Security performance analysis and enhancement authentication for internet of things

العناوين الأخرى

تحليل الأداء الأمني و تحسين التحقق في إنترنت الأشياء

مقدم أطروحة جامعية

Jawdah, Haya Ali

مشرف أطروحة جامعية

al-Sarayirah, Jafar Muhammad

الجامعة

جامعة الأميرة سمية للتكنولوجيا

الكلية

كلية الملك طلال لتكنولوجيا الأعمال

القسم الأكاديمي

قسم نظم المعلومات الإدارية

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2018

الملخص الإنجليزي

The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways.

The eponymous “Things” include innumerable products (e.g.

consumer goods and technological devices) connected to each other via the internet.

They have the ability to communicate, generate, transmit and store data over the network connection, enabling the efficient execution of tasks required by human users and internal system requirements.

During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks (e.g.

data theft), loss, deformations and interruption which impair functionality, system efficiency and user satisfaction.

Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner.

Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol.

This thesis represents a security performance analysis and enhancement authentication for the IoT.

The proposed enhancement methodology covers both security and performance optimization issues.

The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area (after the first login) compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.

التخصصات الرئيسية

تكنولوجيا المعلومات وعلم الحاسوب

الموضوعات

عدد الصفحات

70

قائمة المحتويات

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background and related work.

Chapter Three : Methodology.

Chapter Four : Simulation environment.

Chapter Five : Results, analysis and discussion.

Chapter Six : Conclusion and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Jawdah, Haya Ali. (2018). Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-795923

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Jawdah, Haya Ali. Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2018).
https://search.emarefa.net/detail/BIM-795923

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Jawdah, Haya Ali. (2018). Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-795923

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-795923