skip to main content
research-article

PROLISEAN: A New Security Protocol for Programmable Matter

Authors Info & Claims
Published:13 January 2021Publication History
Skip Abstract Section

Abstract

The vision for programmable matter is to create a material that can be reprogrammed to have different shapes and to change its physical properties on demand. They are autonomous systems composed of a huge number of independent connected elements called particles. The connections to one another form the overall shape of the system. These particles are capable of interacting with each other and take decisions based on their environment. Beyond sensing, processing, and communication capabilities, programmable matter includes actuation and motion capabilities. It could be deployed in different domains and will constitute an intelligent component of the IoT. A lot of applications can derive from this technology, such as medical or industrial applications. However, just like any other technology, security is a huge concern. Given its distributed architecture and its processing limitations, programmable matter cannot handle the traditional security protocols and encryption algorithms. This article proposes a new security protocol optimized and dedicated for IoT programmable matter. This protocol is based on lightweight cryptography and uses the same encryption protocol as a hashing function while keeping the distributed architecture in mind. The analysis and simulation results show the efficiency of the proposed method and that a supercomputer will need about 5.93 × 1025 years to decrypt the message.

References

  1. Hossein Ahmadzadeh and Ellips Masehian. 2015. Modular robotic systems: Methods and algorithms for abstraction, planning, control, and synchronization. Artif. Intell. 223 (2015), 27--64.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Hossein Ahmadzadeh, Ellips Masehian, and Masoud Asadpour. 2016. Modular robotic systems: Characteristics and applications. J. Intell. Robot. Syst. 81, 3–4 (Mar. 2016), 317--357. DOI:https://doi.org/10.1007/s10846-015-0237-8Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ahmet Arış, Sema F. Oktuğ, and Sıddıka Berna Örs Yalçın. 2015. Internet-of-things security: Denial of service attacks. In Proceedings of the 2015 23nd Signal Processing and Communications Applications Conference (SIU’15). IEEE, 903--906.Google ScholarGoogle ScholarCross RefCross Ref
  4. Joseph Assaker, Abdallah Makhoul, Julien Bourgeois1, and Jacques Demerjian. 2020. A unique identifier assignment method for distributed modular robots. In Proceedings of the 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’20). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  5. Jacques M. Bahi, Christophe Guyeux, and Abdallah Makhoul. 2010. Secure data aggregation in wireless sensor networks: Homomorphism versus watermarking approach. In Proceedings of the International Conference on Ad Hoc Networks. Springer, 344--358.Google ScholarGoogle ScholarCross RefCross Ref
  6. Jad Bassil, Mohamad Moussa, Abdallah Makhoul, Benoît Piranda, and Julien Bourgeois. 2020. Linear distributed clustering algorithm for modular robots BasedProgrammable matter. In Proceedings of the 2020 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS’20). IEEE.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Isha Bhardwaj, Ajay Kumar, and Manu Bansal. 2017. A review on lightweight cryptography algorithms for data security and authentication in IoTs. In Proceedings of the 2017 4th International Conference on Signal Processing, Computing and Control (ISPCC’17). IEEE, 504--509.Google ScholarGoogle ScholarCross RefCross Ref
  8. Alex Biryukov and Léo Paul Perrin. 2017. State of the art in lightweight symmetric cryptography. (2017).Google ScholarGoogle Scholar
  9. John Black, Phillip Rogaway, and Thomas Shrimpton. 2002. Black-box analysis of the block-cipher-based hash-function constructions from PGV. In Proceedings of the Annual International Cryptology Conference. Springer, 320--335.Google ScholarGoogle ScholarCross RefCross Ref
  10. Andrey Bogdanov, Miroslav Knežević, Gregor Leander, Deniz Toz, Kerem Varıcı, and Ingrid Verbauwhede. 2011. SPONGENT: A lightweight hash function. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 312--325.Google ScholarGoogle ScholarCross RefCross Ref
  11. Zoran Cekerevac, Zdenek Dvorak, Ludmila Prigoda, and Petar Cekerevac. 2017. Internet of things and the man-in-the-middle attacks–security and economic risks. MEST J. 5, 2 (2017), 15--25.Google ScholarGoogle ScholarCross RefCross Ref
  12. Zahra Derakhshandeh. 2017. Algorithmic Foundations of Self-Organizing Programmable Matter. Ph.D. Dissertation. Arizona State University.Google ScholarGoogle Scholar
  13. Zahra Derakhshandeh, Robert Gmyr, Andréa W. Richa, Christian Scheideler, and Thim Strothmann. 2016. Universal shape formation for programmable matter. In Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures. ACM, 289--299.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. ECRYPT Francois-Xavier Standaert, II and D SYM. 2010. ECRYPT II, final lightweight cryptography status report. (2010).Google ScholarGoogle Scholar
  15. Christophe Guyeux, Abdallah Makhoul, and Jacques M. Bahi. 2014. A security framework for wireless sensor networks: Theory and practice. In Proceedings of the 2014 IEEE 23rd International WETICE Conference ’14), Sumitra Reddy (Ed.). 269--274.Google ScholarGoogle Scholar
  16. Neil Hanley and Maire ONeill. 2012. Hardware comparison of the ISO/IEC 29192-2 block ciphers. In Proceedings of the 2012 IEEE Computer Society Annual Symposium on VLSI. IEEE, 57--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim, Sangjin Lee, Bon-Seok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, et al. 2006. HIGHT: A new block cipher suitable for low-resource device. In Proceedings of the International Workshop on Cryptographic Hardware and Embedded Systems. Springer, 46--59.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Vittorio P. Illiano and Emil C. Lupu. 2015. Detecting malicious data injections in event detection wireless sensor networks. IEEE Trans. Netw. Serv. Manage. 12, 3 (2015), 496--510.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Masanobu Katagi, Shiho Moriai, et al. 2008. Lightweight cryptography for the internet of things. Sony Corporation. Technical report. 7--10. 7--10.Google ScholarGoogle Scholar
  20. Vinod Kumar, Rakesh Kumar Jha, and Sanjeev Jain. 2020. NB-IoT security: A survey. Wireless Pers. Commun. 113, 4 (2020), 2661--2708. https://doi.org/10.1007/s11277-020-07346-7Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Giuseppe A. Di Luna, Paola Flocchini, Nicola Santoro, Giovanni Viglietta, and Yukiko Yamauchi. 2017. Brief Announcement: Shape formation by programmable particles. In 31st International Symposium on Distributed Computing (DISC 2017) (Leibniz International Proceedings in Informatics (LIPIcs)), Vol. 91, Andréa W. Richa (Ed.). Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 48:1--48:3. https://doi.org/10.4230/LIPIcs.DISC.2017.48Google ScholarGoogle Scholar
  22. Morgan L. McCorkle. 2018.ORNL Launches Summit Supercomputer. Retrieved November 3, 2020 from https://www.ornl.gov/news/ornl-launches-summit-supercomputer.Google ScholarGoogle Scholar
  23. Sunday Oyinlola Ogundoyin. 2020. An autonomous lightweight conditional privacy-preserving authentication scheme with provable security for vehicular ad-hoc networks. Int. J. Comput. Appl. 42, 2 (2020), 196--211.Google ScholarGoogle Scholar
  24. Daniel Perrin. 2008. La suite logistique et le chaos. Rapport Technique, Dép. Math. d’Orsay, Univ. de Paris-Sud, France, Vol. 22 (2008).Google ScholarGoogle Scholar
  25. Benoit Piranda, S. Fekete, A Richa, K. Römer, and C. Scheideler. 2016. Visiblesim: Your simulator for programmable matter. In Proceedings of the Algorithmic Foundations of Programmable Matter (Dagstuhl Seminar 16271).Google ScholarGoogle Scholar
  26. Benoît Piranda, Guillaume J. Laurent, Julien Bourgeois, Cédric Clévy, Sebastian Möbes, and Nadine Le Fort-Piat. 2013. A new concept of planar self-reconfigurable modular robot for conveying microparts. Mechatronics 23, 7 (Oct. 2013), 906--915. DOI:https://doi.org/10.1016/j.mechatronics.2013.08.009Google ScholarGoogle ScholarCross RefCross Ref
  27. Bart Preneel, René Govaerts, and Joos Vandewalle. 1993. Hash functions based on block ciphers: A synthetic approach. In Proceedings of the Annual International Cryptology Conference. Springer, 368--378.Google ScholarGoogle Scholar
  28. Phillip Rogaway and John Steinberger. 2008. Constructing cryptographic hash functions from fixed-key blockciphers. In Proceedings of the Annual International Cryptology Conference. Springer, 433--450.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Iván Santos-González, Alexandra Rivero-García, Mike Burmester, Jorge Munilla, and Pino Caballero-Gil. 2020. Secure lightweight password authenticated key exchange for heterogeneous wireless sensor networks. Inf. Syst. 88 (2020), 101423.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Victor Kathan Sarker, Tuan Nguyen Gia, Hannu Tenhunen, and Tomi Westerlund. 2020. Lightweight security algorithms for resource-constrained IoT-based sensor nodes. In Proceedings of the 2020 IEEE International Conference on Communications (ICC’20). IEEE, 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  31. Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, and Tetsu Iwata. 2007. The 128-bit blockcipher CLEFIA. In Proceedings of the International Workshop on Fast Software Encryption. Springer, 181--195.Google ScholarGoogle Scholar
  32. Pierre Thalamy, Benoît Piranda, and Julien Bourgeois. 2019. A survey of autonomous self-reconfiguration methods for robot-based programmable matter. Robot. Auton. Syst. 120 (2019), 103242.Google ScholarGoogle ScholarCross RefCross Ref
  33. Mohammad Wazid, Ashok Kumar Das, Vivekananda Bhat, and Athanasios V Vasilakos. 2020. LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment. J. Netw. Comput. Appl. 150 (2020), 102496.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PROLISEAN: A New Security Protocol for Programmable Matter

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format
    About Cookies On This Site

    We use cookies to ensure that we give you the best experience on our website.

    Learn more

    Got it!