Abstract
The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive from this technology, such as medical or industrial applications. However, just like any other technology, security is a huge concern. Given its distributed architecture and its processing limitations, programmable matter cannot handle the traditional security protocols and encryption algorithms. This article proposes a new security protocol optimized and dedicated for IoT programmable matter. This protocol is based on lightweight cryptography and uses the same encryption protocol as a hashing function while keeping the distributed architecture in mind. The analysis and simulation results show the efficiency of the proposed method and that a supercomputer will need about 5.93 × 1025 years to decrypt the message.
- Hossein Ahmadzadeh and Ellips Masehian. 2015. Modular robotic systems: Methods and algorithms for abstraction, planning, control, and synchronization. Artif. Intell. 223 (2015), 27--64.Google Scholar
Digital Library
- Hossein Ahmadzadeh, Ellips Masehian, and Masoud Asadpour. 2016. Modular robotic systems: Characteristics and applications. J. Intell. Robot. Syst. 81, 3–4 (Mar. 2016), 317--357. DOI:https://doi.org/10.1007/s10846-015-0237-8Google Scholar
Digital Library
- Ahmet Arış, Sema F. Oktuğ, and Sıddıka Berna Örs Yalçın. 2015. Internet-of-things security: Denial of service attacks. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU’15). IEEE, 903--906.Google Scholar
Cross Ref
- Joseph Assaker, Abdallah Makhoul, Julien Bourgeois1, and Jacques Demerjian. 2020. A unique identifier assignment method for distributed modular robots. In Proceedings of the 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’20). IEEE.Google Scholar
Cross Ref
- Jacques M. Bahi, Christophe Guyeux, and Abdallah Makhoul. 2010. Secure data aggregation in wireless sensor networks: Homomorphism versus watermarking approach. In Proceedings of the International Conference on Ad Hoc Networks. Springer, 344--358.Google Scholar
Cross Ref
- Jad Bassil, Mohamad Moussa, Abdallah Makhoul, Benoît Piranda, and Julien Bourgeois. 2020. Linear distributed clustering algorithm for modular robots BasedProgrammable matter. In Proceedings of the 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’20). IEEE.Google Scholar
Digital Library
- Isha Bhardwaj, Ajay Kumar, and Manu Bansal. 2017. A review on lightweight cryptography algorithms for data security and authentication in IoTs. In Proceedings of the 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC’17). IEEE, 504--509.Google Scholar
Cross Ref
- Alex Biryukov and Léo Paul Perrin. 2017. State of the art in lightweight symmetric cryptography. (2017).Google Scholar
- John Black, Phillip Rogaway, and Thomas Shrimpton. 2002. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Proceedings of the Annual International Cryptology Conference. Springer, 320--335.Google Scholar
Cross Ref
- Andrey Bogdanov, Miroslav Knežević, Gregor Leander, Deniz Toz, Kerem Varıcı, and Ingrid Verbauwhede. 2011. SPONGENT: A lightweight hash function. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 312--325.Google Scholar
Cross Ref
- Zoran Cekerevac, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. 2017. Internet of things and the man-in-the-middle attacks–security and economic risks. MEST J. 5, 2 (2017), 15--25.Google Scholar
Cross Ref
- Zahra Derakhshandeh. 2017. Algorithmic Foundations of Self-Organizing Programmable Matter. Ph.D. Dissertation. Arizona State University.Google Scholar
- Zahra Derakhshandeh, Robert Gmyr, Andréa W. Richa, Christian Scheideler, and Thim Strothmann. 2016. Universal shape formation for programmable matter. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. ACM, 289--299.Google Scholar
Digital Library
- ECRYPT Francois-Xavier Standaert, II and D SYM. 2010. ECRYPT II, final lightweight cryptography status report. (2010).Google Scholar
- Christophe Guyeux, Abdallah Makhoul, and Jacques M. Bahi. 2014. A security framework for wireless sensor networks: Theory and practice. In Proceedings of the 2014 IEEE 23rd International WETICE Conference ’14), Sumitra Reddy (Ed.). 269--274.Google Scholar
- Neil Hanley and Maire ONeill. 2012. Hardware comparison of the ISO/IEC 29192-2 block ciphers. In Proceedings of the 2012 IEEE Computer Society Annual Symposium on VLSI. IEEE, 57--62.Google Scholar
Digital Library
- Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, et al. 2006. HIGHT: A new block cipher suitable for low-resource device. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 46--59.Google Scholar
Digital Library
- Vittorio P. Illiano and Emil C. Lupu. 2015. Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manage. 12, 3 (2015), 496--510.Google Scholar
Digital Library
- Masanobu Katagi, Shiho Moriai, et al. 2008. Lightweight cryptography for the internet of things. Sony Corporation. Technical report. 7--10. 7--10.Google Scholar
- Vinod Kumar, Rakesh Kumar Jha, and Sanjeev Jain. 2020. NB-IoT security: A survey. Wireless Pers. Commun. 113, 4 (2020), 2661--2708. https://doi.org/10.1007/s11277-020-07346-7Google Scholar
Digital Library
- Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, and Yukiko Yamauchi. 2017. Brief Announcement: Shape formation by programmable particles. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Vol. 91, Andréa W. Richa (Ed.). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 48:1--48:3. https://doi.org/10.4230/LIPIcs.DISC.2017.48Google Scholar
- Morgan L. McCorkle. 2018.ORNL Launches Summit Supercomputer. Retrieved November 3, 2020 from https://www.ornl.gov/news/ornl-launches-summit-supercomputer.Google Scholar
- Sunday Oyinlola Ogundoyin. 2020. An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks. Int. J. Comput. Appl. 42, 2 (2020), 196--211.Google Scholar
- Daniel Perrin. 2008. La suite logistique et le chaos. Rapport Technique, Dép. Math. d’Orsay, Univ. de Paris-Sud, France, Vol. 22 (2008).Google Scholar
- Benoit Piranda, S. Fekete, A Richa, K. Römer, and C. Scheideler. 2016. Visiblesim: Your simulator for programmable matter. In Proceedings of the Algorithmic Foundations of Programmable Matter (Dagstuhl Seminar 16271).Google Scholar
- Benoît Piranda, Guillaume J. Laurent, Julien Bourgeois, Cédric Clévy, Sebastian Möbes, and Nadine Le Fort-Piat. 2013. A new concept of planar self-reconfigurable modular robot for conveying microparts. Mechatronics 23, 7 (Oct. 2013), 906--915. DOI:https://doi.org/10.1016/j.mechatronics.2013.08.009Google Scholar
Cross Ref
- Bart Preneel, René Govaerts, and Joos Vandewalle. 1993. Hash functions based on block ciphers: A synthetic approach. In Proceedings of the Annual International Cryptology Conference. Springer, 368--378.Google Scholar
- Phillip Rogaway and John Steinberger. 2008. Constructing cryptographic hash functions from fixed-key blockciphers. In Proceedings of the Annual International Cryptology Conference. Springer, 433--450.Google Scholar
Digital Library
- Iván Santos-González, Alexandra Rivero-García, Mike Burmester, Jorge Munilla, and Pino Caballero-Gil. 2020. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Inf. Syst. 88 (2020), 101423.Google Scholar
Digital Library
- Victor Kathan Sarker, Tuan Nguyen Gia, Hannu Tenhunen, and Tomi Westerlund. 2020. Lightweight security algorithms for resource-constrained IoT-based sensor nodes. In Proceedings of the 2020 IEEE International Conference on Communications (ICC’20). IEEE, 1--7.Google Scholar
Cross Ref
- Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata. 2007. The 128-bit blockcipher CLEFIA. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 181--195.Google Scholar
- Pierre Thalamy, Benoît Piranda, and Julien Bourgeois. 2019. A survey of autonomous self-reconfiguration methods for robot-based programmable matter. Robot. Auton. Syst. 120 (2019), 103242.Google Scholar
Cross Ref
- Mohammad Wazid, Ashok Kumar Das, Vivekananda Bhat, and Athanasios V Vasilakos. 2020. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150 (2020), 102496.Google Scholar
Digital Library
Index Terms
PROLISEAN: A New Security Protocol for Programmable Matter
Recommendations
Security protocol of internet of things based on NTRU encryption model
In view of the low security and reliability of the current internet of things security protocols, a NTRU encryption model-based internet of things security protocol method is proposed. This method uses NTRU-PGP to construct the security protocol of the ...
TAKE-IoT: Tiny Authenticated Key Exchange Protocol for the Internet of Things
The goal of this work is to develop a key exchange solution for IPsec protocol, adapted to the restricted nature of the Internet of Things (IoT) components. With the emergence of IP-enabled wireless sensor networks (WSNs), the landscape of IoT is ...






Comments