Security in smart object networks

dc.contributorAalto-yliopistofi
dc.contributorAalto Universityen
dc.contributor.advisorKeränen, Ari
dc.contributor.advisorArkko, Jari
dc.contributor.authorSethi, Mohit
dc.contributor.departmentTietotekniikan laitosfi
dc.contributor.schoolPerustieteiden korkeakoulufi
dc.contributor.supervisorAura, Tuomas
dc.contributor.supervisorHidell, Markus
dc.date.accessioned2012-10-30T12:24:33Z
dc.date.available2012-10-30T12:24:33Z
dc.date.issued2012
dc.description.abstractInternet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes. This involves the inter-connection of a large number of heterogeneous networked entities and networks. Emergence of technologies such as Zigbee, Bluetooth low energy and embedded sensors has transformed simple physical devices into smart objects that can understand and react to their environment. Such smart objects form the building blocks for the Internet of Things. The communication infrastructure for these objects is based on an extension of the Internet protocol stack. Although the need for security is widely accepted, there is no clear consensus on how IP-based Internet security protocols can be applied to resource-constrained smart object networks. In this thesis, we develop a new secure and energy efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks. We contribute to the standardization of the generic communication architecture by adding security and delegation components for smart objects that sleep for large amounts of time during their operational phase. This architecture ensures data integrity and authenticity over a multi-hop network topology. It also provides a mirroring mechanism that uses a proxy to serve data on behalf of sleeping smart objects, thereby allowing them to act as always-online web servers. A working prototype implementation of the architecture is also developed. The security features in the architecture presented in this thesis are based on using strong public-key cryptography. Contrary to popular belief, our performance evaluation shows that asymmetric public-key cryptography can be implemented on small 8-bit micro-controllers without modifying the underlying cryptographic algorithms.en
dc.format.extent73 s.
dc.format.mimetypeapplication/pdf
dc.identifier.urihttps://aaltodoc.aalto.fi/handle/123456789/6050
dc.identifier.urnURN:NBN:fi:aalto-201210313327
dc.language.isoenen
dc.programme.majorTietokoneverkotfi
dc.programme.mcodeT-110
dc.rights.accesslevelopenAccess
dc.subject.keywordIoTen
dc.subject.keywordsmart objectsen
dc.subject.keywordsecurityen
dc.subject.keywordCoAPen
dc.subject.keywordasymmetric cryptographyen
dc.subject.keywordintegrityen
dc.subject.keywordauthenticityen
dc.subject.keywordmirroring mechanismen
dc.titleSecurity in smart object networksen
dc.typeG2 Pro gradu, diplomityöfi
dc.type.dcmitypetexten
dc.type.okmG2 Pro gradu, diplomityö
dc.type.ontasotDiplomityöfi
dc.type.ontasotMaster's thesisen
dc.type.publicationmasterThesis
local.aalto.digifolderAalto_09575
local.aalto.idinssi45207
local.aalto.inssiarchivenr6930
local.aalto.inssilocationP1 Ark Aalto
local.aalto.openaccessyes

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
master_sethi_mohit_2012.pdf
Size:
2.1 MB
Format:
Adobe Portable Document Format