Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CTM

2019

Identifying optical turbulence profiles for realistic tomographic error in adaptive optics

Autores
Farley, OJD; Osborn, J; Morris, T; Fusco, T; Neichel, B; Correia, C; Wilson, RW;

Publicação
MONTHLY NOTICES OF THE ROYAL ASTRONOMICAL SOCIETY

Abstract
For extremely large telescopes, adaptive optics will be required to correct the Earth’s turbulent atmosphere. The performance of tomographic adaptive optics is strongly dependent on the vertical distribution (profile) of this turbulence. An important way in which this manifests is the tomographic error, arising from imperfect measurement and reconstruction of the turbulent phase at altitude. Conventionally, a small number of reference profiles are used to obtain this error in simulation; however these profiles are not constructed to be representative in terms of tomographic error. It is therefore unknown whether these simulations are providing realistic performance estimates. Here, we employ analytical adaptive optics simulation that drastically reduces computation times to compute tomographic error for 10 691 measurements of the turbulence profile gathered by the Stereo-SCIDAR instrument at ESO Paranal. We assess for the first time the impact of the profile on tomographic error in a statistical manner. We find, in agreement with previous work, that the tomographic error is most directly linked with the distribution of turbulence into discrete, stratified layers. Reference profiles are found to provide mostly higher tomographic error than expected, which we attribute to the fact that these profiles are primarily composed of averages of many measurements resulting in unrealistic, continuous distributions of turbulence. We propose that a representative profile should be defined with respect to a particular system, and that as such simulations with a large statistical sample of profiles must be an important step in the design process.

2019

Key Distribution Protocol for Industrial Internet of Things Without Implicit Certificates

Autores
Eldefrawy, MH; Pereira, N; Gidlund, M;

Publicação
IEEE INTERNET OF THINGS JOURNAL

Abstract
The deployment of the Internet of Things (IoT) in industry, called the Industrial IoT (IIoT), is supporting the introduction of very desirable improvements, such as increasing production flexibility, self-organization, and real-time and quick response to events. However, security and privacy challenges are still to be well addressed. The IIoT requires different properties to achieve secure and reliable systems and these requirements create extra challenges considering the limited processing and communication power available to IIoT field devices. In this research article, we present a key distribution protocol for IIoT that is computationally and communicationally lightweight (requires a single message exchange) and handles node addition and revocation, as well as fast rekeying. The scheme can also resist the consequences of node capture attacks (we assume that captured nodes can be detected by the gateway and previous works have shown this assumption to be acceptable in practice), server impersonation attacks and provides forward/backward secrecy. We show formally the correctness of our protocol and evaluate its energy consumption under realistic scenarios using a real embedded platform compared to previous state-of-theart key-exchange protocols, to show our protocol reliability for IIoT.

2019

Security Risk Analysis of LoRaWAN and Future Directions

Autores
Butun, I; Pereira, N; Gidlund, M;

Publicação
FUTURE INTERNET

Abstract
LoRa (along with its upper layers definition-LoRaWAN) is one of the most promising Low Power Wide Area Network (LPWAN) technologies for implementing Internet of Things (IoT)-based applications. Although being a popular technology, several works in the literature have revealed vulnerabilities and risks regarding the security of LoRaWAN v1.0 (the official 1st specification draft). The LoRa-Alliance has built upon these findings and introduced several improvements in the security and architecture of LoRa. The result of these efforts resulted in LoRaWAN v1.1, released on 11 October 2017. This work aims at reviewing and clarifying the security aspects of LoRaWAN v1.1. By following ETSI guidelines, we provide a comprehensive Security Risk Analysis of the protocol and discuss several remedies to the security risks described. A threat catalog is presented, along with discussions and analysis in view of the scale, impact, and likelihood of each threat. To the best of the authors' knowledge, this work is one of the first of its kind, by providing a detailed security risk analysis related to the latest version of LoRaWAN. Our analysis highlights important practical threats, such as end-device physical capture, rogue gateway and self-replay, which require particular attention by developers and organizations implementing LoRa networks.

