Lightweight security schemes for internet of things resource-constrained devices / Usman Ali

The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. S...

Full description

Saved in:
Bibliographic Details
Main Author: Usman , Ali
Format: Thesis
Published: 2024
Subjects:
Online Access:http://studentsrepo.um.edu.my/15420/2/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/1/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Malaya
id my.um.stud.15420
record_format eprints
spelling my.um.stud.154202024-09-08T21:57:11Z Lightweight security schemes for internet of things resource-constrained devices / Usman Ali Usman , Ali QA75 Electronic computers. Computer science QA76 Computer software The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. Several authentication schemes have been proposed in recent years. However, some schemes are more focused on lightweight performance features using cryptographic operations with the lowest computational cost. The use of this operation affects important security requirements. Other authentication schemes that meet security requirements have unsatisfactory lightweight characteristics. To address these issues, three different authentication schemes are proposed, namely: Signcription-based Authentication Scheme for RFID termed SAS-RFID, Signcription-based Certificateless Authentication Scheme for WSN termed SCAS-WSN, and Enhanced Lightweight and Secure Certificateless Authentication for WSNs termed ELWSCAS-WSN. ELWSCAS-WSN is based on the concept of Authenticated Encryption with Associated Data (AEAD). The proposed solutions namely SAS-RFID, SCAS-WSN and ELWSCAS-WSN are based on elliptic curve cryptography (ECC) with Curve25519. The key exchange (KE) protocol X25519 is also used in the proposed solution to create a secure session key (SK) with reduced computational cost. The security of the proposed solution is evaluated using two different methods: formal analysis and informal analysis. Formal security analysis is conducted using the Real or Random (RoR) model and the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit. The efficiency of the proposed solution is evaluated and compared with existing related schemes. The results obtained show that the proposed solution is generally more efficient and resistant to known attacks. Further, the proposed solution fulfills all the required security features and is faster compared to the related existing authentication schemes. 2024-01 Thesis NonPeerReviewed application/pdf http://studentsrepo.um.edu.my/15420/2/Usman_Ali.pdf application/pdf http://studentsrepo.um.edu.my/15420/1/Usman_Ali.pdf Usman , Ali (2024) Lightweight security schemes for internet of things resource-constrained devices / Usman Ali. PhD thesis, Universiti Malaya. http://studentsrepo.um.edu.my/15420/
institution Universiti Malaya
building UM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaya
content_source UM Student Repository
url_provider http://studentsrepo.um.edu.my/
topic QA75 Electronic computers. Computer science
QA76 Computer software
spellingShingle QA75 Electronic computers. Computer science
QA76 Computer software
Usman , Ali
Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
description The implementation of efficient security mechanisms for Internet of Things (IoT) environments based on Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSN) has always been a constant challenge due to limited computing resources and communication over insecure wireless channels. Several authentication schemes have been proposed in recent years. However, some schemes are more focused on lightweight performance features using cryptographic operations with the lowest computational cost. The use of this operation affects important security requirements. Other authentication schemes that meet security requirements have unsatisfactory lightweight characteristics. To address these issues, three different authentication schemes are proposed, namely: Signcription-based Authentication Scheme for RFID termed SAS-RFID, Signcription-based Certificateless Authentication Scheme for WSN termed SCAS-WSN, and Enhanced Lightweight and Secure Certificateless Authentication for WSNs termed ELWSCAS-WSN. ELWSCAS-WSN is based on the concept of Authenticated Encryption with Associated Data (AEAD). The proposed solutions namely SAS-RFID, SCAS-WSN and ELWSCAS-WSN are based on elliptic curve cryptography (ECC) with Curve25519. The key exchange (KE) protocol X25519 is also used in the proposed solution to create a secure session key (SK) with reduced computational cost. The security of the proposed solution is evaluated using two different methods: formal analysis and informal analysis. Formal security analysis is conducted using the Real or Random (RoR) model and the Automated Validation of Internet Security Protocols and Applications (AVISPA) toolkit. The efficiency of the proposed solution is evaluated and compared with existing related schemes. The results obtained show that the proposed solution is generally more efficient and resistant to known attacks. Further, the proposed solution fulfills all the required security features and is faster compared to the related existing authentication schemes.
format Thesis
author Usman , Ali
author_facet Usman , Ali
author_sort Usman , Ali
title Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
title_short Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
title_full Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
title_fullStr Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
title_full_unstemmed Lightweight security schemes for internet of things resource-constrained devices / Usman Ali
title_sort lightweight security schemes for internet of things resource-constrained devices / usman ali
publishDate 2024
url http://studentsrepo.um.edu.my/15420/2/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/1/Usman_Ali.pdf
http://studentsrepo.um.edu.my/15420/
_version_ 1811682658219982848