|
| Titre : |
Web-based management platform for secure key redistribution in IoT networks |
| Type de document : |
document électronique |
| Auteurs : |
Issam Eddine Hamani ; Mahdi Benslim, Auteur ; BETTAYEB, Sami, Directeur de thèse |
| Editeur : |
Setif:UFA |
| Année de publication : |
2025 |
| Importance : |
1 vol (77 f .) |
| Format : |
29 cm |
| Langues : |
Anglais (eng) |
| Catégories : |
Thèses & Mémoires:Informatique
|
| Mots-clés : |
Internet of Things (IoT)
Key Management
Security
EVKMS (Efficient Vectors-Based Key Management Scheme)
Key Redistribution |
| Index. décimale : |
004 Informatique |
| Résumé : |
Managing security keys for large, dynamic Internet of Things (IoT) networks is
a significant challenge, often leading to security gaps and high operational costs. To
address this, this project involved the design and implementation of a centralized webbased
platform to simplify and automate this complex process. The platform is built
upon a lightweight cryptographic method known as the Efficient Vectors-Based Key
Management Scheme (EVKMS), which is specifically designed for resource-constrained
devices. The system automates the entire security lifecycle of devices, including their
addition, removal, and key updates, through a robust, task-based orchestration system
managed by a modern backend server. A key contribution is the implementation of a
comprehensive, immutable audit log that automatically records every administrative
action, ensuring full traceability and accountability. The platform’s effectiveness and its
workflows were validated in a high-fidelity simulation environment that mimics realworld
network communications. Ultimately, this work demonstrates that advanced
security proto
cols can be successfully translated into practical, scalable, and userfriendly
management tools for securing modern IoT deployments. |
| Note de contenu : |
Sommaire
Abstract i
Table of contents ix
List of figures x
List of tables xi
Abbreviations xii
Introduction 1
1 Background 2
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 IoT Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.2 Applications of IoT . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.3 Characteristics Of Iot . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.4 Foundational IoT Architectures . . . . . . . . . . . . . . . . . . 9
1.2.5 The Growing Importance of Interconnected Devices . . . . . . . 11
1.3 Cyber Security (CS) with internet of things . . . . . . . . . . . . . . . 11
1.3.1 Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3.2 Why we need Cs in iot ? . . . . . . . . . . . . . . . . . . . . . . 12
1.3.3 Crucial Cyber Security Considerations for IoT . . . . . . . . . . 13
1.3.4 The most popular Attacks in iot . . . . . . . . . . . . . . . . . . 14
1.3.5 IoT security principles . . . . . . . . . . . . . . . . . . . . . . . 16
1.4 Key Management Systems (KMS) . . . . . . . . . . . . . . . . . . . . . 17
1.4.1 KMS Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4.2 Key Management System Architecture . . . . . . . . . . . . . . 18
1.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2 Related Work 22
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.2 Fundamentals of Cryptography and Key Management . . . . . . . . . . 23
2.2.1 Symmetric and. Asymmetric Cryptography . . . . . . . . . . . 23
2.2.2 Key Lifecycle Management (Generation, Distribution, Storage,
Revocation, refresh) . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3 Key Management Schemes In IoT And Wireless Sensor Networks . . . 25
2.3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.2 Key Management Protocol For WSN . . . . . . . . . . . . . . . 26
2.3.3 Cryptographic Schemes for WSNs . . . . . . . . . . . . . . . . . 27
2.3.4 Static vs. Dynamic Key Management . . . . . . . . . . . . . . . 28
2.3.5 Review of Specific KMS Protocols . . . . . . . . . . . . . . . . . 29
2.3.6 Existing IoT Key Management Platforms and Tools . . . . . . . 39
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3 The Efficient Vectors-Based Key Management Scheme (EVKMS) 42
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.2 What Problem Does EVKMS Method Solve? . . . . . . . . . . . . . . . 44
3.3 Method Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.3.1 Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.3.2 Key Management Phases . . . . . . . . . . . . . . . . . . . . . . 44
3.4 What Cryptographic Techniques Does It Use? . . . . . . . . . . . . . . 46
