An ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of Things

DC Field Value Language
dc.contributor.advisorKi-Hyung Kim-
dc.contributor.authorEMERSON, SAHAYA SHAMINI BRINTO MOL-
dc.date.accessioned2018-11-08T08:22:27Z-
dc.date.available2018-11-08T08:22:27Z-
dc.date.issued2016-08-
dc.identifier.other23035-
dc.identifier.urihttps://dspace.ajou.ac.kr/handle/2018.oak/13282-
dc.description학위논문(석사)--아주대학교 일반대학원 :컴퓨터공학과,2016. 8-
dc.description.tableofcontentsChapter 1 1 Introduction 1 1.1 Problem Statement 3 1.2 Aims and Objectives 4 1.3 Thesis Structure 4 Chapter 2 6 Background 6 2.1 Elliptical Curve Cryptography (ECC) 6 2.2 Kerberos Authentication 7 2.3 Distributed Capability based access control 8 2.4 Identity Authentication and Capability based access control 10 2.5 Authentication and Attribute based access Control 11 2.6 Security Analysis and Improvements of Authentication and Access Control in the Internet of Things 12 2.7 Access Control Methods 13 2.7.1 Role based Access Control 14 2.7.2 Attribute based Access Control 15 Chapter 3 18 Proposed Method 18 3.1 Key Establishment Phase 19 3.2 Mutual Authentication Phase 20 3.3 Capability based Access Control Method 21 Chapter 4 24 Security Analysis 24 4.1 Mutual Authentication 24 4.2 Replay attack 25 4.3 Man-in-the-Middle attack 26 4.4 DoS attacks 26 Chapter 5 28 Performance Evaluation 28 Chapter 6 33 Conclusion and Future Work 33 References 34-
dc.language.isoeng-
dc.publisherThe Graduate School, Ajou University-
dc.rights아주대학교 논문은 저작권에 의해 보호받습니다.-
dc.titleAn ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of Things-
dc.typeThesis-
dc.contributor.affiliation아주대학교 일반대학원-
dc.contributor.department일반대학원 컴퓨터공학과-
dc.date.awarded2016. 8-
dc.description.degreeMaster-
dc.identifier.localId758610-
dc.identifier.urlhttp://dcoll.ajou.ac.kr:9080/dcollection/jsp/common/DcLoOrgPer.jsp?sItemId=000000023035-
dc.subject.keywordInternet of Things-
dc.subject.keywordECC-
dc.subject.keywordsecurity-
dc.subject.keywordmutual authentication-
dc.subject.keywordaccess control.-
dc.description.alternativeAbstractThe rapid growth of small Internet connected devices, known as the Internet of Things (IoT), puts resilient challenges to create secure, private infrastructures. Each IoT device with unique identifier is able to communicate with other devices by enabling their self-identification to other devices. Hence, the security of the device, network and data becoming a big concern. Authentication and access control are two key techniques to prevent a computer or network component from being compromised. To enhance the security of IoT devices various authentication and access control schemes including authorization methods are proposed. Traditionally, authentication method such as Kerberos authentication protocol, etc. are used for network authentication. However, these protocols are not fits for constrained devices in IoT environment. Moreover, devices in constrained environments need more interoperable authentication and access control mechanisms to ensure the security of IoT devices. In this paper we proposed a security enhanced integrated approach of mutual authentication mechanism using Elliptical Curve Cryptography (ECC) and also a capability based access control mechanism to protect the IoT devices from unauthorized users. Our wok provides the end-to-end security and meets up the requirements of constrained devices. We have analyzed the proposed work against various attacks and shown the performance evaluation in comparison with related works.-
Appears in Collections:
Graduate School of Ajou University > Department of Computer Engineering > 3. Theses(Master)
Files in This Item:
There are no files associated with this item.

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Browse