Login | Register

Authentication Protocols for IoT Edge Computing

Title:

Authentication Protocols for IoT Edge Computing

Ibrahieem, Mohamed (2024) Authentication Protocols for IoT Edge Computing. PhD thesis, Concordia University.

[thumbnail of Ibrahieem_PhD_F2024.pdf]
Text (application/pdf)
Ibrahieem_PhD_F2024.pdf - Accepted Version
Restricted to Repository staff only until 13 June 2026.
Available under License Spectrum Terms of Access.
7MB

Abstract

The proliferation of IoT has led to vast interconnectivity, generating massive data that exceeds the processing capabilities of IoT devices. Traditional IoT-cloud models, where devices offload computations to centralized cloud servers, are increasingly inadequate due to the expected surge in IoT devices, projected to surpass 75 billion by 2025. This growth intensifies cloud vulnerability to single points of failure and highlights the need for alternatives that meet QoS requirements like low latency and location awareness. The 3-tier IoT-edge-cloud architecture offers a solution by processing data at nearby edge nodes, improving location awareness, and mitigating single-point-of-failure. While this distributed approach meets QoS requirements, it introduces security challenges, such as offloading data to distributed edge nodes without prior registration. Additionally, an adversary can trace the edge node attached to the IoT device and compromise the privacy of an IoT device user. Moreover, many deployed IoT devices are vulnerable to hardware compromise and unauthorized access, raising significant privacy and security concerns that hinder the broader adoption of edge computing.

In this thesis, we address the above challenges by proposing efficient and secure authentication protocols for IoT applications in edge computing. Our proposed protocols include Symmetric Key Authentication with Forward Secrecy (SKAFS), Symmetric Key Inter-Cloud Authentication and Redeemable Micropayment Protocol (SKICAP), Mutual Authentication Privacy-Preserving Protocol with Forward Secrecy (MAPFS), and Conditional Privacy-Preserving Message Authentication for VANET Emergency Exchange (CP-MAVE). The proposed protocols utilize lightweight cryptographic primitives to realize efficient protocols for edge computing. Moreover, the proposed protocols fulfill the security requirements for IoT applications, such as IoT device anonymity, session unlinkability, and resilience to hardware compromise of IoT devices.

For our proposed protocols, we provided formal security analyses based on computationally hard problems. Furthermore, we evaluated their performance in terms of communication overhead and computational complexity and compared them with other closely related protocols. Finally, we implemented prototypes of our proposed protocols using socket programming, simulating the message flow between the protocol entities to calculate their end-to-end latency and confirm the efficiency of our proposed protocols.
The proliferation of IoT has led to vast interconnectivity, generating massive data that exceeds the processing capabilities of IoT devices. Traditional IoT-cloud models, where devices offload computations to centralized cloud servers, are increasingly inadequate due to the expected surge in IoT devices, projected to surpass 75 billion by 2025. This growth intensifies cloud vulnerability to single points of failure and highlights the need for alternatives that meet Quality of Service (QoS) requirements like low latency and location awareness. The 3-tier IoT-edge-cloud architecture offers a solution by processing data at nearby edge nodes, improving location awareness, and mitigating single-point-of-failure. While this distributed approach meets QoS requirements, it introduces security challenges, such as offloading data to distributed edge nodes without prior registration. Additionally, an adversary can trace the edge node attached to the IoT device and compromise the privacy of an IoT device user. Moreover, with 2.38 billion IoT devices vulnerable to hardware compromise and unauthorized access, raising significant privacy and security concerns that hinder the broader adoption of edge computing.
In this thesis, we address the above challenges by proposing efficient and secure authentication protocols for IoT applications in edge computing. Our proposed protocols include Symmetric Key Authentication with Forward Secrecy (SKAFS), Symmetric Key Inter-Cloud Authentication and Redeemable Micropayment Protocol (SKICAP), Mutual Authentication Privacy-Preserving Protocol with Forward Secrecy (MAPFS), and Conditional Privacy-Preserving Message Authentication for VANET Emergency Exchange (CP-MAVE). The proposed protocols utilize lightweight cryptographic primitives to realize efficient protocols for edge computing. Moreover, the proposed protocols fulfill the security requirements for IoT applications, such as IoT device anonymity, session unlinkability, and resilience to hardware compromise of IoT devices.
For our proposed protocols, we provided formal security analyses based on computationally hard problems. Furthermore, we evaluated their performance in terms of communication overhead and computational complexity and compared them with other closely related protocols. Finally, we implemented prototypes of our proposed protocols using socket programming, simulating the message flow between the protocol entities to calculate their end-to-end latency and confirm the efficiency of our proposed protocols.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering
Item Type:Thesis (PhD)
Authors:Ibrahieem, Mohamed
Institution:Concordia University
Degree Name:Ph. D.
Program:Information and Systems Engineering
Date:13 June 2024
Thesis Supervisor(s):Youssef, Amr
ID Code:994317
Deposited By: Mohamed Mahdy Seifelnasr Ibrahieem
Deposited On:24 Oct 2024 17:58
Last Modified:24 Oct 2024 17:58
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top