2019

Formal security analysis of LoRaWAN

Autores
Eldefrawy, M; Butun, I; Pereira, N; Gidlund, M;

Publicação
COMPUTER NETWORKS

Abstract
Recent Low Power Wide Area Networks (LPWAN) protocols are receiving increased attention from industry and academia to offer accessibility for Internet of Things (IoT) connected remote sensors and actuators. In this work, we present a formal study of LoRaWAN security, an increasingly popular technology, which defines the structure and operation of LPWAN networks based on the LoRa physical layer. There are previously known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements, some already incorporated into the latest protocol specification. Our analysis of LoRaWAN security uses Scyther, a formal security analysis tool and focuses on the key exchange portion of versions 1.0 (released in 2015) and 1.1 (the latest, released in 2017). For version 1.0, which is still the most widely deployed version of LoRaWAN, we show that our formal model allowed to uncover weaknesses that can be related to previously reported vulnerabilities. Our model did not find weaknesses in the latest version of the protocol (v1.1), and we discuss what this means in practice for the security of LoRaWAN as well as important aspects of our model and tools employed that should be considered. The Scyther model developed provides realistic models for LoRaWAN v1.0 and v1.1 that can be used and extended to formally analyze, inspect, and explore the security features of the protocols. This, in turn, can clarify the methodology for achieving secrecy, integrity, and authentication for designers and developers interested in these LPWAN standards. We believe that our model and discussion of the protocols security properties are beneficial for both researchers and practitioners. To the best of our knowledge, this is the first work that presents a formal security analysis of LoRaWAN.

2019

Improving Quality-of-Service in LoRa Low-Power Wide-Area Networks through Optimized Radio Resource Management

Autores
Sallum, E; Pereira, N; Alves, M; Santos, MM;

Publicação

Abstract
Low Power Wide Area Networks (LPWAN) enable a growing number of Internet-of-Things (IoT) applications with large geographical coverage, low bit-rate, and long lifetime requirements. LoRa (Long Range) is a well-known LPWAN technology that uses a proprietary Chirp Spread Spectrum (CSS) physical layer, while the upper layers are defined by an open standard - LoRaWAN. In this paper, we propose a simple yet effective method to improve the Quality-of-Service (QoS) of LoRa networks by fine-tuning specific radio parameters. Through a Mixed Integer Linear Programming (MILP) problem formulation, we find optimal settings for the Spreading Factor (SF) and Carrier Frequency (CF) radio parameters, considering the network traffic specifications as a whole, to improve the Data Extraction Rate (DER) and to reduce the packet collision rate and the energy consumption in LoRa networks. The effectiveness of the optimization procedure is demonstrated by simulations, using LoRaSim for different network scales. In relation to the traditional LoRa radio parameter assignment policies, our solution leads to an average increase of 6% in DER, and a number of collisions 13 times smaller. In comparison to networks with dynamic radio parameter assignment policies, there is an increase of 5%, 2.8%, and 2% of DER, and a number of collisions 11, 7.8 and 2.5 times smaller than equal-distribution, Tiurlikova's (SoTa), and random distribution, respectively. Regarding the network energy consumption metric, the proposed optimization obtained an average consumption similar to Tiurlikova's, and 2.8 times lower than the equal-distribution and random dynamic allocation policies. Furthermore, we approach the practical aspects of how to implement and integrate the optimization mechanism proposed in LoRa, guaranteeing backward compatibility with the standard protocol.

2019

Improving Quality-of-Service in LoRa Low-Power Wide-Area Networks through Optimized Radio Resource Management

Autores
Sallum, E; Pereira, N; Alves, M; Santos, M;

Publicação

Abstract
Low Power Wide Area Networks (LPWAN) enable a growing number of Internet-of-Things (IoT) applications with large geographical coverage, low bit-rate and long lifetime requirements. LoRa (Long Range) is a well-known LPWAN technology which uses a proprietary Chirp Spread Spectrum (CSS) physical layer, while the upper layers are defined by an open standard - LoRaWAN. In this paper, we propose a simple yet effective method to improve the Quality-of-Service (QoS) of LoRa networks by fine-tuning specific radio parameters. Through a Mixed Integer Linear Programming (MILP) problem formulation, we find optimal settings for the Spreading Factor (SF) and Carrier Frequency (CF) radio parameters, considering the network traffic specifications as a whole, to improve the Data Extraction Rate (DER) and to reduce the packet collision rate and the energy consumption in LoRa networks. The effectiveness of the optimization procedure is demonstrated by simulations, considering realistic scenarios. In relation to the traditional LoRa radio parameter assignment policies, our solution leads to an average increase of 30% in DER, and a number of collisions 17 times smaller. In comparison to networks with dynamic radio parameter assignment policies, there is an increase of 10.5% and 4% of DER, and a number of collisions 13.5 and 7.5 times smaller than equal-distribution and random distribution, respectively. Regarding the network energy consumption metric, the proposed optimization obtained an average consumption 3.6 and 2.74 times lower than the equal-distribution and random dynamic allocation policies, respectively. Furthermore, we approach the practical aspects on how to implement and integrate the optimization mechanism proposed in LoRa, guaranteeing backward compatibility with the standard protocol.

  • 173
  • 381