Date of Award

31-8-2024

Document Type

Thesis

School

School of Computing

Programme

Ph.D.-Doctoral of Philosophy

First Advisor

Dr.D.Manivannan

Keywords

Lightweight Authentication, Cyber-Physical Systems, Internet of Things, Game-Theoretic Security; Chaotic Pseudo-Random Number Generation.

Abstract

As digital computing paradigm and practices have emerged in disciplines, devices with processors and sensors were rudimentary, performing independent tasks with limited power. The first computer processors were slow, bulky and consuming high energy, as sensors in thermometers and pressure gauges provide original, independent measurements without effective communication, 1999. It often required powerful, energy-efficient processors and advanced sensors to enable seamless communication and sophisticated data processing.

These devices, since smart home systems to industrial automation tools, which continuously collect, analyse and share data via the internet, facilitating if real-time management, predictive maintenance, and improved seamless experience are used, transforming everyday objects into intelligent, connected systems but IoT devices face greater security risks and attacks. These vulnerabilities are often caused by weak encryption, inadequate authentication methods and irregular software updates, which put critical data and critical systems at potential risk.

The proposed mechanism aims to provide a secure authentication mechanism between IoT nodes and gateways utilizing lightweight authentication techniques and provides a robust mechanism for secured key generation, and key exchange to increase the performance and confirm the integrity of communication with less time consumption and computation costs compared to other existing approaches.

Lightweight authentication protocols enable efficient data exchange among resourceconstrained devices, while robust authentication mechanisms at the gateway level ensures the protection of sensitive information and critical network operations. Hence the proposed system employs an HG-based hashing technique, which offers enhanced resistance to attacks during the key-sharing process. This multi-dimensional approach improves the robustness and security of the authentication process, ensuring a higher level of protection for IoT networks.

Furthermore, an important feature of the proposed scheme is that it can generate a unique random number using a chaotic pseudorandom number generator (PRNG) for each authentication instance, thus improving security by ensuring that each assembly is unique and confusing, ensuring the same range of safe types. The proposed system is designed to operate with minimal computing and communication costs, and maintain low storage requirements, which are critical for resource-constrained environments, and makes the system particularly suitable for IoT and CPS applications Comparative analysis with existing approaches shows the proposed System reachability security is robust, resulting in dynamic security assets that can adapt to multiple threats and operating conditions occur.

The performance of the proposed system is evaluated on different hardware platforms, where real-time performance is critical. The design of the system ensures that it can meet the demands of real-time applications, delivering better results than existing solutions. This improvement is attributed to the resource efficiency of the system and its robust security system, which does not compromise performance. Furthermore, chaos-based PRNG-based random number generation enhances security by eliminating guesswork in the authentication process. This feature is especially important in environments where devices are constantly communicating and exchanging critical information to withstand covert inspection and inspection attacks i.e., probe attacks.

In summary, the proposed system enhances machine communication performance and security through a sophisticated authentication scheme with efficient resource management It effectively addresses the identity-based authentication issues and reveals which good results have been shown in real-time execution, adapted to practical situations compared to existing methods. The integrated storage cost significantly improves the effectiveness of the proposed scheme for secure and efficient machine communication in modern technology.

Share

COinS