MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing & Notification
Dependencies: MaximInterface mbed
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
More information about the MAXREFDES143# is available on the Maxim Integrated website.
Diff: Factory.cpp
- Revision:
- 8:594529956266
- Parent:
- 7:e24f0b29f1f7
- Child:
- 9:bc3d211d75ce
diff -r e24f0b29f1f7 -r 594529956266 Factory.cpp
--- a/Factory.cpp Fri May 13 14:54:04 2016 -0500
+++ b/Factory.cpp Sat May 14 14:28:31 2016 -0500
@@ -34,15 +34,13 @@
#include "Factory.hpp"
#include "SensorNode.hpp"
#include "common.hpp"
+#include "RomCommands.h"
#include "Masters/DS2465/DS2465.h"
#include "Authenticators/DS28E15_22_25/DS28E15_22_25.h"
#include "wait_api.h"
-using OneWire::Masters::OneWireMaster;
-using OneWire::Masters::DS2465;
-using OneWire::OneWireSlave;
-using OneWire::Authenticators::DS28E15_22_25;
-using OneWire::Authenticators::ISha256MacCoproc;
+using namespace OneWire;
+using namespace OneWire::RomCommands;
const uint8_t Factory::masterSecret[] = { 0x11, 0x12, 0x13, 0x14, 0x15, 0x16, 0x17, 0x18, 0x19, 0x1A, 0x1B, 0x1C, 0x1D, 0x1E, 0x1F, 0x21,
0x22, 0x23, 0x24, 0x25, 0x26, 0x27, 0x28, 0x29, 0x2A, 0x2B, 0x2C, 0x2D, 0x2E, 0x2F, 0x31, 0x32 };
@@ -82,7 +80,7 @@
DS28E15_22_25::BlockProtection protectionStatus;
bool result;
// Select device through Skip ROM
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
if (result)
result = (sensorNode.ds28e15_22_25.readBlockProtection(blockNum, protectionStatus) == OneWireSlave::Success);
// Check if invalid protections are set
@@ -90,13 +88,13 @@
result = ((protectionStatus.statusByte() & ~(desiredProtection.statusByte())) == 0x00);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Load secret into scratchpad
if (result)
result = (sensorNode.ds28e15_22_25.writeScratchpad(validSecret ? masterSecret : invalidMasterSecret) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Load master secret from scratchpad without locking
if (result)
result = (sensorNode.ds28e15_22_25.loadSecret(false) == OneWireSlave::Success);
@@ -112,19 +110,19 @@
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Read page data
if (result)
result = (sensorNode.ds28e15_22_25.readPage(sensorNode.authData.pageNum, pageData, false) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Load partial secret into scratchpad
if (result)
result = (sensorNode.ds28e15_22_25.writeScratchpad(partialSecret) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Compute secret
if (result)
result = (sensorNode.ds28e15_22_25.computeSecret(sensorNode.authData.pageNum, false) == OneWireSlave::Success);
@@ -133,13 +131,13 @@
result = (DS28E15_22_25::computeNextSecret(sensorNode.ds2465, pageData, sensorNode.authData.pageNum, partialSecret, sensorNode.ds28e15_22_25.romId, sensorNode.ds28e15_22_25.manId) == ISha256MacCoproc::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Enable authentication protection if not set
if (result && (protectionStatus != desiredProtection))
result = (sensorNode.ds28e15_22_25.writeAuthBlockProtection(sensorNode.ds2465, desiredProtection, protectionStatus) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Write initial filter life and set all other segments to default value
if (result)
{
@@ -147,7 +145,7 @@
std::memset(blankSegment, SensorNode::defaultPaddingByte, blankSegment.length);
for (size_t i = 0; i < DS28E15_22_25::segmentsPerPage; i++)
{
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
if (result)
result = (sensorNode.ds28e15_22_25.writeAuthSegment(sensorNode.ds2465, sensorNode.authData.pageNum, i,
((i == sensorNode.authData.segmentNum) ? sensorNode.authData.segment : blankSegment),
@@ -161,31 +159,31 @@
// Reload secret with known page values
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Load master secret into scratchpad
if (result)
result = (sensorNode.ds28e15_22_25.writeScratchpad(masterSecret) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Load master secret
if (result)
result = (sensorNode.ds28e15_22_25.loadSecret(false) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Read page data
if (result)
result = (sensorNode.ds28e15_22_25.readPage(sensorNode.authData.pageNum, pageData, false) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Write partial secret to scratchpad
if (result)
result = (sensorNode.ds28e15_22_25.writeScratchpad(partialSecret) == OneWireSlave::Success);
// Select device through Skip ROM
if (result)
- result = (sensorNode.ds2465.OWSkipRom() == OneWireMaster::Success);
+ result = (OWSkipRom(sensorNode.ds2465) == OneWireMaster::Success);
// Compute secret
if (result)
result = (sensorNode.ds28e15_22_25.computeSecret(sensorNode.authData.pageNum, false) == OneWireSlave::Success);
MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing & Notification