NUST Institutional Repository

Information Security in the Post Quantum Era for IoT

Show simple item record

dc.contributor.author Rauf, Abid
dc.date.accessioned 2023-10-08T04:42:47Z
dc.date.available 2023-10-08T04:42:47Z
dc.date.issued 2021
dc.identifier.other : NUST201390044PSEECS2113S
dc.identifier.uri http://10.250.8.41:8080/xmlui/handle/123456789/39637
dc.description Supervisor: Dr. Muhammad Ali Tahir en_US
dc.description.abstract With the emergence of Quantum computing, more and more emphasis is on devel oping cyber-physical quantum-safe systems. Information-Theoretic security does not depend upon assumptions of computational hardness. Thus is quantum-safe if a framework is proved to be Information-Theoretic Secure. As the connectivity of net worked devices becomes more and more ubiquitous, revolutionary Internet of Things (IoT) technologies find their place in many facets of our society. The key explanation for cyberattacks on IoT networks is the misuse of these devices. Security architecture is still an open issue and a key phase in making effective IoT applications. Real time commands must reach the end devices in milliseconds in dicey settings, such as e-health, smart grid, and smart cities. Traditional public-key cryptosystems, while essential in the sense of general Internet security, fail to create new session keys for critical messages on a millisecond scale. In this thesis, we proposed three frame works that satisfy the cryptographic properties of cyber-physical systems. Firstly, a Blockchain User Authentication using zk-SNARKS is proposed to authenticate nodes wanted to join a network using a decentralized mechanism. Secondly, an information theoretic key generation mechanism is proposed based on packet erasures and error correction codes. Thirdly, an information-theoretic secure message routing algorithms in software-defined networks (SDN) is proposed. The information-theoretic security of the latter two schemes is proved under the adversarial model. Efficiency of keystream generation is demonstrated by experimental results and Shamir’s secret sharing (SSS)- based protocols and the validity of our mechanism design. en_US
dc.language.iso en_US en_US
dc.publisher School of Electrical Engineering and Computer Science,(SEECS) NUST en_US
dc.subject Information-Theoretic Security, Quantum, cyber, key stream, blockchain. ALLPhDTheses. en_US
dc.title Information Security in the Post Quantum Era for IoT en_US
dc.type Thesis en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account