3 research outputs found
Recommended from our members
Internet of Things Security Case Studies and Internet of Things Core Service Comparions
This culminating project conducted an analysis of IoT security breach case studies. The analysis identified numerous vulnerable points: software failure, node tampering attack, eavesdropping, code injection, unauthorized access, social engineering attack, hardware exploitation, and node insertion. It therefor seems that even with the proper tests conducted on vulnerabilities to discover solutions, regular end users are unable to apply patches or other technical solutions to protect themselves. This project solely focuses on analyzing of comprehensive IoT security services that come with devices connected to home network. The devices are those provided by the big three: Amazon, Google, and Microsoft, on the communication between platform and devices, how they are protected, and how costs vary depending on different situations. Also, performance differences were analyzed among different solutions based on three different scenarios with different number of settings to give a deeper insight to users. There are comparisons throughout the paper, but it is to help normal users make better choices depending on their different situations and purpose of usage
Internet-of-Things Architectures for Secure Cyber-Physical Spaces: the VISOR Experience Report
Internet of things (IoT) technologies are becoming a more and more widespread
part of civilian life in common urban spaces, which are rapidly turning into
cyber-physical spaces. Simultaneously, the fear of terrorism and crime in such
public spaces is ever-increasing. Due to the resulting increased demand for
security, video-based IoT surveillance systems have become an important area
for research. Considering the large number of devices involved in the illicit
recognition task, we conducted a field study in a Dutch Easter music festival
in a national interest project called VISOR to select the most appropriate
device configuration in terms of performance and results. We iteratively
architected solutions for the security of cyber-physical spaces using IoT
devices. We tested the performance of multiple federated devices encompassing
drones, closed-circuit television, smart phone cameras, and smart glasses to
detect real-case scenarios of potentially malicious activities such as
mosh-pits and pick-pocketing. Our results pave the way to select optimal IoT
architecture configurations -- i.e., a mix of CCTV, drones, smart glasses, and
camera phones in our case -- to make safer cyber-physical spaces' a reality