Low-cost security protocols for resource-constrained Internet of Things devices
Low-cost security protocols for resource-constrained Internet of Things devices
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequency identification (RFID) systems, have limited resources. For example, battery-operated sensor devices forming the basic structure of the wireless sensor networks and the passive tags forming the basic structure of the RFID system can now be produced in smaller sizes and lower cost because of the development in electronics. Therefore, the wireless sensor devices are limited in memory, computation ability and energy resource and passive tags are limited in their chip area and computation ability. However, these devices make the task of establishing security protocols difficult as they dedicate most of the available resources to perform their basic tasks. On the other hand, these devices are based on pervasive technology which makes it easy for potential adversities and third parties to have access to them and carry well-established attacks. Security protocols that rely on storing keys or secrets in the devices' memory cannot provide physical security, as the key or secret data stored on the device is always open to physical tampering. Physical Unclonable Functions (PUF) technology is a potential candidate cryptographic primitive to incorporate physical security into the system. However, PUF-based protocols come with complications. Their security has not been established against communication traffic attacks. The machine learning and the Man in the Middle (MitM) are considered major security threats for PUF-based protocols. Consequently, there are two challenges in developing and implementing security protocols specific to resource-constrained devices; the first challenge is to provide security against common attacks, including physical attacks. The second challenge is to make the use of resources efficient considering the device-specific characteristics for the smooth implementation of the security protocol.
This thesis proposes three new security protocols in consideration of the unique characteristics of IoT devices. The proposed and implemented security protocols that ensure privacy and mutual authentication in wireless sensor devices and RFID system are described in details, and their security is analysed systematically. The first protocol is named ASSURE and is based on PUF technology and a symmetric light cipher. It provides security for wireless sensor devices and ensures communication traffic privacy, physical security and energy-efficiency. The second security protocol is called ARMOR and is based on PUF and lightweight asymmetric encryption. It provides security for the RFID system and ensures communication traffic privacy and physical security. For the ARMOR protocol, it is proposed a PUF enabled area-efficient tag architecture. The third protocol termed TiGHTEN provides energy-efficiency and mutual authentication for wireless sensor devices and it consumes less energy compared to the first protocol. In the third protocol aimed at minimising communicational energy consumption, both symmetric (RC5) and asymmetric cryptosystems (ECC) are used to provide mutual authentication.
University of Southampton
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
October 2019
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33
Yilmaz, Yildiran
(2019)
Low-cost security protocols for resource-constrained Internet of Things devices.
University of Southampton, Doctoral Thesis, 216pp.
Record type:
Thesis
(Doctoral)
Abstract
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequency identification (RFID) systems, have limited resources. For example, battery-operated sensor devices forming the basic structure of the wireless sensor networks and the passive tags forming the basic structure of the RFID system can now be produced in smaller sizes and lower cost because of the development in electronics. Therefore, the wireless sensor devices are limited in memory, computation ability and energy resource and passive tags are limited in their chip area and computation ability. However, these devices make the task of establishing security protocols difficult as they dedicate most of the available resources to perform their basic tasks. On the other hand, these devices are based on pervasive technology which makes it easy for potential adversities and third parties to have access to them and carry well-established attacks. Security protocols that rely on storing keys or secrets in the devices' memory cannot provide physical security, as the key or secret data stored on the device is always open to physical tampering. Physical Unclonable Functions (PUF) technology is a potential candidate cryptographic primitive to incorporate physical security into the system. However, PUF-based protocols come with complications. Their security has not been established against communication traffic attacks. The machine learning and the Man in the Middle (MitM) are considered major security threats for PUF-based protocols. Consequently, there are two challenges in developing and implementing security protocols specific to resource-constrained devices; the first challenge is to provide security against common attacks, including physical attacks. The second challenge is to make the use of resources efficient considering the device-specific characteristics for the smooth implementation of the security protocol.
This thesis proposes three new security protocols in consideration of the unique characteristics of IoT devices. The proposed and implemented security protocols that ensure privacy and mutual authentication in wireless sensor devices and RFID system are described in details, and their security is analysed systematically. The first protocol is named ASSURE and is based on PUF technology and a symmetric light cipher. It provides security for wireless sensor devices and ensures communication traffic privacy, physical security and energy-efficiency. The second security protocol is called ARMOR and is based on PUF and lightweight asymmetric encryption. It provides security for the RFID system and ensures communication traffic privacy and physical security. For the ARMOR protocol, it is proposed a PUF enabled area-efficient tag architecture. The third protocol termed TiGHTEN provides energy-efficiency and mutual authentication for wireless sensor devices and it consumes less energy compared to the first protocol. In the third protocol aimed at minimising communicational energy consumption, both symmetric (RC5) and asymmetric cryptosystems (ECC) are used to provide mutual authentication.
Text
Final thesis
- Version of Record
Restricted to Repository staff only
More information
Published date: October 2019
Identifiers
Local EPrints ID: 438665
URI: http://eprints.soton.ac.uk/id/eprint/438665
PURE UUID: d47da9dc-35a7-4897-afbb-20e2610dc26d
Catalogue record
Date deposited: 20 Mar 2020 17:30
Last modified: 17 Mar 2024 03:25
Export record
Contributors
Author:
Yildiran Yilmaz
Thesis advisor:
Basel Halak
Download statistics
Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.
View more statistics