Security Mechanisms Over Delay Tolerant Infrastructures

aut.embargoNoen_NZ
aut.thirdpc.containsNoen_NZ
dc.contributor.advisorLiu, William
dc.contributor.authorGonzales, Brian
dc.date.accessioned2020-07-23T01:44:08Z
dc.date.available2020-07-23T01:44:08Z
dc.date.copyright2020
dc.date.issued2020
dc.date.updated2020-07-23T00:10:35Z
dc.description.abstractThe motivation of this research is to seek a flexible encryption and authentication method to facilitate the secure delivery of data through a Delay-Tolerant Network Infrastructure. This work will demonstrate a proof-of-concept, by using the blockchain and Delay-Tolerant technologies. These two technologies have the characteristics of being both decentralised and distributed and emphasise the data accessibility and delivery on any type of data through a Delay-Tolerant Infrastructure. Part of this motivation is to conduct an academic enquiry to look in-depth into providing cryptographic attribution of transferred data from source to destination in a distributed environment. This work conducted both an academic study and a proof of concept for securing digital exchange between nodes on Delay-Tolerant Infrastructures. This work will provide a conceptual proposal on delivering digital services to the rural and remote areas. The remote areas (e.g., rural towns and villages) can only connect to a limited number of base stations where they can store their electronic transactions. Once there is a successful direct connection to the Internet, all stored data and transactions will be processed and recognised. Creating a prototype of using blockchains can be used to protect sensitive information, identification management, and protecting the integrity of logging user activity. The research focuses on the use of security mechanisms throughout the Delay-Tolerant Network Infrastructure. This work has adopted the Threshold Cryptography, in a developed prototype to observe both hardware and software utilisation and processes using Raspberry Pi versions 2 and 3. The prototype will have two sets of clusters based on hardware types, which includes observations based on (1) the length of time for encryption and decryption, (2) the performance of hardware, and (3) the performance of network connectivity through Bluetooth and Wi-Fi.en_NZ
dc.identifier.urihttps://hdl.handle.net/10292/13544
dc.language.isoenen_NZ
dc.publisherAuckland University of Technology
dc.rights.accessrightsOpenAccess
dc.subjectBlockchainsen_NZ
dc.subject5Gen_NZ
dc.subjectDelay-tolerant infrastructuresen_NZ
dc.subjectEncryptionen_NZ
dc.subjectDecentralisationen_NZ
dc.titleSecurity Mechanisms Over Delay Tolerant Infrastructuresen_NZ
dc.typeThesisen_NZ
thesis.degree.grantorAuckland University of Technology
thesis.degree.levelMasters Theses
thesis.degree.nameMaster of Information Security and Digital Forensicsen_NZ
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
GonzalesB.pdf
Size:
1.63 MB
Format:
Adobe Portable Document Format
Description:
Thesis
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
897 B
Format:
Item-specific license agreed upon to submission
Description:
Collections