- Browse by Author
Browsing by Author "Kamoona, Mustafa"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item FlexiWi-Fi Security Manager Using Freescale embedded System(IEEE, 2015-12) Kamoona, Mustafa; El-Sharkawy, Mohamed; Department of Electrical and Computer Engineering, School of Engineering and TechnologyAmong the current Wi-Fi two security models (Enterprise and Personal), while the Enterprise model (802.1X) offers an effective framework for authenticating and controlling the user traffic to a protected network, the Personal model (802.11) offers the cheapest and the easiest to setup solution. However, the drawback of the personal model implementation is that all access points and client radio NIC on the wireless LAN should use the same encryption key. A major underlying problem of the 802.11 standard is that the pre-shared keys are cumbersome to change. So if those keys are not updated frequently, unauthorized users with some resources and within a short timeframe can crack the key and breach the network security. The purpose of this paper is to propose and implement an effective method for the system administrator to manage the users connected to a router, update the keys and further distribute them for the trusted clients using the Freescale embedded system, Infrared and Bluetooth modules.Item Hidden Wind Farms Potential for Residential Households Having Roofmounted Wind Arrester(IEEE, 2015) Amini, Amin; Kamoona, Mustafa; Department of Electrical and Computer Engineering, Purdue School of Engineering and TechnologySmall-scale energy-generating systems are being increasingly integrated into built environment, and the use of renewable energies is now spreading to old towns in developing countries. Despite the promise of free energy, the high-tech appearance of the harnessing tools of renewables has provoked criticism because of the incompatibility with the cultural/environmental characteristics of older towns in Iran. This paper presents a new concept of novel hidden wind farms in the residential households of Iranian desert-edge towns with roof-mounted wind-arresters. The results of this study show that a hidden wind farm integrated into old towns with the potential of tourism can eliminate the concern over the visibility and bird collisions as well as the use of land. In the present study, the old city of Ardakan, Yazd, with an arid climate located at the edge of a desert in the center of Iran, is selected as target case study. Calculations show that the application of one small-scale wind turbine per wind-arrester across the town can generate approximately 2.90 GWh a year. Moreover, the proposed concept could also be applied in other countries such as Afghanistan, Egypt, Pakistan, Iraq, UAE and some African countries.Item Internet of Things Security Using Proactive WPA/WPA2(2016-04-05) Kamoona, Mustafa; El-Sharkawy, Mohamed A.; King, Brian; Rizkalla, MaherThe Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.