Porting and securing an ad-hoc library for mobile devices
Le, Thai
Promoteur(s) : Mathy, Laurent ; Gain, Gaulthier
Date de soutenance : 24-jui-2021/25-jui-2021 • URL permanente : http://hdl.handle.net/2268.2/11450
Détails
Titre : | Porting and securing an ad-hoc library for mobile devices |
Titre traduit : | [fr] Portage et sécurisation d'une librairie ad-hoc pour téléphone mobiles |
Auteur : | Le, Thai |
Date de soutenance : | 24-jui-2021/25-jui-2021 |
Promoteur(s) : | Mathy, Laurent
Gain, Gaulthier |
Membre(s) du jury : | Donnet, Benoît
Mattheus, Benoît |
Langue : | Anglais |
Nombre de pages : | 74 |
Mots-clés : | [en] Ad Hoc [en] Network [en] Cryptography [en] Flutter [en] Dart [en] Bluetooth Low Energy [en] Wi-Fi Direct [en] AODV [en] Android |
Discipline(s) : | Ingénierie, informatique & technologie > Sciences informatiques |
Public cible : | Chercheurs Professionnels du domaine Etudiants Grand public |
URL complémentaire : | https://github.com/thai-dinh/adhoc_plugin |
Institution(s) : | Université de Liège, Liège, Belgique |
Diplôme : | Master en sciences informatiques, à finalité spécialisée en "computer systems security" |
Faculté : | Mémoires de la Faculté des Sciences appliquées |
Résumé
[en] Today, almost everyone carries a mobile device, which is used for various purposes such as communicating with friends or watching videos on an online video sharing platform. However, it requires the presence of a centralised access point, which is not always available. This restriction could be avoided by transitioning to ad hoc wireless communications, where devices would communicate with each other directly. Even so, there are few resources available for the development of ad hoc applications. This master thesis presents the port of a Java mobile ad hoc library to Dart. Therefore, the ported library could be used by the Flutter framework, which allows to develop ad hoc mobile apps regardless of the mobile platforms used. Since the Java mobile ad hoc library is based on a layered architecture, each layer has been individually ported one by one. Another wireless technology, Bluetooth Low Energy, has been explored and used instead of Bluetooth Classic. Despite having a lower data rate, Bluetooth Low Energy is still used to overcome the limitation of Wi-Fi Direct, which is the non-support for multi-hop communications. Then, a new layer has been introduced and implemented, which is responsible for encryption and decryption of data. As a result, a key management system is needed and the on-demand self-organised public key management has been chosen and implemented for end-to-end secure communication. To provide secure communication beyond the end-to-end secure communication, the CRTDH group key agreement has been implemented and provides the possibility to have secure group communications. Study in the literature has shown that the symmetric cryptography ChaCha20 has proven to be very efficient in terms of computation time and energy consumption.
Fichier(s)
Document(s)
Annexe(s)
Citer ce mémoire
L'Université de Liège ne garantit pas la qualité scientifique de ces travaux d'étudiants ni l'exactitude de l'ensemble des informations qu'ils contiennent.