SlideShare a Scribd company logo
1 of 19
Download to read offline
Haystack + DASH7 Security
1
Similarities & Differences of PHY/MAC
DASH7 DASH7/LoRa 6LoWPAN
Primary Spectrum 433 MHz 433/915 MHz 2450 MHz
Supported Bitrates 26.5, 53, 106 kbps 1 - 26.5 kbps 250 kbps
Modulation/Encoding MSK / FEC+RS CSS / FEC MSK / DSSS
Network Model Host – Host Host – Host
Multiaccess Models
CSMA-CA

Time slotting

Query Arbitration
CSMA-CA

Time slotting
MAC Data Integrity High Low
MAC Cryptography AES128 EAX AES128 CCM
Frame MTU 256 bytes 127 bytes
2
Similarities & Differences of PHY/MAC
DASH7 DASH7/LoRa 6LoWPAN
Primary Spectrum 433 MHz 433/915 MHz 2450 MHz
Supported Bitrates 26.5, 53, 106 kbps 1 - 26.5 kbps 250 kbps
Modulation/Encoding MSK / FEC+RS CSS / FEC MSK / DSSS
Network Model Host – Host Host – Host
Multiaccess Models
CSMA-CA

Time slotting

Query Arbitration
CSMA-CA

Time slotting
MAC Data Integrity High Low
MAC Cryptography AES128 EAX AES128 CCM
Frame MTU 256 bytes 127 bytes
CRC validation of the frame is vulnerable
to incorrect length byte in header.
Koopman & Chakravarty, 

CRC Polynomial Selection For Embedded Networks
EAX is a newer (2004) cipher for AES.
‣ Standard AES keys & distribution!
‣ Runs twice as fast as CCM!
‣ Can encrypt MAC addresses (CCM can’t)!
‣ Packets don’t need to be 16byte aligned!
2
Networking Strengths Weaknesses
• Fast, low-power network sync
• Fast round-trip for request/response
• Universal MAC precludes App Profiles
• Supports core IPv6 features & UDP
• New, so few implementations available
• Formal support for only 2 hops
• No TCP support at present
• Possible to do almost all IPv6 features
• Mature implementations available
• Lots of PHY/MAC options
• App data really should use internal CRC!
• No standard way for low-power network sync
• Needs a lot of extra work up the stack and in
definition of application profiles
Greatest Differentiation is in Networking
DASH7
6LoWPAN
3
Networking Strengths Weaknesses
• Fast, low-power network sync
• Fast round-trip for request/response
• Universal MAC precludes App Profiles
• Supports core IPv6 features & UDP
• New, so few implementations available
• Formal support for only 2 hops
• No TCP support at present
• Possible to do almost all IPv6 features
• Mature implementations available
• Lots of PHY/MAC options
• App data really should use internal CRC!
• No standard way for low-power network sync
• Needs a lot of extra work up the stack and in
definition of application profiles
Let’s Investigate a Few Areas
4
DASH7
6LoWPAN
802.15.4 CRC is Vulnerable
• On vulnerable MAC’s, payloads should have their own integrity check.
• Seminal research on the topic published only in 2012.

Koopman & Chakravarty, CRC Polynomial Selection for Embedded Networks. 2012.

Mirror: http://www.indigresso.com/wiki/doku.php?id=dash7_mode_2:crc_research
• Some polynomials we thought were good, are not.
• Length byte (header) must be protected independently. If frame length is
wrong, the frame-CRC gets marginalized no matter how strong it is.
DASH7 LoRa HW Support 6LP
CRC Poly CRC16-IBM CRC16-IBM CRC16-CCITT
Koopman’s Rating Strong Strong Weak
Header CRC Yes Yes No
5
Contrasting Methods of Network Sync