3.5 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.6 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.7 Why This Method Was Chosen . . . . . . . . . . . . . . . . . . . . . . 47
3.7.1 Relevance for IoT . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.7.2 Suitability for Web-Based Implementation . . . . . . . . . . . . 47
3.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4 Design and Implementation of the Web Platform 49
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2 Objectives of the Platform . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.3 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.3.1 Core Components . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.3.2 Database Schema and Security Model . . . . . . . . . . . . . . . 54
4.4 Operational Workflows and Data Flow . . . . . . . . . . . . . . . . . . 55
4.5 Key Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.5.1 Centralized Device and Network Management . . . . . . . . . . 60
4.5.2 Task-Based Key Lifecycle Orchestration . . . . . . . . . . . . . 60
4.5.3 Autonomous Pairwise Key Establishment . . . . . . . . . . . . . 60
4.5.4 Secure Storage and Auditing . . . . . . . . . . . . . . . . . . . . 61
4.5.5 Automated and Manual Key Rotation . . . . . . . . . . . . . . 61
4.5.6 Simulation Environment . . . . . . . . . . . . . . . . . . . . . . 61
4.6 Technologies Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.6.1 Frontend Technologies (Administrative Dashboard) . . . . . . . 63
4.6.2 Backend Technologies . . . . . . . . . . . . . . . . . . . . . . . . 64
4.6.3 Database Technologies . . . . . . . . . . . . . . . . . . . . . . . 65
4.6.4 Containerization . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.6.5 Messaging Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.6.6 Development IDE . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.7 Screenshots or Interface Walkthrough . . . . . . . . . . . . . . . . . . . 67
4.7.1 Dashboard Overview: . . . . . . . . . . . . . . . . . . . . . . . . 67
4.7.2 Network Topology Management (Subsets, Gateways, Devices) . 67
4.7.3 Task Orchestration and Monitoring . . . . . . . . . . . . . . . . 68
4.7.4 Security Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Conclusion 72 |
| Côte titre : |
MAI/0971 |
Web-based management platform for secure key redistribution in IoT networks [document électronique] / Issam Eddine Hamani ; Mahdi Benslim, Auteur ; BETTAYEB, Sami, Directeur de thèse . - [S.l.] : Setif:UFA, 2025 . - 1 vol (77 f .) ; 29 cm. Langues : Anglais ( eng)
| Catégories : |
Thèses & Mémoires:Informatique
|
| Mots-clés : |
Internet of Things (IoT)
Key Management
Security
EVKMS (Efficient Vectors-Based Key Management Scheme)
Key Redistribution |
| Index. décimale : |
004 Informatique |
| Résumé : |
Managing security keys for large, dynamic Internet of Things (IoT) networks is
a significant challenge, often leading to security gaps and high operational costs. To
address this, this project involved the design and implementation of a centralized webbased
platform to simplify and automate this complex process. The platform is built
upon a lightweight cryptographic method known as the Efficient Vectors-Based Key
Management Scheme (EVKMS), which is specifically designed for resource-constrained
devices. The system automates the entire security lifecycle of devices, including their
addition, removal, and key updates, through a robust, task-based orchestration system
managed by a modern backend server. A key contribution is the implementation of a
comprehensive, immutable audit log that automatically records every administrative
action, ensuring full traceability and accountability. The platform’s effectiveness and its
workflows were validated in a high-fidelity simulation environment that mimics realworld
network communications. Ultimately, this work demonstrates that advanced
security proto
cols can be successfully translated into practical, scalable, and userfriendly
management tools for securing modern IoT deployments. |
| Note de contenu : |
Sommaire
Abstract i
Table of contents ix
List of figures x
List of tables xi
Abbreviations xii
Introduction 1
1 Background 2
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.1 IoT Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2.2 Applications of IoT . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2.3 Characteristics Of Iot . . . . . . . . . . . . . . . . . . . . . . . . 7
1.2.4 Foundational IoT Architectures . . . . . . . . . . . . . . . . . . 9
