With PQDT Open, you can read the full text of open access dissertations and theses free of charge.
About PQDT Open
Search
COMING SOON! PQDT Open is getting a new home!
ProQuest Open Access Dissertations & Theses will remain freely available as part of a new and enhanced search experience at www.proquest.com.
Questions? Please refer to this FAQ.
The evolution and convergence of embedded information and communication systems (ICS) technologies has contributed to an era of device-embedded smart objects whose continually increasing capabilities drives utility and an ever-expanding footprint. Collectively, the smart objects comprise the Internet of Things (IoT). Individually, the smart objects consist of thing-embedded or standalone microcontrollers, System on a Chip (SoC), and/or single-board computers (SBC) based devices whose capabilities include data generation, aggregation, communication, and/or data-driven actuation of cyber-physical components. Smart Home Automation (SHA) is at the forefront of the IoT revolution.
The motivations for SHA include increased energy efficiencies, convenience, security, and the provision of assistive-living technologies within the domicile. Academic research into these areas has been ongoing for decades. The feasibility of SHA, however, has been a more recent realization resulting in an ever-expanding consumer market space.
Contemporary research disclosing authentication vulnerabilities has been evidenced by wide-spread device comprise. Implementation of application authentication faces several challenges including constrained device resource limitations, key distribution or exchange, and device heterogeneity. Application authentication is critical to ensure the authenticity of the originating data source and, consequently, the integrity of the data, as well as the authorization of any subsequently triggered actions. Application authentication, particularly for machine to machine communications, is an active research area consisting of multiple broad focuses. Authentication efficiency research frequently examines device processor, memory, and power utilization. The goal of this study is to examine the effect incurred upon processor, memory, and power utilization by a SHA controller utilizing an enhanced authentication mechanism not typically studied, time-based dynamic passwords.
Advisor: | Pittman, Jason Michael |
Commitee: | Ford, Dan, Herschbach, Robert A |
School: | Capitol Technology University |
Department: | Technology (PhD) |
School Location: | United States -- Maryland |
Source: | DAI-B 81/9(E), Dissertation Abstracts International |
Source Type: | DISSERTATION |
Subjects: | Information Technology, Computer Engineering, Computer science |
Keywords: | Authentication, Automation, IoT, Security, Smart home, TOTP |
Publication Number: | 27739945 |
ISBN: | 9781658490597 |