Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things

Show simple item record

dc.contributor.advisor Hancke, Gerhard P.
dc.contributor.coadvisor Venter, Hein S.
dc.contributor.postgraduate Ledwaba, Lehlogonolo P.I.
dc.date.accessioned 2018-08-17T09:42:41Z
dc.date.available 2018-08-17T09:42:41Z
dc.date.created 2005/03/18
dc.date.issued 2017
dc.description Dissertation (MSc)--University of Pretoria, 2017.
dc.description.abstract Endpoint devices are integral in the realisation of any industrial cyber-physical system (ICPS) application. As part of the work of promoting safer and more secure industrial Internet of Things (IIoT) networks and devices, the Industrial Internet Consortium (IIC) and the OpenFog Consortium have developed security framework specifications detailing security techniques and technologies that should be employed during the design of an IIoT network. Previous work in establishing cryptographic services on platforms intended for wireless sensor networks (WSN) and the Internet of Things (IoT) has concluded that security mechanisms cannot be implemented using software libraries owing to the lack of memory and processing resources, the longevity requirements of the processor platforms, and the hard real-time requirements of industrial operations. Over a decade has passed since this body of knowledge was created, however, and IoT processors have seen a vast improvement in the available operating and memory resources while maintaining minimal power consumption. This study aims to update the body of knowledge regarding the provision of security services on an IoT platform by conducting a detailed analysis regarding the performance of new generation IoT platforms when running software cryptographic services. The research considers execution time, power consumption and memory occupation and works towards a general, implementable design of a secure, IIoT edge device. This is realised by identifying security features recommended for IIoT endpoint devices; identifying currently available security standards and technologies for the IIoT; and highlighting the trade-offs that the application of security will have on device size, performance, memory requirements and monetary cost.
dc.description.availability Unrestricted
dc.description.degree MSc
dc.description.department Electrical, Electronic and Computer Engineering
dc.identifier.citation Ledwaba, LP 2017, Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things, MSc Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/66210>
dc.identifier.other A2018
dc.identifier.uri http://hdl.handle.net/2263/66210
dc.language.iso en
dc.publisher University of Pretoria
dc.rights © 2018 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subject UCTD
dc.subject Cryptography
dc.subject Cyber-Physical Systems
dc.subject Industrial Internet of Things
dc.subject Security
dc.subject Endpoint security
dc.subject Performance evaluation
dc.title Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things
dc.type Dissertation


Files in this item

This item appears in the following Collection(s)

Show simple item record