الفهرس | Only 14 pages are availabe for public view |
Abstract The Internet of Things (IoT) is the interconnection of highly heterogeneous networked entities that was invented in 1980. It has provided a promising opportunity to build powerful systems and applications with its integration with social media and making decisions by devices instead of human beings. However, it experiences many challenges such as: complexity, memory, power consumption, vulnerability, and security. Device Authentication and access controls are essential aspects of IoT security. This security is considered as one of the main IoT challenges and development measuring tools in the wide world of IoT nowadays. Authentication allows freshness of the exchanged messages, beside its main task of legitimate participants to verify themselves mutually. Methods of providing this authentication is the use of lightweight cryptography with its key generations and key distribution as a major type in key management. However, access control is the dictates who’s allowed to access and use system information and resources.The first objective of this study is to present an easy and versatile way for a designer to pick up the optimum security scheme according to some important parameters including: application, device distribution and connections to the internet in an inventory way called a matrix map link. This map link provides cross connection between the IoT modes of operations, represented as matrix rows and security schemes as matrix columns. These modes of operation are classified into centralized and decentralized modes. The centralized mode represents the direct connectivity between the device and the internet, while the decentralized mode includes other various types such as Machine to Machine (M2M), Gateway (GW) and collaborative modes. Subsequently, a survey has been done to fill all the cells of this map link table based on techniques in the literature.The second objective of the study is to present a novel unicast key distribution protocol, which is based on a symmetric encryption with its advantages in realizing the same level of security with lower execution time, less power consumption and short key length. The proposal is based also on another primitive cryptography tool which are nonce and hashing. The selection of symmetric unicast key distribution is based on the result of complete comparison between various key management classifications. The security level of the proposed unicast key distribution protocol has been verified using Burrows-Abadi-Needham (BAN) logic security analysis as an authentication verification. Finally, the thesis presents the use of Logical Hierarchy Key (LKH) in Smart Grid (SG) in an easily and scalable system with lower number of modified rekeying messages in the two cases of member join and leave. Moreover, performance evaluation in the form of comparative study tables with similar techniques are presented based on performance metrics of execution time, number of communications, total messages bits and attacks. |