MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing & Notification

Dependencies:   MaximInterface mbed

The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.

More information about the MAXREFDES143# is available on the Maxim Integrated website.

Revision:
18:6fbf7e7b6ab6
Parent:
17:41be4896ed6d
Child:
20:cdba71cb5506
--- a/SensorNode.cpp	Thu Jul 21 11:06:13 2016 -0500
+++ b/SensorNode.cpp	Wed Aug 10 08:19:00 2016 -0500
@@ -62,7 +62,7 @@
 }
 
 SensorNode::SensorNode(mbed::I2C & i2c, uint8_t ds7505_i2c_addr, uint8_t max44009_i2c_addr, DS2465 & ds2465)
-  : m_initialLux(1),ds2465(ds2465), selector(ds2465), ds28e15_22_25(selector), ds7505(i2c, ds7505_i2c_addr), max44009(i2c, max44009_i2c_addr)
+  : m_initialLux(1),ds2465(ds2465), selector(ds2465), ds28e15(selector), ds7505(i2c, ds7505_i2c_addr), max44009(i2c, max44009_i2c_addr)
 {
   if (!rngInitialized)
   {
@@ -88,7 +88,7 @@
   // Calculate secret
   if (result)
   {
-    result = (DS28E15_22_25::computeNextSecret(ds2465, pageData, authData.pageNum, scratchpad, ds28e15_22_25.romId(), ds28e15_22_25.manId()) == ISha256MacCoproc::Success);
+    result = (DS28E15_22_25::computeNextSecret(ds2465, pageData, authData.pageNum, scratchpad, ds28e15.romId(), ds28e15.manId()) == ISha256MacCoproc::Success);
   }
   return result;
 }
@@ -99,12 +99,12 @@
   bool result;
   
   
-  result = (ds28e15_22_25.readBlockProtection(0, protectionStatus) == OneWireSlave::Success);
+  result = (ds28e15.readBlockProtection(0, protectionStatus) == OneWireSlave::Success);
   if (result)
   {
     if (!protectionStatus.noProtection())
     {
-      result = (ds28e15_22_25.readSegment(authData.pageNum, authData.segmentNum, authData.segment) == OneWireSlave::Success);
+      result = (ds28e15.readSegment(authData.pageNum, authData.segmentNum, authData.segment) == OneWireSlave::Success);
       if (result)
         provisioned = true;
     }
@@ -122,7 +122,7 @@
   DS28E15_22_25::Page pageData;
   
   // Read page data
-  if (ds28e15_22_25.readPage(authData.pageNum, pageData, false) != OneWireSlave::Success)
+  if (ds28e15.readPage(authData.pageNum, pageData, false) != OneWireSlave::Success)
     return false;
   
   // Create random challenge
@@ -142,15 +142,15 @@
   }
 
   // Write challenge to scratchpad
-  if (ds28e15_22_25.writeScratchpad(challenge) != OneWireSlave::Success)
+  if (ds28e15.writeScratchpad(challenge) != OneWireSlave::Success)
     return false;
   // Have device compute MAC
   DS28E15_22_25::Mac nodeMac;
-  if (ds28e15_22_25.computeReadPageMac(0, false, nodeMac) != OneWireSlave::Success)
+  if (ds28e15.computeReadPageMac(0, false, nodeMac) != OneWireSlave::Success)
     return false;
   // Compute expected MAC
   DS28E15_22_25::Mac controllerMac;
-  if (DS28E15_22_25::computeAuthMac(ds2465, pageData, authData.pageNum, challenge, ds28e15_22_25.romId(), ds28e15_22_25.manId(), controllerMac) != ISha256MacCoproc::Success)
+  if (DS28E15_22_25::computeAuthMac(ds2465, pageData, authData.pageNum, challenge, ds28e15.romId(), ds28e15.manId(), controllerMac) != ISha256MacCoproc::Success)
     return false;
   // Check if authentic
   return (nodeMac == controllerMac);
@@ -194,7 +194,7 @@
     AuthData oldAuthData(authData);
     authData.filterLife = sensorData.filterLife;
     // Write new filter life to DS28E15
-    result = (ds28e15_22_25.writeAuthSegment(ds2465, authData.pageNum, authData.segmentNum, authData.segment, oldAuthData.segment, false) == OneWireSlave::Success);
+    result = (ds28e15.writeAuthSegment(ds2465, authData.pageNum, authData.segmentNum, authData.segment, oldAuthData.segment, false) == OneWireSlave::Success);
   }
   
   return result;
@@ -209,7 +209,7 @@
   RomId romId;
   if (OWReadRom(ds2465, romId) != OneWireMaster::Success)
     return UnableToCommunicate;
-  ds28e15_22_25.setRomId(romId);
+  ds28e15.setRomId(romId);
   
   if (!checkProvisioned(provisioned))
     return UnableToCommunicate;