Skip to main content

Automatic and Secure Wi-Fi Connection Mechanisms for IoT End-Devices and Gateways

  • Conference paper
  • First Online:
Emerging Technologies in Computing (iCETiC 2018)

Abstract

Internet of Things (IoT) are developed rapidly in recent years and more than 50 billion of IoT devices are expected to be deployed worldwide in 2020. How to automatically and securely connect the tremendous number of IoT end devices to Internet is one of critical problems to be addressed. This paper proposes secure and automatic Wi-Fi (Wireless Fidelity) connection mechanisms for connecting IoT end devices and IoT gateways. Our design has the following advantages. First, IoT end devices, once powered on, can automatically connect to an IoT gateway without human intervention. Secondly, the SSID and password for high security strength WPA2 connection are randomly generated to enhance IoT security. Finally, the randomly generated password and SSID are automatically changed every day or when network attacking is detected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gartner IoT market report, February 2017. https://www.gartner.com/newsroom/id/3598917. Accessed 3 Apr 2018

  2. Gartner IoT security report, March 2018. https://www.gartner.com/newsroom/id/3869181. Accessed 3 Apr 2018

  3. Evans, D.: The Internet of Things: how the next evolution of the internet is changing everything? (2011). https://www.cisco.com/c/dam/en_us/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf

  4. Wi-Fi Protected Access (WPA). https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access. Accessed 3 Apr 2018

  5. Wi-Fi. https://en.wikipedia.org/wiki/Wi-Fi. Accessed 3 Apr 2018

  6. 4-way handshake. https://en.wikipedia.org/wiki/IEEE_802.11i-2004. Accessed 3 Apr 2018

  7. KRACK. https://en.wikipedia.org/wiki/KRACK. Accessed 3 Apr 2018

  8. Liu, X.: The security analysis on Wi-Fi communication, Master thesis, Shanghai Jiaotong University (2009)

    Google Scholar 

  9. Wi-Fi Protected Setup. https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup. Accessed 3 Apr 2018

  10. Chang, J.: Secure and automatic connection for IoT end-devices and gateways based on WiFi Technology, Master thesis, Tatung University (2015)

    Google Scholar 

  11. Zhang, Y., Sampalli, S.: Client-based intrusion prevention system for 802.11 Wireless LANs. In: IEEE Wireless and Mobile Computing, Networking and Communications, pp. 100–105 (2010)

    Google Scholar 

  12. Service set (802.11 network). https://en.wikipedia.org/wiki/Service_set_(802.11_network). Accessed 3 Apr 2018

  13. Advanced encryption standard. https://en.wikipedia.org/wiki/Advanced_Encryption_Standard. Accessed 3 Apr 2018

  14. Jie, M.A., Jin-long, E.: WiFi transmission connection scheme based on near field communication. Comput. Eng. 39(6), 1–6 (2013)

    Google Scholar 

  15. NodeMCU. https://en.wikipedia.org/wiki/NodeMCU. Accessed 3 Apr 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fu-Chiung Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Cheng, FC. (2018). Automatic and Secure Wi-Fi Connection Mechanisms for IoT End-Devices and Gateways. In: Miraz, M., Excell, P., Ware, A., Soomro, S., Ali, M. (eds) Emerging Technologies in Computing. iCETiC 2018. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 200. Springer, Cham. https://doi.org/10.1007/978-3-319-95450-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-95450-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-95449-3

  • Online ISBN: 978-3-319-95450-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics