Internet of Things Security Using Proactive WPA/WPA2

dc.contributor.advisorEl-Sharkawy, Mohamed A.
dc.contributor.authorKamoona, Mustafa
dc.contributor.otherKing, Brian
dc.contributor.otherRizkalla, Maher
dc.date.accessioned2016-09-14T18:34:58Z
dc.date.available2016-09-14T18:34:58Z
dc.date.issued2016-04-05
dc.degree.date2016en_US
dc.degree.disciplineElectrical & Computer Engineeringen
dc.degree.grantorPurdue Universityen_US
dc.degree.levelM.S.E.C.E.en_US
dc.descriptionIndiana University-Purdue University Indianapolis (IUPUI)en_US
dc.description.abstractThe Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation.en_US
dc.identifier.doi10.7912/C2K30R
dc.identifier.urihttps://hdl.handle.net/1805/10919
dc.identifier.urihttp://dx.doi.org/10.7912/C2/2533
dc.language.isoen_USen_US
dc.subjectInternet of Thingsen_US
dc.subjectWPAen_US
dc.subjectWi-Fien_US
dc.subjectsecurityen_US
dc.subjectcybersecurityen_US
dc.subjectIoTen_US
dc.subjectconfidentialityen_US
dc.subjectcryptographyen_US
dc.titleInternet of Things Security Using Proactive WPA/WPA2en_US
dc.typeThesisen
Files
Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Thesis + GS 30 second page [Mustafa Kamoona].pdf
Size:
5.38 MB
Format:
Adobe Portable Document Format
Description:
Full Thesis
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.88 KB
Format:
Item-specific license agreed upon to submission
Description: