Secure and Efficient Wireless Sensor Network (SecureWSN)
Today a growing number of applications within the Internet of Things (IoT) depends on data collected by wireless sensor networks. The individual nodes of these networks have severe resource limitations, concerning storage, processing, and transmission capabilities, but also concerning energy available for communication functions. Supporting the required protocol functionality in combination with the goal of energy-saving operation typically results in the development of proprietary, highly specialized communication protocols for wireless sensor networks (WSN).
However, with Internet technology as the dominating communication paradigm for a wide range of application areas, it became an attractive goal to be able to use Internet protocols (IP) within WSNs. The idea itself is interesting but at the same time challenging, because the commonly used devices in WSNs are very constraint in memory, computational capacity, and power. The most challenging constraints are the first two if more than only data collection and sending should be performed by the devices. RFC 7228 groups the devices into classes depending on their RAM and ROM resources and points out that only devices with more than 10 KB RAM and 100 KB ROM are able to support Internet connectivity and security functions. The latter becomes essential due to the linkage of WSNs to the Internet and the raising concerns of privacy and security by the users, because any kind of collected data includes sensitive information (e.g., ID, address). Thus, WSN solutions must support security solutions beyond efficient data transmission.
The project SecureWSN faces those challenges and develops different solutions for secure and efficient data transmission for WSNs consisting of devices between 10-50 KB RAM and 100-250 KB ROM.
Due to my employment at CSG@UZH a parallel site is available here.
History of SecureWSN
SecureWSN started in 2008 with the development of an efficient data transmission protocol. Messages within a WSN have in common that they include meta information and measured values at the same time, and are send automatically in a predefined interval. Due to the fact that the message size is very limited (around 102 bytes on MAC layer using IEEE 802.15.4 radio) and costs energy it needs to be efficient. Thus, the PUSH-based Internet Protocol Flow Information Export (IPFIX) protocol from IP networks standardized in RFC 5101 becomes interesting due to its template-based design. In general IPFIX splits messages into Template and Data Records. Template Records include meta information and Data Records the corresponding values. A drawback of IPFIX is the introduction of additional IPFIX headers with around 20 byte size. IPFIX can be used for WSNs in a light-weighted solution together with header compression. TinyIPFIX is the resulting protocol for WSNs including header compression to compress the additional headers down to 3 bytes and reducing redundancy by the re-sending of meta information in each message. The principle is the following: (1) Device boots. (2) Device announces its meta information to the network by sending out a Template Record with unique ID. The Template Record is stored by nodes in the networks (e.g., gateway, aggregator) that need to perform decoding of data (e.g., for aggregation). (3) Now device sends only out Data Records with a reference to the Template Record for decoding purposes. Due to the usage of UDP and especially quick changing topology in the beginning of the WSN establishment the Template Record is re-send periodically. To make proper use of the limited message size TinyIPFIX was extended with aggregation functionality. It can support message aggregation and data aggregation at the same time. The latter is useful in scenarios where pre-processing of data is needed (e.g., control of HVAC system). In order to modify the aggregation type and degree during run-time a SHELL was developed allowing the user to access an aggregator and change the functionality (e.g., MIN, MAX, AVG, degree of aggregation).
In a next step of development SecureWSN faced the security request by the users. Therefore, different security solution where designed and implemented keeping the device resources in mind as well as the idea to re-use standards from IP networks. At the moment SecureWSN supports three security option that have authentication, session key agreement, and being standard-based in common. The TinySAM protocol is a solution developed for devices with 10 KB RAM and max. 100 KB ROM. It offers one-way authentication and works with pre-shared keys. A more secure solution is the developed TinyTO protocol performing the Bellare-Canetti-Krawczyk (BCK) handshake with pre-shared keys resulting in two-way authentication. It uses Elliptic Curve Cryptography (ECC) for key generation, key signatures, and encryption. Where the used 192-bit ECC keys are assumed to be as secure as 1024-2048 bit RSA keys. For devices with more resources the TinyDTLS protocol was designed performing a common DTLS handshake using X.509 certificates and supporting two-way authentication.