1.2.5 The Growing Importance of Interconnected Devices . . . . . . . 11
1.3 Cyber Security (CS) with internet of things . . . . . . . . . . . . . . . 11
1.3.1 Cybersecurity . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.3.2 Why we need Cs in iot ? . . . . . . . . . . . . . . . . . . . . . . 12
1.3.3 Crucial Cyber Security Considerations for IoT . . . . . . . . . . 13
1.3.4 The most popular Attacks in iot . . . . . . . . . . . . . . . . . . 14
1.3.5 IoT security principles . . . . . . . . . . . . . . . . . . . . . . . 16
1.4 Key Management Systems (KMS) . . . . . . . . . . . . . . . . . . . . . 17
1.4.1 KMS Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
1.4.2 Key Management System Architecture . . . . . . . . . . . . . . 18
1.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2 Related Work 22
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
2.2 Fundamentals of Cryptography and Key Management . . . . . . . . . . 23
2.2.1 Symmetric and. Asymmetric Cryptography . . . . . . . . . . . 23
2.2.2 Key Lifecycle Management (Generation, Distribution, Storage,
Revocation, refresh) . . . . . . . . . . . . . . . . . . . . . . . . 24
2.3 Key Management Schemes In IoT And Wireless Sensor Networks . . . 25
2.3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
2.3.2 Key Management Protocol For WSN . . . . . . . . . . . . . . . 26
2.3.3 Cryptographic Schemes for WSNs . . . . . . . . . . . . . . . . . 27
2.3.4 Static vs. Dynamic Key Management . . . . . . . . . . . . . . . 28
2.3.5 Review of Specific KMS Protocols . . . . . . . . . . . . . . . . . 29
2.3.6 Existing IoT Key Management Platforms and Tools . . . . . . . 39
2.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
3 The Efficient Vectors-Based Key Management Scheme (EVKMS) 42
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
3.2 What Problem Does EVKMS Method Solve? . . . . . . . . . . . . . . . 44
3.3 Method Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.3.1 Network Model . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.3.2 Key Management Phases . . . . . . . . . . . . . . . . . . . . . . 44
3.4 What Cryptographic Techniques Does It Use? . . . . . . . . . . . . . . 46
3.5 Advantages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.6 Limitations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.7 Why This Method Was Chosen . . . . . . . . . . . . . . . . . . . . . . 47
3.7.1 Relevance for IoT . . . . . . . . . . . . . . . . . . . . . . . . . . 47
3.7.2 Suitability for Web-Based Implementation . . . . . . . . . . . . 47
3.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
4 Design and Implementation of the Web Platform 49
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
4.2 Objectives of the Platform . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.3 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
4.3.1 Core Components . . . . . . . . . . . . . . . . . . . . . . . . . . 51
4.3.2 Database Schema and Security Model . . . . . . . . . . . . . . . 54
4.4 Operational Workflows and Data Flow . . . . . . . . . . . . . . . . . . 55
4.5 Key Functionalities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
4.5.1 Centralized Device and Network Management . . . . . . . . . . 60
4.5.2 Task-Based Key Lifecycle Orchestration . . . . . . . . . . . . . 60
4.5.3 Autonomous Pairwise Key Establishment . . . . . . . . . . . . . 60
4.5.4 Secure Storage and Auditing . . . . . . . . . . . . . . . . . . . . 61
4.5.5 Automated and Manual Key Rotation . . . . . . . . . . . . . . 61
4.5.6 Simulation Environment . . . . . . . . . . . . . . . . . . . . . . 61
4.6 Technologies Used . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
4.6.1 Frontend Technologies (Administrative Dashboard) . . . . . . . 63
4.6.2 Backend Technologies . . . . . . . . . . . . . . . . . . . . . . . . 64
4.6.3 Database Technologies . . . . . . . . . . . . . . . . . . . . . . . 65
4.6.4 Containerization . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.6.5 Messaging Protocol . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.6.6 Development IDE . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.7 Screenshots or Interface Walkthrough . . . . . . . . . . . . . . . . . . . 67
4.7.1 Dashboard Overview: . . . . . . . . . . . . . . . . . . . . . . . . 67
4.7.2 Network Topology Management (Subsets, Gateways, Devices) . 67
4.7.3 Task Orchestration and Monitoring . . . . . . . . . . . . . . . . 68
4.7.4 Security Auditing . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Conclusion 72 |
| Côte titre : |
MAI/0971 |
|