To do it in a low-power way, network asymmetries must be exploited
DASH7 6LoWPAN
Idle Mode BackgroundDetect Duty-cycledRX
Asymmetry Exploited
Plug-in nodes can transmit
streams
Plug-in nodes can transmit
streams
Low-Power Listening Yes Yes
Provides Group Sync Yes No
Endpoints Stay Quiet Yes Yes
Sync Latency (typ) 1 - 2 sec 1 - 2 sec
On-time / Period (typ) 1.3 ms / 500 ms 8 ms / 1s
6
Contrasting Methods of Network Sync

To do it in a low-power way, network asymmetries must be exploited
DASH7 6LoWPAN
Idle Mode BackgroundDetect Duty-cycledRX
Asymmetry Exploited
Plug-in nodes can transmit
streams
Plug-in nodes can transmit
streams
Low-Power Listening Yes Yes
Provides Group Sync Yes No
Endpoints Stay Quiet Yes Yes
Sync Latency (typ) 1 - 2 sec 1 - 2 sec
On-time / Period (typ) 1.3 ms / 500 ms 8 ms / 1s
Typical figures: all standards can be
configured to optimize latency vs. low power.
6
6LoWPAN:RepeatthePacket
• Idea is to send the request packet many times, so the receiver can
“strobe” its listening cycle and still get the data.
• Many different — but similar — variants of above:

BMAC, XMAC, BoXMAC, WiseMAC, ContikiMAC, … others
• Downside: synchronizes one endpoint at a time, not a group all at once.
• Downside: if data rate is low, packets are long & receiver listens a lot.
DD D A
AD
D
A Acknowledgement packet
Data packet
Reception window
Send data packets until ack received
Sender
Receiver
Transmission detected
D
Figure 1: ContikiMAC: nodes sleep most of the time and
periodically wake up to check for radio activity. If a
packet transmission is detected, the receiver stays awake
to receive the next packet and sends a link layer acknowl-
edgment. To send a packet, the sender repeatedly sends
the same packet until a link layer acknowledgment is re-
ceived.
Data packet
t
i
t
c
t
r
Sender
Receiver
CCA
Figure 3: The ContikiMAC tr
ing.
2.1 ContikiMAC Timi
ContikiMAC has a power-effi
that relies on precise timing be
Example is of “ContikiMAC”

http://www.dunkels.com/adam/
dunkels11contikimac.pdf
7
DASH7:Advertise&GroupSync
ETA
500
Info
0
ETA
1
Info
0
ETA
0
Info
0
Foreground RequestBackground AdvertisingBackground AdvertisingBackground Advertising
Host A sends a stream of special “background frames” containing
Advertising Protocol Data. The data includes the time when the
next request will occur (e.g. 500 ms).
Host A sends
synchronized request
at planned time
Any number of other Hosts can listen for advertising.
1. Briefly sample the channel for any activity.
2. Check for signs that it’s a background frame (part of design).
3. Receive the background frame.
1 2 3
All listeners can receive
request, all can send
responses, all are now
synced to each other.
DASH7’s advertising & synchronization model follows from the
previous concepts. It provides group synchronization, allows for wide
tolerances in device specs, and also scales to low data rates.
8
Low-Pwr Advertising & Group Sync Timeline
Engineers have pursued low-power
advertising for years. The goals have
been mostly consistent:
‣ Minimize RX on-time
‣ Minimize False-positives
‣ Maximize True-positives
DASH7’s method is the first to use a
bifurcated frame specification and
real-time synchronization units (ms).
20 years of collective R&D, but the
concept finally works and scales.
1990’s2000-20102010—
Transmission of long preamble
ahead of request packet.
BMAC proposed (early 2000’s): 

A protocol using countdown packets.
ISO 18000-7.1 (early 2000’s)
structured long preamble
TinyOS group implements BMAC+:
struggles, finds impractical (late 2000’s)
Final spec of DASH7 MAC and
Advertising Protocol (2012)
9
Fast Group Sync Enables Fast Round-Trip

