Optimizing authentication performance for industrial IoT devices
With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memo...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Theses and Dissertations |
Language: | English |
Published: |
2018
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/76019 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
id |
sg-ntu-dr.10356-76019 |
---|---|
record_format |
dspace |
spelling |
sg-ntu-dr.10356-760192023-07-04T15:56:22Z Optimizing authentication performance for industrial IoT devices Wang, Mingyu Goh Wang Ling School of Electrical and Electronic Engineering DRNTU::Engineering::Electrical and electronic engineering With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memory resources, which is unable to meet the needs of lightweight IoT devices. The idea of the new authentication protocol is to use the historical data exchanged between an IoT device (verifier) and a server (prover) as a second authentication factor, in addition to the conventional factor of a shared secret key. The new authentication method needs more memory resources of server instead of IoT devices, which is what people want. However, the historical data authentication factor is considered a big dataset and the retrieve of selected pieces of data from a large data pool usually encounters long latency if the algorithm and implementation are not well optimized. To reduce latency, three methods are proposed in this dissertation. After presenting the new authentication method using historical data and optimizing it, a real system is implemented. Because the IoT devices are normally unable to verify the legality of the server, BeagleBone Black (BBB) (a kind of single board computer) is used to verify. Thus, the communication between the IoT device and BBB and between BBB and server are key problems. A structure named “bridge” is built and in order to insert verifier process, ip_queue in Linux is adopted. Thus, an optimized authentication process using historical data can be run in this system. Master of Science (Electronics) 2018-09-18T05:49:33Z 2018-09-18T05:49:33Z 2018 Thesis http://hdl.handle.net/10356/76019 en 81 p. application/pdf |
institution |
Nanyang Technological University |
building |
NTU Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NTU Library |
collection |
DR-NTU |
language |
English |
topic |
DRNTU::Engineering::Electrical and electronic engineering |
spellingShingle |
DRNTU::Engineering::Electrical and electronic engineering Wang, Mingyu Optimizing authentication performance for industrial IoT devices |
description |
With the rising prevalence of industrial Internet of Things (IoT) devices, it has become more important to ensure that IoT devices are secure. A method that attackers use to gain access to the IoT devices is to spoof themselves as the IoT server. Traditional authentication methods need a lot of memory resources, which is unable to meet the needs of lightweight IoT devices. The idea of the new authentication protocol is to use the historical data exchanged between an IoT device (verifier) and a server (prover) as a second authentication factor, in addition to the conventional factor of a shared secret key. The new authentication method needs more memory resources of server instead of IoT devices, which is what people want. However, the historical data authentication factor is considered a big dataset and the retrieve of selected pieces of data from a large data pool usually encounters long latency if the algorithm and implementation are not well optimized. To reduce latency, three methods are proposed in this dissertation. After presenting the new authentication method using historical data and optimizing it, a real system is implemented. Because the IoT devices are normally unable to verify the legality of the server, BeagleBone Black (BBB) (a kind of single board computer) is used to verify. Thus, the communication between the IoT device and BBB and between BBB and server are key problems. A structure named “bridge” is built and in order to insert verifier process, ip_queue in Linux is adopted. Thus, an optimized authentication process using historical data can be run in this system. |
author2 |
Goh Wang Ling |
author_facet |
Goh Wang Ling Wang, Mingyu |
format |
Theses and Dissertations |
author |
Wang, Mingyu |
author_sort |
Wang, Mingyu |
title |
Optimizing authentication performance for industrial IoT devices |
title_short |
Optimizing authentication performance for industrial IoT devices |
title_full |
Optimizing authentication performance for industrial IoT devices |
title_fullStr |
Optimizing authentication performance for industrial IoT devices |
title_full_unstemmed |
Optimizing authentication performance for industrial IoT devices |
title_sort |
optimizing authentication performance for industrial iot devices |
publishDate |
2018 |
url |
http://hdl.handle.net/10356/76019 |
_version_ |
1772827321550503936 |