Beyond the secure and efficient data transmission protocols a graphical user interface (GUI) was design in SecureWSN. Today the users prefer to configure and manage networks in handsome ways usually using buttons. Therefore, the CoMaDa framework was designed, allowing the user to configure, manage, and handling data using an intuitive GUI. CoMaDa works with a virtualization of the deployed WSN and has connection to the deployment via the gateway. The user can program new devices and update running ones, can view the network status, can define how collected data is handled (e.g., stored or forwarded to analysis tools), and receives a visualization of data in raw format and in curve design. The newest feature is to provide filtering options for network owners addressing the transparency request of users to stay in controll of their data and to know who accessed when the data, as well as which priviledges were granted including to whom and when. The only requirement for CoMaDa is that the user sits directly before his PC, which is connected to the gateway of the WSN. This is a contradiction to the mobility requirement of the user. Thus, WebMaDa was developed and included into CoMaDa. WebMaDa is a Web-based mobile access and data handling framework allowing authorized users to publish their own WSN data online, and grant authorized users (e.g., security firm, fire department) access to the data. Additionally, WebMaDa supports pull requests allowing authorized users to reuqest sensor data independent on the pre-set intervalls used for push process. The pull requests become essential when thinking of emergency requests. Due to limited resources on the sensor node itself, the sensor node answers with a complete data set to the pull request that is filtered based on the set rights of the authorized pull requestor on the CoMaDa part before displaying the measurements on WebMaDa. In order to address the transparency request for network owners filtering options where here includes as well similar to the CoMaDa instance. The newest feature is the support of automated handling of requests (e.g., priviledge granting, passwort reset) to overcome the existing delay occuring when an administrator is required to forward communication between network owners and requestors.
More details about features supported by the components can be found further below.
Topics of Future Research Interest
Contact me and talk about your interests! I am sure there are other topics that fit into the scope of SecureWSN than the ones listed here:
- Linkage of other sensor networks using different operating systems and hardware to CoMaDa and WebMaDa
- Implementation of security solutions
- Optimization of system lifetime using energy harvesting mechanisms
- Extension of visualization mechanisms
- Establishment of bidirectional communication (e.g., for updating purposes of intervals)
- Optimizing CoMaDa and WebMaDa including security features and performance issues
Overview of Deployed Network and Supported Functionalities
The figure above illustrates the cooperation between all components in the established wireless sensor network (status 10/2016):
- CoMaDa represents the server side of the network. It shows the data flow within the interface and the offered functionalities including hardware configuration, management of the network components, network status and data visualization, and information storage. Additionally, CoMaDa includes an Export/Import Client for Matlab and a secured connection to Xively (a third party to visualize data) and WebMaDa. Since 2016 the visualization of the collected data can be performed without active involvement of a third party, like Xively, using now Google Charts. This change results in the fact that no data leaves the control area of the data owner. The newest feature addresses the transparency request of network owner to see who accessed what kind of data in active manner supported by detailed filtering options.
- WebMaDa is a mobile interface offering visualization of data and network topology for authorized users access their WSN information via the Internet. Additionally, WebMaDa now allows authorized users to send pull-request in order to receive sensor measurements immediately. On the upper left side of the figure the available views for a user - claudio - are shown who is a user of WebMaDa and has the right to send pull-requests. In order to ensure that ony authorized persons can use WebMaDa a database server is required that hosts the access management solution. The newest feature addresses the transparency request of network owner to see who accessed what kind of data in active manner supported by detailed filtering options.
- On the bottom left part a room scenario as a zoom-in example for the WSN is illustrated. The deployed sensor nodes use TinyIPFIX for data transmission purpose throughout the network up to the gateway. Within the WSN some sensor nodes, usually with more resources, support special functionalities, such as data/message aggregation. The cluster head (grey ball) is a special node - called OPAL - including a trusted platform module and allows a strong two-way authentication handshake in order to establish a DTLS secured communication channel to the gateway. It works as a TinyDTLS client and requires X.509 certificate for authentication purposes to build an end-to-end secured tunnel with the gateway. OPAL node also supports aggregation functionality in order to transmit more data over a secured connection to the gateway. Sensor nodes not bind to a OPAL node transmitting their data over UDP to the gateway. In order to bring security to lower devices than OPAL TinySAM and TinyTO are used. Where the latter is an end-to-end solution using Elliptic Curve Cryptography.
- The TinyDTLS server runs on the CoMaDa component for creating X.509 certificates and includes a self-managed Certificate Authority. Those components can also be hosted on external servers if needed.
People Supporting SecureWSN and further research around IoT - It is/was a pleasure working with you!
Active - Communication Systems Group, Department of Informatics, University of Zurich (Switzerland)
- YOU - We are looking for support!
- Madeleine von Heyl (BA) - ECC-based Security Solution for Contiki-based Sensor Networks
- Severin Sieffert (BA) - Secure Data Transmission in Contiki-based Constrained Networks Offering Mututal Authentication
Alumni - Communication Systems Group, Department of Informatics, University of Zurich (Switzerland)
- Claudio Anliker (MA) - Secure Pull Request Development for TinyIPFIX in Wireless Sensor Network
- Michael Balmer (BA) - Security, Privacy, and Transparency Improvements of CoMaDa
- Michael Balmer (VA) - CoMaDa Extension Addressing Transparency Request for Data Owners
- Dominik Buenzli (BA) - Efficient and User-friendly Handling of Access Requests in WebMaDa
- Matthias Diez (MA) - Secure Position Data Transmission for Object Tracking using LoRaWAN
- Michael Keller (MA) - Design and Development of a Mobile App to Monitor Active Wireless Sensor Networks under Authorized Access Rules
- Jan Meier (MA) - Design, Implementation, and Evaluation of an Object Tracking Motion Detection System
- Michael Meister (BA) - Data Gathering in Wireless Sensor Networks using IPFIX under Contiki
- Stefan Mussato (VA) - Guideline for Mapping Security Solutions of Wireless Sensor Networks to Security Fundamentals
- Martin Noack (MA) - Optimization of Two-way Authentication Protocol in Internet of Things
- Christian Ott (VA) - Database Solution for Sensor Data with Authorized Data Access Solution
- Christian Ott (SA) - Modular ADCP Parser
- Christian Ott (BA) - Design and Implementation of a Module Framework for Sensor Data Management
- Sebastian Pinegger (VA) - Integration of Contiki Support in CoMaDa-GUI
- Livio Sgier (CSI) - TinyIPFIX Aggregation in Contiki
- Livio Sgier (SP) - Optimization of TinyIPFIX Implementation in Contiki and Realtime Visualization of Data
- Neva Silvestri (VA) - WebMaDa Extension Addressing Transparency Request for Data Owners
- Tim Strasser (VA) - Offline Method for Graphical Visualization of Sensor Data
- Niko Van Wyk (FA) - Classification and Analysis of Security Protocols and Algo- rithms for Constrained Networks
Alumni - Cair for Network Architecture and Services, Computer Science, Technische Universität München (Germany)
- Benjamin Ertl (BA): Data Aggregation using TinyIPFIX
- Andre Freitag (BA, Hiwi-activity): Framework Development for WSNs facing Configuration and Information Exchange/Export Tasks (CoMaDa)
- Thomas Kothmayr (Hiwi-activity): TinyIPFIX support
- Thomas Kothmayr (BA): Data collection in WSNs for Autonomic Home Networks
- Thomas Kothmayr (MA): Adaption of DTLS for a Cluster-based Security Protocol in Wireless Sensor Networks
- Christian Liedl (ZA, BA): Security analysis for very constrainted objects
- Philipp Lowack (MA): Key Management and Secure Data Aggregation in Wireless Sensor Networks
- Andreas Schaumeier (BA): Secure Communication in WSN
- Matti Strese (Hiwi-activity): Driver development for AutHoNe interface
- Lukas Tillmann (BA): Communication Standards in WSNs
- Tsvetko Tsvetkov (BA): Performance Evaluation of Routing Protocols in Wireless Sensor Networks
- Philip Wenger (BA): Bidirectional Data Querying with TinyIPFIX
- Konrad Windszus (MA): Impact of asymmetric links on the performance of routing in Wireless Sensor Networks
Demonstrator: TinyIPFIX as Data Transmission Protocol with Extensions for Aggregation and Security Support
The demonstrator runs currently with the following software under Ubuntu:
- TinyOS version 2.x
- BLIP support (using Hydro or RPL)
Supported Hardware and Functionalities
IRIS (MTS300, MTS400) from Crossbow Inc. (XBOW) running TinyOS
- Data collection - TinyIPFIX
TelosB of type CM5000-SMA from ADVANTIC SISTEMAS Y SERVICIOS S.L.
- Data collection - TinyIPFIX under TinyOS and Contiki
- Aggregation - TinyIPFIX under TinyOS
- Security support: TinyTO, TinySAM under TinyOS
OPAL from Commonwealth Scientific and Industrial Research Organisation (CSIRO) running TinyOS
- Security support: TinyDTLS
- Aggregation - TinyIPFIX
OpenMote running Contiki
- Data collection - TinyIPFIX
- Aggregation - TinyIPFIX
- Efficient data format based on standard IPFIX
- Header compression
- Support of pull requests besied periodical reporting in a push manner
- Support of message aggregation and data pre-processing
- Aggregation update in live system via UDP-Shell
- TinyDTLS - DTLS based two-way authentication solution using OPAL clusterhead supporting message aggregation
- TinySAM - Pre-shared key solution
- TinyTO - Optimized two-way authentication solution using ECC
CoMaDa - Configuration, Management, and Data Handling Framework, a Graphical User Interface for WSNs
- version 1.0: Configuration of hardware components under TinyOS, Management of network, Data Handling: Visualization and data storage
- version 1.1: Visualization of data using Google Charts instead of third party Xively
- version 1.2: Tranparency support for network owners
WebMaDa - Mobile Access and Data Handling Framework to published data via CoMaDa (here)
- version 1.0: Access management, online database storage, responsive design
- version 1.1: Pull support, updated fine-grained access management
- version 1.2: Tranparency support for network owners
- version 2.0: Automated handling of requests
Open Source Parts
Parts of SecureWSN are open source available under different licences. If you recognize any problems do not hesitate to contact me.
