of Things with Bluetooth Smart (5ed.). Ad hoc networks, 57, 19-31
Open this publication in new window or tab >>Building the Internet of Things with Bluetooth Smart
2017 (English)In: Ad hoc networks, ISSN 1570-8705, E-ISSN 1570-8713, Vol. 57, p. 19-31Article in journal (Refereed) Published
Abstract [en]

The Internet of Things, or the IoT, is an emerging, disruptive technology that enables physical devices to communicate across disparate networks. IP has been the de facto standard for seamless interconnectivity in the traditional Internet; and piggybacking on the success of IP, 6LoWPAN has been the first standardized technology to realize it for networks of resource-constrained devices. In the recent past Bluetooth Low Energy (BLE) a.k.a Bluetooth Smart - a subset of the Bluetooth v4.0 and the latest v4.2 stack, has surfaced as an appealing alternative, with many competing advantages over available low-power communication technologies in the IoT space such as IEEE 802.15.4. However, BLE is a closed standard and lacks open hardware and firmware support, something that hinders innovation and development in this field. In this article, we aim to overcome some of the constraints in BLE's core building blocks by making three contributions: first, we present the design of a new open hardware platform for BLE; second, we provide a Contiki O.S. port for the new platform; and third, we identify research challenges and opportunities in 6LoWPAN-connected Bluetooth Smart. We believe that the knowledge and insights will facilitate IoT innovations based on this promising technology

Keywords
Bluetooth Low Energy, Bluetooth LE IoT Internet of Things
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24572 (URN)10.1016/j.adhoc.2016.08.012 (DOI)2-s2.0-84994115599 (Scopus ID)
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2019-08-07Bibliographically approved
He, Z., Hewage, K. & Voigt, T. (2016). Arpeggio: a Penetration Attack on Glossy Networks (9ed.). In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON): . Paper presented at 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON 2016), June 27-30, 2016, London, UK. , Article ID 7732971.
Open this publication in new window or tab >>Arpeggio: a Penetration Attack on Glossy Networks
2016 (English)In: 2016 13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON), 2016, 9, article id 7732971Conference paper, Published paper (Refereed)
Abstract [en]

Glossy networks make use of concurrent transmissions to achieve rapid network flooding in wireless networks with high reliability. They are robust against jamming and header injection attacks. We find that Glossy floods can be hijacked by a packet injection attacker to penetrate into the network and cause severe loss. We demonstrate the design of such an attacker by evaluating its effectiveness in a 30-node testbed.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24545 (URN)10.1109/SAHCN.2016.7732971 (DOI)9781509017324 (ISBN)
Conference
13th Annual IEEE International Conference on Sensing, Communication, and Networking (SECON 2016), June 27-30, 2016, London, UK
Projects
Promos
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2019-06-12Bibliographically approved
Raza, S., Misra, P., He, Z. & Voigt, T. (2015). Bluetooth Smart: An Enabling Technology for the Internet of Things (6ed.). In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob): . Paper presented at 11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2015), October 19-21, 2015, Abu Dhabi, United (pp. 155-162). , Article ID 7347955.
Open this publication in new window or tab >>Bluetooth Smart: An Enabling Technology for the Internet of Things
2015 (English)In: 2015 IEEE 11th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), 2015, 6, p. 155-162, article id 7347955Conference paper, Published paper (Refereed)
Abstract [en]

The past couple of years have seen a heightened interest in the Internet of Things (IoT), transcending industry, academia and government. As with new ideas that hold immense potential, the optimism of IoT has also exaggerated the underlying technologies well before they can mature into a sustainable ecosystem. While 6LoWPAN has emerged as a disruptive technology that brings IP capability to networks of resource constrained devices, a suitable radio technology for this device class is still debatable. In the recent past, Bluetooth Low Energy (LE) - a subset of the Bluetooth v4.0 stack - has surfaced as an appealing alternative that provides a low-power and loosely coupled mechanism for sensor data collection with ubiquitous units (e.g., smartphones and tablets). When Bluetooth 4.0 was first released, it was not targeted for IP-connected devices but for communication between two neighboring peers. However, the latest release of Bluetooth 4.2 offers features that makes Bluetooth LE a competitive candidate among the available low-power communication technologies in the IoT space. In this paper, we discuss the novel features of Bluetooth LE and its applicability in 6LoWPAN networks. We also highlight important research questions and pointers for potential improvement for its greater impact.

