Optimizing authentication performance for industrial IoT devices

With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memo...

Full description

Saved in:
Bibliographic Details
Main Author: Wang, Mingyu
Other Authors: Goh Wang Ling
Format: Theses and Dissertations
Language:English
Published: 2018
Subjects:
Online Access:http://hdl.handle.net/10356/76019
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Language: English
id sg-ntu-dr.10356-76019
record_format dspace
spelling sg-ntu-dr.10356-760192023-07-04T15:56:22Z Optimizing authentication performance for industrial IoT devices Wang, Mingyu Goh Wang Ling School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memory resources, which is unable to meet the needs of lightweight IoT devices. The idea of the new authentication protocol is to use the historical data exchanged between an IoT device (verifier) and a server (prover) as a second authentication factor, in addition to the conventional factor of a shared secret key. The new authentication method needs more memory resources of server instead of IoT devices, which is what people want. However, the historical data authentication factor is considered a big dataset and the retrieve of selected pieces of data from a large data pool usually encounters long latency if the algorithm and implementation are not well optimized. To reduce latency, three methods are proposed in this dissertation. After presenting the new authentication method using historical data and optimizing it, a real system is implemented. Because the IoT devices are normally unable to verify the legality of the server, BeagleBone Black (BBB) (a kind of single board computer) is used to verify. Thus, the communication between the IoT device and BBB and between BBB and server are key problems. A structure named “bridge” is built and in order to insert verifier process, ip_queue in Linux is adopted. Thus, an optimized authentication process using historical data can be run in this system. Master of Science (Electronics) 2018-09-18T05:49:33Z 2018-09-18T05:49:33Z 2018 Thesis http://hdl.handle.net/10356/76019 en 81 p. application/pdf
institution Nanyang Technological University
building NTU Library
continent Asia
country Singapore
Singapore
content_provider NTU Library
collection DR-NTU
language English
topic DRNTU::Engineering::Electrical and electronic engineering
spellingShingle DRNTU::Engineering::Electrical and electronic engineering
Wang, Mingyu
Optimizing authentication performance for industrial IoT devices
description With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memory resources, which is unable to meet the needs of lightweight IoT devices. The idea of the new authentication protocol is to use the historical data exchanged between an IoT device (verifier) and a server (prover) as a second authentication factor, in addition to the conventional factor of a shared secret key. The new authentication method needs more memory resources of server instead of IoT devices, which is what people want. However, the historical data authentication factor is considered a big dataset and the retrieve of selected pieces of data from a large data pool usually encounters long latency if the algorithm and implementation are not well optimized. To reduce latency, three methods are proposed in this dissertation. After presenting the new authentication method using historical data and optimizing it, a real system is implemented. Because the IoT devices are normally unable to verify the legality of the server, BeagleBone Black (BBB) (a kind of single board computer) is used to verify. Thus, the communication between the IoT device and BBB and between BBB and server are key problems. A structure named “bridge” is built and in order to insert verifier process, ip_queue in Linux is adopted. Thus, an optimized authentication process using historical data can be run in this system.
author2 Goh Wang Ling
author_facet Goh Wang Ling
Wang, Mingyu
format Theses and Dissertations
author Wang, Mingyu
author_sort Wang, Mingyu
title Optimizing authentication performance for industrial IoT devices
title_short Optimizing authentication performance for industrial IoT devices
title_full Optimizing authentication performance for industrial IoT devices
title_fullStr Optimizing authentication performance for industrial IoT devices
title_full_unstemmed Optimizing authentication performance for industrial IoT devices
title_sort optimizing authentication performance for industrial iot devices
publishDate 2018
url http://hdl.handle.net/10356/76019
_version_ 1772827321550503936