Exploiting Smart Device Communication to Perform Malicious Attacks

Aspen Akunne, Stacy Fortes, Dr. Jean Chu, Dr. Daehan Kwak School of Computer Science and Technology, Kean University, Union, NJ 07083

The Internet of Things (IoT) market has begun to take off to the point where it is hard to find a home without some type of smart device. Whether it be an Amazon Alexa, a Samsung refrigerator, or a smart light bulb, most homes have some type of smart device. Consumers can buy connected versions of nearly every household appliance available. According to a study conducted by the Consumer Technology Association, 69% of U.S. households contain at least one smart device in their home. However, as the number of people purchasing smart home devices increases, so does the risk of an attack. All of the potential weaknesses that could afflict IoT systems such as: authentication and traffic encryption issues are already well known to the security industry. However, known mitigation techniques are often neglected for these devices. Therefore, IoT vendors must ensure improved security before their devices become ubiquitous in every home.

In this experiment, a network is penetrated by exploiting the signals being sent to a smart device that will be monitored in order to replicate them. The replicated packets of data will then be used to manipulate the smart device. The current hypothesis is that if a smart device can be knocked off of a network, the same can be done to spoof a signal to a device. Various smart devices, such as smart bulbs and smart lids will be dismantled to examine general behaviour of smart devices during communication with a router. 

Additional Abstract Information

Presenters: Aspen Akunne, Stacy Fortes

Institution: Kean University

Type: Poster

Subject: Computer Science

Status: Approved

Time and Location

Session: Poster 5
Date/Time: Tue 12:30pm-1:30pm
Session Number: 4020