Document Details

Document Type : Thesis 
Document Title :
SOFTWARE MECHANISM FOR SECURING INTERNET OF THINGS IN DISTRIBUTED ARCHITECTURE
آلية برمجية لحماية انترنت الأشياء في البنية الموزعة
 
Subject : Faculty of Computing and Information Technology 
Document Language : Arabic 
Abstract : Message Queue Telemetry Transport (MQTT) protocol is a promising messaging protocol used in IoT. However, with the rapid growth of internet-connected devices and the tremendous amount of data that could be generated and exchanged in an IoT environment, MQTT can encounter many challenges, such as increasing performance overhead, network congestion, scalability issue, and complexity of security management. This is because the current MQTT architecture relies on a central broker in the cloud responsible for delivering data between clients (from the publisher to the subscriber) and implements a heavyweight authentication mechanism based on the cryptographic protocol, Secure Sockets Layer/Transport Layer Security (SSL/TLS). In this case, cloud-based MQTT architecture will be unable to meet IoT requirements, especially the complex IoT applications that need fast responses, real-time processing, and high-level automation, such as in the Industrial Internet of Things (IIoT). As a result, this thesis proposes a fog-based MQTT architecture where brokers are distributed in a fog layer and communicate with each other using the dynamic bridging mechanism to allow delivering data from the publisher to the subscriber through more than one broker. In addition, the thesis presents a lightweight mutual authentication scheme based on the hash function and XOR operation. An authentication manager is deployed in each broker to generate authentication parameters and conduct authentication for each group of clients/brokers connected to that broker to achieve independent security management. The scheme's security was analyzed using informal and formal analysis using the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool. The results showed that the scheme is safe and can resist common attacks such as impersonation, replay, and eavesdropping attacks. Furthermore, the scheme's performance was evaluated and showed that it outperformed and it was more efficient compared with other schemes. 
Supervisor : Dr. Vijey Thayananthan 
Thesis Type : Master Thesis 
Publishing Year : 1445 AH
2023 AD
 
Added Date : Wednesday, December 20, 2023 

Researchers

Researcher Name (Arabic)Researcher Name (English)Researcher TypeDr GradeEmail
حسن كرديKurdi, Hassan ResearcherDoctorate 

Files

File NameTypeDescription
 49601.pdf pdf 

Back To Researches Page