Browse wiki

Jump to: navigation, search
Risk-based Adaptive Security for Internet of Things in Smart Home
Approved Pending  +
DueDate 1 October 2017  +
Methods The tools and methods in this thesis are bThe tools and methods in this thesis are based on * A set of scenario, describing the challenges * A list of requirements being extracted from the scenarios * A description and evaluation of technologies and tools being candidates for solutions * A functional architecture/description of the envisaged system * An implementation of the core concepts * A demonstration of the solution * An evaluation of the solution, including a critical review of the descisions taken earlier * Conclusions * Referencess taken earlier * Conclusions * References  +
Objective While connected smart homes through InternWhile connected smart homes through Internet of Things (IoT) can make our lives more comfortable, they can also be vulnerable to cyber attacks unless strong security measures are put in place. Smart home health care is one of the primary beneficiaries of the technological revolution created by smart home IoT. In the implementation of health care with IoT, wireless body area network (WBAN) is a suitable communication tool. That being the case security has been one of the major concerns to efficiently utilize the services of WBAN. The diverse nature of the technologies involved in WBAN, the broadcast nature of wireless networks, and the existence of resource constrained devices are the main challenges to implement heavy security protocols for WBAN. Since authentication is the gatekeeper for other security tasks (such as confidentiality–restricting data access to authorized persons, integrity–ensuring data modification by authorized persons, non-repudiation–conclusively tracing an action to an individual and availability–ensuring availability of data to authorized persons), this thesis is investigating the development of a risk-based adaptive authentication mechanism which continuously monitors the channel characteristics variation, analyzes a potential risk using naive Bayes machine learning algorithm and performs adaptation of the authentication solution. The thesis is validating both the authenticity of the user and the device. In addition the thesis is evaluating the resource need of the selected authentication solution and provides an offloading functionality in case of scarce resource to perform the selected protocol.resource to perform the selected protocol.  +
Pre-Knowledge This thesis includes a reasonable amount of programming. The envisaged thesis is based on radio communications, thus expects the user to have followed at least two radio-related courses  +
Schedule The envisaged time schedule (for a long thThe envisaged time schedule (for a long thesis/60 ECTS) is: :T0 0 starting month, T0+m denotes the month where the contribution to a certain chapter shalle be finalized :T0+2 months: create an initial page describing the scenario :T0+3: Provide a list of technologies which you think are necessary for the thesis :T0+4: Establish the table of content (TOC) of the envisaged thesis. Each section shall contain 3-10 keywords describing the content of that section :T0+7: Provide a draft of section 2 (scenario) and 3 (technologies) :T0+10: Establish a draft on what to implement/architecture :T0+11: Set-up an implementation, testing and evaluation plan :T0+15: Evaluate your solution based on a set of parameters, keep in mind ''there is no such thing as a free lunch'' :T0+17: Deliver the thesis a free lunch'' :T0+17: Deliver the thesis  +
Supervisor Habtamu Abie  +
ThesisStatus Finished  +
Titel Risk-based Adaptive Security for Internet of Things in Smart Home  +
User Mattias Gebrie  +
Creation dateThis property is a special property in this wiki. 30 August 2017 11:08:24  +
Categories Thesis  +
Modification dateThis property is a special property in this wiki. 3 February 2024 10:17:04  +
hide properties that link here 
  No properties link to this page.
 

 

Enter the name of the page to start browsing from.