Abstract
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet for the purpose of exchanging information. The direct connection of IoT devices to the internet makes them susceptible to several security threats. Researchers have developed techniques aimed at enhancing security of IoT devices at both network and application layers. In this paper, we present a real-time and lightweight algorithm, based on information theoretic approach, that enables rogue access point detection for embedded IoT devices. This is to ensure that WiFi-enabled IoT devices can intelligently distinguish between legitimate and rogue access points. We evaluated the performance of the algorithm with respect to the detection rate and also CPU utilization efficiency.
Highlights
The Internet of Things (IoT) is one of the largest technological revolutions of computing
In the domain of WiFi-enabled IoT devices, [7] demonstrated how IoT devices are susceptible to Man-In-The-Middle (MITM) attack
This paper presents a real-time and lightweight rogue access point detection algorithm that can be implemented on resource-constrained WiFi-enabled IoT devices
Summary
The Internet of Things (IoT) is one of the largest technological revolutions of computing. The convergence of these real-world objects and the internet exposes end users to several security threats. These threats can be categorized into the following: cloning of things, malicious substitution of things, firmware replacement, extraction of security parameters, eavesdropping, Man-In-The-Middle (MITM) attack, routing attack and Denial of Service (DoS) attack [4]. In the domain of WiFi-enabled IoT devices, [7] demonstrated how IoT devices are susceptible to Man-In-The-Middle (MITM) attack. This paper presents a real-time and lightweight rogue access point detection algorithm that can be implemented on resource-constrained WiFi-enabled IoT devices.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: Information Security and Computer Fraud
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.