![]() | Only 14 pages are availabe for public view |
Abstract Data is constantly exchanged in networks of IoT devices. For the purpose of condentiality and integrity of the data, cryptographic keys are required to encrypt the exchanged data. The encryption process requires a reliable key management scheme to handle the creation and distribution of the group-key across the network devices. This thesis proposes an Adaptive Time-Bound Key Management Scheme for IoT. In which, the lifetime of the system is divided into equal periods of time-slots. Each time-slot has a unique key, which can be derived by the joining nodes using a few parameters sent by the key manager. In order for a node to join the network, it species the time-period or the number of time-slots it needs to join the network for. The server then responds with the values the node needs in order to generate the keys of the requested time-slots. This scheme ensures that the amount of seed values sent is based on the energy available at the receiving nodes. Our protocol is designed to suit a dynamic environment, with a high number of joins, predicted and unpredicted leaves while maintaining the security level required. Our key management scheme can adapt the amount of data sent by the server for the nodes based on the amount of energy that can be consumed in key generation by the client, while maintaining the required security level. The performance of the proposed scheme is measured in terms of energy consumption, Storage and Communication by the IoT devices. It gives good results compared with Veltri and LKH key management schemes. The thesis also proposes An adaptive Time-Bound Attribute-Base Encryption Scheme (TB-ABE) with an ecient indirect revocation handling. In which Time-Bound keys are used along with Attribute Based Encryption. In Attributed Based Encryption, an access policy is associated with the original text. where only those who have attributes that satisfy the access policy can access the data. TB-ABE is a suitable technique for data exchange between a large amount of devices based on attribute based access control. The scheme is applied in a Fog-Cloud architecture where Fog devices are used as an intermediate communication layer between the IoT devices and the Cloud. Fog devices are also used for partial execution of the encryption and decryption operations to minimize the amount of energy consumed by the IoT devices. Analysis of proposed scheme proved the usage feasibility for limited-resource devices, while maintaining a secure data exchange environment between IoT devices |