Synchronize devices, send request, and get responses before endpoints are GONE
“Chaotic” Conditions assume:
‣ Endpoints as well as internet gateways
(i.e. edge routers) may be mobile.
‣ “Potpourri of ownership” of the
endpoints & gateways.
Some examples of chaotic networks:
‣ Getting sensor data off-of tags in a
moving vehicle (see diagram).
‣ Smartphones querying smart objects
and each other.
30m/s
Advertising (1s)
Request (<50ms)
Responses (1s)
Discovering and getting data from low-power
devices inside a vehicle going highway speed
is a hard problem, but it is one for which
DASH7 is well-suited.
Any IP
address
WAN/4G
DASH7

Gateway
10
Networking Strengths Weaknesses
• Fast, low-power network sync
• Fast round-trip for request/response
• Universal MAC precludes App Profiles
• Supports core IPv6 features & UDP
• New, so few implementations available
• Formal support for only 2 hops
• No TCP support at present
• Possible to do almost all IPv6 features
• Mature implementations available
• Lots of PHY/MAC options
• App data really should use internal CRC!
• No standard way for low-power network sync
• Needs a lot of extra work up the stack and in
definition of application profiles
Let’s Investigate a Few Areas (Update)
DASH7
6LoWPAN
11
Implementing Trivial Apps

DASH7 stacks have built-in application functionality
DASH7
PHY/MAC/NET
Sessioning
Transport Layer
Applications
Filesystem
Transport Layer Apps (TLA’s) include:
‣ Beaconing Series (a.k.a. “Announcement”)
‣ Inventory & Collection Queries
User configures TLA’s and provides them
with data via Filesystem API.
12
What Exactly is the DASH7 Filesystem?

A consistent data model & API to promote multi-app, multi-vendor interoperability
DASH7
PHY/MAC/NET
Sessioning
Transport Layer
Applications
Filesystem
• L6, queryable, database-ish API
• root/admin/guest XRW privileges
• Up to 256 “BLOB” files (Generic Files)
• Up to 1024 indexed short files (ISF’s)
‣ Low-level (L4) queries happen here
‣ Batch or single-file access
‣ 0-15 used as configuration registry
‣ Rest available to user for arbitrary data
storage, application ports, etc.
13
What Exactly is the DASH7 Filesystem?

A consistent data model & API to promote multi-app, multi-vendor interoperability
DASH7
PHY/MAC/NET
Sessioning
Transport Layer
Applications
Filesystem
• L6, queryable, database-ish API
• root/admin/guest XRW privileges
• Up to 256 “BLOB” files (Generic Files)
• Up to 1024 indexed short files (ISF’s)
‣ Low-level (L4) queries happen here
‣ Batch or single-file access
‣ 0-15 used as configuration registry
‣ Rest available to user for arbitrary data
storage, application ports, etc.
Filesystem is key to security and 

interoperability of binary data formats.
13
WhyDASH7FilesystemMatters
Alice’s
Network
Bob’s
Network
DASH7 Endpoint with
default configuration.
Alice discovers Endpoint &
uploads network params
Endpoint leaves Alice, joins Bob.
Bob uploads its network params
A DASH7 device can productively carry data across diverse IoT networks.
Today’s IoT lacks such a distributed data model, and as a result data gets
stuck in cloud “silos.” On the other hand, a distributed data model promotes
IoT market growth and market-wide commitment to data security features.
14
WhyDASH7FilesystemMatters
Alice’s
Network
Bob’s
Network
DASH7 Endpoint with
default configuration.
Alice discovers Endpoint &
uploads network params
Endpoint leaves Alice, joins Bob.
Bob uploads its network params
A DASH7 device can productively carry data across diverse IoT networks.
Today’s IoT lacks such a distributed data model, and as a result data gets
stuck in cloud “silos.” On the other hand, a distributed data model promotes
IoT market growth and market-wide commitment to data security features.
Not to mention, the potential to
spider & search an open IoT.
14
Haystack + DASH7 Security
15
Patrick Burns
co-founder & CEO
pat@haystacktechnologies.com

More Related Content

What's hot

BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionAPNIC
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec APNIC
 
