OpCloudSec: Open cloud software defined wireless network security for the Internet of Things

2018 ◽  
Vol 122 ◽  
pp. 1-8 ◽  
Author(s):  
Pradip Kumar Sharma ◽  
Saurabh Singh ◽  
Jong Hyuk Park
Author(s):  
Gabriel PETRICĂ

Solutions that can be implemented to secure a LAN include firewalls and intrusion detection / prevention systems (IDS / IPS). For a wireless network, security is a challenge considering the specific elements of this type of network: the physical area from which the connection is possible, and the weaknesses of the protocols used for data encryption. This article presents a case study on the most widely used protocols (WEP, WPA and WPA2) to secure wireless networks and the methodology by which passwords can be decrypted using Kali Linux distribution - available for free on the Internet - and applications included in this operating system.


Author(s):  
S. Sundar ◽  
Piyush Arora ◽  
Sarthak Agrawal ◽  
R. Kumar ◽  
Harish M. Kittur

<p>In the last few years,there has been big interest in adhoc wireless network as they have tremendous military and commercial potential[1].Traditionally to test various parameters in the MANET , the most popular approach is to use mobile phone and Laptops and use the popular WIFI based protocol . But in the recent years there is a huge attraction towards the Internet Of things and specifically wireless sensor network. In this paper we are going to test the MANET protocol using zigbee based XBee modules specifally to determine the Range and Throughput of the Xbee netowork using XCTU Software . The sensor network will be deployed in the car parking application to see the parameters in the real time and dynamically see the sustainability of the network .The network is being designed keeping in mind that the nodes are mobile and at the same time the network does not require a standard infrastructure.</p>


2013 ◽  
Vol 748 ◽  
pp. 910-914
Author(s):  
Zhong Wei Zhou ◽  
Lei Shi

With the development of Internet of things, the security has become moreand more important. In order to make clear the internet of things existing security threats, provide a theoretical reference for Internet of things Security and privacy protection, this paper summarizes the internet of things security threat and the measures. According to the Internet of things main system frame, research the perception layer, transport layer and application layer seperately, analysis of the network security needs issues, research networking security model, and discuss the content of network security mechanisms, gives the corresponding safety measures and recommendations for all kinds of security threats.


Micromachines ◽  
2021 ◽  
Vol 12 (12) ◽  
pp. 1455
Author(s):  
Qiongfeng Shi ◽  
Huicong Liu

In recent years, we have witnessed the revolutionary innovation and flourishing advancement of the Internet of things (IoT), which will maintain a strong momentum even more with the gradual rollout of the fifth generation (5G) wireless network and the rapid development of personal healthcare electronics [...]


Author(s):  
Firmansyah Firmansyah ◽  
Rachmat Adi Purnama ◽  
Rachmawati Darma Astuti

The use 802.11 wireless-based network services have become one of the most widely used network services, this will be directly proportional to the security holes that are in the wireless network. The rise of access rights theft in wireless networks is due to the large number of software and tools available on the internet to read encryption in wireless security. To minimize the occurrence of theft of access rights in wireless networks can use a layered security system by implementing security Hotspot login and MAC Address Filtering. This layered wireless network security is able to block users who try to access the network. This is because the wireless network security system has verified access rights 2 (two) times by matching the username and password in the hotspot login with the physical address or MAC address of the client. From the research results obtained by clients who use a username and password with different devices can not access the computer network. So every client who wants to connect to the internet network must use a device that has registered its MAC Address and in accordance with user access rights and passwords in the Hotspot login


Author(s):  
Wenji He ◽  
Yifeng Liu ◽  
Haipeng Yao ◽  
Tianle Mai ◽  
Ni Zhang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document