An analysis of security protocols for lightweight systems
dc.contributor.advisor | Sanders, Jeff | en_ZA |
dc.contributor.author | Kamkuemah, Martha Ndeyapeuomagano | en_ZA |
dc.contributor.other | Stellenbosch University. Faculty of Science. Dept. of Mathematical Sciences. | en_ZA |
dc.date.accessioned | 2022-03-15T07:07:38Z | en_ZA |
dc.date.accessioned | 2022-04-29T09:31:15Z | en_ZA |
dc.date.available | 2022-03-15T07:07:38Z | en_ZA |
dc.date.available | 2022-04-29T09:31:15Z | en_ZA |
dc.date.issued | 2022-04 | en_ZA |
dc.description | Thesis (PhD)--Stellenbosch University, 2022. | en_ZA |
dc.description.abstract | ENGLISH SUMMARY: Security is hard to maintain in distributed systems especially for communicating agents restricted to lightweight computations, as in the Internet of Things, which struggle to implement strong cryptographic security. A methodology is developed for specifying and reasoning algebraically about security in such systems which combines epistemic logic and a state-based formalism. The knowledge modality K is used to define a uthentication a nd s ecrecy i n t erms o f w hat e ach agent knows. Operations are defined a s s tate t ransitions. Having g ained c onfidence in our methodology by applying it to the benchmark case studies Needham-Schroeder and Diffie-Hellman protocols, we then apply it to the contemporary examples Signal and Long-Range Wide-Area Network protocols. A mitigation is proposed and verified for a Long-Range Wide-Area Network. | en_ZA |
dc.description.abstract | AFRIKAANS OPSOMMING: Sekuriteit is moeilik om te handhaaf in verspreide stelsels, veral vir kommunikasieagente met beperkte berekenings vermoë, soos Internet van Dinge, wat sukkel om sterk kriptografiese s ekuriteit t e i mplimenteer. ‘n Metodologie word ontwikkel vir die spesifikasie e n a lgebraïes r edenering a angaande s ekuriteit v ir s ulke sisteme. Hierdie metodologie maak van epistemiese logika en ‘n staat gebaseerde formalisme gebruik. Die kennismodaliteit K word gebruik om verifikasie e n geheimhouding te definieer i n t erme van wat e lke a gent w eet. Operasies word a s staatsoorgange gedefinieer. Nadat vertroue in die metodologie verkry word deur dit op die maatstaf gevallestudies van die Needham-Schroeder- en Diffie-Hellman protokolle toe te pas, word dit vervolgens op die hedendaagse voorbeelde van Sein en Langafstand Wye-area netwerk protokolle toegepas. ‘n Versagting word vir ‘n Langafstand Wye-area netwerk voorgestel en geverifieer. | af_ZA |
dc.description.version | Doctoral | en_ZA |
dc.format.extent | xii, 132 pages : illustrations | en_ZA |
dc.identifier.uri | http://hdl.handle.net/10019.1/124762 | en_ZA |
dc.language.iso | en_ZA | en_ZA |
dc.publisher | Stellenbosch : Stellenbosch University | en_ZA |
dc.rights.holder | Stellenbosch University | en_ZA |
dc.subject | Lightweight computations | en_ZA |
dc.subject | Computer programming | en_ZA |
dc.subject | Computer system security | en_ZA |
dc.subject | UCTD | en_ZA |
dc.title | An analysis of security protocols for lightweight systems | en_ZA |
dc.type | Thesis | en_ZA |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- kamkuemah_analysis_2022.pdf
- Size:
- 1.49 MB
- Format:
- Adobe Portable Document Format
- Description: