Loading...

Security analysis and confidentiality in the Internet of Things

Zare Jousheghani, Zahra | 2016

451 Viewed
  1. Type of Document: M.Sc. Thesis
  2. Language: Farsi
  3. Document No: 49047 (05)
  4. University: Sharif University of Technology
  5. Department: Electrical Engineering
  6. Advisor(s): Aref, Mohammad Reza
  7. Abstract:
  8. Nowadays, Internet of Things is considered as a global infrastructure to establish communication between physical world and virtual world by using existing technologies. Its purpose is enabling things to establish communication with anything and any person in any time and any place by using existing networks and services. This technology makes different aspects of people's life smarter, facilitates doing works, and increases the quality of people's life. But, the development of Internet of Things faces to fundamental challenges that one of the most important of them is security and privacy preserving of users. According to the projects of European Research Cluster on the Internet of Things in the security and privacy preserving domain, some of the most important security requirements in the Internet of Things domain are as follows: data confidentiality, message source authentication, access control, and privacy preserving. The main achievements of this thesis are presented in two parts; fog and cloud. Both of them consider a hierarchical network model. In the fog section, KP-ABE method is used for encryption of common session key, and an identity-based digital signature is used for source authentication and data integrity. Moreover, a recursive secret sharing scheme is used for data encryption. The most important characteristic of the fog scheme is that data and session keys are exchanged via a distributed manner and it doesn't need a third party. In the cloud part, a hidden access policy CP-ABE method is used for data encryption and an identity-based digital signature is utilized for source authentication and data integrity. In this scheme, data sender and data receiver reduce their computational overhead by using auxiliary nodes and cloud respectively. The proposed schemes have the security features such as confidentiality, authentication and access control and in comparison with previous presented schemes have less communication overhead and less computational overhead
  9. Keywords:
  10. Access Control ; Authentication ; Confidentiality ; Cryptanalysis ; Internet of Things ; Cryptography

 Digital Object List

 Bookmark

No TOC