Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things

dc.contributor.advisorHancke, Gerhard P.
dc.contributor.coadvisorVenter, Hein S.
dc.contributor.emailu10502263@tuks.co.za
dc.contributor.postgraduateLedwaba, Lehlogonolo P.I.
dc.date.accessioned2018-08-17T09:42:41Z
dc.date.available2018-08-17T09:42:41Z
dc.date.created2005/03/18
dc.date.issued2017
dc.descriptionDissertation (MSc)--University of Pretoria, 2017.
dc.description.abstractEndpoint devices are integral in the realisation of any industrial cyber-physical system (ICPS) application. As part of the work of promoting safer and more secure industrial Internet of Things (IIoT) networks and devices, the Industrial Internet Consortium (IIC) and the OpenFog Consortium have developed security framework specifications detailing security techniques and technologies that should be employed during the design of an IIoT network. Previous work in establishing cryptographic services on platforms intended for wireless sensor networks (WSN) and the Internet of Things (IoT) has concluded that security mechanisms cannot be implemented using software libraries owing to the lack of memory and processing resources, the longevity requirements of the processor platforms, and the hard real-time requirements of industrial operations. Over a decade has passed since this body of knowledge was created, however, and IoT processors have seen a vast improvement in the available operating and memory resources while maintaining minimal power consumption. This study aims to update the body of knowledge regarding the provision of security services on an IoT platform by conducting a detailed analysis regarding the performance of new generation IoT platforms when running software cryptographic services. The research considers execution time, power consumption and memory occupation and works towards a general, implementable design of a secure, IIoT edge device. This is realised by identifying security features recommended for IIoT endpoint devices; identifying currently available security standards and technologies for the IIoT; and highlighting the trade-offs that the application of security will have on device size, performance, memory requirements and monetary cost.
dc.description.availabilityUnrestricted
dc.description.degreeMSc
dc.description.departmentElectrical, Electronic and Computer Engineering
dc.identifier.citationLedwaba, LP 2017, Determining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things, MSc Dissertation, University of Pretoria, Pretoria, viewed yymmdd <http://hdl.handle.net/2263/66210>
dc.identifier.otherA2018
dc.identifier.urihttp://hdl.handle.net/2263/66210
dc.language.isoen
dc.publisherUniversity of Pretoria
dc.rights© 2018 University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria.
dc.subjectUCTD
dc.subjectCryptography
dc.subjectCyber-physical systems
dc.subjectIndustrial Internet of things (IIoT)
dc.subjectSecurity
dc.subjectEndpoint security
dc.subjectPerformance evaluation
dc.titleDetermining the performance costs in establishing cryptography services as part of a secure endpoint device for the Industrial Internet of Things
dc.typeDissertation

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
Ledwaba_Determining_2017.pdf
Size:
2.06 MB
Format:
Adobe Portable Document Format
Description: