Font Size: a A A

Research On Privacy-preserving Mechanisms For Unit And Ubiquitous Internet Of Things(U2IoT)

Posted on:2019-06-26Degree:DoctorType:Dissertation
Country:ChinaCandidate:ZahidFull Text:PDF
GTID:1318330542453259Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
The world advancement in research and knowledge has enabled physical life,social life,and living standards of a human being with the most promising Internet of Things(IoT)based technologies.The IoT computing is becoming a research,industrial,and academics interest in this modern world.The numerous computing technologies such as smartphones,wearable devices,medical devices,and smart sensing,play a vital role to improve human living standards.In near future,there will be trillions of smart devices collectively establish a huge network and connect to the internet.The ubiquitous deployment of IoT units called Unit and the ubiquitous Internet of Things(U2IoT)is an essential future network that makes it possible to multiple smart devices network to interact with each other for cooperation to accomplish desired goals.The ubiquitous deployments of U2IoT will be the foundation of future services in our daily life.Modern age systems are converging into IoT based smart systems to perform huge tasks.The user authentication,user privacy,and user data security are critical challenges among many other issues in IoT.The interconnected of smart systems to the internet are exposed for security.Researchers are aiming to achieve confidentiality,authentication,and privacy preservation in different domains.By reviewing existing research,this work explored cryptographic protocol for IoT based network and proposed anew protocol to secure user data,make authentication reliable,and ensure user privacy in IoT.Secure key management plays a fundamental role in the secure data sharing,user privacy,user authentication in the IoT based smart system.Traditional security protocols cannot implement as it is to make IoT secure because of heavy computation cost,memory overhead,and heavy communication burden on such resource-constrained environment.Firstly,this research presented polynomial based lightweight secure and efficient multiparty computing for group-based IoT network.The cluster head computes a secure key for group member authentication and key agreement for inter-cluster as well as intra-cluster secure communication.This scheme used encrypted unique identities of participants using the public-private key,hashing value,nonce number,the time stamp for data integrity and XOR of randomly selected hash values to generate a common polynomial.Authentication and secure data transmission in intra-cluster and inter cluster for multiple devices ensured by implementing polynomial based key management in the heterogeneous network.Secondly,to solve the one node efficiency and one node failure in group-based IoT network where cluster head is responsible for ensuring security,this research proposed Chebyshev polynomial based distributed key management.In this scheme,a distributed secure key management technique proposed in which trusted server is responsible to authenticate cluster heads and cluster heads established secure group in their domain.The Chebyshev based polynomial provides equal security like well-known existing cryptographic technique such as RSA,ECC and bilinear pairing with efficient resource utilization.Thirdly,as smart health carrying systems are getting popular in our system so user privacy is essential.The third scheme of this work presented anonymous participant authentication scheme using the trusted server for specific services such as Telecare Medical Information systems(TMIS),where privacy is most important for involved parties.In this scheme trusted sever authenticate doctors and patients anonymously by masking original identity.Thus,this research work proposed the security hallmarks for IoT and Unit IoT;secure key management,anonymous participant authentication,secure smart device joining in the network,secure network dynamicity,message integrity,forward-backward secrecy,data freshness,user privacy by overcoming data leakage,and user un-traceability with efficiency.Achieving maximal efficiency by reducing,computation overhead,communication overhead,reduction of storage overhead,and minimal re-keying during new node joining and leaving phase.Consequently,the improved security protocols and techniques for IoT data security and user authentication and significant reduction of security management cost can make our research work as the best choice for resources-constrained oriented IoT based smart system network.
Keywords/Search Tags:Unit and Ubiquitous Internet of Things, Lightweight Protocols, Authentication, User Privacy, Data Security
PDF Full Text Request
Related items