Internet Of Things-Proactive Security Approach
The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do s...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Medwell Journals
2018
|
Subjects: | |
Online Access: | http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf http://eprints.utem.edu.my/id/eprint/21650/ http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.21650 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.216502021-08-16T20:43:54Z http://eprints.utem.edu.my/id/eprint/21650/ Internet Of Things-Proactive Security Approach Thiab, Ali Shawket Shibghatullah, Abdul Samad Mohd Yusoh, Zeratul Izzah T Technology (General) TK Electrical engineering. Electronics Nuclear engineering The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability. Medwell Journals 2018 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf Thiab, Ali Shawket and Shibghatullah, Abdul Samad and Mohd Yusoh, Zeratul Izzah (2018) Internet Of Things-Proactive Security Approach. Journal Of Engineering And Applied Sciences, 13 (9). pp. 2668-2671. ISSN 1816-949X http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf 10.3923/jeasci.2018.2668.2671 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
topic |
T Technology (General) TK Electrical engineering. Electronics Nuclear engineering |
spellingShingle |
T Technology (General) TK Electrical engineering. Electronics Nuclear engineering Thiab, Ali Shawket Shibghatullah, Abdul Samad Mohd Yusoh, Zeratul Izzah Internet Of Things-Proactive Security Approach |
description |
The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability. |
format |
Article |
author |
Thiab, Ali Shawket Shibghatullah, Abdul Samad Mohd Yusoh, Zeratul Izzah |
author_facet |
Thiab, Ali Shawket Shibghatullah, Abdul Samad Mohd Yusoh, Zeratul Izzah |
author_sort |
Thiab, Ali Shawket |
title |
Internet Of Things-Proactive Security Approach |
title_short |
Internet Of Things-Proactive Security Approach |
title_full |
Internet Of Things-Proactive Security Approach |
title_fullStr |
Internet Of Things-Proactive Security Approach |
title_full_unstemmed |
Internet Of Things-Proactive Security Approach |
title_sort |
internet of things-proactive security approach |
publisher |
Medwell Journals |
publishDate |
2018 |
url |
http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf http://eprints.utem.edu.my/id/eprint/21650/ http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf |
_version_ |
1709671882666541056 |
score |
13.211869 |