Alselwi, A (2015) Wireless Security Protocol in DNA Bio-Inspired Network. Masters thesis, Liverpool John Moores University.
Text
158273_Wireless Security Protocol in DNA Bio-Inspired Network.pdf - Published Version Download (6MB) |
Abstract
The 21st century communications have evolved rapidly and spread all over the world
using the Wi-Fi network which has provided benefits of connection which become more
desirable for users to connect to the internet. These benefits are driving the world to a
major internet security issues that links to harm their own sensitive data and it resulting for
generates encouragement for attackers to drill the legitimate user’s Wi-Fi connection to
access to where they want to organize and eavesdropping the data passed to hack them
through and revealing it to check whether it is useful for them, hence exploiting packets
travelling through the user’s Wi-Fi and using of the powerful of super sniffer techniques by
the hackers to break in to such as malware and sniffing software that allows them to crack
on the Wi-Fi to steal the data of the user who uses the eavesdropper Wi-Fi without their
knowledge, these sniffers open to the hackers access to the user’s data like bank details and
other data, it could be using their details for a crime such as find their identity which make
the world more concerns about their personal information and they are looking for the
latest security protocols to protect their Wi-Fi network.
Wi-Fi security introduces a number of vulnerabilities that give hackers an opportunity to
cause harm to the Wi-Fi users by stealing information, accessing the Wi-Fi network to
compromise the Wi-Fi network as a way to access the enterprise network which is used by
some security protocols. This would allow a hacker to use sniffers to access the Wi-Fi
enterprise network which is used in coffee shops across the world and other trading
premises by probing the SSID of their Wi-Fi. Near by the hackers would be able to crack the
security protocols such as WPA or WPA2 which are the latest protocol that users use for
their Wi-Fi security keys.
In our research we have taken different security methods to secure the Wi-Fi network
using the bio-inspired DNA is the idea comed from the Deoxyribonucleic Acid DNA because
that DNA have several important features including the random nature of the sequences
denoted by alphapet characters A, C, G and T to perform encoded unique DNA sequences
that is transmitting the secrets and the DNA encryption comes from the biology of the DNA
science of the human and animals.
Our research has achieved basic steps which encrypt the user’s static data to DNA
sequence to use it for a security access key this work is functioning successfully to DNA
bases and experimentation prove in the implementation at chapter 5, and we used the
symmetric cryptographic keys in DNA sequence encryption to be similar at both parties
with the admin(Wi-Fi) and clients and this is the basic step for this project and it needs to
implement the dynamic DNA to make the keys more secure for each user and we have
explained how we can match and mismatch these encrypted data and how they need to
updated automatically to new security keys with the dynamic DNA sequence in future work
[1].
The achievements of our research are proposed to convert user data to a DNA security
sequence to use it in the same way as the existing security protocols such as WPA2 but in
DNA format with the dynamic key and static user data will keep the security key rubost
durig the automatic updates, hence the static data and dynamic data can be updated
automatically when adding the dynamic data to the project in future work for the user
access key and this can be suitable for multi-users to form an autonomous Wi-Fi connection
and DNA security key to mitigating some flaws of that existing security protocols techniques
has such as sharing the same security key on the same Wi-Fi network users.
Item Type: | Thesis (Masters) |
---|---|
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Computer Science & Mathematics |
Date Deposited: | 02 Nov 2016 13:48 |
Last Modified: | 03 Sep 2021 23:26 |
DOI or ID number: | 10.24377/LJMU.t.00004393 |
Supervisors: | Askwith, R |
URI: | https://researchonline.ljmu.ac.uk/id/eprint/4393 |
View Item |