Lightweight security schemes for internet of things resource-constrained devices / Usman Ali

The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. S...

Full description

Saved in:
Bibliographic Details
Main Author: Usman , Ali
Format: Thesis
Published: 2024
Subjects:
Online Access:http://studentsrepo.um.edu.my/15420/2/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/1/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaya
Description
Summary:The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. Several authentication schemes have been proposed in recent years. However, some schemes are more focused on lightweight performance features using cryptographic operations with the lowest computational cost. The use of this operation affects important security requirements. Other authentication schemes that meet security requirements have unsatisfactory lightweight characteristics. To address these issues, three different authentication schemes are proposed, namely: Signcription-based Authentication Scheme for RFID termed SAS-RFID, Signcription-based Certificateless Authentication Scheme for WSN termed SCAS-WSN, and Enhanced Lightweight and Secure Certificateless Authentication for WSNs termed ELWSCAS-WSN. ELWSCAS-WSN is based on the concept of Authenticated Encryption with Associated Data (AEAD). The proposed solutions namely SAS-RFID, SCAS-WSN and ELWSCAS-WSN are based on elliptic curve cryptography (ECC) with Curve25519. The key exchange (KE) protocol X25519 is also used in the proposed solution to create a secure session key (SK) with reduced computational cost. The security of the proposed solution is evaluated using two different methods: formal analysis and informal analysis. Formal security analysis is conducted using the Real or Random (RoR) model and the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit. The efficiency of the proposed solution is evaluated and compared with existing related schemes. The results obtained show that the proposed solution is generally more efficient and resistant to known attacks. Further, the proposed solution fulfills all the required security features and is faster compared to the related existing authentication schemes.