183 research outputs found

    Internet of Things Security Case Studies and Internet of Things Core Service Comparions

    Get PDF
    This culminating project conducted an analysis of IoT security breach case studies. The analysis identified numerous vulnerable points: software failure, node tampering attack, eavesdropping, code injection, unauthorized access, social engineering attack, hardware exploitation, and node insertion. It therefor seems that even with the proper tests conducted on vulnerabilities to discover solutions, regular end users are unable to apply patches or other technical solutions to protect themselves. This project solely focuses on analyzing of comprehensive IoT security services that come with devices connected to home network. The devices are those provided by the big three: Amazon, Google, and Microsoft, on the communication between platform and devices, how they are protected, and how costs vary depending on different situations. Also, performance differences were analyzed among different solutions based on three different scenarios with different number of settings to give a deeper insight to users. There are comparisons throughout the paper, but it is to help normal users make better choices depending on their different situations and purpose of usage
    • …
    corecore