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...LF_DPDK
 
IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44Jisc
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesMyNOG
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSpijans
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...gogo6
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalJim St. Leger
 
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014Jaime Martin Losa
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014Pascal Thubert
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingThomas Graf
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and CaliforniumJulien Vermillard
 
Open stackdaykorea2016 wedge
Open stackdaykorea2016 wedgeOpen stackdaykorea2016 wedge
Open stackdaykorea2016 wedgeJunho Suh
 
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...LF_DPDK
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodAPNIC
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...Indonesia Network Operators Group
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingJaime Martin Losa
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015Pascal Thubert
 

What's hot (20)

BGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and DiscussionBGP Flowspec (RFC5575) Case study and Discussion
BGP Flowspec (RFC5575) Case study and Discussion
 
DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec DDoS Mitigation using BGP Flowspec
DDoS Mitigation using BGP Flowspec
 
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
LF_DPDK17_OpenNetVM: A high-performance NFV platforms to meet future communic...
 
IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44IPv6 at Mythic Beasts - Networkshop44
IPv6 at Mythic Beasts - Networkshop44
 
The Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry ServicesThe Next Generation Internet Number Registry Services
The Next Generation Internet Number Registry Services
 
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGSTRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
TRUST BASED ROUTING METRIC FOR RPL ROUTING PROTOCOL IN THE INTERNET OF THINGS
 
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
IoT Field Area Network Solutions & Integration of IPv6 Standards by Patrick G...
 
DPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun RajagopalDPDK Summit 2015 - Sprint - Arun Rajagopal
DPDK Summit 2015 - Sprint - Arun Rajagopal
 
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014DDS over Low Bandwidth Data Links - Connext Conf London October 2014
DDS over Low Bandwidth Data Links - Connext Conf London October 2014
 
6TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 20146TiSCH + RPL @ Telecom Bretagne 2014
6TiSCH + RPL @ Telecom Bretagne 2014
 
SDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center NetworkingSDN & NFV Introduction - Open Source Data Center Networking
SDN & NFV Introduction - Open Source Data Center Networking
 
Hands on with CoAP and Californium
Hands on with CoAP and CaliforniumHands on with CoAP and Californium
Hands on with CoAP and Californium
 
Open stackdaykorea2016 wedge
Open stackdaykorea2016 wedgeOpen stackdaykorea2016 wedge
Open stackdaykorea2016 wedge
 
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...
LF_DPDK17_DPDK with KNI – Pushing the Performance of an SDWAN Gateway to High...
 
Actual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long PeriodActual Condition Survey of Malware Download Sites for A Long Period
Actual Condition Survey of Malware Download Sites for A Long Period
 
Iot rpl
Iot rplIot rpl
Iot rpl
 
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
07 (IDNOG02) SDN Research activity in Institut Teknologi Bandung by Affan Bas...
 
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin MeetingeProsima RPC over DDS - OMG June 2013 Berlin Meeting
eProsima RPC over DDS - OMG June 2013 Berlin Meeting
 
6TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 20156TiSCH @Telecom Bretagne 2015
6TiSCH @Telecom Bretagne 2015
 
IPv6 in cellular networks - Jordi Palet
IPv6 in cellular networks - Jordi PaletIPv6 in cellular networks - Jordi Palet
IPv6 in cellular networks - Jordi Palet
 

Similar to Haystack + DASH7 Security: Comparing Wireless Standards

DPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettDPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettJim St. Leger
 
High performace network of Cloud Native Taiwan User Group
High performace network of Cloud Native Taiwan User GroupHigh performace network of Cloud Native Taiwan User Group
High performace network of Cloud Native Taiwan User GroupHungWei Chiu
 
Pacemaker+DRBD
Pacemaker+DRBDPacemaker+DRBD
Pacemaker+DRBDDan Frincu
 
Network-aware Data Management for Large Scale Distributed Applications, IBM R...
Network-aware Data Management for Large Scale Distributed Applications, IBM R...Network-aware Data Management for Large Scale Distributed Applications, IBM R...
Network-aware Data Management for Large Scale Distributed Applications, IBM R...balmanme
 
