Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
An investigation of lightweight cryptography and using the key derivation function for a hybrid scheme for security in IoT
Blekinge Institute of Technology.
2017 (English)Independent thesis Advanced level (degree of Master (Two Years)), 10 credits / 15 HE creditsStudent thesis
Abstract [en]

Data security plays a central role in the design of Internet of Things (IoT). Since most of the "things" in IoT are embedded computing devices it is appropriate to talk about cryptography in embedded of systems. This kind of devices is based on microcontrollers, which have limited resources (processing power, memory, storage, and energy). Therefore, we can apply only lightweight cryptography. The goal of this work is to find the optimal cryptographic solution for IoT devices. It is expected that perception of this solution would be useful for implementation on “limited” devices.

In this study, we investigate which lightweight algorithm is better to implement. Also, how we can combine two different algorithms in a hybrid scheme and modify this scheme due to data sending scenario. Compendex, Inspec, IEEE Xplore, ACM Digital Library, and Springer Link databases are used to conduct a comprehensive literature review. Experimental work adopted in this study involves implementations, measurements, and observations from the results. The experimental research covers implementations of different algorithms and experimental hybrid scheme, which includes additional function. Results show the performance of the considered algorithms and proposed hybrid scheme.

According to our results, security solutions for IoT have to utilize algorithms, which have good performance. The combination of symmetric and asymmetric algorithms in the hybrid scheme can be a solution, which provides the main security requirements: confidentiality, integrity, and authenticity. Adaptation of this scheme to the possible IoT scenarios shows the results acceptable for implementation due to limited resources of hardware.

Place, publisher, year, edition, pages
2017. , 42 p.
Keyword [en]
Internet of Things, Lightweight cryptography, Measurement, Hybrid Scheme
National Category
Telecommunications
Identifiers
URN: urn:nbn:se:bth-14982OAI: oai:DiVA.org:bth-14982DiVA: diva2:1130904
Subject / course
ET2580 Master's Thesis (120 credits) in Electrical Engineering with emphasis on Telecommunication Systems
Presentation
2017-05-30, J1280, 14:00 (English)
Supervisors
Examiners
Available from: 2017-08-11 Created: 2017-08-11 Last updated: 2017-08-11Bibliographically approved

Open Access in DiVA

fulltext(1452 kB)73 downloads
File information
File name FULLTEXT02.pdfFile size 1452 kBChecksum SHA-512
1a1cf2711edc9a34bd953164b5cec42058fc139c201e6c467c1324aa29525dbc832777e20a63fd374385deace9a6e3f8e93d99b595187a9e87ca6791542bf4bb
Type fulltextMimetype application/pdf

By organisation
Blekinge Institute of Technology
Telecommunications

Search outside of DiVA

GoogleGoogle Scholar
Total: 73 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 1564 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf