Internet of Things Security Using Proactive WPA/WPA2
dc.contributor.advisor | El-Sharkawy, Mohamed A. | |
dc.contributor.author | Kamoona, Mustafa | |
dc.contributor.other | King, Brian | |
dc.contributor.other | Rizkalla, Maher | |
dc.date.accessioned | 2016-09-14T18:34:58Z | |
dc.date.available | 2016-09-14T18:34:58Z | |
dc.date.issued | 2016-04-05 | |
dc.degree.date | 2016 | en_US |
dc.degree.discipline | Electrical & Computer Engineering | en |
dc.degree.grantor | Purdue University | en_US |
dc.degree.level | M.S.E.C.E. | en_US |
dc.description | Indiana University-Purdue University Indianapolis (IUPUI) | en_US |
dc.description.abstract | The Internet of Things (IoT) is a natural evolution of the Internet and is becoming more and more ubiquitous in our everyday home, enterprise, healthcare, education, and many other aspects. The data gathered and processed by IoT networks might be sensitive and that calls for feasible and adequate security measures. The work in this thesis describes the use of the Wi-Fi technology in the IoT connectivity, then proposes a new approach, the Proactive Wireless Protected Access (PWPA), to protect the access networks. Then a new end to end (e2e) IoT security model is suggested to include the PWPA scheme. To evaluate the solutions security and performance, rstly, the cybersecurity triad: con dentiality, integrity, and availability aspects were discussed, secondly, the solutions performance was compared to a counterpart e2e security solution, the Secure Socket Layer security. A small e2e IoT network was set up to simulate a real environment that uses HTTP protocol. Packets were then collected and analyzed. Data analysis showed a bandwidth e ciency increase by 2% (Internet links) and 12% (access network), and by 344% (Internet links) and 373% (access network) when using persistent and non-persistent HTTP respectively. On the other hand, the analysis showed a reduction in the average request-response delay of 25% and 53% when using persistent and non-persistent HTTP respectively. This scheme is possibly a simple and feasible solution that improves the IoT network security performance by reducing the redundancy in the TCP/IP layers security implementation. | en_US |
dc.identifier.doi | 10.7912/C2K30R | |
dc.identifier.uri | https://hdl.handle.net/1805/10919 | |
dc.identifier.uri | http://dx.doi.org/10.7912/C2/2533 | |
dc.language.iso | en_US | en_US |
dc.subject | Internet of Things | en_US |
dc.subject | WPA | en_US |
dc.subject | Wi-Fi | en_US |
dc.subject | security | en_US |
dc.subject | cybersecurity | en_US |
dc.subject | IoT | en_US |
dc.subject | confidentiality | en_US |
dc.subject | cryptography | en_US |
dc.title | Internet of Things Security Using Proactive WPA/WPA2 | en_US |
dc.type | Thesis | en |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- Thesis + GS 30 second page [Mustafa Kamoona].pdf
- Size:
- 5.38 MB
- Format:
- Adobe Portable Document Format
- Description:
- Full Thesis
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.88 KB
- Format:
- Item-specific license agreed upon to submission
- Description: