The University of Southampton
University of Southampton Institutional Repository

Low-cost security protocols for resource-constrained Internet of Things devices

Low-cost security protocols for resource-constrained Internet of Things devices
Low-cost security protocols for resource-constrained Internet of Things devices
The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequency identification (RFID) systems, have limited resources. For example, battery-operated sensor devices forming the basic structure of the wireless sensor networks and the passive tags forming the basic structure of the RFID system can now be produced in smaller sizes and lower cost because of the development in electronics. Therefore, the wireless sensor devices are limited in memory, computation ability and energy resource and passive tags are limited in their chip area and computation ability. However, these devices make the task of establishing security protocols difficult as they dedicate most of the available resources to perform their basic tasks. On the other hand, these devices are based on pervasive technology which makes it easy for potential adversities and third parties to have access to them and carry well-established attacks. Security protocols that rely on storing keys or secrets in the devices' memory cannot provide physical security, as the key or secret data stored on the device is always open to physical tampering. Physical Unclonable Functions (PUF) technology is a potential candidate cryptographic primitive to incorporate physical security into the system. However, PUF-based protocols come with complications. Their security has not been established against communication traffic attacks. The machine learning and the Man in the Middle (MitM) are considered major security threats for PUF-based protocols. Consequently, there are two challenges in developing and implementing security protocols specific to resource-constrained devices; the first challenge is to provide security against common attacks, including physical attacks. The second challenge is to make the use of resources efficient considering the device-specific characteristics for the smooth implementation of the security protocol.

This thesis proposes three new security protocols in consideration of the unique characteristics of IoT devices. The proposed and implemented security protocols that ensure privacy and mutual authentication in wireless sensor devices and RFID system are described in details, and their security is analysed systematically. The first protocol is named ASSURE and is based on PUF technology and a symmetric light cipher. It provides security for wireless sensor devices and ensures communication traffic privacy, physical security and energy-efficiency. The second security protocol is called ARMOR and is based on PUF and lightweight asymmetric encryption. It provides security for the RFID system and ensures communication traffic privacy and physical security. For the ARMOR protocol, it is proposed a PUF enabled area-efficient tag architecture. The third protocol termed TiGHTEN provides energy-efficiency and mutual authentication for wireless sensor devices and it consumes less energy compared to the first protocol. In the third protocol aimed at minimising communicational energy consumption, both symmetric (RC5) and asymmetric cryptosystems (ECC) are used to provide mutual authentication.
University of Southampton
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Yilmaz, Yildiran
6b5cc6e0-2711-4c0c-8f68-5bca77184d08
Halak, Basel
8221f839-0dfd-4f81-9865-37def5f79f33

Yilmaz, Yildiran (2019) Low-cost security protocols for resource-constrained Internet of Things devices. University of Southampton, Doctoral Thesis, 216pp.

Record type: Thesis (Doctoral)

Abstract

The Internet of Things (IoT) devices, especially in wireless sensor networks (WSN) and radio frequency identification (RFID) systems, have limited resources. For example, battery-operated sensor devices forming the basic structure of the wireless sensor networks and the passive tags forming the basic structure of the RFID system can now be produced in smaller sizes and lower cost because of the development in electronics. Therefore, the wireless sensor devices are limited in memory, computation ability and energy resource and passive tags are limited in their chip area and computation ability. However, these devices make the task of establishing security protocols difficult as they dedicate most of the available resources to perform their basic tasks. On the other hand, these devices are based on pervasive technology which makes it easy for potential adversities and third parties to have access to them and carry well-established attacks. Security protocols that rely on storing keys or secrets in the devices' memory cannot provide physical security, as the key or secret data stored on the device is always open to physical tampering. Physical Unclonable Functions (PUF) technology is a potential candidate cryptographic primitive to incorporate physical security into the system. However, PUF-based protocols come with complications. Their security has not been established against communication traffic attacks. The machine learning and the Man in the Middle (MitM) are considered major security threats for PUF-based protocols. Consequently, there are two challenges in developing and implementing security protocols specific to resource-constrained devices; the first challenge is to provide security against common attacks, including physical attacks. The second challenge is to make the use of resources efficient considering the device-specific characteristics for the smooth implementation of the security protocol.

This thesis proposes three new security protocols in consideration of the unique characteristics of IoT devices. The proposed and implemented security protocols that ensure privacy and mutual authentication in wireless sensor devices and RFID system are described in details, and their security is analysed systematically. The first protocol is named ASSURE and is based on PUF technology and a symmetric light cipher. It provides security for wireless sensor devices and ensures communication traffic privacy, physical security and energy-efficiency. The second security protocol is called ARMOR and is based on PUF and lightweight asymmetric encryption. It provides security for the RFID system and ensures communication traffic privacy and physical security. For the ARMOR protocol, it is proposed a PUF enabled area-efficient tag architecture. The third protocol termed TiGHTEN provides energy-efficiency and mutual authentication for wireless sensor devices and it consumes less energy compared to the first protocol. In the third protocol aimed at minimising communicational energy consumption, both symmetric (RC5) and asymmetric cryptosystems (ECC) are used to provide mutual authentication.

Text
Final thesis - Version of Record
Restricted to Repository staff only

More information

Published date: October 2019

Identifiers

Local EPrints ID: 438665
URI: http://eprints.soton.ac.uk/id/eprint/438665
PURE UUID: d47da9dc-35a7-4897-afbb-20e2610dc26d
ORCID for Yildiran Yilmaz: ORCID iD orcid.org/0000-0002-5337-6090
ORCID for Basel Halak: ORCID iD orcid.org/0000-0003-3470-7226

Catalogue record

Date deposited: 20 Mar 2020 17:30
Last modified: 17 Mar 2024 03:25

Export record

Contributors

Author: Yildiran Yilmaz ORCID iD
Thesis advisor: Basel Halak ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×