Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
A PUF-based lightweight group authentication and key distribution protocol
Date
2020-9
Author
Yıldız, Hüsnü
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
444
views
0
downloads
Cite This
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this thesis is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature perform computations using asymmetric ciphers, which are costly for IoT. Therefore, applications generally employ simple security primitives that are prone to or lead to cyber-attacks by using IoT devices. In this thesis, we propose a physically unclonable function (PUF) based lightweight group authentication and key distribution (PLGAKD) protocol that employs PUF, factorial tree, and the Chinese Remainder Theorem (CRT). In PLGAKD, PUF facilitates lightweight authentication and key distribution for group members. Factorial tree and CRT help us reduce the number of keys stored in nodes and the number of communication messages contrary to the binary tree. The communication overhead in PLGAKD is reduced to almost half in comparison with binary trees for almost the same number of group members. Moreover, the computation overhead is significantly less since only symmetric encryption, hash functions, and XOR are performed for group operations.
Subject Keywords
Group Authentication
,
Group Key Distribution
,
Security
,
Internet Of Things (IOT)
,
Lightweight Cryptography
,
Physically Unclonable Function (PUF)
,
The Chinese Remainder Theorem (CRT)
URI
https://hdl.handle.net/11511/69256
Collections
Graduate School of Natural and Applied Sciences, Thesis
Suggestions
OpenMETU
Core
PLGAKD: A PUF-based Lightweight Group Authentication and Key Distribution Protocol
Yıldız, Hüsnü; Cenk, Murat; Onur, Ertan (Institute of Electrical and Electronics Engineers (IEEE), 2020-11-01)
Securing Internet of Things (IoT) applications that collect and transport sensitive data by guaranteeing authenticity, integrity, and confidentiality is a critical challenge. Reducing computation and communication overhead of security functions is also a key concern since a large number of constrained devices may take place in such applications. Our main focus in this paper is group authentication and key management in IoT. The existing group authentication and key management protocols in the literature per...
A visual programming framework for distributed Internet of Things centric complex event processing
Gökalp, Mert Onuralp; Koçyiğit, Altan; Eren, Pekin Erhan (2019-03-01)
Complex Event Processing (CEP) is a promising approach for real-time processing of big data streams originating from Internet of Things (IoT) devices. Even though scalability and flexibility are key issues for IoT applications, current studies are mostly based on centralized solutions and restrictive query languages. Moreover, development, deployment and operation of big-data applications require significant amount of technical expertise. Hence, a framework that provides a higher abstraction level programmi...
A Decision Support System for Optimal Selection of Enterprise Information Security Preventative Actions
Sonmez, Ferda Ozdemir; Günel Kılıç, Banu (2021-09-01)
Types and complexity of information security related vulnerabilities are growing rapidly and present numerous challenges to the enterprises. One of the key challenges is to identify the optimal set of precautions with limited budget. Despite the fact that majority of enterprises have a budget constraint for installing and maintaining the protection systems, the majority of the previous work only focus on prioritization of security targets and do not consider the preventative actions and budget constraints. ...
Performance evaluation of lightweight cryptographic algorithms for internet of things security
Polat, Selahattin; Baykal, Nazife; Department of Cyber Security (2019)
Widespread deployment of mobile and embedded devices in everyday use has brought up not only new concepts and application areas such as Internet-of-Things (IoT) but also several security and privacy problems. In theory, it is possible to mitigate most of these problems by implementing well-known and standardized security algorithms and techniques on IoT devices. However, in practice, it is rather difficult, if not impossible, to implement standard security algorithms on these devices due to their limited re...
An energy efficient hierarchical approach using multimedia and scalar sensors for emergency services
Kızılkaya, Burak; Ever, Enver; Sustainable Environment and Energy Systems (2019-7)
Recently, environment monitoring and detection systems became more accessible with the help of IoT applications. Furthermore, connecting smart devices makes monitoring applications more accurate and reliable. On the other hand, optimizing the energy requirement of smart sensors especially while transmitting data has always been very important, and there are different applications to create energy efficient IoT systems. Detailed analysis of lifetimes of various types of sensors (survival analysis) has theref...
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
H. Yıldız, “A PUF-based lightweight group authentication and key distribution protocol,” Ph.D. - Doctoral Program, Middle East Technical University, 2020.