DEVELOPMENT OF AUTHENTICATED KEY EXCHANGE PROTOCOL FOR INTERNET OF THINGS SENSOR LAYER
The research in this thesis done by adopting the Design Research Methodology (DRM) with research topic on the security of Internet of Things (IoT). From this research topic, a literature study was conducted to find the research focus and problem which is the security on the IoT sensor layer. The lit...
Saved in:
Main Author: | |
---|---|
Format: | Theses |
Language: | Indonesia |
Online Access: | https://digilib.itb.ac.id/gdl/view/36606 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Institut Teknologi Bandung |
Language: | Indonesia |
Summary: | The research in this thesis done by adopting the Design Research Methodology (DRM) with research topic on the security of Internet of Things (IoT). From this research topic, a literature study was conducted to find the research focus and problem which is the security on the IoT sensor layer. The literature study shows one of the main issues on IoT sensor layer is the privacy and security of data collected by the sensor. The security mechanism recommended to protect this is by using encryption algorithm, key management, and authentication schemes. Encryption algorithm is needed to maintain the confidentiality of data collected by sensors. Key management is needed to manage the keys used in the encryption algorithm. An authentication scheme is needed to make sure the device that communicating is a valid device.
In this research, an authenticated scheme will be developed and utilized on cryptographic key management process. In our approach, we combine the key exchange protocol based on Elliptic Curve Diffie-Hellman (ECDH) with identity-based authentication. The proposed protocol aims to provide encryption algorithm, key management, and authentication scheme for IoT sensor layer. The proposed protocol utilize two channel for exchanging data. The main channel used for key exchange and sensor data communication. The auxiliary channel used to exchange device’s indentiy information that occurred prior to key exchange process. The ECDH protocol will produce the same secret key on both devices. This secret key then will be derived into AES key using hash function. The proposed protocol was evaluated using security analysis against common security threats on IoT sensor layer, security testing using attack scenario to prove the authentication mechanism and data confidentiality, and formal verification of protocol using Scyther tool. The experimental results show the proposed protocol able to provide an authentication mechanism, data confidentiality, and resilience against common security threats on IoT sensor layers. |
---|