Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
»
Projects
Synergy: Collaborative: CPS-Security: End-to-End Security for the Internet of Things
View
Submitted by prabal on Mon, 04/04/2016 - 5:01pm
Project Details
Lead PI:
Dutta Prabal
Performance Period:
09/01/15
-
08/31/18
Institution(s):
University of Michigan at Ann Arbor
Sponsor(s):
National Science Foundation
Award Number:
1505684
1032 Reads. Placed 360 out of 804 NSF CPS Projects based on total reads on all related artifacts.
Abstract:
Computation is everywhere. Greeting cards have processors that play songs. Fireworks have processors for precisely timing their detonation. Computers are in engines, monitoring combustion and performance. They are in our homes, hospitals, offices, ovens, planes, trains, and automobiles. These computers, when networked, will form the Internet of Things (IoT). The resulting applications and services have the potential to be even more transformative than the World Wide Web. The security implications are enormous. Internet threats today steal credit cards. Internet threats tomorrow will disable home security systems, flood fields, and disrupt hospitals. The root problem is that these applications consist of software on tiny low-power devices and cloud servers, have difficult networking, and collect sensitive data that deserves strong cryptography, but usually written by developers who have expertise in none of these areas. The goal of the research is to make it possible for two developers to build a complete, secure, Internet of Things applications in three months. The research focuses on four important principles. The first is "distributed model view controller." A developer writes an application as a distributed pipeline of model-view-controller systems. A model specifies what data the application generates and stores, while a new abstraction called a transform specifies how data moves from one model to another. The second is "embedded-gateway-cloud." A common architecture dominates Internet of Things applications. Embedded devices communicate with a gateway over low-power wireless. The gateway processes data and communicates with cloud systems in the broader Internet. Focusing distributed model view controller on this dominant architecture constrains the problem sufficiently to make problems, such as system security, tractable. The third is "end-to-end security." Data emerges encrypted from embedded devices and can only be decrypted by end user applications. Servers can compute on encrypted data, and many parties can collaboratively compute results without learning the input. Analysis of the data processing pipeline allows the system and runtime to assert and verify security properties of the whole application. The final principle is "software-defined hardware." Because designing new embedded device hardware is time consuming, developers rely on general, overkill solutions and ignore the resulting security implications. The data processing pipeline can be compiled into a prototype hardware design and supporting software as well as test cases, diagnostics, and a debugging methodology for a developer to bring up the new device. These principles are grounded in Ravel, a software framework that the team collaborates on, jointly contributes to, and integrates into their courses and curricula on cyberphysical systems.
Related Artifacts
Presentations
Synergy: Collaborative: CPS-Security: End-to-End Security for the Internet of Things
|
Download
Publications
Privacy, Discovery, and Authentication for the Internet of Things
How to Build Static Checking Systems Using Orders of Magnitude Less Code
{Ravel: Programming IoT Applications as Distributed Models, Views, and Controllers}
{Ownership is Theft: Experiences Building an Embedded OS in Rust}
{CESEL: Securing a Mote for 20 Years}
{Beetle: Flexible Communication for Bluetooth Low Energy}
The Toastboard: Ubiquitous Instrumentation and Automated Checking of Breadboarded Circuits
Fabryq: Using Phones As Gateways to Prototype Internet of Things Applications Using Web Scripting
Drill Sergeant: Supporting Physical Construction Projects Through an Ecosystem of Augmented Tools
Enhancing Cross-Device Interaction Scripting with Interactive Illustrations
Engaging Amateurs in the Design, Fabrication, and Assembly of Electronic Devices
Fiat-Lux: Interactive Urban Lights for Combining Positive Emotion and Efficiency
Verena: End-to-End Integrity Protection for Web Applications
Embark: Securely Outsourcing Middleboxes to the Cloud
Ving: Bootstrapping the Desktop Area Network with a Vibratory Ping
PolyPoint: Guiding Indoor Quadrotors with Ultra-Wideband Localization
The Haunted House: Networking Smart Homes to Enable Casual Long-distance Social Interactions
PowerBlade: A Low-Profile, True-Power, Plug-Through Energy Meter
Browsing the Web of Things with Summon
{PolyPoint}: High-Precision Indoor Localization with {UWB}
Cinamin: A Perpetual and Nearly Invisible BLE Beacon
Harmonium: Asymmetric, Bandstitched {UWB} for Fast, Accurate, and Robust Indoor Localization
MBus: The Missing Interconnect that Enables the Module Millimeter-Scale Computing Class and Connects the World's Smallest Computers
Calibration-free network localization using non-line-of-sight ultra-wideband measurements
{Trust but Verify: Auditing Secure Internet of Things Devices}
{Robust, low-cost, auditable random number generation for embedded system security}
Opaque: An Oblivious and Encrypted Distributed Analytics Platform
MiniCrypt: Reconciling Encryption and Compression for Big Data Stores
Surnaming Schemes, Fast Verification, and Applications to {SGX} Technology
Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
Bifrost : Visualizing and Checking Behavior of Embedded Systems across Hardware and Software
Turning Coders into Makers: The Promise of Embedded Design Generation
Machine Learning for Makers: Interactive Sensor Data Classification Based on Augmented Code Examples
The Toastboard: Ubiquitous Instrumentation and Automated Checking of Breadboarded Circuits
Finding and Preventing Bugs in JavaScript Bindings
Videos
CPS-Security: Synergy: End-to-End Security for the Internet of Things
PDF version
Printer-friendly version
Architectures
CPS Technologies
Education
Internet of Things (IoT)
security