Security performance analysis and enhancement authentication for internet of things

Other Title(s)

تحليل الأداء الأمني و تحسين التحقق في إنترنت الأشياء

Dissertant

Jawdah, Haya Ali

Thesis advisor

al-Sarayirah, Jafar Muhammad

University

Princess Sumaya University for Technology

Faculty

King Talal School of Business Technology

Department

Department Management Information Systems

University Country

Jordan

Degree

Master

Degree Date

2018

English Abstract

The Internet of Things (IoT) is increasingly affecting human lives in multiple profound ways.

The eponymous “Things” include innumerable products (e.g.

consumer goods and technological devices) connected to each other via the internet.

They have the ability to communicate, generate, transmit and store data over the network connection, enabling the efficient execution of tasks required by human users and internal system requirements.

During each communication between “Things”, the data transmitted is potentially vulnerable to malicious attacks (e.g.

data theft), loss, deformations and interruption which impair functionality, system efficiency and user satisfaction.

Additionally, inappropriate user controls can cause problems in IoT services, such as granting anonymous users access to personal resources and enable legitimate users to access resources in an illegal manner or preventing legitimate users to access resources in an authorized manner.

Therefore, communications between things need to be authenticated, authorized, secured and ensured to have high privacy by applying a strong authentication protocol.

This thesis represents a security performance analysis and enhancement authentication for the IoT.

The proposed enhancement methodology covers both security and performance optimization issues.

The results indicate that the enhanced protocol has a positive effect on minimizing packet length and time performance in authenticating users having once obtained access to the visited location area (after the first login) compared with the other two protocols used for comparative purposes, with 33% increased the proposed protocol performance.

Main Subjects

Information Technology and Computer Science

Topics

No. of Pages

70

Table of Contents

Table of contents.

Abstract.

Abstract in Arabic.

Chapter One : Introduction.

Chapter Two : Background and related work.

Chapter Three : Methodology.

Chapter Four : Simulation environment.

Chapter Five : Results, analysis and discussion.

Chapter Six : Conclusion and future work.

References.

American Psychological Association (APA)

Jawdah, Haya Ali. (2018). Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-795923

Modern Language Association (MLA)

Jawdah, Haya Ali. Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2018).
https://search.emarefa.net/detail/BIM-795923

American Medical Association (AMA)

Jawdah, Haya Ali. (2018). Security performance analysis and enhancement authentication for internet of things. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-795923

Language

English

Data Type

Arab Theses

Record ID

BIM-795923