Symmetric encryption using preshared public parameters for a secure TFTP protocol / Nur Nabila Mohamed

Due to rapid development of communication technology of constrained embedded systems, it is important to deal with security including integrity and confidentiality to maintain the accuracy while distributing data safely and efficiently. Trivial File Transfer Protocol (TFTP) is used for transferring...

Full description

Saved in:
Bibliographic Details
Main Author: Mohamed, Nur Nabila
Format: Thesis
Language:English
Published: 2015
Subjects:
Online Access:https://ir.uitm.edu.my/id/eprint/18440/2/TM_NUR%20NABILA%20MOHAMED%20EE%2015_5.pdf
https://ir.uitm.edu.my/id/eprint/18440/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Due to rapid development of communication technology of constrained embedded systems, it is important to deal with security including integrity and confidentiality to maintain the accuracy while distributing data safely and efficiently. Trivial File Transfer Protocol (TFTP) is used for transferring files quickly and simply. The main advantage of using TFTP in embedded system is because of its speed and simplicity but it provides no security mechanism which makes it vulnerable to various attacks. This work proposes the security implementation of Diffie Heilman Key Exchange (DHKE) by presharing public parameters for mutual authentication that enables two communicating parties to achieve the same secret key. The concept is integrated with compression and encryption technique to significantly reduce the computational requirements in TFTP communication. The experiment is done on two embedded devices to perform the functionality of key exchange and data encryption in TFTP. The results were analyzed in terms of confidentiality and integrity of data, execution time, file scheme throughput, compression ratio, average file reduction percentage and transmission time using variable file size. The results show that the proposed work based on DHKE using preshared public parameters includes compression and encryption technique is an efficient solution to mitigate Man In The Middle (MITM) attack as well as manage security issues and large file sizes. The purpose of TFTP which acts as a simple file transfer protocol would bring huge advantages to be employed in ubiquitous computing environment if the basic security strategies were integrated with this protocol.