Internet Of Things-Proactive Security Approach
The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do s...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Medwell Journals
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf http://eprints.utem.edu.my/id/eprint/21650/ http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability. |
---|