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Community
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsGerardo Pardo-Castellote
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7FRSecure
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...IEEEFINALSEMSTUDENTSPROJECTS
 
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Big Data Streams Architectures. Why? What? How?
Big Data Streams Architectures. Why? What? How?Big Data Streams Architectures. Why? What? How?
Big Data Streams Architectures. Why? What? How?Anton Nazaruk
 
6 open capi_meetup_in_japan_final
6 open capi_meetup_in_japan_final6 open capi_meetup_in_japan_final
6 open capi_meetup_in_japan_finalYutaka Kawai
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File MulticastYoss Cohen
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDKKernel TLV
 
Network-aware Data Management for High Throughput Flows Akamai, Cambridge, ...
Network-aware Data Management for High Throughput Flows   Akamai, Cambridge, ...Network-aware Data Management for High Throughput Flows   Akamai, Cambridge, ...
Network-aware Data Management for High Throughput Flows Akamai, Cambridge, ...balmanme
 
Apache Hadoop 3.0 Community Update
Apache Hadoop 3.0 Community UpdateApache Hadoop 3.0 Community Update
Apache Hadoop 3.0 Community UpdateDataWorks Summit
 

Similar to Haystack + DASH7 Security: Comparing Wireless Standards (20)

Haystack Technology Overview
Haystack Technology OverviewHaystack Technology Overview
Haystack Technology Overview
 
Presentacion QoS.pptx
Presentacion QoS.pptxPresentacion QoS.pptx
Presentacion QoS.pptx
 
DPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles ShiflettDPDK Summit 2015 - Aspera - Charles Shiflett
DPDK Summit 2015 - Aspera - Charles Shiflett
 
High performace network of Cloud Native Taiwan User Group
High performace network of Cloud Native Taiwan User GroupHigh performace network of Cloud Native Taiwan User Group
High performace network of Cloud Native Taiwan User Group
 
Pacemaker+DRBD
Pacemaker+DRBDPacemaker+DRBD
Pacemaker+DRBD
 
WiFi - IEEE 802.11
WiFi - IEEE 802.11WiFi - IEEE 802.11
WiFi - IEEE 802.11
 
Bcs 052 solved assignment
Bcs 052 solved assignmentBcs 052 solved assignment
Bcs 052 solved assignment
 
Network-aware Data Management for Large Scale Distributed Applications, IBM R...
Network-aware Data Management for Large Scale Distributed Applications, IBM R...Network-aware Data Management for Large Scale Distributed Applications, IBM R...
Network-aware Data Management for Large Scale Distributed Applications, IBM R...
 
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
Ceph Day SF 2015 - Deploying flash storage for Ceph without compromising perf...
 
UAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time CommunicationsUAV Data Link Design for Dependable Real-Time Communications
UAV Data Link Design for Dependable Real-Time Communications
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
2014 IEEE JAVA NETWORKING PROJECT Receiver based flow control for networks in...
 
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
IEEE 2014 JAVA NETWORKING PROJECTS Receiver based flow control for networks i...
 
Big Data Streams Architectures. Why? What? How?
Big Data Streams Architectures. Why? What? How?Big Data Streams Architectures. Why? What? How?
Big Data Streams Architectures. Why? What? How?
 
6 open capi_meetup_in_japan_final
6 open capi_meetup_in_japan_final6 open capi_meetup_in_japan_final
6 open capi_meetup_in_japan_final
 
FEC & File Multicast
FEC & File MulticastFEC & File Multicast
FEC & File Multicast
 
Introduction to DPDK
Introduction to DPDKIntroduction to DPDK
Introduction to DPDK
 
Network-aware Data Management for High Throughput Flows Akamai, Cambridge, ...
Network-aware Data Management for High Throughput Flows   Akamai, Cambridge, ...Network-aware Data Management for High Throughput Flows   Akamai, Cambridge, ...
Network-aware Data Management for High Throughput Flows Akamai, Cambridge, ...
 
