Self-Organizing High-Assurance Privacy

When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootst...

Full description

Bibliographic Details
Main Authors: Ingnäs, Joakim, Tutsch, Nicole
Format: Others
Language:English
Published: Uppsala universitet, Institutionen för informationsteknologi 2019
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-394005
id ndltd-UPSALLA1-oai-DiVA.org-uu-394005
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-uu-3940052019-10-02T04:33:56ZSelf-Organizing High-Assurance PrivacyengIngnäs, JoakimTutsch, NicoleUppsala universitet, Institutionen för informationsteknologiUppsala universitet, Institutionen för informationsteknologi2019Engineering and TechnologyTeknik och teknologierWhen using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. Therefore, the question of how to make these devices find therelevant peers becomes a pressing one. In addition, the devices have to securelyexchange keys. In this paper, a solution is presented using a rendezvous point thatacts as a gateway between a key distribution server and the clients. Thearchitecture of the system consists of one rendezvous point, one key distributionserver, and multiple clients. The clients have to go through the rendezvous point inorder to reach the key distribution server. Two different protocols, RSA andpassword-authenticated key exchange, are studied in order to understand whichone of them is superior in key exchange security. The result of the study is that theRSA protocol is faster than the password-authenticated key exchange protocolwhen applied to this solution. However, password-authenticated key exchange isseen as safer, as it applies security measures that RSA lacks.In this project, the system manages to have the clients routed from the rendezvouspoint to the key distribution center, and the key distribution server manages tosend out information to the clients about their peers. In addition, the rendezvousmanages to shield the key distribution center from some denial-of-service attackon the hardware. However, this solution is highly theoretical, and requires furtherresearch to be regarded as completely functional. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-394005UPTEC IT, 1401-5749 ; 19015application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Engineering and Technology
Teknik och teknologier
spellingShingle Engineering and Technology
Teknik och teknologier
Ingnäs, Joakim
Tutsch, Nicole
Self-Organizing High-Assurance Privacy
description When using a network, devices might have to securely communicate with oneanother. Issues arise when the devices are unaware of others in the network, orwhen the devices have to be manually updated with the information about thedevices they wish to communicate with. This presents an issue with bootstrappingover networks. Therefore, the question of how to make these devices find therelevant peers becomes a pressing one. In addition, the devices have to securelyexchange keys. In this paper, a solution is presented using a rendezvous point thatacts as a gateway between a key distribution server and the clients. Thearchitecture of the system consists of one rendezvous point, one key distributionserver, and multiple clients. The clients have to go through the rendezvous point inorder to reach the key distribution server. Two different protocols, RSA andpassword-authenticated key exchange, are studied in order to understand whichone of them is superior in key exchange security. The result of the study is that theRSA protocol is faster than the password-authenticated key exchange protocolwhen applied to this solution. However, password-authenticated key exchange isseen as safer, as it applies security measures that RSA lacks.In this project, the system manages to have the clients routed from the rendezvouspoint to the key distribution center, and the key distribution server manages tosend out information to the clients about their peers. In addition, the rendezvousmanages to shield the key distribution center from some denial-of-service attackon the hardware. However, this solution is highly theoretical, and requires furtherresearch to be regarded as completely functional.
author Ingnäs, Joakim
Tutsch, Nicole
author_facet Ingnäs, Joakim
Tutsch, Nicole
author_sort Ingnäs, Joakim
title Self-Organizing High-Assurance Privacy
title_short Self-Organizing High-Assurance Privacy
title_full Self-Organizing High-Assurance Privacy
title_fullStr Self-Organizing High-Assurance Privacy
title_full_unstemmed Self-Organizing High-Assurance Privacy
title_sort self-organizing high-assurance privacy
publisher Uppsala universitet, Institutionen för informationsteknologi
publishDate 2019
url http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-394005
work_keys_str_mv AT ingnasjoakim selforganizinghighassuranceprivacy
AT tutschnicole selforganizinghighassuranceprivacy
_version_ 1719259401701818368