Show simple item record

dc.contributor.advisorStoleru, Radu
dc.creatorAltaweel, Ala' (Mohammad Hafez) Barakat
dc.date.accessioned2020-03-10T20:22:02Z
dc.date.available2021-05-01T12:34:12Z
dc.date.created2019-05
dc.date.issued2019-04-10
dc.date.submittedMay 2019
dc.identifier.urihttps://hdl.handle.net/1969.1/187560
dc.description.abstractToday’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc communication mechanism for mobile devices) that allows users to establish a wireless network (without a wireless router) and exchange data among their devices. The Wi-Fi Direct protocol, developed by the Wi-Fi Alliance, is built upon the IEEE 802.11 infrastructure and it implements the Wi-Fi Protected Setup (WPS) protocol to establish a secure key and connection between two devices. The shipments of Wi-Fi Direct devices reached 1.7 billion in 2016, and it is predicted to reach 3 billion by 2019. With the prevalence of Wi-Fi Direct devices nowadays, the Wi-Fi Direct based Opportunistic Networks (WDON) will play a crucial role in the future mobile networks. A WDON refers to the network paradigm where mobile devices communicate with each other through the opportunistically formed Wi-Fi Direct links. The WDONs have a wide range of applications, e.g., disaster response, battlefield communications, social networks applications, etc. In this dissertation, we identify several vulnerabilities of WDONs, which pose severe threats to the authentication and data confidentiality: a) the brute-force/dictionary attack on the PIN method of the WPS protocol; b) the EvilDirect attack on the Push-Button method of the WPS protocol; and c) the CollusiveHijack attack on routing protocols in WDONs. Consequently, in order to address the aforementioned vulnerabilities, we propose a security framework to defend against these attacks. Our framework contains a set of secure-key-establishment algorithm and protocols that aim to provide secure communication services in WDONs. In this framework, we propose: a) an algorithm to establish a secure key (128 bits) from the contextual sensors data of the devices in WDONs; b) a challenge-response protocol to detect the EvilDirect attack in both dynamic and static environments of WDONs; and c) two detection protocols to detect the CollusiveHijack attack in WDONs. We evaluate the proposed algorithm and protocols through extensive simulations and proof-of-concept implementations in smartphones and notebooks. The evaluation results show that, the proposed framework prevents the brute-force/dictionary attack and detects, within seconds, both EvilDirect and CollusiveHijack attacks with relatively high detection rates while maintaining low false positive rates.en
dc.format.mimetypeapplication/pdf
dc.language.isoen
dc.subjectWireless Networksen
dc.subjectWi-Fi Directen
dc.subjectComputer Networksen
dc.subjectSecurityen
dc.subjectSession Hijacking Attacken
dc.subjectRoute Hijacking Attacken
dc.titleOn Securing Wi-Fi Direct Based Opportunistic Networksen
dc.typeThesisen
thesis.degree.departmentComputer Science and Engineeringen
thesis.degree.disciplineComputer Engineeringen
thesis.degree.grantorTexas A&M Universityen
thesis.degree.nameDoctor of Philosophyen
thesis.degree.levelDoctoralen
dc.contributor.committeeMemberHou, I-Hong
dc.contributor.committeeMemberLiu, Jyh-Charn Steve
dc.contributor.committeeMemberGu, Guofei
dc.type.materialtexten
dc.date.updated2020-03-10T20:22:03Z
local.embargo.terms2021-05-01
local.etdauthor.orcid0000-0002-0451-7758


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record