Campo Dublin Core | Valor | Língua |
dc.contributor.advisor | Gondim, Paulo Roberto de Lira | - |
dc.contributor.author | Lopes, Ana Paula Golembiouski | - |
dc.contributor.author | Hilgert, Lucas de Oliveira | - |
dc.identifier.citation | LOPES, Ana Paula Golembiouski; HILGERT, Lucas de Oliveira. Group authentication protocols for Internet of Things (IoT) – QoS and Security Properties Evaluation. 2016. xiii, 76 f., il. Trabalho de conclusão de curso (Bacharelado em Engenharia de Redes de Comunicação)—Universidade de Brasília, Brasília, 2016. | pt_BR |
dc.description | Trabalho de conclusão de curso (graduação)—Universidade de Brasília, Faculdade de Tecnologia, 2016. | pt_BR |
dc.rights | Acesso Aberto | pt_BR |
dc.subject.keyword | Internet das coisas | pt_BR |
dc.subject.keyword | Segurança da informação | pt_BR |
dc.title | Group authentication protocols for Internet of Things (IoT) – QoS and Security Properties Evaluation | pt_BR |
dc.type | Trabalho de Conclusão de Curso - Graduação - Bacharelado | pt_BR |
dc.date.accessioned | 2017-08-14T18:32:11Z | - |
dc.date.available | 2017-08-14T18:32:11Z | - |
dc.date.submitted | 2016-12-09 | - |
dc.identifier.uri | http://bdm.unb.br/handle/10483/17879 | - |
dc.language.iso | Inglês | pt_BR |
dc.description.abstract1 | The objective of this work is to provide an overview on group authentication protocols for Internet of Things (IoT) and to propose two new group protocols. Both protocols perform authentication and key agreement among a group of devices and a Mobility Management Entity (MME) and aim performance improvements, ensuring a robust security and anonymity protection. One scheme is based on both Elliptical Curves Diffie-Hellman protocol and bilinear pairing and the other is a lightweight symmetric protocol based on Shamir’s secret. Additionally, both protocols have their performance and security objectives accomplishment analyzed and compared with other works already proposed in the literature. The performance analysis and comparison comprises communication, computational, verification and storage costs. Some of the security features analyzed are forward/backward secrecy (FS/BS), anonymity and resistance to several attacks. Finally, the protocols were formally validated by AVISPA tool. | pt_BR |
Aparece na Coleção: | Engenharia de Redes de Comunicação
|