1 / 28

Evaluation of Security Protocols for IoT

This project aims to analyze and refine a problem statement related to security protocols for the Internet of Things (IoT) and develop a project plan for developing a concrete solution. Participants will learn to conduct research, define work plans, implement protocols, and evaluate their performance. The project will be supervised by Prof. Frederik Armknecht and Vasily Mikhalev from the University of Mannheim.

kerns
Télécharger la présentation

Evaluation of Security Protocols for IoT

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Universität Mannheim Mannheim, Germany Evaluation of Security Protocols for the Internet of Things Kick-Off Meeting Frederik Armknecht, Vasily Mikhalev University of Mannheim

  2. Agenda • Educational Goals • Content and Structure • Grades and Next Steps

  3. Educational Goals

  4. DidacticAims • Lectures Learnnewmethods, etc. • Seminars Learntoprepare and givepresentations, writereports • Bachelor/masterthesisLearntoacquireautonomouslynewcontent, producenewresults, writereports • Team project ???

  5. Excerpts fromthe Module Catalog • Aimofthemodule • The students solve a practical problem as a team. • The participants have to analyze and refine the problem and come up with a project plan for developing a concrete solution that will be carried out by the team over the duration of one year. • Participants will learn to • Refine a given problem statement by analyzing requirements and the state of the art using techniques like literature research and expert interviews. • Define a workplanincluding tasks, milestones, deliverables and resources and continually assess and modify the plan according to the actual progress of the work.

  6. Why? • Common scenario in industry • Purchaser (P) and contractor (C) agree on a project • Set up a contractthatdefines • Outcome oftheproject • Price • Duration • Possiblysomeinterimresults • UptoCtoachievetheseresults • Requirestoorganize and conduct a project, possiblywith different teammembers • This is „simulated“ here in thisproject

  7. WhatDoes This Mean? • Conductingthisprojectis YOUR responsibility • We will provide • Feedback • Hints on request • Technical support • Background material • We will not • Organizetheproject • Superviseyoucontinuously • Remindyouofdeadlines

  8. Content and Structure

  9. Internet ofthings https://techiezlounge.com/internet-of-things-iot-everything-you-need-to-know-examples-and-challenges/

  10. Industry 4.0 • Industry 4.0 is a name for the current trend of automation and data exchange in manufacturing technologies. • It creates what has been called a "smart factory". • Within the modular structured smart factories, cyber-physical systems monitor physical processes, create a virtual copy of the physical world and make decentralized decisions. • Over the Internet of Things, cyber-physical systems communicate and cooperate with each other and with humans in real time

  11. Arduino Uno R3 • will be used for implementations • open-source • widely used • easy to learn • many tutorials and examples

  12. Arduino Uno R3

  13. Arduino IDE

  14. Protocolscosts at Arduino Uno R3 To be found: • Code size • Memory size • Throughput • Power consumption • Energy consumption

  15. Structure • Packet 1 (New protocols) Task: to implement and to evaluate.Hash functions: • Packet 2 (Protocols evaluated during previous team projects) Task: to measure power and energy consumption properly (using an oscilloscope). • Block ciphers • Stream ciphers • Authenticated encryption schemes • HB-type protocols • ARMADILLO • DM-PRESENT • H-PRESENT • GLUON • Lesamnta-LW • Neeva • PHOTON • QUARK • SipHash • SHA-3 • SPN-Hash • SPONGENT • Lhash • Lesamnta-LW • Tav-128 • Hash-One

  16. Tasks andresultsthatweexpect • Implementation of the protocols • Protocols evaluation/testing • Documentation • Contract specification document including work plan • Reports for each packets including: description of the protocols, justification of implementation choices, evaluation results • Final thesis, combining all results together • Final presentationand demonstration

  17. Supervision • University of Mannheim • Prof. Frederik Armknecht - cryptography + organization • Vasily Mikhalev – technicalissues + cryptography + organization

  18. Contactingthe Supervisors • Usemailinglistwheneverpossible • Oneemail per subject • Language: English • Regular meetings: everyFriday?

  19. Grades, Next Steps, Further Hints

  20. Grades • The grade iscomposedoftwo grades: • The grade forthetasksthatyouarethemainlyresponsiblefor – weightedwith 3/4 • Iftwoormoreparticipantsareresponsibleforthe same taskthey will getthe same grade for it. • The grade fortheoverallproject – weightedwith ¼ • Grades will express if and towhatextentthegoalsdesribed in thecontractspecificationaremet (seelater). • Bonusesfor extra workarepossible

  21. Next Steps • Take a look at thetasks • Background material will bemadeavailable on thewebsitebythebeginningofnextweek • Distributethetasksamongyou • This isuptoyou! • Ideally, youshouldselectoneprojectcoordinator. Volunteers? • Youaretotellus • Decisiondeadline: April 1st

  22. Next Steps • Eachparticipanthastosetup a contractspecificationdocument • Content: seenextslide • Important: Deadline is April 12th. (TRY TO MAKE IT EARLIER) • Missingthisdeadlinemeansthatyoufailthecourse! • You will still beallowedtomakesmallmodificationsuntilMay 3rd

  23. ContractSpecification • Part 1: • Describethegoals, milestones (includingconcretedeliverydate) • Changes after thisdatearepossible, but only upon negotiationwithus • Part 2: • Time management (howmuch time didyouinvestwhen) • Updated frequently

  24. ContractSpecification • Describestasks and goals • Differbetween MUST, SHOULD, and CAN • Describethemilestones • Whattoachieve? • Whentoachieve?

  25. ExpectedDeliverables • Source codesofimplementedprotocols • Shouldworkasrequired • Resultsofprotocolsevaluationandtesting • Documentation • ContractSpecificationDocument • Reports for each packets including: description of the protocols, justification of implementation choices, evaluationand implementation results • Final thesis

  26. Presentation • All thesedeliverablesare due end ofFebruary 2020 • In addition, a final presentationneedstobegivenaroundthis time • Presentation also impactsthe grade

  27. Advises • Regular meetings • Report yourresults • Each 1st dayof a month, weexpect a short (10 lines) writtenfeedbackaboutthestatus • Start early and intensively • Broad experiences confirm, that this way of performing the project reduces your overall time and stress because you get more feedback and better marks.

  28. We Are HereTo Help You • Youare not alone! • Weareboth: purchaser and supervisor • Contactusassoonaspossibleifproblemsshowup

More Related