Dissertation/Thesis Abstract

Application Layer Authentication Using a Time-Based Password Effect upon the Smart Home Automation Controller
by Bringardner, Alan Scott, D.Sc., Capitol Technology University, 2017, 227; 27739945
Abstract (Summary)

The evolution and convergence of embedded information and communication systems (ICS) technologies has contributed to an era of device-embedded smart objects whose continually increasing capabilities drives utility and an ever-expanding footprint. Collectively, the smart objects comprise the Internet of Things (IoT). Individually, the smart objects consist of thing-embedded or standalone microcontrollers, System on a Chip (SoC), and/or single-board computers (SBC) based devices whose capabilities include data generation, aggregation, communication, and/or data-driven actuation of cyber-physical components. Smart Home Automation (SHA) is at the forefront of the IoT revolution.

The motivations for SHA include increased energy efficiencies, convenience, security, and the provision of assistive-living technologies within the domicile. Academic research into these areas has been ongoing for decades. The feasibility of SHA, however, has been a more recent realization resulting in an ever-expanding consumer market space.

Contemporary research disclosing authentication vulnerabilities has been evidenced by wide-spread device comprise. Implementation of application authentication faces several challenges including constrained device resource limitations, key distribution or exchange, and device heterogeneity. Application authentication is critical to ensure the authenticity of the originating data source and, consequently, the integrity of the data, as well as the authorization of any subsequently triggered actions. Application authentication, particularly for machine to machine communications, is an active research area consisting of multiple broad focuses. Authentication efficiency research frequently examines device processor, memory, and power utilization. The goal of this study is to examine the effect incurred upon processor, memory, and power utilization by a SHA controller utilizing an enhanced authentication mechanism not typically studied, time-based dynamic passwords.

Indexing (document details)
Advisor: Pittman, Jason Michael
Commitee: Ford, Dan, Herschbach, Robert A
School: Capitol Technology University
Department: Technology (PhD)
School Location: United States -- Maryland
Source: DAI-B 81/9(E), Dissertation Abstracts International
Source Type: DISSERTATION
Subjects: Information Technology, Computer Engineering, Computer science
Keywords: Authentication, Automation, IoT, Security, Smart home, TOTP
Publication Number: 27739945
ISBN: 9781658490597
Copyright © 2020 ProQuest LLC. All rights reserved. Terms and Conditions Privacy Policy Cookie Policy
ProQuest