MKR log

Citation Author(s):
JEAN GERALD VINCENT
ETIBOU
POLYMTL
SAMUEL
PIERRE
POLYMTL
Submitted by:
JEAN GERALD VIN...
Last updated:
Sun, 08/20/2023 - 03:29
DOI:
10.21227/pzg3-dp94
Data Format:
License:
114 Views
Categories:
Keywords:
0
0 ratings - Please login to submit your rating.

Abstract 

In this paper, we propose a modular security approach using 

a positioning security engine featuring GPS location features that can 

uniquely identify the IoT user device. We propose the modular security 

scheme to reinforce the security and viability of IoT-centric solutions for 

various innovative applications, including IoT Mobile payment, Smart city 

heterogeneous networks, communication services, safety, and locationbased services integration. To achieve our goal of securitization and 

viability we target consumer IoT devices equipped with built-in locationbased GPS chips, which are vulnerable to hackers where the existing 

cryptographic authentication-based protocols demand power and 

computation resources required for authentication protocols is not 

sufficient to carry end to end secure transaction in an IoT environment. 

Therefore, to compensate this lack of environment capability to carry the 

end-to-end secure transaction on IoT devices, we implement a modular 

security approach method to offer the security environment the consumer 

IoT devices require when emitting various radio signals. Moreover, the 

implementation of our security engine has a purpose to offer optimal 

security facilitated by Simple Public Key Infrastructure (SPKI) following 

the Pretty Good Privacy (PGP) Web of Trust (WoT) approach. Our 

implementation of the security engine on the development board Arduino 

succeeded in providing and extended secure capable environment for 

carrying secure transactions. Our results show 70, 80 and 90 percent 

communication success between Security Engine modules with 70 percent 

of successful SSL secure key exchange by every identified user in best 15 

seconds simulation time for two by third round of simulation. 

Instructions: 

Step 1:

Obtain a ARduino MKR board with GSM module for Interaction with users.

Step 2:

Connect the Board and run de code MKR_GSM_SMS_Localize_20230625173648. And save the Log.

Step 3:

Store de data log in separate data plot file directory. Run de code mygnuplot.plt from your internal storage using GNU PLOT.

 

Funding Agency: 
Natural Resource and Engineering Research Council of Canada