Datasets
Standard Dataset
MKR log
- Citation Author(s):
- Submitted by:
- JEAN GERALD VIN...
- Last updated:
- Sun, 08/20/2023 - 03:29
- DOI:
- 10.21227/pzg3-dp94
- Data Format:
- License:
- Categories:
- Keywords:
Abstract
In this paper, we propose a modular security approach using
a positioning security engine featuring GPS location features that can
uniquely identify the IoT user device. We propose the modular security
scheme to reinforce the security and viability of IoT-centric solutions for
various innovative applications, including IoT Mobile payment, Smart city
heterogeneous networks, communication services, safety, and locationbased services integration. To achieve our goal of securitization and
viability we target consumer IoT devices equipped with built-in locationbased GPS chips, which are vulnerable to hackers where the existing
cryptographic authentication-based protocols demand power and
computation resources required for authentication protocols is not
sufficient to carry end to end secure transaction in an IoT environment.
Therefore, to compensate this lack of environment capability to carry the
end-to-end secure transaction on IoT devices, we implement a modular
security approach method to offer the security environment the consumer
IoT devices require when emitting various radio signals. Moreover, the
implementation of our security engine has a purpose to offer optimal
security facilitated by Simple Public Key Infrastructure (SPKI) following
the Pretty Good Privacy (PGP) Web of Trust (WoT) approach. Our
implementation of the security engine on the development board Arduino
succeeded in providing and extended secure capable environment for
carrying secure transactions. Our results show 70, 80 and 90 percent
communication success between Security Engine modules with 70 percent
of successful SSL secure key exchange by every identified user in best 15
seconds simulation time for two by third round of simulation.
Step 1:
Obtain a ARduino MKR board with GSM module for Interaction with users.
Step 2:
Connect the Board and run de code MKR_GSM_SMS_Localize_20230625173648. And save the Log.
Step 3:
Store de data log in separate data plot file directory. Run de code mygnuplot.plt from your internal storage using GNU PLOT.
Documentation
Attachment | Size |
---|---|
INSTRUCTION.pdf | 111.93 KB |