The evolution and convergence of embedded information and communication systems (ICS) technologies has contributed to an era of device-embedded smart objects whose continually increasing capabilities drives utility and an ever-expanding footprint. Collectively, the smart objects comprise the Internet of Things (IoT). Individually, the smart objects consist of thing-embedded or standalone microcontrollers, System on a Chip (SoC), and/or single-board computers (SBC) based devices whose capabilities include data generation, aggregation, communication, and/or data-driven actuation of cyber-physical components. Smart Home Automation (SHA) is at the forefront of the IoT revolution.
The motivations for SHA include increased energy efficiencies, convenience, security, and the provision of assistive-living technologies within the domicile. Academic research into these areas has been ongoing for decades. The feasibility of SHA, however, has been a more recent realization resulting in an ever-expanding consumer market space.
Contemporary research disclosing authentication vulnerabilities has been evidenced by wide-spread device comprise. Implementation of application authentication faces several challenges including constrained device resource limitations, key distribution or exchange, and device heterogeneity. Application authentication is critical to ensure the authenticity of the originating data source and, consequently, the integrity of the data, as well as the authorization of any subsequently triggered actions. Application authentication, particularly for machine to machine communications, is an active research area consisting of multiple broad focuses. Authentication efficiency research frequently examines device processor, memory, and power utilization. The goal of this study is to examine the effect incurred upon processor, memory, and power utilization by a SHA controller utilizing an enhanced authentication mechanism not typically studied, time-based dynamic passwords.
|Advisor:||Pittman, Jason Michael|
|Commitee:||Ford, Dan, Herschbach, Robert A|
|School:||Capitol Technology University|
|School Location:||United States -- Maryland|
|Source:||DAI-B 81/9(E), Dissertation Abstracts International|
|Subjects:||Information Technology, Computer Engineering, Computer science|
|Keywords:||Authentication, Automation, IoT, Security, Smart home, TOTP|
Copyright in each Dissertation and Thesis is retained by the author. All Rights Reserved
The supplemental file or files you are about to download were provided to ProQuest by the author as part of a
dissertation or thesis. The supplemental files are provided "AS IS" without warranty. ProQuest is not responsible for the
content, format or impact on the supplemental file(s) on our system. in some cases, the file type may be unknown or
may be a .exe file. We recommend caution as you open such files.
Copyright of the original materials contained in the supplemental file is retained by the author and your access to the
supplemental files is subject to the ProQuest Terms and Conditions of use.
Depending on the size of the file(s) you are downloading, the system may take some time to download them. Please be