Securing Internet-of-things devices / by Leigh Fix.

Author/creator Fix, Leigh author.
Other author Varnell, Karla Thompson, degree supervisor.
Other author East Carolina University. Department of Technology Systems.
Format Theses and dissertations
Publication[Greenville, N.C.] : [East Carolina University], 2021.
Description1 online resource (85 pages) : illustrations (some color)
Supplemental ContentAccess via ScholarShip
Subjects

Summary Smart home devices, also known as the Internet of Things (IoT) devices, are utilized more and more each day. As these devices grow in popularity, users connect to personal and private networks with devices that were unheard of ten years ago. The problem examined in this study is the security posture of IoT devices. Attackers are finding it relatively easy to access data on personal IoT devices. As the researcher, I examined the vulnerability of various types of IoT devices. IoT has allowed the public to take devices with them, creating a larger footprint, opening multiple attack vectors to exploit the data we produce daily. Ideally, these devices should be secure out of the box, so that users can trust the devices they have connected. Smart home technologies allow both autonomous and managed connections to a variety of network-connected devices. Using the penetration-testing framework known as the Information Systems Security Assessment Framework, the vulnerabilities present on these devices were examined. Kali Linux provided the best platform when trying to breach the IoT devices. Utilizing Kali Linux, I was able to breach more devices than using ParrotOS or Commando VM. Of the different types of IoT devices examined in this study, Kasa was the most susceptible to a breach. I was able to determine the IP address and hostnames of all 15 devices. On 47% (7 of 15) of the IoT devices, I was able to obtain the location of the rooms these devices were in. On 80% (12 of 15) of the IoT devices, I was able to render them useless with a DoS attack. This study will contribute to the overall body of knowledge specific to the security and vulnerability of IoT devices and provide information for users who are likely to utilize them.
General notePresented to the faculty of the Department of Technology Systems
General noteAdvisor: Karla Thompson Varnell
General noteTitle from PDF t.p. (viewed November 28, 2022).
Dissertation noteM.S. East Carolina University 2021
Bibliography noteIncludes bibliographical references.
Technical detailsSystem requirements: Adobe Reader.
Technical detailsMode of access: World Wide Web.
Genre/formAcademic theses.
Genre/formAcademic theses.
Genre/formThèses et écrits académiques.

Availability

Library Location Call Number Status Item Actions
Electronic Resources Access Content Online ✔ Available