Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study

2020 ◽  
Vol 7 (10) ◽  
pp. 10102-10110
Author(s):  
Brittany D. Davis ◽  
Janelle C. Mason ◽  
Mohd Anwar
Keyword(s):  
2019 ◽  
Vol 8 (2) ◽  
pp. 3064-3070 ◽  

Internet of Things (IoT) is growing at an exponential rate but the area of privacy and security in IoT still remains unexplored. The existing algorithms or methods are mainly centralized and hence they are vulnerable due to their single point authentication topology. As it has been estimated that by 2020 there will be more ‘things’ than people on this earth the problem of security becomes a major concern in IoT networks, as a person having control to an IoT network will be able to control a large portion of an organization. Blockchain has recently been used to provide security to peer-to-peer networks. Blockchains are computationally expensive, heavyweight and are considered unsuitable for IoT architecture. In this paper a new lightweight and secure architecture for IoT by using Ethereum Blockchain retaining most of its security providing powers is proposed. Since Blockchain is decentralized it solves the single point authentication problem existing in IoT networks. A Smart Home System as a representative case study has been implemented for broader IoT applications. The two parameters measured are temperature and intrusion detection. The proposed model tackles some more challenges that exist in IoT networks. The Qualitative evaluation of the proposed architecture highlights how it tackles various attacks.


Sensors ◽  
2019 ◽  
Vol 19 (4) ◽  
pp. 833 ◽  
Author(s):  
Ingook Jang ◽  
Donghun Lee ◽  
Jinchul Choi ◽  
Youngsung Son

The traditional Internet of Things (IoT) paradigm has evolved towards intelligent IoT applications which exploit knowledge produced by IoT devices using artificial intelligence techniques. Knowledge sharing between IoT devices is a challenging issue in this trend. In this paper, we propose a Knowledge of Things (KoT) framework which enables sharing self-taught knowledge between IoT devices which require similar or identical knowledge without help from the cloud. The proposed KoT framework allows an IoT device to effectively produce, cumulate, and share its self-taught knowledge with other devices at the edge in the vicinity. This framework can alleviate behavioral repetition in users and computational redundancy in systems in intelligent IoT applications. To demonstrate the feasibility of the proposed concept, we examine a smart home case study and build a prototype of the KoT framework-based smart home system. Experimental results show that the proposed KoT framework reduces the response time to use intelligent IoT devices from a user’s perspective and the power consumption for compuation from a system’s perspective.


Sensors ◽  
2020 ◽  
Vol 20 (18) ◽  
pp. 5298
Author(s):  
Ladislav Huraj ◽  
Marek Šimon ◽  
Tibor Horák

Smart devices along with sensors are gaining in popularity with the promise of making life easier for the owner. As the number of sensors in an Internet of Things (IoT) system grows, a question arises as to whether the transmission between the sensors and the IoT devices is reliable and whether the user receives alerts correctly and in a timely manner. Increased deployment of IoT devices with sensors increases possible safety risks. It is IoT devices that are often misused to create Distributed Denial of Service (DDoS) attacks, which is due to the weak security of IoT devices against misuse. The article looks at the issue from the opposite point of view, when the target of a DDoS attack are IoT devices in a smart home environment. The article examines how IoT devices and the entire smart home will behave if they become victims of a DDoS attack aimed at the smart home from the outside. The question of security was asked in terms of whether a legitimate user can continue to control and receive information from IoT sensors, which is available during normal operation of the smart home. The case study was done both from the point of view of the attack on the central units managing the IoT sensors directly, as well as on the smart-home personal assistant systems, with which the user can control the IoT sensors. The article presents experimental results for individual attacks performed in the case study and demonstrates the resistance of real IoT sensors against DDoS attack. The main novelty of the article is that the implementation of a personal assistant into the smart home environment increases the resistance of the user’s communication with the sensors. This study is a pilot testing the selected sensor sample to show behavior of smart home under DDoS attack.


IoT ◽  
2021 ◽  
Vol 2 (1) ◽  
pp. 140-162
Author(s):  
Hung Nguyen-An ◽  
Thomas Silverston ◽  
Taku Yamazaki ◽  
Takumi Miyoshi

We now use the Internet of things (IoT) in our everyday lives. The novel IoT devices collect cyber–physical data and provide information on the environment. Hence, IoT traffic will count for a major part of Internet traffic; however, its impact on the network is still widely unknown. IoT devices are prone to cyberattacks because of constrained resources or misconfigurations. It is essential to characterize IoT traffic and identify each device to monitor the IoT network and discriminate among legitimate and anomalous IoT traffic. In this study, we deployed a smart-home testbed comprising several IoT devices to study IoT traffic. We performed extensive measurement experiments using a novel IoT traffic generator tool called IoTTGen. This tool can generate traffic from multiple devices, emulating large-scale scenarios with different devices under different network conditions. We analyzed the IoT traffic properties by computing the entropy value of traffic parameters and visually observing the traffic on behavior shape graphs. We propose a new method for identifying traffic entropy-based devices, computing the entropy values of traffic features. The method relies on machine learning to classify the traffic. The proposed method succeeded in identifying devices with a performance accuracy up to 94% and is robust with unpredictable network behavior with traffic anomalies spreading in the network.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1044
Author(s):  
Yassine Bouabdallaoui ◽  
Zoubeir Lafhaj ◽  
Pascal Yim ◽  
Laure Ducoulombier ◽  
Belkacem Bennadji

