Ibrahieem, Mohamed (2024) Authentication Protocols for IoT Edge Computing. PhD thesis, Concordia University.
Text (application/pdf)
7MBIbrahieem_PhD_F2024.pdf - Accepted Version Restricted to Repository staff only until 13 June 2026. Available under License Spectrum Terms of Access. |
Abstract
The proliferation of IoT has led to vast interconnectivity, generating massive data that exceeds the processing capabilities of IoT devices. Traditional IoT-cloud models, where devices offload computations to centralized cloud servers, are increasingly inadequate due to the expected surge in IoT devices, projected to surpass 75 billion by 2025. This growth intensifies cloud vulnerability to single points of failure and highlights the need for alternatives that meet QoS requirements like low latency and location awareness. The 3-tier IoT-edge-cloud architecture offers a solution by processing data at nearby edge nodes, improving location awareness, and mitigating single-point-of-failure. While this distributed approach meets QoS requirements, it introduces security challenges, such as offloading data to distributed edge nodes without prior registration. Additionally, an adversary can trace the edge node attached to the IoT device and compromise the privacy of an IoT device user. Moreover, many deployed IoT devices are vulnerable to hardware compromise and unauthorized access, raising significant privacy and security concerns that hinder the broader adoption of edge computing.
In this thesis, we address the above challenges by proposing efficient and secure authentication protocols for IoT applications in edge computing. Our proposed protocols include Symmetric Key Authentication with Forward Secrecy (SKAFS), Symmetric Key Inter-Cloud Authentication and Redeemable Micropayment Protocol (SKICAP), Mutual Authentication Privacy-Preserving Protocol with Forward Secrecy (MAPFS), and Conditional Privacy-Preserving Message Authentication for VANET Emergency Exchange (CP-MAVE). The proposed protocols utilize lightweight cryptographic primitives to realize efficient protocols for edge computing. Moreover, the proposed protocols fulfill the security requirements for IoT applications, such as IoT device anonymity, session unlinkability, and resilience to hardware compromise of IoT devices.
For our proposed protocols, we provided formal security analyses based on computationally hard problems. Furthermore, we evaluated their performance in terms of communication overhead and computational complexity and compared them with other closely related protocols. Finally, we implemented prototypes of our proposed protocols using socket programming, simulating the message flow between the protocol entities to calculate their end-to-end latency and confirm the efficiency of our proposed protocols.
The proliferation of IoT has led to vast interconnectivity, generating massive data that exceeds the processing capabilities of IoT devices. Traditional IoT-cloud models, where devices offload computations to centralized cloud servers, are increasingly inadequate due to the expected surge in IoT devices, projected to surpass 75 billion by 2025. This growth intensifies cloud vulnerability to single points of failure and highlights the need for alternatives that meet Quality of Service (QoS) requirements like low latency and location awareness. The 3-tier IoT-edge-cloud architecture offers a solution by processing data at nearby edge nodes, improving location awareness, and mitigating single-point-of-failure. While this distributed approach meets QoS requirements, it introduces security challenges, such as offloading data to distributed edge nodes without prior registration. Additionally, an adversary can trace the edge node attached to the IoT device and compromise the privacy of an IoT device user. Moreover, with 2.38 billion IoT devices vulnerable to hardware compromise and unauthorized access, raising significant privacy and security concerns that hinder the broader adoption of edge computing.
In this thesis, we address the above challenges by proposing efficient and secure authentication protocols for IoT applications in edge computing. Our proposed protocols include Symmetric Key Authentication with Forward Secrecy (SKAFS), Symmetric Key Inter-Cloud Authentication and Redeemable Micropayment Protocol (SKICAP), Mutual Authentication Privacy-Preserving Protocol with Forward Secrecy (MAPFS), and Conditional Privacy-Preserving Message Authentication for VANET Emergency Exchange (CP-MAVE). The proposed protocols utilize lightweight cryptographic primitives to realize efficient protocols for edge computing. Moreover, the proposed protocols fulfill the security requirements for IoT applications, such as IoT device anonymity, session unlinkability, and resilience to hardware compromise of IoT devices.
For our proposed protocols, we provided formal security analyses based on computationally hard problems. Furthermore, we evaluated their performance in terms of communication overhead and computational complexity and compared them with other closely related protocols. Finally, we implemented prototypes of our proposed protocols using socket programming, simulating the message flow between the protocol entities to calculate their end-to-end latency and confirm the efficiency of our proposed protocols.
Divisions: | Concordia University > Gina Cody School of Engineering and Computer Science > Concordia Institute for Information Systems Engineering |
---|---|
Item Type: | Thesis (PhD) |
Authors: | Ibrahieem, Mohamed |
Institution: | Concordia University |
Degree Name: | Ph. D. |
Program: | Information and Systems Engineering |
Date: | 13 June 2024 |
Thesis Supervisor(s): | Youssef, Amr |
ID Code: | 994317 |
Deposited By: | Mohamed Mahdy Seifelnasr Ibrahieem |
Deposited On: | 24 Oct 2024 17:58 |
Last Modified: | 24 Oct 2024 17:58 |
Repository Staff Only: item control page