Search In this Thesis
   Search In this Thesis  
العنوان
group Key Management with Multi-Level
Security in the Internet of Things /
المؤلف
AboDoma,Noran Ahmed.
هيئة الاعداد
باحث / Noran Ahmed AboDoma
مشرف / Eman Shabaan
مشرف / Ahmad Mostafa
تاريخ النشر
2019
عدد الصفحات
99p.;
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
Computer Science Applications
تاريخ الإجازة
1/1/2019
مكان الإجازة
جامعة عين شمس - كلية الحاسبات والمعلومات - نظم الحاسبات
الفهرس
Only 14 pages are availabe for public view

from 99

from 99

Abstract

Data is constantly exchanged in networks of IoT devices. For the purpose of con dentiality
and integrity of the data, cryptographic keys are required to encrypt the exchanged
data. The encryption process requires a reliable key management scheme to handle the
creation and distribution of the group-key across the network devices. This thesis proposes
an Adaptive Time-Bound Key Management Scheme for IoT. In which, the lifetime
of the system is divided into equal periods of time-slots. Each time-slot has a unique
key, which can be derived by the joining nodes using a few parameters sent by the key
manager.
In order for a node to join the network, it speci es the time-period or the number of
time-slots it needs to join the network for. The server then responds with the values
the node needs in order to generate the keys of the requested time-slots. This scheme
ensures that the amount of seed values sent is based on the energy available at the
receiving nodes. Our protocol is designed to suit a dynamic environment, with a high
number of joins, predicted and unpredicted leaves while maintaining the security level
required. Our key management scheme can adapt the amount of data sent by the server
for the nodes based on the amount of energy that can be consumed in key generation
by the client, while maintaining the required security level.
The performance of the proposed scheme is measured in terms of energy consumption,
Storage and Communication by the IoT devices. It gives good results compared with
Veltri and LKH key management schemes.
The thesis also proposes An adaptive Time-Bound Attribute-Base Encryption Scheme
(TB-ABE) with an ecient indirect revocation handling. In which Time-Bound keys are
used along with Attribute Based Encryption. In Attributed Based Encryption, an access
policy is associated with the original text. where only those who have attributes that
satisfy the access policy can access the data. TB-ABE is a suitable technique for data
exchange between a large amount of devices based on attribute based access control.
The scheme is applied in a Fog-Cloud architecture where Fog devices are used as an
intermediate communication layer between the IoT devices and the Cloud. Fog devices
are also used for partial execution of the encryption and decryption operations to minimize
the amount of energy consumed by the IoT devices. Analysis of proposed scheme
proved the usage feasibility for limited-resource devices, while maintaining a secure data
exchange environment between IoT devices