Internet Of Things-Proactive Security Approach

The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do s...

Full description

Saved in:
Bibliographic Details
Main Authors: Thiab, Ali Shawket, Shibghatullah, Abdul Samad, Mohd Yusoh, Zeratul Izzah
Format: Article
Language:English
Published: Medwell Journals 2018
Subjects:
Online Access:http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf
http://eprints.utem.edu.my/id/eprint/21650/
http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.21650
record_format eprints
spelling my.utem.eprints.216502021-08-16T20:43:54Z http://eprints.utem.edu.my/id/eprint/21650/ Internet Of Things-Proactive Security Approach Thiab, Ali Shawket Shibghatullah, Abdul Samad Mohd Yusoh, Zeratul Izzah T Technology (General) TK Electrical engineering. Electronics Nuclear engineering The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability. Medwell Journals 2018 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf Thiab, Ali Shawket and Shibghatullah, Abdul Samad and Mohd Yusoh, Zeratul Izzah (2018) Internet Of Things-Proactive Security Approach. Journal Of Engineering And Applied Sciences, 13 (9). pp. 2668-2671. ISSN 1816-949X http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf 10.3923/jeasci.2018.2668.2671
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
topic T Technology (General)
TK Electrical engineering. Electronics Nuclear engineering
spellingShingle T Technology (General)
TK Electrical engineering. Electronics Nuclear engineering
Thiab, Ali Shawket
Shibghatullah, Abdul Samad
Mohd Yusoh, Zeratul Izzah
Internet Of Things-Proactive Security Approach
description The proposed solution in this study is to use a proactive WPA/WPA2 approach in order to secure the access link side of the IoT. The proactive approach is controlled by a DDWRT router which changes the password proactively after a specific time interval after instructing the connected devices to do so as well. The solution uses an IPsec security on the end routers to ensure the data security on the public internet side of the connection. This simple solution allows using a simple Wi-Fi setup or even better to use the current Wi-Fi infrastructure which is available in almost every enterprise or home environment where the IoT is needed. A separate Wi-Fi network will be created for the IoT devices, so that, the current normal users experience will not change. The solution proved to be secure by evaluating the three security pillars: confidentiality, integrity and availability.
format Article
author Thiab, Ali Shawket
Shibghatullah, Abdul Samad
Mohd Yusoh, Zeratul Izzah
author_facet Thiab, Ali Shawket
Shibghatullah, Abdul Samad
Mohd Yusoh, Zeratul Izzah
author_sort Thiab, Ali Shawket
title Internet Of Things-Proactive Security Approach
title_short Internet Of Things-Proactive Security Approach
title_full Internet Of Things-Proactive Security Approach
title_fullStr Internet Of Things-Proactive Security Approach
title_full_unstemmed Internet Of Things-Proactive Security Approach
title_sort internet of things-proactive security approach
publisher Medwell Journals
publishDate 2018
url http://eprints.utem.edu.my/id/eprint/21650/2/Full%20Paper.pdf
http://eprints.utem.edu.my/id/eprint/21650/
http://docsdrive.com/pdfs/medwelljournals/jeasci/2018/2668-2671.pdf
_version_ 1709671882666541056
score 13.211869