dc.contributor.advisor | Farrelly, William + McKevitt, Prof. Paul | en |
dc.contributor.author | Ksiazak, Piotr | en |
dc.date.accessioned | 2017-03-21T14:05:01Z | |
dc.date.available | 2017-03-21T14:05:01Z | |
dc.date.issued | 2010 | |
dc.identifier.other | MSc in Computing | en |
dc.identifier.uri | https://research.thea.ie/handle/20.500.12065/1184 | |
dc.description.abstract | This dissertation examines the theoretical context for the security of wireless communication between ubiquitous computing devices and presents an implementation that addresses this need. The number of Resource-Limited Wireless Devices utilized in many areas of the IT industry is growing rapidly. Some of the applications of these devices pose real security threats that can be addressed using authentication and cryptography.
Many of the available authentication and encryption software solutions are predicated on the availability of ample processing power and memory. These demands cannot be met by the majority of ubiquitous computing devices, thus there is a need to apply lightweight cryptography primitives and lightweight authentication protocols that meet these demands in any application of security to devices with limited resources.
The analysis of the lightweight solutions is divided into two major sections: Lightweight Authentication Protocols and Lightweight Encryption Algorithms. Further sections of this work describe the proposed prototype‟s Wireless Sensor Network including a study of its limitations.
A number of protocols in the field of Authentication and in the field of Encryption are analyzed. The Gossamer Authentication Protocol and the Scalable Encryption Algorithm (SEA) are chosen as the basis of prototype implementation in the C-language on a development platform of the 8051-compatible Nordic Semiconductor nRF9E5 microcontroller. A security framework is developed that combines the attributes of the Gossamer protocol and the SEA to provide an implementation of inter-device security. The Gossamer Protocol is additionally used as a means of exchanging session keys for use with the SEA encryption protocol. A brief performance analysis of the prototype running on the nRF9E5 microcontroller is provided by way of conclusion. The resuls of the software implementation of the Gossamer were unsatisfactory both in terms of the code space needs (approximately 1700 bytes excluding shared libraries) and the execution time (almost 150 milliseconds). In contrast, the SEA implementation‟s results were satisfactory above expectations with the code space requirements smaller than 600 bytes (excluding shared libraries) and the performance of 27 milliseconds per one 96-bit block of data. | en |
dc.format | PDF | en |
dc.language.iso | en | en |
dc.title | Lightweight cryptography and authentication protocols for secure communications between resource-limited devices and wireless sensor networks: evaluation and implementation | en |
dc.type | Masters (taught) | en |
dc.publisher.institution | Letterkenny Institute of Technology | en |
dc.rights.access | Creative Commons | en |
dc.subject.department | Computing | en |
dc.subject.keyword | Cryptography | en |