Abstract

The integrity of wireless networks that make up the clear majority of IoT networks lack the inherent security of their wired counterparts. With the growth of the internet of things (IoT) and its pervasive nature in the modern home environment, it has caused a spike in security concerns over how the network infrastructure handles, transmits, and stores data. New wireless attacks such as KeySniffer and other attacks of this type cannot be tracked by traditional solutions. Therefore, this study investigates if wireless spectrum frequency monitoring using interference analysis tools can aid in the monitoring of device signals within a home IoT network. This could be used enhance the security compliance guidelines set forth by OWASP and NIST for these network types and the devices associated. Active and passive network scanning tools are used to provide analysis of device vulnerability and as comparison for device discovery purposes. The work shows the advantages and disadvantages of this signal pattern testing technique compared to traditional network scanning methods. The authors demonstrate how RF spectrum analysis is an effective way of monitoring network traffic over the air waves but also possesses limitations in that knowledge is needed to decipher these patterns. This article demonstrates alternative methods of interference analysis detection.

Highlights

  • Wi-Fi and other communication technologies such as Bluetooth have existed for more than two decades and the volume of devices that utilise these technologies have exploded in recent years with a nearly 100% adoption rate.The term The Internet of Things (IoT) is commonly used to name a set of objects that are directly connected to the Internet via communication protocols such as Wi-Fi (802.11), Bluetooth and numerous other communication protocols

  • We outline the test rig needed to track an attacker injecting data through radio frequency technology (RF) signals to input his own commands to susceptible devices [26]

  • RF spectrum analysis is an effective way of monitoring network traffic over the air waves

Read more

Summary

Introduction

The term The Internet of Things (IoT) is commonly used to name a set of objects (or things) that are directly connected to the Internet via communication protocols such as Wi-Fi (802.11), Bluetooth and numerous other communication protocols These networks consist of devices known as “Things” which can be constrained by hardware shortcomings that reduce their security effectiveness. With this growth and the security constraints imposed on these devices by hardware shortcomings and security misconfigurations, it is predicted by Gartner Research that 20% of the overall security budget of major corporations will be spent trying to secure these devices [3] Applications for this technology include agriculture, manufacturing, power distribution, to smart homes, healthcare, and beyond. This technology advance acknowledges the reality that human society is moving towards ‘smart’ and ‘smarter’

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call