Utilize este link para identificar ou citar este item: https://bdm.unb.br/handle/10483/17879
Arquivos neste item:
Arquivo Descrição TamanhoFormato 
2016_AnaPaulaLopes_LucasHilgert_tcc.pdf3,34 MBAdobe PDFver/abrir
Registro completo
Campo Dublin CoreValorLíngua
dc.contributor.advisorGondim, Paulo Roberto de Lira-
dc.contributor.authorLopes, Ana Paula Golembiouski-
dc.contributor.authorHilgert, Lucas de Oliveira-
dc.identifier.citationLOPES, Ana Paula Golembiouski; HILGERT, Lucas de Oliveira. Group authentication protocols for Internet of Things (IoT) – QoS and Security Properties Evaluation. 2016. xiii, 76 f., il. Trabalho de conclusão de curso (Bacharelado em Engenharia de Redes de Comunicação)—Universidade de Brasília, Brasília, 2016.pt_BR
dc.descriptionTrabalho de conclusão de curso (graduação)—Universidade de Brasília, Faculdade de Tecnologia, 2016.pt_BR
dc.rightsAcesso Abertopt_BR
dc.subject.keywordInternet das coisaspt_BR
dc.subject.keywordSegurança da informaçãopt_BR
dc.titleGroup authentication protocols for Internet of Things (IoT) – QoS and Security Properties Evaluationpt_BR
dc.typeTrabalho de Conclusão de Curso - Graduação - Bachareladopt_BR
dc.date.accessioned2017-08-14T18:32:11Z-
dc.date.available2017-08-14T18:32:11Z-
dc.date.submitted2016-12-09-
dc.identifier.urihttp://bdm.unb.br/handle/10483/17879-
dc.language.isoInglêspt_BR
dc.description.abstract1The objective of this work is to provide an overview on group authentication protocols for Internet of Things (IoT) and to propose two new group protocols. Both protocols perform authentication and key agreement among a group of devices and a Mobility Management Entity (MME) and aim performance improvements, ensuring a robust security and anonymity protection. One scheme is based on both Elliptical Curves Diffie-Hellman protocol and bilinear pairing and the other is a lightweight symmetric protocol based on Shamir’s secret. Additionally, both protocols have their performance and security objectives accomplishment analyzed and compared with other works already proposed in the literature. The performance analysis and comparison comprises communication, computational, verification and storage costs. Some of the security features analyzed are forward/backward secrecy (FS/BS), anonymity and resistance to several attacks. Finally, the protocols were formally validated by AVISPA tool.pt_BR
Aparece na Coleção:Engenharia de Redes de Comunicação



Este item está licenciado na Licença Creative Commons Creative Commons