Document Type |
: |
Thesis |
Document Title |
: |
SOFTWARE MECHANISM FOR SECURING INTERNET OF THINGS IN DISTRIBUTED ARCHITECTURE آلية برمجية لحماية انترنت الأشياء في البنية الموزعة |
Subject |
: |
Faculty of Computing and Information Technology |
Document Language |
: |
Arabic |
Abstract |
: |
Message Queue Telemetry Transport (MQTT) protocol is a promising messaging protocol used in IoT. However, with the rapid growth of internet-connected devices and the tremendous amount of data that could be generated and exchanged in an IoT environment, MQTT can encounter many challenges, such as increasing performance overhead, network congestion, scalability issue, and complexity of security management. This is because the current MQTT architecture relies on a central broker in the cloud responsible for delivering data between clients (from the publisher to the subscriber) and implements a heavyweight authentication mechanism based on the cryptographic protocol, Secure Sockets Layer/Transport Layer Security (SSL/TLS). In this case, cloud-based MQTT architecture will be unable to meet IoT requirements, especially the complex IoT applications that need fast responses, real-time processing, and high-level automation, such as in the Industrial Internet of Things (IIoT).
As a result, this thesis proposes a fog-based MQTT architecture where brokers are distributed in a fog layer and communicate with each other using the dynamic bridging mechanism to allow delivering data from the publisher to the subscriber through more than one broker. In addition, the thesis presents a lightweight mutual authentication scheme based on the hash function and XOR operation. An authentication manager is deployed in each broker to generate authentication parameters and conduct authentication for each group of clients/brokers connected to that broker to achieve independent security management. The scheme's security was analyzed using informal and formal analysis using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results showed that the scheme is safe and can resist common attacks such as impersonation, replay, and eavesdropping attacks. Furthermore, the scheme's performance was evaluated and showed that it outperformed and it was more efficient compared with other schemes. |
Supervisor |
: |
Dr. Vijey Thayananthan |
Thesis Type |
: |
Master Thesis |
Publishing Year |
: |
1445 AH
2023 AD |
Added Date |
: |
Wednesday, December 20, 2023 |
|
Researchers
حسن كردي | Kurdi, Hassan | Researcher | Doctorate | |
|