Apache Hadoop 3.0 Community Update
Apache Hadoop 3.0 Community UpdateApache Hadoop 3.0 Community Update
Apache Hadoop 3.0 Community Update
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 

Recently uploaded

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 

Recently uploaded (20)

Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 

Haystack + DASH7 Security: Comparing Wireless Standards

  • 1. Haystack + DASH7 Security 1
  • 2. Similarities & Differences of PHY/MAC DASH7 DASH7/LoRa 6LoWPAN Primary Spectrum 433 MHz 433/915 MHz 2450 MHz Supported Bitrates 26.5, 53, 106 kbps 1 - 26.5 kbps 250 kbps Modulation/Encoding MSK / FEC+RS CSS / FEC MSK / DSSS Network Model Host – Host Host – Host Multiaccess Models CSMA-CA
 Time slotting
 Query Arbitration CSMA-CA
 Time slotting MAC Data Integrity High Low MAC Cryptography AES128 EAX AES128 CCM Frame MTU 256 bytes 127 bytes 2
  • 3. Similarities & Differences of PHY/MAC DASH7 DASH7/LoRa 6LoWPAN Primary Spectrum 433 MHz 433/915 MHz 2450 MHz Supported Bitrates 26.5, 53, 106 kbps 1 - 26.5 kbps 250 kbps Modulation/Encoding MSK / FEC+RS CSS / FEC MSK / DSSS Network Model Host – Host Host – Host Multiaccess Models CSMA-CA
 Time slotting
 Query Arbitration CSMA-CA
 Time slotting MAC Data Integrity High Low MAC Cryptography AES128 EAX AES128 CCM Frame MTU 256 bytes 127 bytes CRC validation of the frame is vulnerable to incorrect length byte in header. Koopman & Chakravarty, 
 CRC Polynomial Selection For Embedded Networks EAX is a newer (2004) cipher for AES. ‣ Standard AES keys & distribution! ‣ Runs twice as fast as CCM! ‣ Can encrypt MAC addresses (CCM can’t)! ‣ Packets don’t need to be 16byte aligned! 2
  • 4. Networking Strengths Weaknesses • Fast, low-power network sync • Fast round-trip for request/response • Universal MAC precludes App Profiles • Supports core IPv6 features & UDP • New, so few implementations available • Formal support for only 2 hops • No TCP support at present • Possible to do almost all IPv6 features • Mature implementations available • Lots of PHY/MAC options • App data really should use internal CRC! • No standard way for low-power network sync • Needs a lot of extra work up the stack and in definition of application profiles Greatest Differentiation is in Networking DASH7 6LoWPAN 3
  • 5. Networking Strengths Weaknesses • Fast, low-power network sync • Fast round-trip for request/response • Universal MAC precludes App Profiles • Supports core IPv6 features & UDP • New, so few implementations available • Formal support for only 2 hops • No TCP support at present • Possible to do almost all IPv6 features • Mature implementations available • Lots of PHY/MAC options • App data really should use internal CRC! • No standard way for low-power network sync • Needs a lot of extra work up the stack and in definition of application profiles Let’s Investigate a Few Areas 4 DASH7 6LoWPAN
  • 6. 802.15.4 CRC is Vulnerable • On vulnerable MAC’s, payloads should have their own integrity check. • Seminal research on the topic published only in 2012.
 Koopman & Chakravarty, CRC Polynomial Selection for Embedded Networks. 2012.
 Mirror: http://www.indigresso.com/wiki/doku.php?id=dash7_mode_2:crc_research • Some polynomials we thought were good, are not. • Length byte (header) must be protected independently. If frame length is wrong, the frame-CRC gets marginalized no matter how strong it is. DASH7 LoRa HW Support 6LP CRC Poly CRC16-IBM CRC16-IBM CRC16-CCITT Koopman’s Rating Strong Strong Weak Header CRC Yes Yes No 5
  • 7. Contrasting Methods of Network Sync