Keywords
Bluetooth Smart, Bluetooth 4.2, Low Energy, Internet of Things, Research Challenges
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24445 (URN)10.1109/WiMOB.2015.7347955 (DOI)978-1-4673-7701-0 (ISBN)
Conference
11th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2015), October 19-21, 2015, Abu Dhabi, United
Projects
RBCCPSSeCThings
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2019-07-10Bibliographically approved
He, Z. & Voigt, T. (2013). Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks (10ed.). In: : . Paper presented at 10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (pp. 542-550).
Open this publication in new window or tab >>Droplet: A New Denial-of-Service Attack on Low Power Wireless Sensor Networks
2013 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this paper we present a new kind of Denial-of-Service attack against the PHY layer of low power wireless sensor networks. Overcoming the very limited range of jamming-based attacks, this attack can penetrate deep into a target network with high power efficiency. We term this the Droplet attack, as it attains enormous disruption by dropping small, payload-less frame headers to its victim's radio receiver, depriving the latter of bandwidth and sleep time. We demonstrate the Droplet attack's high damage rate to full duty-cycle receivers, and further show that a high frequency version of Droplet can even force nodes running on very low duty-cycle MAC protocols to drop most of their packets.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24246 (URN)
Conference
10th IEEE International Conference on Mobile Ad-hoc and Sensor Systems
Projects
WISENET (NES)Promos
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
He, Z. & Voigt, T. (2012). Zooming Into Radio Events by Bus Snooping (11ed.). In: : . Paper presented at The Third International Workshop on Networks of Cooperating Objects (pp. 70-74).
Open this publication in new window or tab >>Zooming Into Radio Events by Bus Snooping
2012 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this position paper, we advocate the use of bus snooping to trace radio events. Highly precise and unintrusive, the technique leads to potentially more efficient code and enables more insightful protocol analysis than conventional code instrumentation techniques.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-24027 (URN)
Conference
The Third International Workshop on Networks of Cooperating Objects
Projects
GINSENGCONET
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
Qin, Y. & He, Z. (2011). A Communication Monitor for Wireless Sensor Networks Based on Software Defined Radio (13ed.). Kista, Sweden: Swedish Institute of Computer Science
Open this publication in new window or tab >>A Communication Monitor for Wireless Sensor Networks Based on Software Defined Radio
2011 (English)Report (Other academic)
Abstract [en]

Link quality estimation of reliability-crucial wireless sensor networks (WSNs) is often limited by the observability and testability of single-chip radio transceivers. The estimation is often based on collection of packer-level statistics, including packet reception rate, or vendor-specific registers, such as CC2420's Received Signal Strength Indicator (RSSI) and Link Quality Indicator (LQI). The speed or accuracy of such metrics limits the performance of reliability mechanisms built in wireless sensor networks. To improve link quality estimation in WSNs, we designed a powerful wireless communication monitor based on Software Defined Radio (SDR). We studied the relations between three implemented link quality metrics and packet reception rate under different channel conditions. Based on a comparison of the metrics' relative advantages, we proposed using a combination of them for fast and accurate estimation of a sensor network link.

Place, publisher, year, edition, pages
Kista, Sweden: Swedish Institute of Computer Science, 2011 Edition: 13
Series
SICS Technical Report, ISSN 1100-3154 ; 2011:03
Keywords
Wireless sensor networks, Link quality estimation, Software-defined radio
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23785 (URN)
Projects
ReSense
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
Qin, Y., He, Z. & Voigt, T. (2011). Link Quality Estimation for Future Cooperating Objects (8ed.). In: : . Paper presented at The Second International Workshop on Networks of Cooperating Objects CONET 2011.
Open this publication in new window or tab >>Link Quality Estimation for Future Cooperating Objects
2011 (English)Conference paper, Published paper (Refereed)
National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23879 (URN)
Conference
The Second International Workshop on Networks of Cooperating Objects CONET 2011
Projects
ReSense
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
He, Z. & Voigt, T. (2011). Precise Packet Loss Pattern Generation by Intentional Interference (6ed.). In: : . Paper presented at 3rd International Workshop on Performance Control in Wireless Sensor Networks (pp. 1-6).
Open this publication in new window or tab >>Precise Packet Loss Pattern Generation by Intentional Interference
2011 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Abstract—Intermediate-quality links often cause vulnerable connectivity in wireless sensor networks, but packet losses caused by such volatile links are not easy to trace. In order to equip link layer protocol designers with a reliable test and debugging tool, we develop a reactive interferer to generate packet loss patterns precisely. By using intentional interference to emulate parameterized lossy links with very low intrusiveness, our tool facilitates both robustness evaluation of protocols and flaw detection in protocol implementation.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23890 (URN)
Conference
3rd International Workshop on Performance Control in Wireless Sensor Networks
Projects
GINSENG
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
Qin, Y., He, Z. & Voigt, T. (2011). Towards Accurate and Agile Link Quality Estimation in Wireless Sensor Networks (15ed.). In: : . Paper presented at The 10th IEEE IFIP Annual Mediterranean Ad Hoc Networking Workshop.
Open this publication in new window or tab >>Towards Accurate and Agile Link Quality Estimation in Wireless Sensor Networks
2011 (English)Conference paper, Published paper (Refereed)
Abstract [en]

Link quality estimation has been an important research topic in the wireless sensor networking community and researchers have developed a large number of different methods to estimate link quality. The commonly used CC2420 radio provides simple signal quality indicators. These are agile in that they react fast to changing link quality but they are inaccurate under complicated channel conditions. More sophisticated link quality estimators combine these simple metrics with packet reception statistics collected by the network stack. These approaches compensate the hardware-based metrics to a limited degree but they compromise agility and incur extra overhead. In this paper, we take a novel approach and develop a number of link quality metrics using a software defined radio. We evaluate our metrics under several channel conditions. The results show that they have good accuracy and can handle complicated channel conditions if combined properly.

National Category
Computer and Information Sciences
Identifiers
urn:nbn:se:ri:diva-23859 (URN)
Conference
The 10th IEEE IFIP Annual Mediterranean Ad Hoc Networking Workshop
Projects
CNS-STANDEMB
Available from: 2016-10-31 Created: 2016-10-31 Last updated: 2018-08-16Bibliographically approved
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-2283-2206

Search in DiVA

Show all publications
v. 2.35.8