Show simple item record

dc.contributor.advisorIslam, Md. Motaharul
dc.contributor.authorAnisuzzaman, Kazi
dc.contributor.authorKhan, Mehreen
dc.date.accessioned2024-11-25T04:36:35Z
dc.date.available2024-11-25T04:36:35Z
dc.date.copyright©2020
dc.date.issued2021-01
dc.identifier.otherID 16341017
dc.identifier.otherID 16241009
dc.identifier.urihttp://hdl.handle.net/10361/24815
dc.descriptionThis thesis is submitted in partial fulfillment of the requirements for the degree of Bachelor of Science in Computer Science, 2021.en_US
dc.descriptionCatalogued from PDF version of thesis.
dc.descriptionIncludes bibliographical references (pages 34-36).
dc.description.abstractThe Narrow-band Internet of Things (NB-IoT) is a high throughput and Low Power Con- sumption Wide Area Network (LPWAN) radio technology, introduced by 3rd Generation Partnership Project (3GPP). The NB-IoT and LTE-M technologies continue to evolve as a part of the 5G speci cations with upcoming releases of 3GPP. The assessment of security threats such as attacks on inter-operator security, radio interfaces, signaling and user plane, masquerading, replay, man-in-middle, bidding-down and privacy security is- sues have been considered for the 5G system. However, there is a scope for improvement in end-to-end security authentication for 5G NB-IoT. The user identity related issues are still a concern as the existing authentication protocols provide poor compatibility with current network architecture. In addition, these protocols demands dual authenti- cation and key agreements. In this paper, we are proposing an application of Whirlpool Hash Function and Physical Unclonable Function (PUF) for an end-to-end authentication method for NB-IoT devices over 5G network.en_US
dc.description.statementofresponsibilityKazi Anisuzzaman
dc.description.statementofresponsibilityMehreen Khan
dc.format.extent50 pages
dc.language.isoenen_US
dc.publisherBrac Universityen_US
dc.rightsBrac University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission.
dc.subjectIoTen_US
dc.subjectNarrow-band Internet of Thingsen_US
dc.subject5G networken_US
dc.subject3GPPen_US
dc.subjectWhirlpool hash functionen_US
dc.subjectLPWANen_US
dc.subjectSecurity authentication methoden_US
dc.subject.lcshComputer networks--Security measures.
dc.subject.lcsh5G mobile communication systems--Security measures.
dc.subject.lcshInternet of things.
dc.subject.lcshRadio frequency modulation, Narrow-band.
dc.subject.lcshData encryption (Computer science).
dc.subject.lcshCoding theory.
dc.subject.lcshWireless communication systems.
dc.titleAn end-to-end authentication method for NB-IoT devices over 5G network using whirlpool hash function and physical unclonable functionen_US
dc.typeThesisen_US
dc.contributor.departmentDepartment of Computer Science and Engineering, Brac University
dc.description.degreeB.Sc. in Computer Science


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record