Leveraging 1-wire communication bus system for secure home automation

Home automation is a rising technology that is available to anyone thanks to the reduce cost of the embedded systems. Since the appearance of different products to create your own domotic system, and the recent popularity around the Internet of Things (IoT) technology, the domotics industry has chan...

Full description

Autores:
Tipo de recurso:
Fecha de publicación:
2017
Institución:
Universidad Tecnológica de Bolívar
Repositorio:
Repositorio Institucional UTB
Idioma:
eng
OAI Identifier:
oai:repositorio.utb.edu.co:20.500.12585/8949
Acceso en línea:
https://hdl.handle.net/20.500.12585/8949
Palabra clave:
1-wire
Home automation
Secure communication
Cryptography
Embedded systems
Internet of things
Secure communication
Security of data
1-wire
Communication bus
Control device
Home automation
Internet of thing (IOT)
Low overhead
Original systems
User experience
Automation
Rights
restrictedAccess
License
http://creativecommons.org/licenses/by-nc-nd/4.0/
id UTB2_01686df3e1175422422807296506b476
oai_identifier_str oai:repositorio.utb.edu.co:20.500.12585/8949
network_acronym_str UTB2
network_name_str Repositorio Institucional UTB
repository_id_str
dc.title.none.fl_str_mv Leveraging 1-wire communication bus system for secure home automation
title Leveraging 1-wire communication bus system for secure home automation
spellingShingle Leveraging 1-wire communication bus system for secure home automation
1-wire
Home automation
Secure communication
Cryptography
Embedded systems
Internet of things
Secure communication
Security of data
1-wire
Communication bus
Control device
Home automation
Internet of thing (IOT)
Low overhead
Original systems
User experience
Automation
title_short Leveraging 1-wire communication bus system for secure home automation
title_full Leveraging 1-wire communication bus system for secure home automation
title_fullStr Leveraging 1-wire communication bus system for secure home automation
title_full_unstemmed Leveraging 1-wire communication bus system for secure home automation
title_sort Leveraging 1-wire communication bus system for secure home automation
dc.contributor.editor.none.fl_str_mv Solano A.
Ordonez H.
dc.subject.keywords.none.fl_str_mv 1-wire
Home automation
Secure communication
Cryptography
Embedded systems
Internet of things
Secure communication
Security of data
1-wire
Communication bus
Control device
Home automation
Internet of thing (IOT)
Low overhead
Original systems
User experience
Automation
topic 1-wire
Home automation
Secure communication
Cryptography
Embedded systems
Internet of things
Secure communication
Security of data
1-wire
Communication bus
Control device
Home automation
Internet of thing (IOT)
Low overhead
Original systems
User experience
Automation
description Home automation is a rising technology that is available to anyone thanks to the reduce cost of the embedded systems. Since the appearance of different products to create your own domotic system, and the recent popularity around the Internet of Things (IoT) technology, the domotics industry has changed. The ability to control devices through the Internet creates numerous vulnerabilities to the system, allowing an attacker to control or see everything. In this work, we present a domotic system which uses a leveraged 1-wire as its communication channel. The original system lacks of any kind of security. Our objective is to implement information security through the encryption of the system’s commands, so we can assure the CIA triad (Confidentiality, Integrity and Availability). The results show that we achieve a secure communication without affecting the user experience due to the low overhead our approach provides. © Springer International Publishing AG 2017.