- CoMaDa the Graphical User Interface under MIT-Licence - Acknowledgement to Andre Freitag
- TinyIPFIX and Extensions under GPLv3 and eCos Licence - Ackowledgements to Thomas Kothmayr and Benjamin Ertl
- TinyPKC is a port of the CyaSSL implentation of RSA and ECC to TinyOS 2.x that is released under the GPLv2. - Acknowledgement to Thomas Kothmayr
SecureWSN addresses several research area where many publications exit. Thanks to all supporters that make research possible and giving good ideas for continuation of SecureWSN. Some relevant publications are listed below:
- C.Schmitt, T.Kothmayr, W.Hu, B.Stiller: Two-way Authentication for the Internet-of-Things; Internet of Things: Novel Advances and Envisioned Applications, D.P. Acharjya and M. Kalaiselvi Geetha (Eds.), Springer, New York, NY, USA, Chapter 2, pp. 27-56, May 2017
- C.Schmitt, C.Anliker, B.Stiller: Efficient and Secure Pull Requests for Emergency Cases Using a Mobile Access Framework; Managing the Web of Things: Linking the Real World to the Web, M.Sheng, Y. Qin, L. Yao, and B. Benatallah (Eds.), Morgen Kaufmann (imprint of Elsevier), Chapter 8, pp. 229-247, ISBN: 978-0-12-809764-9, February 2017
- C.Schmitt, C.Anliker, B.Stiller: Pull Support for IoT Applications Using Mobile Access Framework WebMaDa, IEEE 3rd World Forum on Internet of Things (WF-IoT 2016), Reston, VA, USA, pp. 377-382, December 2016
- C.Schmitt, T.Strasser, B.Stiller: Third-party-independent Data Visualization of Sensor Data in CoMaDa, 12th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications, New York, NY, USA, pp. 1-8, October 2016
- C.Schmitt, M.Noack, B.Stiller: TinyTO: Two-Way Authentication for Constrained Devices in the Internet of Things. Internet of Things: Principles and Paradigms, R.Buyya, A.V. Dastjerdi (Eds.), Morgan Kaufmann, Imprint of Elsevier, Cambridge, MA, USA, Chapter 13, pp. 239-258, ISBN: 978-0128053959, May 2016
- C. Schmitt, B. Stiller: Two-way Authentication for IoT. IETF Internet Draft, Standards Track, Version 02, June 2015.
- C.Schmitt, M.Keller, B.Stiller: WebMaDa: Web-based Mobile Access And Data Handling Framework for Wireless Sensor Networks, International Conference on Networked Systems (NetSys), KiVS, Cottbus (GER), March 2015.
- C. Schmitt, T. Kothmayr, B. Ertl, W. Hu, L. Braun, G. Carle: TinyIPFIX: An Efficient Application Protocol For Data Exchange In Cyber Physical Systems, Journal Computer Communications, ELSEVIER, doi: http://dx.doi.org/10.1016/j.comcom.2014.05.012, June 2014.
- T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, G. Carle: DTLS based security and two-way authentication for the Internet of Things, Journal Ad Hoc Networks, ELSEVIER, Vol. 11, Issue 8, pages 2710-2723, DOI: 10.1016/j.adhoc.2013.05.003, November 2013.
- T. Kothmayr, C. Schmitt, W. Hu, M. Brünig, G. Carle: DTLS based security and two-way authentication for the Internet of Things. Ad Hoc Networks, ELSEVIER, Vol. 11, Issue 8, pages 2710-2723, November 2013.
- C. Schmitt, A. Freitag, G. Carle: CoMaDa: An Adaptive Framework with Graphical Support for Configuration, Management, and Data Handling Tasks for Wireless Sensor Networks, 9th International Conference on Network and Service Management (CNSM), Zurich (CH), October 2013.
- C. Schmitt: Secure Data Transmission in Wireless Sensor Networks. Dissertation, Technische Universität München, Germany, ISBN: 3-937201-36-X, DOI: 10.2313/NET-2013-07-2, July 2013.
more are here