Titre : |
Security Solution for Internet of Things |
Type de document : |
texte imprimé |
Auteurs : |
Dina Sabrine Benrbiga, Auteur ; Hanane Rabhi ; Djamila Mechta, Directeur de thèse |
Editeur : |
Setif:UFA |
Année de publication : |
2024 |
Importance : |
1 vol (45 f .) |
Format : |
29 cm |
Langues : |
Anglais (eng) |
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Internet of Things (IoT)
Software-Defined Networking (SDN)
Authentication |
Index. décimale : |
004 - Informatique |
Résumé : |
The Internet of Things (IoT) plays an increasingly crucial role in the contemporary world.
It is an interconnected network of physical devices equipped with sensors, software, and
communication technologies, enabling data exchange and interaction with the environment.
However, despite its numerous advantages, the IoT also presents challenges, particularly in
terms of security. The limitations of IoT devices pose a major challenge, as some of these
devices have limited resources, making the implementation of advanced security measures
more complex. Given the importance of security and reliability in IoT, it is essential to
implement robust security protocols. In our research, we addressed these issues by proposing
a foundational architecture based on blockchain technology and Software-Defined Networking
(SDN). This architecture aims to solve security problems in the IoT by ensuring reliable
authentication between different devices. To evaluate the performance of our approach,
we used the AVISPA simulator. The results of our experiments and the security analysis
demonstrate the security and reliability of our solution. |
Note de contenu : |
Sommaire
Table of contents vii
List of figures viii
List of tables ix
Abbreviations x
General Introduction 1
1 Security Schemes: State of the art 3
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 IoT Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 Five-layer architecture . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 IoT security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Common security challenges in various layers . . . . . . . . . . . 6
1.4 Categorization of security issues . . . . . . . . . . . . . . . . . . . . . . 8
1.4.1 Low-level security issues . . . . . . . . . . . . . . . . . . . . . . 8
1.4.2 Intermediate-level security issues . . . . . . . . . . . . . . . . . 8
1.4.3 High-level security issues . . . . . . . . . . . . . . . . . . . . . . 10
1.5 Intermediate-level and high-level security solutions (about network layer) 10
1.6 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7 discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 Lightweight Anonymous Authentication, Key Agreement, and Blockchain
Scheme for Secure SDN-Driven IoT Systems 17
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.1 Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.2 Software-Defined Networking (SDN) . . . . . . . . . . . . . . . 20
2.3 System architecture and threat model . . . . . . . . . . . . . . . . . . . 21
2.4 The Proposed Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.4.1 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4.2 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4.3 Authentication and key agreement . . . . . . . . . . . . . . . . 26
2.5 Secure and Decentralized Architecture for IoT Communication: Integration
of Blockchain and P2P Network . . . . . . . . . . . . . . . . . . . . . . 29
2.5.1 Blockchain Recording for Integrity and Traceability . . . . . . . 30
2.5.2 Direct Communication Between Devices . . . . . . . . . . . . . 30
2.5.3 Message Encryption by Sender . . . . . . . . . . . . . . . . . . . 30
2.5.4 Message Decryption by Receiver . . . . . . . . . . . . . . . . . . 30
2.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3 Performance evaluation of proposed scheme 31
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2 Experiment environment . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3.1 Informal security analysis . . . . . . . . . . . . . . . . . . . . . 32
3.3.2 Formal Security Analysis using AVISPA . . . . . . . . . . . . . 33
3.3.3 Security properties comparison . . . . . . . . . . . . . . . . . . 34
3.4 Performance evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.4.1 Computational cost comparison . . . . . . . . . . . . . . . . . . 35
3.4.2 Communication cost comparison . . . . . . . . . . . . . . . . . . 37
3.5 Simulation Results and Discussion . . . . . . . . . . . . . . . . . . . . . 38
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 |
Côte titre : |
MAI/0838 |
Security Solution for Internet of Things [texte imprimé] / Dina Sabrine Benrbiga, Auteur ; Hanane Rabhi ; Djamila Mechta, Directeur de thèse . - [S.l.] : Setif:UFA, 2024 . - 1 vol (45 f .) ; 29 cm. Langues : Anglais ( eng)
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Internet of Things (IoT)
Software-Defined Networking (SDN)
Authentication |
Index. décimale : |
004 - Informatique |
Résumé : |
The Internet of Things (IoT) plays an increasingly crucial role in the contemporary world.
