검색 상세

An ECC based Light-weight Authentication Mechanism and Capability based Access Control for Internet of Things

초록/요약

The rapid growth of small Internet connected devices, known as the Internet of Things (IoT), puts resilient challenges to create secure, private infrastructures. Each IoT device with unique identifier is able to communicate with other devices by enabling their self-identification to other devices. Hence, the security of the device, network and data becoming a big concern. Authentication and access control are two key techniques to prevent a computer or network component from being compromised. To enhance the security of IoT devices various authentication and access control schemes including authorization methods are proposed. Traditionally, authentication method such as Kerberos authentication protocol, etc. are used for network authentication. However, these protocols are not fits for constrained devices in IoT environment. Moreover, devices in constrained environments need more interoperable authentication and access control mechanisms to ensure the security of IoT devices. In this paper we proposed a security enhanced integrated approach of mutual authentication mechanism using Elliptical Curve Cryptography (ECC) and also a capability based access control mechanism to protect the IoT devices from unauthorized users. Our wok provides the end-to-end security and meets up the requirements of constrained devices. We have analyzed the proposed work against various attacks and shown the performance evaluation in comparison with related works.

more

목차

Chapter 1 1
Introduction 1
1.1 Problem Statement 3
1.2 Aims and Objectives 4
1.3 Thesis Structure 4
Chapter 2 6
Background 6
2.1 Elliptical Curve Cryptography (ECC) 6
2.2 Kerberos Authentication 7
2.3 Distributed Capability based access control 8
2.4 Identity Authentication and Capability based access control 10
2.5 Authentication and Attribute based access Control 11
2.6 Security Analysis and Improvements of Authentication and Access Control in the Internet of Things 12
2.7 Access Control Methods 13
2.7.1 Role based Access Control 14
2.7.2 Attribute based Access Control 15
Chapter 3 18
Proposed Method 18
3.1 Key Establishment Phase 19
3.2 Mutual Authentication Phase 20
3.3 Capability based Access Control Method 21
Chapter 4 24
Security Analysis 24
4.1 Mutual Authentication 24
4.2 Replay attack 25
4.3 Man-in-the-Middle attack 26
4.4 DoS attacks 26
Chapter 5 28
Performance Evaluation 28
Chapter 6 33
Conclusion and Future Work 33
References 34

more