Abstract

ABSTRACT The rapid proliferation of Internet of Things (IoT) devices has spurred the need for robust security mechanisms within wireless local area network (WLAN) environments. Specifically, the IEEE 802.11ah (WiFi-HaLow) technology offers low-power, long-range communication capabilities ideally suited for IoT devices, but these devices face security threats due to constrained computational resources. This research addresses the challenge of optimizing Internet-wide port scanning to enhance IoT security while minimizing disruptions to network performance. In this paper, we propose a novel reinforcement learning-based approach to achieve this optimization. Our approach harnesses the power of the Proximal Policy Optimization (PPO) algorithm to guide decision-making for IoT security and network performance enhancement. The proposed solution entails training an agent to dynamically adjust the port scanning rate, ensuring the delicate balance between security improvement and network responsiveness. We establish a comprehensive system model, encompassing WiFi-HaLow infrastructure, IPv6-enabled IoT devices, and the integration of Internet-security (IPSec) protocols. Mathematical formulations encapsulate constraints such as resource limitations and security-performance trade-offs. Our experimental setup utilizes a carefully curated dataset and a simulation environment to rigorously evaluate the proposed solution’s effectiveness. The proposed approach demonstrates remarkable security enhancement through the prevention of unauthorized access attempts, data breaches, and improved intrusion detection. Moreover, network performance is optimized, with reductions in latency, improvements in throughput, and energy-efficient operation. By presenting a plethora of comparison scenarios, we validate the superiority of our solution against various benchmarks. This research contributes a comprehensive framework that not only advances IoT security within WLAN environments but also highlights the intricate relationship between security and network performance optimization.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call