Authorization and authentication strategy for mobile highly constrained edge devices
View/Open
Cita com:
hdl:2117/400556
Document typeMaster thesis
Date2023-06
Rights accessOpen Access
All rights reserved. This work is protected by the corresponding intellectual and industrial
property rights. Without prejudice to any existing legal exemptions, reproduction, distribution, public
communication or transformation of this work are prohibited without permission of the copyright holder
Abstract
The rising popularity of mobile devices has driven the need for faster connection speeds and more flexible authentication and authorization methods. This project aims to develop and implement an innovative system that provides authentication and authorization for both the device and the user. It also facilitates real-time user re-authentication within the application, ensuring transparency throughout the process. Additionally, the system aims to establish a secure architecture that minimizes the computational requirements on the client's device, thus optimizing the device's battery life. The achieved results have demonstrated satisfactory outcomes, validating the effectiveness of the proposed solution. However, there is still potential for further improvement to enhance its overall performance.
DegreeMÀSTER UNIVERSITARI EN CIBERSEGURETAT (Pla 2020)
Collections
Files | Description | Size | Format | View |
---|---|---|---|---|
Master_Thesis.pdf | 4,394Mb | View/Open |