Approved
Detecting Impersonation Attacks in a Static WSN
Anton Lin (2013) and Viktor Selleby (2013)
Start
2017-04-01
Presentation
2017-10-04 11:15
Location:
E:2517
Finished:
2017-10-17
Master's thesis:
Abstract
With the rise of Internet of Things(IoT), the number of embedded systems with internet connectivity is seeing an exponential growth. A society that is fully connected down to the bare things in our everyday life has many benefits but does also raise a number of security concerns, autonomous authentication between machines –machine to machine authentication– being one of them.<br><br> Most IoT systems employ credential based authentication. Similar to smart handheld devices or traditional mobile phones, it is the keys stored in the device’s non-volatile memory that are the very credentials on which the devices are authenticated. However, unlike smart handheld devices, IoT devices do not enjoy the security of being carried on the owner’s physical being, they are most often unmanned and unmonitored. Thus, IoT devices are highly susceptible to attacks where a potential adversary could simply extract the necessary credentials and pose as the device in question.<br><br> Research has been done on various authentication mechanisms that operates on top of the traditional credential based authentication. In machine-metrics based authentication various metrics such as computation time given a certain random problem, hardware fingerprint and other characteristics can be used to deduce the identity of the authenticating device. The core of the concept is to identify the proving party through information which cannot be readily found in the device’s non-volatile memory. Such mechanisms are often designed for more traditional systems such as personal computers or smart hand held devices. However, can such authentication models be extended to embedded systems where computational resources are more restrained?
Supervisor: Simon Johansson (Tritech) and Martin Hell (EIT)
Examiner: Thomas Johansson (EIT)