Solutions for Internet of Things Security Challenges: Trust and Authentication

The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimag...

Full description

Bibliographic Details
Main Author: McGinthy, Jason M.
Other Authors: Electrical and Computer Engineering
Format: Others
Published: Virginia Tech 2019
Subjects:
Online Access:http://hdl.handle.net/10919/91443
id ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-91443
record_format oai_dc
spelling ndltd-VTETD-oai-vtechworks.lib.vt.edu-10919-914432021-07-17T05:27:53Z Solutions for Internet of Things Security Challenges: Trust and Authentication McGinthy, Jason M. Electrical and Computer Engineering Clancy, Thomas Charles III Michaels, Alan J. Hicks, Matthew MacKenzie, Allen B. Saad, Walid Security Internet of Things Standardization Authentication Lightweight The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, current security techniques are based on protocols that were designed for more-capable devices such as desktop computers and cellular phones that have ample power, computational ability, and memory storage. Due to IoT's technological infancy, there are many security challenges without proper solutions. As IoT continues to grow, special considerations and protections must be in place to properly secure this data and protect the privacy of its users. This dissertation highlights some of the major challenges related to IoT and prioritizes their impacts to help identify where gaps are that must be filled. Focusing on these high priority concerns, solutions are presented that are tailored to IoT's constraints. A security feature-based framework is developed to help characterize classes of devices to help manage the heterogeneous nature of IoT devices and networks. A novel physical device authentication method is presented to show the feasibility in IoT devices and networks. Additional low-power techniques are designed and evaluated to help identify different security features available to IoT devices as presented in the aforementioned framework. Doctor of Philosophy The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives. 2019-07-13T08:00:55Z 2019-07-13T08:00:55Z 2019-07-12 Dissertation vt_gsexam:21765 http://hdl.handle.net/10919/91443 In Copyright http://rightsstatements.org/vocab/InC/1.0/ ETD application/pdf Virginia Tech
collection NDLTD
format Others
sources NDLTD
topic Security
Internet of Things
Standardization
Authentication
Lightweight
spellingShingle Security
Internet of Things
Standardization
Authentication
Lightweight
McGinthy, Jason M.
Solutions for Internet of Things Security Challenges: Trust and Authentication
description The continuing growth of Internet-connected devices presents exciting opportunities for future technology. These Internet of Things (IoT) products are being manufactured and interleaved with many everyday activities, which is creating a larger security concern. Sensors will collect previously unimaginable amounts of private and public data and transmit all of it through an easily observable wireless medium in order for other devices to perform data analytics. As more and more devices are produced, many are lacking a strong security foundation in order to be the "first to market." Moreover, current security techniques are based on protocols that were designed for more-capable devices such as desktop computers and cellular phones that have ample power, computational ability, and memory storage. Due to IoT's technological infancy, there are many security challenges without proper solutions. As IoT continues to grow, special considerations and protections must be in place to properly secure this data and protect the privacy of its users. This dissertation highlights some of the major challenges related to IoT and prioritizes their impacts to help identify where gaps are that must be filled. Focusing on these high priority concerns, solutions are presented that are tailored to IoT's constraints. A security feature-based framework is developed to help characterize classes of devices to help manage the heterogeneous nature of IoT devices and networks. A novel physical device authentication method is presented to show the feasibility in IoT devices and networks. Additional low-power techniques are designed and evaluated to help identify different security features available to IoT devices as presented in the aforementioned framework. === Doctor of Philosophy === The Internet has been gaining a foothold in our everyday lives. Smart homes, smart cars, and smart cities are becoming less science fiction and more everyday realities. In order to increase the public’s general quality of life, this new Internet of Things (IoT) technological revolution is adding billions of devices around us. These devices aim to collect unforeseen amounts of data to help better understand environments and improve numerous aspects of life. However, IoT technology is still in its infancy, so there are still many challenges still remaining. One major issue in IoT is the questionable security for many devices. Recent cyber attacks have highlighted the shortcomings of many IoT devices. Many of these device manufacturers simply wanted to be the first in a niche market, ignoring the importance of security. Proper security implementation in IoT has only been done by a minority of designers and manufacturers. Therefore, this document proposes a secure design for all IoT devices to be based. Numerous security techniques are presented and shown to properly protect the data that will pass through many of these devices. The overall goal for this proposed work aims to have an overall security solution that overcomes the current shortfalls of IoT devices, lessening the concern for IoT’s future use in our everyday lives.
author2 Electrical and Computer Engineering
author_facet Electrical and Computer Engineering
McGinthy, Jason M.
author McGinthy, Jason M.
author_sort McGinthy, Jason M.
title Solutions for Internet of Things Security Challenges: Trust and Authentication
title_short Solutions for Internet of Things Security Challenges: Trust and Authentication
title_full Solutions for Internet of Things Security Challenges: Trust and Authentication
title_fullStr Solutions for Internet of Things Security Challenges: Trust and Authentication
title_full_unstemmed Solutions for Internet of Things Security Challenges: Trust and Authentication
title_sort solutions for internet of things security challenges: trust and authentication
publisher Virginia Tech
publishDate 2019
url http://hdl.handle.net/10919/91443
work_keys_str_mv AT mcginthyjasonm solutionsforinternetofthingssecuritychallengestrustandauthentication
_version_ 1719417029925011456