7,135 research outputs found

    Smart Humans... WannaDie?

    Get PDF
    It won't be long until our prostheses, ECG personal monitors, subcutaneous insulin infusors, glasses, etc. become devices of the Internet of Things (IoT), always connected for monitoring, maintenance, charging and tracking. This will be the dawn of the Smart Human, not just a user of the IoT but a Thing in the Internet. How long would it then take for hackers to attack us like they have been attacking IoT devices? What would happen if hackers were able to blackmail us threatening our IoT body parts? Smart Humans may become victims of the devastating attack of WannaDie, a new ransomware that could provide the plot-line for a possible future episode of the Black Mirror TV series.Comment: 5 pages, 3 figures, Accepted at the "Re-Coding Black Mirror" workshop of the International Conference Data Protection and Democracy (CPDP

    Virtual environments for penetration testing of IoT devices

    Get PDF
    The aim of this thesis is to build a virtual penetration testing environment in order to test cyber security of IoT devices and provide material for teaching penetration testing in cyber security courses at the University of Turku. This thesis utilises the VMWare ESXI server rented by the University of Turku and also those Linux operating systems which have open-source code licences. In addition, this study exploits the Windows XP licence, held by the University of Turku, as the target machine in the attack. The IoT devices in this study have been coded from scratch by author of this thesis, and they work automatically when the virtual machine, where the device is installed, is switched on. The virtual laboratory is built so that it is possible to install new devices if required. The beginning of the thesis is as comprehensive as possible so that the reader can comprehend the idea of cyber security in IoT devices and smart home system easily. This thesis covers the most common data transfer methods, their history, and the strength of their cyber security. In addition, the thesis covers the most used attack types and tools for implementing these attacks, and also example cases where these particular attacks have been used. Thesis also presents an architecture model for a smart home in order for the reader to get a better view of the different possibilities of a smart home. Possible risk factors concerning cyber security are also considered with each device. This thesis also touches upon the role of smart cities and industry in the IoT market. The main focus is, however, on IoT devices used in smart home architecture and on researching their cyber security

    Exploiting Wireless Received Signal Strength Indicators to Detect Evil-Twin Attacks in Smart Homes

    Get PDF

    Exploiting wireless received signal strength indicators to detect evil-twin attacks in smart homes

    Get PDF
    Evil-twin is becoming a common attack in Smart Home environments where an attacker can set up a fake AP to compromise the security of the connected devices. To identify the fake APs, The current approaches of detecting Evil-twin attacks all rely on information such as SSIDs, the MAC address of the genuine AP or network traffic patterns. However, such information can be faked by the attacker, often leading to low detection rates and weak protection. This paper presents a novel evil-twin attack detection method based on the received signal strength indicator (RSSI). Our key insight is that the location of the genuine AP rarely moves in a home environment and as a result the RSSI of the genuine AP is relatively stable. Our approach considers the RSSI as a fingerprint of APs and uses the fingerprint of the genuine AP to identify fake ones. We provide two schemes to detect a fake AP in two different scenarios where the genuine AP can be located at either a single or multiple locations in the property, by exploiting the multipath effect of the WIFI signal. As a departure from prior work, our approach does not rely on any professional measurement devices. Experimental results show that our approach can successfully detect 90% of the fake APs, at the cost of an one-off, modest connection delay

    Imagination of Mobile Media Through Advertising: Thematic Analysis of 4G and 5G Ads in China and the US

    Full text link
    HonorsUniversity of Michiganhttp://deepblue.lib.umich.edu/bitstream/2027.42/162682/1/zfw.pd
    • …
    corecore