Usman , Ali (2024) Lightweight security schemes for internet of things resource-constrained devices / Usman Ali. PhD thesis, Universiti Malaya.
PDF (The Candidate's Agreement) Restricted to Repository staff only Download (198Kb) | |
PDF (Thesis PhD) Restricted to Repository staff only until 31 December 2026. Download (2334Kb) |
Abstract
The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. Several authentication schemes have been proposed in recent years. However, some schemes are more focused on lightweight performance features using cryptographic operations with the lowest computational cost. The use of this operation affects important security requirements. Other authentication schemes that meet security requirements have unsatisfactory lightweight characteristics. To address these issues, three different authentication schemes are proposed, namely: Signcription-based Authentication Scheme for RFID termed SAS-RFID, Signcription-based Certificateless Authentication Scheme for WSN termed SCAS-WSN, and Enhanced Lightweight and Secure Certificateless Authentication for WSNs termed ELWSCAS-WSN. ELWSCAS-WSN is based on the concept of Authenticated Encryption with Associated Data (AEAD). The proposed solutions namely SAS-RFID, SCAS-WSN and ELWSCAS-WSN are based on elliptic curve cryptography (ECC) with Curve25519. The key exchange (KE) protocol X25519 is also used in the proposed solution to create a secure session key (SK) with reduced computational cost. The security of the proposed solution is evaluated using two different methods: formal analysis and informal analysis. Formal security analysis is conducted using the Real or Random (RoR) model and the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit. The efficiency of the proposed solution is evaluated and compared with existing related schemes. The results obtained show that the proposed solution is generally more efficient and resistant to known attacks. Further, the proposed solution fulfills all the required security features and is faster compared to the related existing authentication schemes.
Item Type: | Thesis (PhD) |
---|---|
Additional Information: | Thesis (PhD) – Faculty of Computer Science & Information Technology, Universiti Malaya, 2024. |
Uncontrolled Keywords: | AEAD; Authentication; AVISPA; ECC; IoT; Key exchange; RFID; RoR model; Security; Signcryption; WSN; X25519 |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Faculty of Computer Science & Information Technology |
Depositing User: | Mr Mohd Safri Tahir |
Date Deposited: | 09 Sep 2024 05:57 |
Last Modified: | 09 Sep 2024 05:57 |
URI: | http://studentsrepo.um.edu.my/id/eprint/15420 |
Actions (For repository staff only : Login required)
View Item |