Context-Aware and Real-time Entrustment Framework for Securing Next Generation Internet Communications
The Internet has been repeatedly demonstrated to be insufficiently secure for transferring sensitive information worldwide. This insecurity is an inherent characteristic as the Internet did not make any security considerations in its initial design. Rather, as is famously known, it was designed to connect “mutually trusting users”. Such void motivated a long and extensive history of a variety of trust measures to secure Internet communications at its different levels or layers. To date, however, the proposed security measures have been identified as computationally demanding, especially as they utilize cryptographic computations. In light of the evolution of the Internet-of-Things (IoT) and therefore the growing reliance on elements with limited capabilities (in terms of computing and/or energy), facilitating security becomes an equally increasing challenge. Such elements include embedded systems, sensors/actuators, small-scale mobile and wireless devices, in addition to various elements utilized in real-time and/or delay-critical applications. Considerations must therefore be made for addressing the computational challenge while providing the required security. In the meanwhile, any meaningful security solution must be global (i.e., Internet-wide) in its operation. Our objective in this thesis is to demonstrate that an adaptive, end-to-end security solution for the next generation Internet is viable. Integral to our thesis is a holistic and innovative proposal for a Context-Aware and Real-time Entrustment framework or (CARE). The framework comprises a set of security components and modules designed to satisfy the observed and expected needs of next generation computing networks and their elements. While introducing the components and operations of our framework, we showcase how they can help into providing security services for the futuristic NGI communication trends. We then introduce a new approach in empirical analysis for cryptographic functions through which their use of computation resource can be identified and/or predicted. The outcome of this approach is applied in designing a robust security adaptation strategy for the CARE framework. A complementary resource-aide system is also presented in order to facilitate the secure end-to-end operation.
URI for this recordhttp://hdl.handle.net/1974/24059
Request an alternative formatIf you require this document in an alternate, accessible format, please contact the Queen's Adaptive Technology Centre
Showing items related by title, author, creator and subject.
Canadian Security Intelligence Service | Service Canadian du renseignement de Securite (Government of Canada, 2016-02)All reports and/or studies commissioned by CSIS on the agency's commitment to diversity (as defined by the Employment Equity Act) between January 1, 2010 and January 22, 2016.
Canadian Security Intelligence Service | Service Canadian du renseignement de Securite (Government of Canada, 2016-03)Reports dated May 1, 2013 to November 30, 2013 from ITAC, IAB or INSET concerning the shale gas protest in New Brunswick or mentioning Elsipogtog First Nation and/or Mi 'Kmaq Warriors Society.
ATIP Request: CSIS Director Briefing material for Senate National Security Committee appearance, April 20, 2015. Canadian Security Intelligence Service | Service Canadian du renseignement de Securite (Government of Canada, 2015-10)CSIS Director Briefing material for Senate National Security Committee appearance, April 20, 2015.