 To do it in a low-power way, network asymmetries must be exploited DASH7 6LoWPAN Idle Mode BackgroundDetect Duty-cycledRX Asymmetry Exploited Plug-in nodes can transmit streams Plug-in nodes can transmit streams Low-Power Listening Yes Yes Provides Group Sync Yes No Endpoints Stay Quiet Yes Yes Sync Latency (typ) 1 - 2 sec 1 - 2 sec On-time / Period (typ) 1.3 ms / 500 ms 8 ms / 1s 6
  • 8. Contrasting Methods of Network Sync
 To do it in a low-power way, network asymmetries must be exploited DASH7 6LoWPAN Idle Mode BackgroundDetect Duty-cycledRX Asymmetry Exploited Plug-in nodes can transmit streams Plug-in nodes can transmit streams Low-Power Listening Yes Yes Provides Group Sync Yes No Endpoints Stay Quiet Yes Yes Sync Latency (typ) 1 - 2 sec 1 - 2 sec On-time / Period (typ) 1.3 ms / 500 ms 8 ms / 1s Typical figures: all standards can be configured to optimize latency vs. low power. 6
  • 9. 6LoWPAN:RepeatthePacket • Idea is to send the request packet many times, so the receiver can “strobe” its listening cycle and still get the data. • Many different — but similar — variants of above:
 BMAC, XMAC, BoXMAC, WiseMAC, ContikiMAC, … others • Downside: synchronizes one endpoint at a time, not a group all at once. • Downside: if data rate is low, packets are long & receiver listens a lot. DD D A AD D A Acknowledgement packet Data packet Reception window Send data packets until ack received Sender Receiver Transmission detected D Figure 1: ContikiMAC: nodes sleep most of the time and periodically wake up to check for radio activity. If a packet transmission is detected, the receiver stays awake to receive the next packet and sends a link layer acknowl- edgment. To send a packet, the sender repeatedly sends the same packet until a link layer acknowledgment is re- ceived. Data packet t i t c t r Sender Receiver CCA Figure 3: The ContikiMAC tr ing. 2.1 ContikiMAC Timi ContikiMAC has a power-effi that relies on precise timing be Example is of “ContikiMAC”
 http://www.dunkels.com/adam/ dunkels11contikimac.pdf 7
  • 10. DASH7:Advertise&GroupSync ETA 500 Info 0 ETA 1 Info 0 ETA 0 Info 0 Foreground RequestBackground AdvertisingBackground AdvertisingBackground Advertising Host A sends a stream of special “background frames” containing Advertising Protocol Data. The data includes the time when the next request will occur (e.g. 500 ms). Host A sends synchronized request at planned time Any number of other Hosts can listen for advertising. 1. Briefly sample the channel for any activity. 2. Check for signs that it’s a background frame (part of design). 3. Receive the background frame. 1 2 3 All listeners can receive request, all can send responses, all are now synced to each other. DASH7’s advertising & synchronization model follows from the previous concepts. It provides group synchronization, allows for wide tolerances in device specs, and also scales to low data rates. 8
  • 11. Low-Pwr Advertising & Group Sync Timeline Engineers have pursued low-power advertising for years. The goals have been mostly consistent: ‣ Minimize RX on-time ‣ Minimize False-positives ‣ Maximize True-positives DASH7’s method is the first to use a bifurcated frame specification and real-time synchronization units (ms). 20 years of collective R&D, but the concept finally works and scales. 1990’s2000-20102010— Transmission of long preamble ahead of request packet. BMAC proposed (early 2000’s): 
 A protocol using countdown packets. ISO 18000-7.1 (early 2000’s) structured long preamble TinyOS group implements BMAC+: struggles, finds impractical (late 2000’s) Final spec of DASH7 MAC and Advertising Protocol (2012) 9
  • 12. Fast Group Sync Enables Fast Round-Trip
