All ETDs from UAB

Advisory Committee Chair

Ragib Hasan

Advisory Committee Members

Alan Sprague

Allen Johnston

Anthony Skjellum

Purushotham Bangalore

Document Type


Date of Award


Degree Name by School

Doctor of Philosophy (PhD) College of Arts and Sciences


The increased deployment of Internet of Things (IoT) based systems make smart devices target for malicious attacks. These devices can also be used as tools for committing crimes, such as cyber espionage and user-targeted attacks. However, IoT devices cannot adopt the conventional security protocols as is to defend against malicious activities. The existing security schemes are primarily designed for resource-rich computing devices, such as personal computers, laptops, and smartphones, while IoT devices are resource-constrained and operate in low power and lossy networks. Additionally, traditional digital forensics tools and techniques are not suitable to investigate cybercrime in IoT. These tools and techniques are not intended to handle the mobile and distributed IoT infrastructure, which generates a massive amount of data every day. In this dissertation, we explore resource efficient techniques for ensuring security, privacy, and trustworthiness of IoT computations and communications. We propose IoTCurator – a holistic security framework for low-powered IoT devices and lossy networks. IoTCurator provides lightweight cryptographic schemes for authentication, access control, network attack mitigation, and forensic investigation. IoTCurator presents a secure network admission scheme that authenticates an IoT device by verifying the integrity of its hardware and software before giving it access to network resources. IoTCurator provides a peer-to-peer authentication scheme that ensures privacy-preserving identity use. IoTCurator presents a delegation-based access control model that unburdens resource-limited devices from communication and computation overheads involved in making authorization decisions. IoTCurator proposes modifications in the packet fragmentation mechanism to mitigate fragmentation attacks in lossy networks. IoTCurator enables forensic investigation in the IoT environment by providing methods for collecting evidence from the IoT infrastructure, maintaining secure provenance of evidence, and obtaining evidence relevant to an incident. We implement prototypes of the proposed security schemes included in IoTCurator using IoT devices powered by Contiki operating system. We evaluate the performance of these schemes regarding computation costs, communication overheads, energy consumption, and memory requirements. The evaluation results show that the proposed schemes are resource efficient compared to the conventional security methods. We also perform a security analysis of each of our proposed schemes to demonstrate that IoTCurator is secure against strong adversarial scenarios.



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.