publishDate 2017
dc.date.issued.none.fl_str_mv 2017
dc.date.accessioned.none.fl_str_mv 2020-03-26T16:32:39Z
dc.date.available.none.fl_str_mv 2020-03-26T16:32:39Z
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_c94f
dc.type.driver.none.fl_str_mv info:eu-repo/semantics/conferenceObject
dc.type.hasversion.none.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.spa.none.fl_str_mv Conferencia
status_str publishedVersion
dc.identifier.citation.none.fl_str_mv Communications in Computer and Information Science; Vol. 735, pp. 759-771
dc.identifier.isbn.none.fl_str_mv 9783319665610
dc.identifier.issn.none.fl_str_mv 18650929
dc.identifier.uri.none.fl_str_mv https://hdl.handle.net/20.500.12585/8949
dc.identifier.doi.none.fl_str_mv 10.1007/978-3-319-66562-7_54
dc.identifier.instname.none.fl_str_mv Universidad Tecnológica de Bolívar
dc.identifier.reponame.none.fl_str_mv Repositorio UTB
dc.identifier.orcid.none.fl_str_mv 56682785300
26325154200
identifier_str_mv Communications in Computer and Information Science; Vol. 735, pp. 759-771
9783319665610
18650929
10.1007/978-3-319-66562-7_54
Universidad Tecnológica de Bolívar
Repositorio UTB
56682785300
26325154200
url https://hdl.handle.net/20.500.12585/8949
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.conferencedate.none.fl_str_mv 19 September 2017 through 22 September 2017
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_16ec
dc.rights.uri.none.fl_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
dc.rights.accessrights.none.fl_str_mv info:eu-repo/semantics/restrictedAccess
dc.rights.cc.none.fl_str_mv Atribución-NoComercial 4.0 Internacional
rights_invalid_str_mv http://creativecommons.org/licenses/by-nc-nd/4.0/
Atribución-NoComercial 4.0 Internacional
http://purl.org/coar/access_right/c_16ec
eu_rights_str_mv restrictedAccess
dc.format.medium.none.fl_str_mv Recurso electrónico
dc.format.mimetype.none.fl_str_mv application/pdf
dc.publisher.none.fl_str_mv Springer Verlag
publisher.none.fl_str_mv Springer Verlag
dc.source.none.fl_str_mv https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028646233&doi=10.1007%2f978-3-319-66562-7_54&partnerID=40&md5=a1007cd21bf178b00440c7c8464c2719
institution Universidad Tecnológica de Bolívar
dc.source.event.none.fl_str_mv 12th Colombian Conference on Computing, CCC 2017
bitstream.url.fl_str_mv https://repositorio.utb.edu.co/bitstream/20.500.12585/8949/1/MiniProdInv.png
bitstream.checksum.fl_str_mv 0cb0f101a8d16897fb46fc914d3d7043
bitstream.checksumAlgorithm.fl_str_mv MD5
repository.name.fl_str_mv Repositorio Institucional UTB
repository.mail.fl_str_mv repositorioutb@utb.edu.co
_version_ 1814021770015932416
spelling Solano A.Ordonez H.Magre Colorado, Luz AlejandraMartínez-Santos, Juan Carlos2020-03-26T16:32:39Z2020-03-26T16:32:39Z2017Communications in Computer and Information Science; Vol. 735, pp. 759-771978331966561018650929https://hdl.handle.net/20.500.12585/894910.1007/978-3-319-66562-7_54Universidad Tecnológica de BolívarRepositorio UTB5668278530026325154200Home automation is a rising technology that is available to anyone thanks to the reduce cost of the embedded systems. Since the appearance of different products to create your own domotic system, and the recent popularity around the Internet of Things (IoT) technology, the domotics industry has changed. The ability to control devices through the Internet creates numerous vulnerabilities to the system, allowing an attacker to control or see everything. In this work, we present a domotic system which uses a leveraged 1-wire as its communication channel. The original system lacks of any kind of security. Our objective is to implement information security through the encryption of the system’s commands, so we can assure the CIA triad (Confidentiality, Integrity and Availability). The results show that we achieve a secure communication without affecting the user experience due to the low overhead our approach provides. © Springer International Publishing AG 2017.Recurso electrónicoapplication/pdfengSpringer Verlaghttp://creativecommons.org/licenses/by-nc-nd/4.0/info:eu-repo/semantics/restrictedAccessAtribución-NoComercial 4.0 Internacionalhttp://purl.org/coar/access_right/c_16echttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85028646233&doi=10.1007%2f978-3-319-66562-7_54&partnerID=40&md5=a1007cd21bf178b00440c7c8464c271912th Colombian Conference on Computing, CCC 2017Leveraging 1-wire communication bus system for secure home automationinfo:eu-repo/semantics/conferenceObjectinfo:eu-repo/semantics/publishedVersionConferenciahttp://purl.org/coar/version/c_970fb48d4fbd8a85http://purl.org/coar/resource_type/c_c94f1-wireHome automationSecure communicationCryptographyEmbedded systemsInternet of thingsSecure communicationSecurity of data1-wireCommunication busControl deviceHome automationInternet of thing (IOT)Low overheadOriginal systemsUser experienceAutomation19 September 2017 through 22 September 2017Brush, A., Lee, B., Mahajan, R., Agarwal, S., Saroiu, S., Dixon, C., Home automation in the wild: Challenges and opportunities (2011) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2115-2124Lucero, S., Burden, K., Home automation and control (2010) ABI ResearchGoodwin, S., (2013) Smart Home Automation with Linux and Raspberry PiJima Masache, M.E., Zambrano Espinosa, J.H., (2015) Diseño E implementación De Un Prototipo De Sistema domótico Para Permitir El Control Centralizado De Dispositivos Dentro Del Hogar Controlado Por FPGA Utilizando El Protocolo, 10. , Ph.D. thesis, EPN, QuitoSabalza, M.M., Santos, J.C.M., Design and construction of a power meter to optimize usage of the electric power (2014) 2014 III International Congress of Engineering Mechatronics and Automation (CIIMA), pp. 1-5(2016) Digital Market Outlook: Smart Home (2015), 7. , Maxim Integrated: Dallas semiconductor(2016) Maxim Integrated: Dallas semiconductor, , Maxim Integrated: Dallas semiconductorHagras, H., Callaghan, V., Colley, M., Clarke, G., Pounds-Cornish, A., Duman, H., Creating an ambient-intelligence environment using embedded agents (2004) IEEE Intell. Syst, 19 (6), pp. 12-20Debono, C.J., Abela, K., Implementation of a home automation system through a central FPGA controller (2012) 2012 16Th IEEE Mediterranean Electrotechnical Conference (MELECON), pp. 641-644Hill, K., (2013) When ‘smart homes’ Get Hacked: I Haunted a Complete stranger’s House via the InternetOluwafemi, T., Kohno, T., Gupta, S., Patel, S., Experimental security analyses of non-networked compact fluorescent lamps: A case study of home automation security (2013) Proceedings of the LASER 2013 (LASER 2013, pp. 13-24Moore, N.C., (2016) Hacking into Homes: ‘smart home’ Security Flaws Found in Popular System, MayHiggins, K.J., (2015) Popular Home Automation System Backdoored via Unpatched Flaw, AprilMaceková, L., 1-wire-the technology for sensor networks (2012) Acta Electrotechnica Et Informatica, 12 (4), p. 52Jayakody, J., Wijesundara, M., (2014) An Automated Monitoring and Alert System for a Typical Server RoomAnoprienko, A., Varzar, R., Anoprienko, A.Y., Varzar, R.L., Anoprnko, O.Y., (2012) Intelligent Supersensory Computer Network for Measurement and Analysis of Environmental HazardsWu, Q., Zhang, G., Yan, L., (2016) Temperature and Humidity Sensor Research Based on Monobus TechnologyAkpan, V.A., Osakwe, R.A., (2015) Real-Time Embedded System for Online Temperature and Pressure Measurements for Automated Fluid Flow Monitoring and Control(2006) Maxim Integrated: Determining the Recovery Time for Multiple-Slave 1-Wire Networks, June(2013) Maxim Integrated: Ibutton RTC(2002) Dallas Semiconductor Ibutton: A Practical Introduction to the Dallas Semiconductor IbuttonGrand, J., (2001) Ds1991 Multikey Ibutton Dictionary Attack VulnerabilityOswald, D., Side-channel attacks on SHA-1-based product authentication ICs (2016) CARDIS 2015. LNCS, 9514, pp. 3-14. , Homma, N., Medwed, M. (eds.), Springer, ChamBrandt, C., Kasper, M., Don’t push it: Breaking iButton security (2014) FPS 2013. LNCS, 8352, pp. 369-387. , Danger, J.-L., Debbabi, M., Marion, J.-Y., Garcia-Alfaro, J., Zincir Heywood, N. (eds.), Springer, ChamGong, Z., Nikova, S., Law, Y.W., KLEIN: A new family of lightweight block ciphers (2012) Rfidsec 2011. LNCS, 7055, pp. 1-18. , Juels, A., Paar, C. (eds.), Springer, HeidelbergCannière, C., Dunkelman, O., Knežević, M., KATAN and KTANTAN — a family of small and efficient hardware-oriented block ciphers (2009) CHES 2009. LNCS, 5747, pp. 272-288. , Clavier, C., Gaj, K. (eds.), Springer, HeidelbergHong, D., HIGHT: A New Block Cipher Suitable for Low-Resource Device, 4249, pp. 46-59. , Goubin, L., Matsui, M. (eds.) CHES 2006. LNCSWheeler, D.J., Needham, R.M., (1995) TEA, a Tiny Encryption Algorithm, 1008, pp. 363-366. , Preneel, B. (ed.) FSE 1994. LNCS, Springer, HeidelbergBogdanov, A., Knudsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., Vikkelsoe, C., PRESENT: An ultra-lightweight block cipher (2007) CHES 2007. LNCS, 4727, pp. 450-466. , Paillier, P., Verbauwhede, I. (eds.), Springer, HeidelbergEngels, D., Fan, X., Gong, G., Hu, H., Smith, E.M., Hummingbird: Ultra-lightweight cryptography for resource-constrained devices (2010) FC 2010. LNCS, 6054, pp. 3-18. , Sion, R., Curtmola, R., Dietrich, S., Kiayias, A., Miret, J.M., Sako, K., Sebé, F. (eds.), Springer, HeidelbergBarreto, P., Simplicio, M., CURUPIRA, a block cipher for constrained platforms (2007) Simpósio Brasileiro De Redes De Computadores E Sistemas Distribuídos-SBRC, 2007Poschmann, A., Leander, G., Schramm, K., Paar, C., New light-weight crypto algorithms for RFID (2007) IEEE, pp. 1843-1846Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., Wingers, L., The Simon and Speck lightweight block ciphers (2015) Proceedings of the 52Nd Annual Design Automation Conference, 175pPanasenko, S., Smagin, S., Lightweight cryptography: Underlying principles and approaches (2011) Int. J. Comput. Theor. Eng, 3 (4), p. 516Alizadeh, M., Salleh, M., Zamani, M., Shayan, J., Karamizadeh, S., Security and Performance Evaluation of Lightweight Cryptographic Algorithms in RFIDStamp, M., (2011) Information Security: Principles and PracticeMcCoy, C., (2015) Implementations of the Simon and Speck Block Ciphers, MarchMiller, R.B., Response time in man-computer conversational transactions (1968) Proceedings of the Fall Joint Computer Conference, Part I, December, pp. 267-277Voss, W., (2008) A Comprehensible Guide to Controller Area Network, , Copperhill Media, New YorkMankar, J., Darode, C., Trivedi, K., Kanoje, M., Shahare, P., (2014) Review of I2C Protocol. Int. J, 2 (1), pp. 474-479(1988) SDI-12 Support Group-Serial Digital Interface at 1200 BaudBoyer, S.A., SCADA: Supervisory control and data acquisition (2009) International Society of Automationhttp://purl.org/coar/resource_type/c_c94fTHUMBNAILMiniProdInv.pngMiniProdInv.pngimage/png23941https://repositorio.utb.edu.co/bitstream/20.500.12585/8949/1/MiniProdInv.png0cb0f101a8d16897fb46fc914d3d7043MD5120.500.12585/8949oai:repositorio.utb.edu.co:20.500.12585/89492023-05-26 16:26:49.018Repositorio Institucional UTBrepositorioutb@utb.edu.co