Author: Yan, Haotian
Title: Message subset integrity problem in the Internet of Things
Advisors: Hu, Haibo (EEE)
Degree: Ph.D.
Year: 2024
Subject: Internet of things -- Security measures
Computer networks -- Security measures
Hong Kong Polytechnic University -- Dissertations
Department: Department of Electrical and Electronic Engineering
Pages: xiii, 130 pages : color illustrations
Language: English
Abstract: With the fast development of the Internet of Things (IoT) applications and tech­nologies, many new wireless communication protocols and hardware have emerged. However, there is one essential security objective during the message transmission in IoT, namely, message integrity, where an adversary cannot modify the message. Clas­sic cryptographic solutions to integrity include the message authentication code and digital signature. In the IoT scenario, especially fog and edge computing, however, different devices have different computation abilities: a fog or edge node may have a strong computation ability to handle many computation tasks, while a sensor node cannot. Therefore, a participant with limited computation ability cannot verify all incoming messages. To solve this problem, we can segment the message into different subsets so that the devices with varying computation abilities can select one or more of the message subsets for verification.
The works described in this thesis are mainly divided into three parts. First, we try to solve the subset privacy problem, which is a by-product of the subset integrity. In some cases, a subset of the message also has privacy concerns where the message may contain useless (in terms of integrity) but sensitive content. Unfortunately, existing MACs or signatures only address message integrity while ignoring the privacy problem. To address the problem, we provide a novel scheme so that only one MAC is necessary for protecting the message integrity, even if the privacy concerns from different clients are varied. Second, we provide a new scheme to support the subset integrity verification between two entities in the fog based industrial IoT scenario. Insides, the fog node has great computation ability. Thus, it can randomly and optimally verify a subset of the message and leave the remaining subsets verified by the receiver. Finally, we extend our research to a smart city scenario, where several edge nodes are involved in subset verification. Since a message is separated into different subsets, several edge nodes should cooperate to verify the message. Therefore, a novel signature scheme is necessary. Moreover, how this process can be optimized in terms of verification latency and system throughput is an open problem. The optimization is incredibly challenging when the verification order of various edge nodes is essential.
Rights: All rights reserved
Access: open access

Files in This Item:
File Description SizeFormat 
7773.pdfFor All Users4.51 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show full item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/13379