Internet of Things Security Using Proactive WPA/WPA2
Indiana University-Purdue University Indianapolis (IUPUI) === The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT network...
Main Author: | |
---|---|
Other Authors: | |
Language: | en_US |
Published: |
2016
|
Subjects: | |
Online Access: | http://hdl.handle.net/1805/10919 |
id |
ndltd-IUPUI-oai-scholarworks.iupui.edu-1805-10919 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-IUPUI-oai-scholarworks.iupui.edu-1805-109192021-10-02T05:06:48Z Internet of Things Security Using Proactive WPA/WPA2 Kamoona, Mustafa El-Sharkawy, Mohamed A. King, Brian Rizkalla, Maher Internet of Things WPA Wi-Fi security cybersecurity IoT confidentiality cryptography Indiana University-Purdue University Indianapolis (IUPUI) The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation. 2016-09-14T18:34:58Z 2016-09-14T18:34:58Z 2016-04-05 Thesis http://hdl.handle.net/1805/10919 10.7912/C2K30R en_US |
collection |
NDLTD |
language |
en_US |
sources |
NDLTD |
topic |
Internet of Things WPA Wi-Fi security cybersecurity IoT confidentiality cryptography |
spellingShingle |
Internet of Things WPA Wi-Fi security cybersecurity IoT confidentiality cryptography Kamoona, Mustafa Internet of Things Security Using Proactive WPA/WPA2 |
description |
Indiana University-Purdue University Indianapolis (IUPUI) === The Internet of Things (IoT) is a natural evolution of the Internet and is becoming
more and more ubiquitous in our everyday home, enterprise, healthcare, education,
and many other aspects. The data gathered and processed by IoT networks might be
sensitive and that calls for feasible and adequate security measures. The work in this
thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes
a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access
networks. Then a new end to end (e2e) IoT security model is suggested to include
the PWPA scheme. To evaluate the solutions security and performance, rstly, the
cybersecurity triad: con dentiality, integrity, and availability aspects were discussed,
secondly, the solutions performance was compared to a counterpart e2e security solution,
the Secure Socket Layer security. A small e2e IoT network was set up to simulate
a real environment that uses HTTP protocol. Packets were then collected and analyzed.
Data analysis showed a bandwidth e ciency increase by 2% (Internet links)
and 12% (access network), and by 344% (Internet links) and 373% (access network)
when using persistent and non-persistent HTTP respectively. On the other hand, the
analysis showed a reduction in the average request-response delay of 25% and 53%
when using persistent and non-persistent HTTP respectively. This scheme is possibly
a simple and feasible solution that improves the IoT network security performance
by reducing the redundancy in the TCP/IP layers security implementation. |
author2 |
El-Sharkawy, Mohamed A. |
author_facet |
El-Sharkawy, Mohamed A. Kamoona, Mustafa |
author |
Kamoona, Mustafa |
author_sort |
Kamoona, Mustafa |
title |
Internet of Things Security Using Proactive WPA/WPA2 |
title_short |
Internet of Things Security Using Proactive WPA/WPA2 |
title_full |
Internet of Things Security Using Proactive WPA/WPA2 |
title_fullStr |
Internet of Things Security Using Proactive WPA/WPA2 |
title_full_unstemmed |
Internet of Things Security Using Proactive WPA/WPA2 |
title_sort |
internet of things security using proactive wpa/wpa2 |
publishDate |
2016 |
url |
http://hdl.handle.net/1805/10919 |
work_keys_str_mv |
AT kamoonamustafa internetofthingssecurityusingproactivewpawpa2 |
_version_ |
1719486426044694528 |