Sistema de transmisión de datos segura: integración de Micropython y Criptografía AES-CTR
Fecha
Autores
Autor corporativo
Título de la revista
ISSN de la revista
Título del volumen
Editor
Compartir
Director
Altmetric
Resumen
The purpose of this monograph is to present a monitoring system based on microcontrollers to protect sensitive data through secure communications. In a context where cyber threats are increasingly frequent and sophisticated, it is essential to have solutions that ensure the integrity and confidentiality of information. The method to be presented integrates technologies such as MicroPython and Java, along with the Spring Boot and Angular frameworks, to develop a secure environment that prevents unauthorized access and attacks. The system design focuses on creating an efficient framework that not only monitors data but also facilitates its management, allowing for a quick response to security incidents by implementing encryption algorithms and secure communication protocols. The goal is to offer a comprehensive solution that minimizes the risks of data leaks and ensures data security. A monitoring system based on microcontrollers is included, specifically using MicroPython for data acquisition and transmission. As a strategy, the “AES-CTR” encoding algorithm was imported to encrypt the data and ensure confidentiality during transmission. Additionally, WebSockets are utilized to guarantee real-time communication between the microcontroller and server, providing system-level security. This type of system is not only an efficient way to handle data but also a robust environment to prevent unauthorized access and cyberattacks. The results obtained after implementing the system have been encouraging. Tests conducted indicate that the combination of MicroPython and Spring Boot has enabled efficient and secure data transmission. A notable reduction in communication latency was recorded, improving user experience when monitoring data in real-time. Furthermore, the security analysis performed with tools such as Wireshark demonstrated that encrypted data is hardly accessible to potential attackers. In conclusion, this work not only addresses existing vulnerabilities in embedded systems but also establishes a model for future applications in environments where data security is of great importance.