Repository logo
 

SENSORY KEYS: SECURE COMMUNICATION & MUTUAL AUTHENTICATION USING MODIFIED DIFFIE HELLMAN KEY AGREEMENT SCHEME

dc.contributor.authorMatta, Sridhar
dc.contributor.copyright-releaseNot Applicableen_US
dc.contributor.degreeMaster of Computer Scienceen_US
dc.contributor.departmentFaculty of Computer Scienceen_US
dc.contributor.ethics-approvalNot Applicableen_US
dc.contributor.external-examinerN/Aen_US
dc.contributor.graduate-coordinatorDr. Malcolm I. Heywooden_US
dc.contributor.manuscriptsNot Applicableen_US
dc.contributor.thesis-readerDr. Nur Zincir Heywooden_US
dc.contributor.thesis-readerDr. Musfiq Rehmanen_US
dc.contributor.thesis-supervisorDr. Srinivas Sampallien_US
dc.date.accessioned2016-08-31T14:38:59Z
dc.date.available2016-08-31T14:38:59Z
dc.date.defence2016-08-10
dc.date.issued2016-08-31T14:38:59Z
dc.description.abstractSmartphones and Tabloids are becoming the digital entity of identification for every individual. Their portability and programmability have made them a juncture of endless applications. Apart from the numerous gaming apps that are available, applications especially in the fields of health and fitness, and finance often require the data to be transferred to a remote server. Manipulation of that data by a hacker, such as by man in the middle (MITM) attacks can lead to many undesired outcomes. Therefore, secure data transfer is critical in many applications. This research work presents a new variant of the Diffie-Hellman key agreement scheme that uses dynamically changing sensor data to facilitate continuous key updates. Our scheme ensures mutual authentication and mitigates MITM attacks with minimal need for public key infrastructure (PKI). We also propose an access control mechanism that protects data recorded by our application on the phone in case of physical attacks. We have tested the randomness of the keys generated using various real time use-cases. There were no noticeable patterns of key generation or key sequences. We have also evaluated our scheme using a security protocol analyzer tool, ‘Scyther’. Our test results have shown that the proposed key agreement scheme is efficient in mitigating MITM attacks.en_US
dc.identifier.urihttp://hdl.handle.net/10222/72148
dc.language.isoen_USen_US
dc.subjectSensorsen_US
dc.subjectAuthenticationen_US
dc.subjectSmartphonesen_US
dc.subjectDetectors
dc.titleSENSORY KEYS: SECURE COMMUNICATION & MUTUAL AUTHENTICATION USING MODIFIED DIFFIE HELLMAN KEY AGREEMENT SCHEMEen_US

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Matta-Sridhar-MCSc-CSCI-August-2016.pdf
Size:
10.94 MB
Format:
Adobe Portable Document Format
Description:
Entire report on my research work for my Master's degree

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: