| | SLO | ENG | Cookies and privacy

Bigger font | Smaller font

Show document

Title:Protokoli za overjanje in dogovor o ključu za neinfrastrukturna omrežja, prilagojeni konceptu interneta stvari
Authors:Turkanović, Muhamed (Author)
Hölbl, Marko (Mentor) More about this mentor... New window
Files:.pdf DOK_Turkanovic_Muhamed_2016.pdf (3,89 MB)
MD5: EEA007F4FB02CC67E190BC7007C63197
 
Language:Slovenian
Work type:Dissertation (m)
Typology:2.08 - Doctoral Dissertation
Organization:FERI - Faculty of Electrical Engineering and Computer Science
Abstract:V zadnjih letih se je pozornost raziskovalcev usmerila v domeno neinfrastrukturnih omrežij in v zagotavljanje varnosti teh omrežij s pomočjo kriptografskih principov. Takšna omrežja predstavljajo za raziskovalce zaradi svojih specifičnih lastnosti, predvsem omejene arhitekture, nov izziv. Potrebno je namreč zagotoviti kompromis med varnostjo in učinkovitostjo. Poglaviten delež neinfrastrukturnih omrežij so brezžična senzorska omrežja, ki so del koncepta interneta stvari. V doktorski disertaciji obravnavamo področje varnostnih protokolov za overjanje in dogovor o ključu za brezžična senzorska omrežja v povezavi z vseprisotnim konceptom interneta stvari. V okviru disertacije smo izvedli klasifikacijo znanih napadov na protokole za overjanje in dogovor o ključu ter specifičnih napadov na brezžična senzorska omrežja. Izvedli smo analize obstoječih protokolov za overjanje in dogovor o ključu za brezžična senzorska omrežja, z namenom ugotavljanja pomanjkljivosti v varnosti, zasnovi in učinkovitosti. Z rezultati analiz smo pokazali, da imajo določeni uveljavljeni protokoli (tj. Dasov in Xuejev protokol) pomanjkljivosti v delovanju, varnosti in učinkovitosti. Prav tako smo predlagali izboljšave omenjenih protokolov. Dokazali smo, da sta izboljšavi varnejši in/ali učinkovitejši. Varnost protokolov smo vrednotili s pomočjo hevrističnega modela, ki predstavlja trenutno uveljavljeno prakso na področju vrednotenja varnosti protokolov za brezžična senzorska omrežja. Kot bazo znanih napadov za hevristično vrednotenje varnosti smo uporabili pripravljeno klasifikacijo napadov. Učinkovitost izboljšanih protokolov smo vrednotili s pomočjo analiz računske, komunikacijske in prostorske zahtevnosti. Pri pregledu literature smo ugotovili pomanjkanje protokolov s področja zagotavljanja varnosti povezovanja brezžičnih senzorskih omrežij z internetom stvari. Iz tega razloga smo razvili nov in izviren protokol, ki temelji na povezovanju omenjenih področij. Model predlaganega protokola omogoča kateremu koli udeležencu iz interneta stvari overjanje ter dogovor o ključu neposredno s posameznim senzorskim vozliščem iz brezžičnega senzorskega omrežja. Nad predlaganim protokolom smo izvedli varnostno analizo, ki temelji na hevrističnem modelu vrednotenja varnosti ob upo- števanju klasifikacije napadov, zasnovane v tem delu. Prav tako smo rezultate analiz primerjali z izbranimi protokoli. Rezultati varnostne analize so pokazali, da predlagani protokol zagotavlja visok nivo varnosti, saj je odporen na znane napade, ki smo jih klasificirali v prvem delu raziskave. Primerjava varnosti predlaganega protokola je le-tega postavila na prvo mesto. Prav tako smo nad predlaganim protokolom izvedli analizo učinkovitosti s pomočjo posamičnih analiz računske, komunikacijske in prostorske zahtevnosti. Rezultati analiz in primerjava z izbranimi protokoli so pokazali, da je protokol glede na prostorsko zahtevnost primerljiv z izbranimi protokoli. Kljub temu so rezultati analize računske in komunikacijske zahtevnosti pokazali, da je protokol še zmeraj učinkovit, saj temelji na simetrični kriptografiji in uporabi relativno majhnega števila računsko nezahtevnih operacij. Posledično se predlagani protokol uvršča med lahke protokole, ki so primerni za energijsko omejena brezžična senzorska omrežja.
Keywords:brezžična senzorska omrežja, internet stvari, protokoli, dogovor o ključu, overjanje, neinfrastrukturna omrežja
Year of publishing:2016
Publisher:[M. Turkanović]
Source:Maribor
UDC:004.72.057.4(043.3)
COBISS_ID:283726848 New window
NUK URN:URN:SI:UM:DK:BODZQM9S
Views:1486
Downloads:265
Metadata:XML RDF-CHPDL DC-XML DC-RDF
Categories:KTFMB - FERI
:
  
Average score:(0 votes)
Your score:Voting is allowed only for logged in users.
Share:AddThis
AddThis uses cookies that require your consent. Edit consent...

Hover the mouse pointer over a document title to show the abstract or click on the title to get all document metadata.

Secondary language

Language:English
Title:User authentication and key agreement protocols for ad hoc networks, tailored for the Internet of Things environment
Abstract:In recent years the attention of researchers has focused on the domain of ad hoc networks, and on ensuring security of these networks using cryptographic primitives. Such networks represent a new challenge for researchers due to their specific characteristics, in particular energy constraints. Therefore the main challenge is to find a trade off between security and efficiency. A large share of attention of ad hoc networks is dedicated to wireless sensor networks, which are an important part of the internet of things paradigm. In this thesis we investigate the scope of security protocols for wireless sensor networks in relation to the internet of things concept. Within the research, we prepare a classification of general attacks on authentication and key agreement protocols and attacks on wireless sensor networks. We conduct some security analysis on existing authentication and key agreement protocols for wireless sensor networks in order to discover weaknesses in security, design and efficiency. We demonstrate that particular protocols (i.e. Das et al.’s and Xue et al.’s scheme) have weaknesses in their design, security and efficiency. In order to sanitize these imperfection we present their improved versions. We demonstrate that the improved protocols are superior in regard to security and/or efficiency. The security of the protocol are evaluated through an ad hoc security valuation model. The use of the model presents the established practice in the field of evaluating security protocols for wireless sensor networks. The prepared classification of known attacks was used as the the attack basis for the model. The efficiency of the protocols was evaluated with the help of communication, computation and storage complexity analysis. In the literature review we discovered a lack of research in the field of security mechanisms when integrating wireless sensor networks into the internet of things. For this reason we develop a novel authentication and key agreement protocol which is based on the idea of integrating both mentioned fields. The proposed protocol enables any participant from the internet of things, authentication and key agreement with a sensor node from a wireless sensor network. In order to prove the security of the proposed protocol, a security analysis, based on the ad hoc security valuation model, was performed. The results of the analysis are compared with results from chosen protocols. They show that the proposed protocol enables a high level of security, since it is resilient to all classified attacks. The security comparison of the proposed protocol has put it in the forefront in relation to others. Furthermore, we analysed the efficiency of the protocol using individual computational, communicational and storage complexity analysis. The results of the storage complexity analysis and the comparison with other protocols have shown that it requires more storage space than others. Nevertheless, with the help of computational and communication complexity analysis, we conclude that the protocol is efficient, since it based on symmetric cryptography and uses only unpretentious mathematical computations. Thus we conclude that the protocol can be classified as a lighweight security protocol, and hence is suitable for energy constrained wireless sensor networks.
Keywords:wireless sensor networks, Internet of Things, cryptographic protocols, key agreement, authentication, ad hoc networks


Comments

Leave comment

You have to log in to leave a comment.

Comments (0)
0 - 0 / 0
 
There are no comments!

Back
Logos of partners University of Maribor University of Ljubljana University of Primorska University of Nova Gorica