Internet of Things Security Using Proactive WPA/WPA2

Indiana University-Purdue University Indianapolis (IUPUI) === The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT network...

Full description

Bibliographic Details
Main Author: Kamoona, Mustafa
Other Authors: El-Sharkawy, Mohamed A.
Language:en_US
Published: 2016
Subjects:
WPA
IoT
Online Access:http://hdl.handle.net/1805/10919
id ndltd-IUPUI-oai-scholarworks.iupui.edu-1805-10919
record_format oai_dc
spelling ndltd-IUPUI-oai-scholarworks.iupui.edu-1805-109192021-10-02T05:06:48Z Internet of Things Security Using Proactive WPA/WPA2 Kamoona, Mustafa El-Sharkawy, Mohamed A. King, Brian Rizkalla, Maher Internet of Things WPA Wi-Fi security cybersecurity IoT confidentiality cryptography Indiana University-Purdue University Indianapolis (IUPUI) The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation. 2016-09-14T18:34:58Z 2016-09-14T18:34:58Z 2016-04-05 Thesis http://hdl.handle.net/1805/10919 10.7912/C2K30R en_US
collection NDLTD
language en_US
sources NDLTD
topic Internet of Things
WPA
Wi-Fi
security
cybersecurity
IoT
confidentiality
cryptography
spellingShingle Internet of Things
WPA
Wi-Fi
security
cybersecurity
IoT
confidentiality
cryptography
Kamoona, Mustafa
Internet of Things Security Using Proactive WPA/WPA2
description Indiana University-Purdue University Indianapolis (IUPUI) === The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.
author2 El-Sharkawy, Mohamed A.
author_facet El-Sharkawy, Mohamed A.
Kamoona, Mustafa
author Kamoona, Mustafa
author_sort Kamoona, Mustafa
title Internet of Things Security Using Proactive WPA/WPA2
title_short Internet of Things Security Using Proactive WPA/WPA2
title_full Internet of Things Security Using Proactive WPA/WPA2
title_fullStr Internet of Things Security Using Proactive WPA/WPA2
title_full_unstemmed Internet of Things Security Using Proactive WPA/WPA2
title_sort internet of things security using proactive wpa/wpa2
publishDate 2016
url http://hdl.handle.net/1805/10919
work_keys_str_mv AT kamoonamustafa internetofthingssecurityusingproactivewpawpa2
_version_ 1719486426044694528