Secure End-to-End IoT Connectivity

Technology Overview

IoT can assist in the integration of communications, control, and information processing across various applications. Wireless sensor network (WSN) refers to a group of spatially dispersed and dedicated smart sensors that are interconnected so that the collected environmental data can be aggregated at the gateway before they are forwarded to the backend Data Management System (DMS).

In this deployment, the gateway can access the sensor data obtained from the smart sensors before performing the aggregation. Therefore, the gateway could be compromised to manipulate and tamper with the original data. This could lead to erroneous sensor reading, data thefts, and possible data disputes. These misdemeanours affect the integrity and authenticity of the usage to provide trustworthy and reliable data collection.

The technology offer team has designed and prototyped an end-to-end data integrity protocol on a testbed to secure data aggregation for a WSN with the goal of providing data integrity and authentication.  

Technology Features & Specifications

This technology adopts the idea of chameleon hash function, where the smart sensors calculate a chameleon message hash periodically based on the previously reported data. Doing so will permit the Data Management System (DMS) to verify the integrity and authenticity of the sensors’ data sent by the gateway with reliability. An example setup uses the following:

• D-Link DSP-W215 Wi-Fi Smart Plugs
• Raspberry Pi (smart meters/concentrators)
• Wi-SUN communication module
• Desktop PC (DMS)

Potential Applications

• Smart metering systems in power grids
• Wearable technology for Telehealth & Telemedicine
• Monitoring soil & water quality in urban farming

Market Trends and Opportunities

According to Grand View Research, the IoT security market was worth $1.24 billion in 2017, but it is expected to his $9.88 billion by 2025. With the highest estimated CAGR of 35.9% by 2025, encryption solutions will be relied on for data security in IoT devices.

Customer Benefits

This technology provides a method to safeguard the integrity and authenticity of data transmitted by IoT sensors.

Make an Enquiry