It is an interconnected network of physical devices equipped with sensors, software, and
communication technologies, enabling data exchange and interaction with the environment.
However, despite its numerous advantages, the IoT also presents challenges, particularly in
terms of security. The limitations of IoT devices pose a major challenge, as some of these
devices have limited resources, making the implementation of advanced security measures
more complex. Given the importance of security and reliability in IoT, it is essential to
implement robust security protocols. In our research, we addressed these issues by proposing
a foundational architecture based on blockchain technology and Software-Defined Networking
(SDN). This architecture aims to solve security problems in the IoT by ensuring reliable
authentication between different devices. To evaluate the performance of our approach,
we used the AVISPA simulator. The results of our experiments and the security analysis
demonstrate the security and reliability of our solution. |
Note de contenu : |
Sommaire
Table of contents vii
List of figures viii
List of tables ix
Abbreviations x
General Introduction 1
1 Security Schemes: State of the art 3
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2 IoT Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.2.1 Five-layer architecture . . . . . . . . . . . . . . . . . . . . . . . 4
1.3 IoT security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
1.3.1 Common security challenges in various layers . . . . . . . . . . . 6
1.4 Categorization of security issues . . . . . . . . . . . . . . . . . . . . . . 8
1.4.1 Low-level security issues . . . . . . . . . . . . . . . . . . . . . . 8
1.4.2 Intermediate-level security issues . . . . . . . . . . . . . . . . . 8
1.4.3 High-level security issues . . . . . . . . . . . . . . . . . . . . . . 10
1.5 Intermediate-level and high-level security solutions (about network layer) 10
1.6 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.7 discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 Lightweight Anonymous Authentication, Key Agreement, and Blockchain
Scheme for Secure SDN-Driven IoT Systems 17
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.1 Blockchain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.2.2 Software-Defined Networking (SDN) . . . . . . . . . . . . . . . 20
2.3 System architecture and threat model . . . . . . . . . . . . . . . . . . . 21
2.4 The Proposed Approach . . . . . . . . . . . . . . . . . . . . . . . . . . 21
2.4.1 Initialization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4.2 Registration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.4.3 Authentication and key agreement . . . . . . . . . . . . . . . . 26
2.5 Secure and Decentralized Architecture for IoT Communication: Integration
of Blockchain and P2P Network . . . . . . . . . . . . . . . . . . . . . . 29
2.5.1 Blockchain Recording for Integrity and Traceability . . . . . . . 30
2.5.2 Direct Communication Between Devices . . . . . . . . . . . . . 30
2.5.3 Message Encryption by Sender . . . . . . . . . . . . . . . . . . . 30
2.5.4 Message Decryption by Receiver . . . . . . . . . . . . . . . . . . 30
2.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3 Performance evaluation of proposed scheme 31
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.2 Experiment environment . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3 Security Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.3.1 Informal security analysis . . . . . . . . . . . . . . . . . . . . . 32
3.3.2 Formal Security Analysis using AVISPA . . . . . . . . . . . . . 33
3.3.3 Security properties comparison . . . . . . . . . . . . . . . . . . 34
3.4 Performance evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
3.4.1 Computational cost comparison . . . . . . . . . . . . . . . . . . 35
3.4.2 Communication cost comparison . . . . . . . . . . . . . . . . . . 37
3.5 Simulation Results and Discussion . . . . . . . . . . . . . . . . . . . . . 38
3.6 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39 |
Côte titre : |
MAI/0838 |
|