The operation and maintenance of buildings has seen several advances in recent years. Multiple information and communication technology (ICT) solutions have been introduced to better manage building maintenance. However, maintenance practices in buildings remain less efficient and lead to significant energy waste. In this paper, a predictive maintenance framework based on machine learning techniques is proposed. This framework aims to provide guidelines to implement predictive maintenance for building installations. The framework is organised into five steps: data collection, data processing, model development, fault notification and model improvement. A sport facility was selected as a case study in this work to demonstrate the framework. Data were collected from different heating ventilation and air conditioning (HVAC) installations using Internet of Things (IoT) devices and a building automation system (BAS). Then, a deep learning model was used to predict failures. The case study showed the potential of this framework to predict failures. However, multiple obstacles and barriers were observed related to data availability and feedback collection. The overall results of this paper can help to provide guidelines for scientists and practitioners to implement predictive maintenance approaches in buildings.


Sensors ◽  
2021 ◽  
Vol 21 (11) ◽  
pp. 3587
Author(s):  
Ezequiel Simeoni ◽  
Eugenio Gaeta ◽  
Rebeca I. García-Betances ◽  
Dave Raggett ◽  
Alejandro M. Medrano-Gil ◽  
...  

Internet of Things (IoT) technologies are already playing an important role in our daily activities as we use them and rely on them to increase our abilities, connectivity, productivity and quality of life. However, there are still obstacles to achieving a unique interface able to transfer full control to users given the diversity of protocols, properties and specifications in the varied IoT ecosystem. Particularly for the case of home automation systems, there is a high degree of fragmentation that limits interoperability, increasing the complexity and costs of developments and holding back their real potential of positively impacting users. In this article, we propose implementing W3C’s Web of Things Standard supported by home automation ontologies, such as SAREF and UniversAAL, to deploy the Living Lab Gateway that allows users to consume all IoT devices from a smart home, including those physically wired and using KNX® technology. This work, developed under the framework of the EC funded Plan4Act project, includes relevant features such as security, authentication and authorization provision, dynamic configuration and injection of devices, and devices abstraction and mapping into ontologies. Its deployment is explained in two scenarios to show the achieved technology’s degree of integration, the code simplicity for developers and the system’s scalability: one consisted of external hardware interfacing with the smart home, and the other of the injection of a new sensing device. A test was executed providing metrics that indicate that the Living Lab Gateway is competitive in terms of response performance.


2021 ◽  
pp. 5-16
Author(s):  
Parth Rustagi ◽  
◽  
◽  
◽  
◽  
...  

As useful as it gets to connect devices to the internet to make life easier and more comfortable, it also opens the gates to various cyber threats. The connection of Smart Home devices to the internet makes them vulnerable to malicious hackers that infiltrate the system. Hackers can penetrate these systems and have full control over devices. This can lead to denial of service, data leakage, invasion of privacy, etc. Thus security is a major aspect of Smart home devices. However, many companies manufacturing these Smart Home devices have little to no security protocols in their devices. In the process of making the IoT devices cheaper, various cost-cutting is done on the security protocols in IoT devices. In some way, many manufactures of the devices don’t even consider this as a factor to build upon. This leaves the devices vulnerable to attacks. Various authorities have worked upon to standardize the security aspects for the IoT and listed out guidelines for manufactures to follow, but many fail to abide by them. This paper introduces and talks about the various threats, various Security threats to Smart Home devices. It takes a deep dive into the solutions for the discussed threats. It also discusses their prevention. Lastly, it discusses various preventive measures and good practices to be incorporated to protect devices from any future attacks.


Author(s):  
Feng Zhou ◽  
Jianxin Roger Jiao ◽  
Songlin Chen ◽  
Daqing Zhang

One of the critical situations facing the society across the globe is the problem of elderly homecare services (EHS) due to the aggravation of the society coupled with diseases and limited social resources. This problem has been typically dealt with by manual assistance from caregivers and/or family members. The emerging Ambience Intelligence (AmI) technology suggests itself to be of great potential for EHS applications, owing to its strength in constructing a pervasive computing environment that is sensitive and responsive to the presence of human users. The key challenge of AmI implementation lies in context awareness, namely how to align with the specific decision making scenarios of particular EHS applications. This paper proposes a context-aware information model in a smart home to tackle the EHS problem. Mainly, rough set theory is applied to construct user activity models for recognizing various activities of daily living (ADLs) based on the sensor platform constructed in a smart home environment. Subsequently, issues of case comprehension and homecare services are also discussed. A case study in the smart home environment is presented. Initial findings from the case study suggest the importance of the research problem, as well as the feasibility and potential of the proposed framework.


Sign in / Sign up

Export Citation Format

Share Document