Credential Provisioning and Peer Configuration with Extensible Authentication Protocol

dc.contributor.advisorAura, Tuomas, juhendaja
dc.contributor.advisorUnruh, Dominique, juhendaja
dc.contributor.authorBoire, Sebastien
dc.contributor.otherTartu Ülikool. Loodus- ja täppisteaduste valdkondet
dc.contributor.otherTartu Ülikool. Arvutiteaduse instituutet
dc.date.accessioned2023-09-21T10:18:10Z
dc.date.available2023-09-21T10:18:10Z
dc.date.issued2021
dc.description.abstractThe Internet of Things (IoT) contains an increasing number of diverse objects, ranging from simple sensors to smart speakers and industrial appliances. The continuing growth in the number and the diversity of connected devices within enterprises and homes complicates their management. Vendor-specific protocols cannot solve this problem. The Extensible Authentication Protocol (EAP) is a framework to negotiate and run EAP methods, i.e. authentication protocols between client and server. Tens of different EAP methods exist, and EAP is widely-adopted in WiFi and cellular networks. In some EAP methods the server can invoke another, “inner” EAP method for additional authentication inside the same EAP session. In this thesis we investigate how to apply EAP for managing devices in wireless networks. Our approach is to add the possibility to send short client tokens from server to client in EAP session. After successful authentication and completion of the EAP session, the client uses these tokens to access the management servers. We have designed several options for transferring client tokens inside an EAP session. These options were then implemented by extending open-source software components and evaluated experimentally, using Raspberry Pi as a platform. Based on our analysis and experiments, the most flexible option for sending client tokens in EAP is by combination of an outer EAP method (EAP-oPROV) that sequentially runs two inner EAP methods. The first inner method does peer authentication, and the tokens are sent to the client in the second inner EAP method (EAP-iPROV). Since the first inner EAP method is not fixed (it is chosen by the authentication server), there are many compatible EAP methods for peer authentication in this option. The two new EAP methods (EAP-oPROV and EAP-iPROV) could be standardized in the future.et
dc.identifier.urihttps://hdl.handle.net/10062/92327
dc.language.isoenget
dc.publisherTartu Ülikoolet
dc.rightsopenAccesset
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectEAPet
dc.subjectIoTet
dc.subjectcredentialet
dc.subjectbootstrappinget
dc.subjectprovisioninget
dc.subjectconfigurationet
dc.subjectauthenticationet
dc.subject.othermagistritöödet
dc.subject.otherinformaatikaet
dc.subject.otherinfotehnoloogiaet
dc.subject.otherinformaticset
dc.subject.otherinfotechnologyet
dc.titleCredential Provisioning and Peer Configuration with Extensible Authentication Protocolet
dc.typeThesiset

Failid

Originaal pakett

Nüüd näidatakse 1 - 1 1
Laen...
Pisipilt
Nimi:
master_thesis_tartu.pdf
Suurus:
1.14 MB
Formaat:
Adobe Portable Document Format
Kirjeldus:

Litsentsi pakett

Nüüd näidatakse 1 - 1 1
Laen...
Pisipilt
Nimi:
license.txt
Suurus:
1.71 KB
Formaat:
Item-specific license agreed upon to submission
Kirjeldus: