Search In this Thesis
   Search In this Thesis  
العنوان
Scalable and Reliable Dynamic Key Distribution Protocol with Explicit Key Authentication in Industrial Internet of
Things IIOT (SRDKEL) /
المؤلف
El laban, Samah Mohamed Sayed Metwally.
هيئة الاعداد
مشرف / Samah Mohamed Sayed Metwally El laban
مشرف / Heba Kamal Aslan
مشرف / Ayman Moustafa Hassan
مشرف / adly shahat merghany
الموضوع
Electrical Engineering Department. Electrical Engineering Department. Electrical Engineering Department. Engineering.
تاريخ النشر
2023.
عدد الصفحات
89 p. :
اللغة
الإنجليزية
الدرجة
الدكتوراه
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2023
مكان الإجازة
جامعة بنها - كلية الهندسة ببنها - الهندسة الكهربية
الفهرس
Only 14 pages are availabe for public view

from 103

from 103

Abstract

The Internet of Things (IoT) is the interconnection of highly heterogeneous networked entities that was invented in 1980. It has provided a promising opportunity to build powerful systems and applications with its integration with social media and making decisions by devices instead of human beings. However, it experiences many challenges such as: complexity, memory, power consumption, vulnerability, and security. Device Authentication and access controls are essential aspects of IoT security. This security is considered as one of the main IoT challenges and development measuring tools in the wide world of IoT nowadays. Authentication allows freshness of the exchanged messages, beside its main task of legitimate participants to verify themselves mutually. Methods of providing this authentication is the use of lightweight cryptography with its key generations and key distribution as a major type in key management. However, access control is the dictates who’s allowed to access and use system information and resources.The first objective of this study is to present an easy and versatile way for a designer to pick up the optimum security scheme according to some important parameters including: application, device distribution and connections to the internet in an inventory way called a matrix map link. This map link provides cross connection between the IoT modes of operations, represented as matrix rows and security schemes as matrix columns. These modes of operation are classified into centralized and decentralized modes. The centralized mode represents the direct connectivity between the device and the internet, while the decentralized mode includes other various types such as Machine to Machine (M2M), Gateway (GW) and collaborative modes. Subsequently, a survey has been done to fill all the cells of this map link table based on techniques in the literature.The second objective of the study is to present a novel unicast key distribution protocol, which is based on a symmetric encryption with its advantages in realizing the same level of security with lower execution time, less power consumption and short key length. The proposal is based also on another primitive cryptography tool which are nonce and hashing. The selection of symmetric unicast key distribution is based on the result of complete comparison between various key management classifications. The security level of the proposed unicast key distribution protocol has been verified using Burrows-Abadi-Needham (BAN) logic security analysis as an authentication verification. Finally, the thesis presents the use of Logical Hierarchy Key (LKH) in Smart Grid (SG) in an easily and scalable system with lower number of modified rekeying messages in the two cases of member join and leave. Moreover, performance evaluation in the form of comparative study tables with similar techniques are presented based on performance metrics of execution time, number of communications, total messages bits and attacks.