• Login
    View Item 
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSIT Theses and Dissertations
    • MSIT Theses and Dissertations (2017)
    • View Item
    •   SU+ Home
    • Research and Publications
    • Faculty of Information Technology (FIT)
    • FIT Projects, Theses and Dissertations
    • MSIT Theses and Dissertations
    • MSIT Theses and Dissertations (2017)
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    A Sandboxing based security model to contain malicious traffic in smart homes

    Thumbnail
    View/Open
    Fulltext Thesis (29.82Mb)
    Date
    2017
    Author
    Nkinyili, Tiberius Tabulu
    Metadata
    Show full item record
    Abstract
    The Internet of Things (lOT) is a developing Next Generation Network (NGN) paradigm that aims to have more devices connected to the Internet and the possibility of these devices to autonomously communicate with each other. These devices mainly use wireless links to communicate, with little or no flow control, error checking or security monitoring. While this helps support mobility and optimize performance, the compromise in flow control and security monitoring, renders them more vulnerable to potential attacks from malicious users. This poses security threats to data exchanged between devices especially in a smart home environment. This necessitates having mechanisms to provide security against malicious messages and unauthorized modification of information to limit potential attacks on integrity and confidentiality of data. Isolation mechanisms would be ideal to cushion devices and the entire lOT network. Sandboxing involves isolating suspect data, processes, applications or devices from the rest of the system. This restricts access to more system resources hence ensuring continuity and availability of the entire system. This research work thus proposed a model to ensure comprehensive data security in a smart home by using sandboxing. The model proposed mechanisms to provide an isolating environment to contain malicious traffic by evaluating levels of authorization, and restricting communication nodes to what they were allowed to. This thus ensured a proactive data security approach in lOT networks within a smart home environment. Linux security Module implementations were used to provide a custom sandbox from the Kernel level. Instant Contiki, a virtual version of the lOT operating system Contiki, was used to emulate lOT communication with Cooja as the emulating module.
    URI
    http://hdl.handle.net/11071/5836
    Collections
    • MSIT Theses and Dissertations (2017) [34]

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV
     

     

    Browse

    All of SU+Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

    My Account

    Login

    DSpace software copyright © 2002-2016  DuraSpace
    Contact Us | Send Feedback
    Theme by 
    Atmire NV