search query: @keyword IoT / total: 27
reference: 25 / 27
« previous | next »
Author:Sethi, Mohit
Title:Security in smart object networks
Publication type:Master's thesis
Publication year:2012
Pages:(9) + 69 s. + liitt. 4      Language:   eng
Department/School:Tietotekniikan laitos
Main subject:Tietokoneverkot   (T-110)
Supervisor:Aura, Tuomas ; Hidell, Markus
Instructor:Keränen, Ari ; Arkko, Jari
Electronic version URL: http://urn.fi/URN:NBN:fi:aalto-201210313327
OEVS:
Electronic archive copy is available via Aalto Thesis Database.
Instructions

Reading digital theses in the closed network of the Aalto University Harald Herlin Learning Centre

In the closed network of Learning Centre you can read digital and digitized theses not available in the open network.

The Learning Centre contact details and opening hours: https://learningcentre.aalto.fi/en/harald-herlin-learning-centre/

You can read theses on the Learning Centre customer computers, which are available on all floors.

Logging on to the customer computers

  • Aalto University staff members log on to the customer computer using the Aalto username and password.
  • Other customers log on using a shared username and password.

Opening a thesis

  • On the desktop of the customer computers, you will find an icon titled:

    Aalto Thesis Database

  • Click on the icon to search for and open the thesis you are looking for from Aaltodoc database. You can find the thesis file by clicking the link on the OEV or OEVS field.

Reading the thesis

  • You can either print the thesis or read it on the customer computer screen.
  • You cannot save the thesis file on a flash drive or email it.
  • You cannot copy text or images from the file.
  • You cannot edit the file.

Printing the thesis

  • You can print the thesis for your personal study or research use.
  • Aalto University students and staff members may print black-and-white prints on the PrintingPoint devices when using the computer with personal Aalto username and password. Color printing is possible using the printer u90203-psc3, which is located near the customer service. Color printing is subject to a charge to Aalto University students and staff members.
  • Other customers can use the printer u90203-psc3. All printing is subject to a charge to non-University members.
Location:P1 Ark Aalto  6930   | Archive
Keywords:IoT
smart objects
security
CoAP
asymmetric cryptography
integrity
authenticity
mirroring mechanism
Abstract (eng): Internet of Things (IoT) refers to an inter-connected world where physical devices are seamlessly integrated into the Internet and become active participants of business, information and social processes.
This involves the inter-connection of a large number of heterogeneous networked entities and networks.
Emergence of technologies such as Zigbee, Bluetooth low energy and embedded sensors has transformed simple physical devices into smart objects that can understand and react to their environment.
Such smart objects form the building blocks for the Internet of Things.
The communication infrastructure for these objects is based on an extension of the Internet protocol stack.

Although the need for security is widely accepted, there is no clear consensus on how IP-based Internet security protocols can be applied to resource-constrained smart object networks.
In this thesis, we develop a new secure and energy efficient communication model for the Constrained Application Protocol (CoAP), a light-weight communication protocol designed for smart object networks.
We contribute to the standardization of the generic communication architecture by adding security and delegation components for smart objects that sleep for large amounts of time during their operational phase.
This architecture ensures data integrity and authenticity over a multi-hop network topology.
It also provides a mirroring mechanism that uses a proxy to serve data on behalf of sleeping smart objects, thereby allowing them to act as always-online web servers.
A working prototype implementation of the architecture is also developed.

The security features in the architecture presented in this thesis are based on using strong public-key cryptography.
Contrary to popular belief, our performance evaluation shows that asymmetric public-key cryptography can be implemented on small 8-bit micro-controllers without modifying the underlying cryptographic algorithms.
ED:2012-09-05
INSSI record number: 45207
+ add basket
« previous | next »
INSSI