Search In this Thesis
   Search In this Thesis  
العنوان
A Novel M2M Mutual Authentication Scheme for
Internet of Things (IoT)
/
المؤلف
Younes,Mohamed Mahmoud Samy
هيئة الاعداد
باحث / محمد محمود سامي أحمد يونس
مشرف / وجدى رفعت أنيس
مناقش / محمد حسن عبد العظيم
مناقش / إسماعيل محمد حافظ
تاريخ النشر
2022.
عدد الصفحات
64p.:
اللغة
الإنجليزية
الدرجة
ماجستير
التخصص
الهندسة الكهربائية والالكترونية
تاريخ الإجازة
1/1/2022
مكان الإجازة
جامعة عين شمس - كلية الهندسة - كهربة اتصالات
الفهرس
Only 14 pages are availabe for public view

from 90

from 90

Abstract

Internet of things (IoT) plays a great role in the 21st century than a couple of years ago. (IoT)provides us a technologically and optimistic image of the future where several computing objects are linked to the internet and they can recognize themselves with additional computing strategies.(IoT) is the capacity to give everyday gadgets a method to identify themselves and communicate with one another. Smart homes, smart cities, wearables, e-health, and other (IoT) application domains are just a few examples. As a result, tens of billions, if not hundreds of billions, of devices will be linked. (IoT) is one of the developing technologies that has piqued the interest of academic and industrial researchers. (IoT)concept is the connecting of internet-enabled things or gadgets with one another and with humans in order to achieve some common aims. In the near future, (IoT) is predicted to be smoothly incorporated into our surroundings, and humans will be completely reliant on it for comfort and ease of living.
In most (IoT) applications, the use of Resource Constrained Devices (RCD) is on the rise, and these gadgets are typically used to handle sensitive data.
As a result, data security has become increasingly important for both producers and users. The main problem that renders these devices vulnerable is a lack of resources. Attackers could take advantage of these flaws to get access to sensitive information. Hence, to improve device efficiency and reduce the danger of sensitive data loss, a carefully chosen and well verified public key crypto-system must be used.
Uses Elliptic curve cryptography (ECC) is essentially a public key crypto-system with the fundamental difference of faster evolving capacity while yielding a variety of different approaches to the solution of the cryptographic algorithm.
This thesis discuss(IoT) problems in machine to machine authentication process and decide to create a protocol for (M2M) mutual authentication scheme for (IoT) to overcome these problems.