 Synchronize devices, send request, and get responses before endpoints are GONE “Chaotic” Conditions assume: ‣ Endpoints as well as internet gateways (i.e. edge routers) may be mobile. ‣ “Potpourri of ownership” of the endpoints & gateways. Some examples of chaotic networks: ‣ Getting sensor data off-of tags in a moving vehicle (see diagram). ‣ Smartphones querying smart objects and each other. 30m/s Advertising (1s) Request (<50ms) Responses (1s) Discovering and getting data from low-power devices inside a vehicle going highway speed is a hard problem, but it is one for which DASH7 is well-suited. Any IP address WAN/4G DASH7
 Gateway 10
  • 13. Networking Strengths Weaknesses • Fast, low-power network sync • Fast round-trip for request/response • Universal MAC precludes App Profiles • Supports core IPv6 features & UDP • New, so few implementations available • Formal support for only 2 hops • No TCP support at present • Possible to do almost all IPv6 features • Mature implementations available • Lots of PHY/MAC options • App data really should use internal CRC! • No standard way for low-power network sync • Needs a lot of extra work up the stack and in definition of application profiles Let’s Investigate a Few Areas (Update) DASH7 6LoWPAN 11
  • 14. Implementing Trivial Apps
 DASH7 stacks have built-in application functionality DASH7 PHY/MAC/NET Sessioning Transport Layer Applications Filesystem Transport Layer Apps (TLA’s) include: ‣ Beaconing Series (a.k.a. “Announcement”) ‣ Inventory & Collection Queries User configures TLA’s and provides them with data via Filesystem API. 12
  • 15. What Exactly is the DASH7 Filesystem?
 A consistent data model & API to promote multi-app, multi-vendor interoperability DASH7 PHY/MAC/NET Sessioning Transport Layer Applications Filesystem • L6, queryable, database-ish API • root/admin/guest XRW privileges • Up to 256 “BLOB” files (Generic Files) • Up to 1024 indexed short files (ISF’s) ‣ Low-level (L4) queries happen here ‣ Batch or single-file access ‣ 0-15 used as configuration registry ‣ Rest available to user for arbitrary data storage, application ports, etc. 13
  • 16. What Exactly is the DASH7 Filesystem?
 A consistent data model & API to promote multi-app, multi-vendor interoperability DASH7 PHY/MAC/NET Sessioning Transport Layer Applications Filesystem • L6, queryable, database-ish API • root/admin/guest XRW privileges • Up to 256 “BLOB” files (Generic Files) • Up to 1024 indexed short files (ISF’s) ‣ Low-level (L4) queries happen here ‣ Batch or single-file access ‣ 0-15 used as configuration registry ‣ Rest available to user for arbitrary data storage, application ports, etc. Filesystem is key to security and 
 interoperability of binary data formats. 13
  • 17. WhyDASH7FilesystemMatters Alice’s Network Bob’s Network DASH7 Endpoint with default configuration. Alice discovers Endpoint & uploads network params Endpoint leaves Alice, joins Bob. Bob uploads its network params A DASH7 device can productively carry data across diverse IoT networks. Today’s IoT lacks such a distributed data model, and as a result data gets stuck in cloud “silos.” On the other hand, a distributed data model promotes IoT market growth and market-wide commitment to data security features. 14
  • 18. WhyDASH7FilesystemMatters Alice’s Network Bob’s Network DASH7 Endpoint with default configuration. Alice discovers Endpoint & uploads network params Endpoint leaves Alice, joins Bob. Bob uploads its network params A DASH7 device can productively carry data across diverse IoT networks. Today’s IoT lacks such a distributed data model, and as a result data gets stuck in cloud “silos.” On the other hand, a distributed data model promotes IoT market growth and market-wide commitment to data security features. Not to mention, the potential to spider & search an open IoT. 14
  • 19. Haystack + DASH7 Security 15 Patrick Burns co-founder & CEO pat@haystacktechnologies.com