Qualcomm: Simple & Secure Wi-fi Configuration for Internet of Things

نویسندگان

  • Jie Luo
  • JIE LUO
چکیده

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission. Abstract: Wi-Fi Protect Setup (WPS) is a Wi-Fi configuration protocol that provides a secure and simple Wi-Fi setup process by PIN method and PushButton method. At the moment, hacking activity and complex configuration process of Wi-Fi is still the main barrier for the developing of Internet of Things. A successful secure and simple Wi-Fi configuration is desired by increasing usage of Internet of Things. This paper proposed to introduce a new Wi-Fi configuration method depending on WPS protocol to simplify the connection process and improve the security level. The fundamental concept of configuration approach is using smartphone as the intermedia to connect Internet of Things and Access point (AP). The PIN number is dynamically displaying by external source, then the PIN information would by captured by smartphone to process the Wi-Fi configuration. The whole IoT device Wi-Fi setup depending on WPS would compress the configuration time from average 5 minutes to several seconds, which is drastically reduced complexity. Compared with traditional way of Wi-Fi setup method, a simple & secure Wi-Fi configuration relied relying on the physical signal communication would significantly improve the security level of current pure wireless sign-in method. On the other hand, any passphrase of small network such as home, office would not be necessary at all due to the very ubiquity of the smartphone in the near future.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment

With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...

متن کامل

Dominant Channel Occupancy for Wi-Fi Backscatter Uplink in Industrial Internet of Things

This paper presents a dominant channel occupancy (DCO) mechanism for the Wi-Fi backscatter uplink in the industrial Internet of things (IIoT). The DCO provides high-priority channel access and reliable burst transmission to the Wi-Fi backscatter devices, thereby enabling the Wi-Fi backscatter tag to deliver its tag information to the Wi-Fi reader without interference from neighboring legacy Wi-...

متن کامل

Secure Modern Healthcare System Based on Internet of Things and Secret Sharing of IoT Healthcare Data

----------------------------------------------------------------------ABSTRACT-----------------------------------------------------------The Internet of Things (IoT), is a concept that describes how objects that we are used in daily life will interact and negotiate with other objects over the internet. The amount of devices with Wi-Fi capabilities and built-in sensors keeps on increasing. IoT c...

متن کامل

Optimizing Power Consumption of Wi-Fi inbuild IoT device

The Internet of Things (IoT) – connection of small smart sensors, actuators and other devices to the Internet – is a key concept within the smart home. To ease deployment, such devices are often wireless and battery powered. An important question is the wireless interface used. The ubiquity of WiFi in homes today makes this an attractive option, but the relatively high power requirements of Wi-...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013