MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing & Notification
Dependencies: MaximInterface mbed
The MAXREFDES143# is an Internet of Things (IoT) embedded security reference design, built to protect an industrial sensing node by means of authentication and notification to a web server. The hardware includes a peripheral module representing a protected sensor node monitoring operating temperature and remaining life of a filter (simulated through ambient light sensing) and an mbed shield representing a controller node responsible for monitoring one or more sensor nodes. The design is hierarchical with each controller node communicating data from connected sensor nodes to a web server that maintains a centralized log and dispatches notifications as necessary. The mbed shield contains a Wi-Fi module, a DS2465 coprocessor with 1-Wire® master function, an LCD, LEDs, and pushbuttons. The protected sensor node contains a DS28E15 authenticator, a DS7505 temperature sensor, and a MAX44009 light sensor. The mbed shield communicates to a web server by the onboard Wi-Fi module and to the protected sensor node with I2C and 1-Wire. The MAXREFDES143# is equipped with a standard shield connector for immediate testing using an mbed board such as the MAX32600MBED#. The simplicity of this design enables rapid integration into any star-topology IoT network requiring the heightened security with low overhead provided by the SHA-256 symmetric-key algorithm.
More information about the MAXREFDES143# is available on the Maxim Integrated website.
Diff: SensorNode.cpp
- Revision:
- 18:6fbf7e7b6ab6
- Parent:
- 17:41be4896ed6d
- Child:
- 20:cdba71cb5506
diff -r 41be4896ed6d -r 6fbf7e7b6ab6 SensorNode.cpp
--- a/SensorNode.cpp Thu Jul 21 11:06:13 2016 -0500
+++ b/SensorNode.cpp Wed Aug 10 08:19:00 2016 -0500
@@ -62,7 +62,7 @@
}
SensorNode::SensorNode(mbed::I2C & i2c, uint8_t ds7505_i2c_addr, uint8_t max44009_i2c_addr, DS2465 & ds2465)
- : m_initialLux(1),ds2465(ds2465), selector(ds2465), ds28e15_22_25(selector), ds7505(i2c, ds7505_i2c_addr), max44009(i2c, max44009_i2c_addr)
+ : m_initialLux(1),ds2465(ds2465), selector(ds2465), ds28e15(selector), ds7505(i2c, ds7505_i2c_addr), max44009(i2c, max44009_i2c_addr)
{
if (!rngInitialized)
{
@@ -88,7 +88,7 @@
// Calculate secret
if (result)
{
- result = (DS28E15_22_25::computeNextSecret(ds2465, pageData, authData.pageNum, scratchpad, ds28e15_22_25.romId(), ds28e15_22_25.manId()) == ISha256MacCoproc::Success);
+ result = (DS28E15_22_25::computeNextSecret(ds2465, pageData, authData.pageNum, scratchpad, ds28e15.romId(), ds28e15.manId()) == ISha256MacCoproc::Success);
}
return result;
}
@@ -99,12 +99,12 @@
bool result;
- result = (ds28e15_22_25.readBlockProtection(0, protectionStatus) == OneWireSlave::Success);
+ result = (ds28e15.readBlockProtection(0, protectionStatus) == OneWireSlave::Success);
if (result)
{
if (!protectionStatus.noProtection())
{
- result = (ds28e15_22_25.readSegment(authData.pageNum, authData.segmentNum, authData.segment) == OneWireSlave::Success);
+ result = (ds28e15.readSegment(authData.pageNum, authData.segmentNum, authData.segment) == OneWireSlave::Success);
if (result)
provisioned = true;
}
@@ -122,7 +122,7 @@
DS28E15_22_25::Page pageData;
// Read page data
- if (ds28e15_22_25.readPage(authData.pageNum, pageData, false) != OneWireSlave::Success)
+ if (ds28e15.readPage(authData.pageNum, pageData, false) != OneWireSlave::Success)
return false;
// Create random challenge
@@ -142,15 +142,15 @@
}
// Write challenge to scratchpad
- if (ds28e15_22_25.writeScratchpad(challenge) != OneWireSlave::Success)
+ if (ds28e15.writeScratchpad(challenge) != OneWireSlave::Success)
return false;
// Have device compute MAC
DS28E15_22_25::Mac nodeMac;
- if (ds28e15_22_25.computeReadPageMac(0, false, nodeMac) != OneWireSlave::Success)
+ if (ds28e15.computeReadPageMac(0, false, nodeMac) != OneWireSlave::Success)
return false;
// Compute expected MAC
DS28E15_22_25::Mac controllerMac;
- if (DS28E15_22_25::computeAuthMac(ds2465, pageData, authData.pageNum, challenge, ds28e15_22_25.romId(), ds28e15_22_25.manId(), controllerMac) != ISha256MacCoproc::Success)
+ if (DS28E15_22_25::computeAuthMac(ds2465, pageData, authData.pageNum, challenge, ds28e15.romId(), ds28e15.manId(), controllerMac) != ISha256MacCoproc::Success)
return false;
// Check if authentic
return (nodeMac == controllerMac);
@@ -194,7 +194,7 @@
AuthData oldAuthData(authData);
authData.filterLife = sensorData.filterLife;
// Write new filter life to DS28E15
- result = (ds28e15_22_25.writeAuthSegment(ds2465, authData.pageNum, authData.segmentNum, authData.segment, oldAuthData.segment, false) == OneWireSlave::Success);
+ result = (ds28e15.writeAuthSegment(ds2465, authData.pageNum, authData.segmentNum, authData.segment, oldAuthData.segment, false) == OneWireSlave::Success);
}
return result;
@@ -209,7 +209,7 @@
RomId romId;
if (OWReadRom(ds2465, romId) != OneWireMaster::Success)
return UnableToCommunicate;
- ds28e15_22_25.setRomId(romId);
+ ds28e15.setRomId(romId);
if (!checkProvisioned(provisioned))
return UnableToCommunicate;
MAXREFDES143#: DeepCover Embedded Security in IoT Authenticated Sensing & Notification