Difference between revisions of "Risk-based Adaptive Security for Internet of Things in Smart Home"
Josef.Noll (Talk | contribs) |
Josef.Noll (Talk | contribs) |
||
Line 4: | Line 4: | ||
|Supervisor=Habtamu.Abie | |Supervisor=Habtamu.Abie | ||
|DueDate=2017/10/01 | |DueDate=2017/10/01 | ||
− | |ThesisStatus= | + | |ThesisStatus=Finished |
|Objective=While connected smart homes through Internet of Things (IoT) can make our lives more comfortable, they can also be vulnerable to cyber attacks unless strong security measures are put in place. Smart home health care is one of the primary beneficiaries of the technological revolution created by smart home IoT. In the implementation of health care with IoT, wireless body area network (WBAN) is a suitable communication tool. That being the case security has been one of the major concerns to efficiently utilize the services of WBAN. The diverse nature of the technologies involved in WBAN, the broadcast nature of wireless networks, and the existence of resource constrained devices are the main challenges to implement heavy security protocols for WBAN. Since authentication is the gatekeeper for other security tasks (such as confidentiality–restricting data access to authorized persons, integrity–ensuring data modification by authorized persons, non-repudiation–conclusively tracing an action to an individual and availability–ensuring availability of data to authorized persons), this thesis is investigating the development of a risk-based adaptive authentication mechanism which continuously monitors the channel characteristics variation, analyzes a potential risk using naive Bayes machine learning algorithm and performs adaptation of the authentication solution. The thesis is validating both the authenticity of the user and the device. In addition the thesis is evaluating the resource need of the selected authentication solution and provides an offloading functionality in case of scarce resource to perform the selected protocol. | |Objective=While connected smart homes through Internet of Things (IoT) can make our lives more comfortable, they can also be vulnerable to cyber attacks unless strong security measures are put in place. Smart home health care is one of the primary beneficiaries of the technological revolution created by smart home IoT. In the implementation of health care with IoT, wireless body area network (WBAN) is a suitable communication tool. That being the case security has been one of the major concerns to efficiently utilize the services of WBAN. The diverse nature of the technologies involved in WBAN, the broadcast nature of wireless networks, and the existence of resource constrained devices are the main challenges to implement heavy security protocols for WBAN. Since authentication is the gatekeeper for other security tasks (such as confidentiality–restricting data access to authorized persons, integrity–ensuring data modification by authorized persons, non-repudiation–conclusively tracing an action to an individual and availability–ensuring availability of data to authorized persons), this thesis is investigating the development of a risk-based adaptive authentication mechanism which continuously monitors the channel characteristics variation, analyzes a potential risk using naive Bayes machine learning algorithm and performs adaptation of the authentication solution. The thesis is validating both the authenticity of the user and the device. In addition the thesis is evaluating the resource need of the selected authentication solution and provides an offloading functionality in case of scarce resource to perform the selected protocol. | ||
|Methods=The tools and methods in this thesis are based on | |Methods=The tools and methods in this thesis are based on |
Latest revision as of 10:17, 3 February 2024
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Risk-based Adaptive Security for Internet of Things in Smart Home
by | Mattias Gebrie |
---|---|
Supervisor(s) | Habtamu.Abie |
Due date | 2017/10/01 |
Status | Finished |
Problem description: | While connected smart homes through Internet of Things (IoT) can make our lives more comfortable, they can also be vulnerable to cyber attacks unless strong security measures are put in place. Smart home health care is one of the primary beneficiaries of the technological revolution created by smart home IoT. In the implementation of health care with IoT, wireless body area network (WBAN) is a suitable communication tool. That being the case security has been one of the major concerns to efficiently utilize the services of WBAN. The diverse nature of the technologies involved in WBAN, the broadcast nature of wireless networks, and the existence of resource constrained devices are the main challenges to implement heavy security protocols for WBAN. Since authentication is the gatekeeper for other security tasks (such as confidentiality–restricting data access to authorized persons, integrity–ensuring data modification by authorized persons, non-repudiation–conclusively tracing an action to an individual and availability–ensuring availability of data to authorized persons), this thesis is investigating the development of a risk-based adaptive authentication mechanism which continuously monitors the channel characteristics variation, analyzes a potential risk using naive Bayes machine learning algorithm and performs adaptation of the authentication solution. The thesis is validating both the authenticity of the user and the device. In addition the thesis is evaluating the resource need of the selected authentication solution and provides an offloading functionality in case of scarce resource to perform the selected protocol. |
Methods and Tools: | The tools and methods in this thesis are based on
|
Time schedule | The envisaged time schedule (for a long thesis/60 ECTS) is:
|
Pre-Knowledge | This thesis includes a reasonable amount of programming. The envisaged thesis is based on radio communications, thus expects the user to have followed at least two radio-related courses |
Approved | Pending by |
Keywords | IoTSec |
Depiction |
this page was created by Special:FormEdit/Thesis, and can be edited by Special:FormEdit/Thesis/Risk-based Adaptive Security for Internet of Things in Smart Home
This page provides hints on what to include in your master thesis.
TOC
Title page, abstract, ...
- 1. Introduction, containing: short intro into the area, what is happening
- 1.1 Motivation, containing: what triggered me to write about what I'm writing about
- 1.2 Methods, containing: which methods are you using, how do you apply them
- 2. Scenario, optional chapter for explaining some use cases
- 2.1 user scenario, (bad name, needs something bedre)
- 2.2 Requirements/Technological challenges
- 3. State-of-the art/Analysis of technology, structure your content after hardware/SW (or other domains). Describe which technologies might be used to answer the challenges, and how they can answer the challenges
- 3.1 technology A
- 3.2 technology B
- 4. Implementation
- 4.1 Architecture, functionality
- 4.2
- 5. Evaluation
- 6. Conclusions
- References
Comments
Red line
Your thesis should have a "red line", which is visible throughout the whole thesis. This means you should mention in the beginning of each chapter how the chapter contributes to the "goals of the thesis".
Use of scientific methods
A thesis follows a standard method:
- describe the problem (problemstilling)
- extract the challenges. These challenges should be measurable, e.g. method is too slow to be useful to voice handover.
- Analyse technology with respect to challenges. Don't write & repeat "everything" from a certain technology, concentrate on those parts (e.g. protocols) which are of importance for your problem
References
- Wikipedia is good to use to get an overview on what is happening. But there is not scientific verification of Wikipedia, thus you should use wikipedia only in the introduction of a chapter (if you use text from wikipedia). Use scientific literature for your thesis.
- Scientific library is "at your hand", you can get there directly from UiO: [[How to get access to IEEE, Springer and other scientific literature -> Unik/UiOLibrary]]
- I suggest that references to web pages, e.g. OASIS, W3C standards, are given in a footnote. Only if you find white papers or other .pdf documents on a web page then you refer to them in the reference section.
Evaluation of own work
Perform an evaluation of your own work. Revisit the challenges and discuss in how you fulfilled them. Provide alternative solution and discuss what should be done (or what could have been done).