0% found this document useful (0 votes)
9 views19 pages

Final

Uploaded by

Manish Chaitanya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views19 pages

Final

Uploaded by

Manish Chaitanya
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

Final Year Major Project on

IOT NETWORK
SECURITY ISSUE

Project Guide Submitted by


Manish Chaitanya S
MAHESH V 3210416233
OBJECTIVES & INTRODUCTION

 To study the threats in the communication and network system based on


IOT
 To create a ZigBee based secured wireless communication using AES
encryption ,so that it allows us to communicate wirelessly with security
feature.
 The data transfer during communication between two system which
includes th IOT application ZIGBEE as a medium is encrypted using
128bit AES encryption which is highly secure.
 The data can be decrypted with correct key only, otherwise it returns
some garbage value. This is two way communication system where we
can transmit as well as receive at both ends. We used Atmega328
microcontroller
 We used Atmega328 microcontroller interfaced with Xbee with LCD
display to send message and key, also have USB keyboards connected to
each system and powered by 12v supply. After starting system, we will
able to enter message on system.
 The maximum limit of message is 32 character. After that system asks
for key, the key limit is 16character it can be number or alphabet.
Entering key will send the encrypted message to other system.
Literature survey

 ZigBee is one of the protocols developed for enhancing the features of


wireless sensor networks. ZigBee technology is created by the ZigBee
Alliance which is founded in the year 2001.
 Characteristics of ZigBee are
 low cost
 Low data rate
 Relatively short transmission range
 Scalability
 Reliability
 Flexible protocol design.
 ZigBee has range of around 100 meters and a bandwidth of 250 kbps
and the topologies that it works are star, cluster tree and mesh. It is
widely used in home automation, digital agriculture, industrial controls,
medical monitoring & power systems.
 The AES (advanced encryption standard) [3] is an encryption standard as
a symmetric block cipher. It was announced by National Institute of
Standards and Technology (NIST) on November 26,2001.
 The Rijndael algorithm was developed by Joan Daemen of Proton World
International and Vincent Fijmen of Katholieke University at Leuven.
Block diagram
HARDWARE & software used
 ATmega328P Microcontroller • Arduino Compiler
 Zigbee module • MC Programming
 LCD

Language-C
Keyboard
 Resistors
 Capacitors
 Push Button
 Crystal Oscillator
 Cables & Connectors
 Diodes
 PCB
 LED’s
 Transformer/Adapter
PROJECT DEVELOPMENTS STAGES

• Choosing Microcontroller
• Components Required
• Soldering
• Testing for Connectivity & Issues
• PCB Printing
• Coding
Results Expected

 The components according to the requirement and block diagram is set


up, the code to set communication between the ZigBee and the
microcontroller has been formulated
 As we are using AES encryption amongst all other types of cyphers, the
appropriate AES encryption to be used (ie 128/192/256 bit) is yet to be
chosen and implemented
 Whilst the working of AES has been studied from sources
 The implementation is pending if everything goes accordingly
General Security Analysis of IoT Systems

 Authentication and physical threats


 Integrity
 Confidentiality
 Privacy
Conventional security and privacy techniques are not necessarily
appropriate for the IoT due to the special characteristics of the IoT.
The attractive prospect of IoT applications, as well as the strong
needs of increasing public confidence about security and privacy
issues, requires new and comprehensive solutions to not only
protect local IoT devices but also the broader Internet aspect of the
IoT
Expected results

AES has a fixed block size of 128 bits and a key size of 128, 192 or 256 bits,
whereas Rijndael can be specified with key and block sizes in any multiple of 32
bits, with a minimum of 128 bits and a maximum of 256 bits. AES operates on a
4×4 array of bytes, termed the state.
a) Sub Bytes - a non-linear substitution step where each byte is replaced with
another according to a lookup table (known as S Box).
b) Shift Rows - a transposition step where each row of the state is shifted
cyclically a certain number of steps.
c) Mix Columns - a mixing operation which operates on the columns of the state,
combining the four bytes in each column using a linear transformation.
d) Add Round Key - each byte of the state is combined with the round key; each
round key is derived from the cipher key using a key schedule.
• AES is 128-bits, so it separates the data into a four-by-four column
of sixteen bytes (there are eight bits in a byte and 16 x 8 = 128).
• If your message was “buy me some potato chips please” the first
block looks like this:

b m o p

u e m o

y e t

s a

• The “…to chips please” would normally just be added to the


next block.
• Key expansion involves taking the initial key and using it to come up
with a series of other keys for each round of the encryption process.
These new 128-bit round keys are derived with Rijndael,s key
schedule, which is essentially a simple and fast way to produce new
key ciphers. If the initial key was “keys are boring1”:

k i
• Then each of the new
e a b n
keys might look
something like this
y r o g once Rijndael’s key
schedule has been
used: 14 29 1h s5
s e r 1
• Although they look like
random characters h9 9f st 9f
(and the example is
just made up) each of gt 2h hq 73
these keys is derived
from a structured
ks dj df hb
process when AES
encryption is actually
applied.
 Add round key:

b m o p k i

u e m o e a b n

y e t y r o g

s a s e r 1
+

h3
jd zu 7s

s8 7d 26 2n

dj 4b 9d 9c

74 el 2h hg
 Substitute bytes:
 In this step, each byte is substituted according to a predetermined table

jb
n3 kf n2

9f jj 1h js

74 wh 0d 18

hs 17 d6 px
 Shift rows :

jb
n3 kf n2

jj 1h js 9f

0d 18 74 wh

px hs 17 d6
 Mix columns : each column has a mathematical equation applied to it in
order to further diffuse it.
 Add round key (again)
 After the last round key was added, it goes back to the byte substitution
stage, where each value is changed according to a predetermined table.
Once that’s done, it’s back to shift rows and moving each row to the left
by one, two or three spaces. Then it goes through the mix columns
equation again. After that, another round key is added.
 With this successfully implemented in the communication interface of
the 2 atmega,s this will be highly secured
Conclusion

The M2M communication in IoT can be secured through many ways


of
encryption such as Two fish, 3DES(Triple Data encryption) and RSA,
but
amongst all we would recommend the AES(Advanced Encryption
Standard) to secure all of our communication as this method uses a
block cipher, which encrypts data one fixed-size block at a time,
unlike
other types of encryption, and with the electronics shown is a
example
of the simplest form where this encryption can be us.
references

 International Journal of Computer Applications (0975 – 8887)


Volume 169 – No.4, July 2017 : A Literature Survey on IoT
Security Challenges
 International Journal of Emerging Science and Engineering (IJESE)
ISSN: 2319–6378, Volume2, Issue-6, April 2014 : Study and
Literature Survey of Advanced Encryption Algorithm for Wireless
Application
 https://www.comparitech.com/blog/information-security/what-is-a
es-encryption/
 https://www.samiam.org/key-schedule.html
 https://www.electronicwings.com/avr-atmega/xbee-interfacing-wit
h-atmega32

You might also like