Investigating the Robustness of IoT Security Cameras against Cyber Attacks∗

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Abstract

In recent years, Internet of Things (IoT) become widely used in various domains. Particularly, consumers are increasingly using IoT devices to build smart homes. These IoT devices can collect data and enable users to manage and secure their smart home environment. However, IoT devices are the target of malicious users and activities. Hence, the security is particularly important for IoT based smart home devices. This paper aims to experimentally evaluate the robustness and resilience of a particular type of IoT devices, known as smart home security cameras, against several common cyber attacks. The attack platform is Kali Linux operation system, which is installed with different types of penetration-testing and cyber-attack programs. The experimental results demonstrate clearly that the evaluated smart home security cameras are very vul-nerable to the tested cyber-attacks, and do not deploy built-in efficient security features. As a consequence, this investigation contributes to confirm the belief that most current IoT based smart home devices are designed and built without sufficient security considerations and solutions and may not be very reliable in untrust and unsafe environments.

Original languageEnglish
Title of host publication5th Conference on Cloud and Internet of Things, CIoT 2022
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages17-23
Number of pages7
ISBN (Electronic)9781665479646
DOIs
Publication statusPublished - 2022
Event5th Conference on Cloud and Internet of Things, CIoT 2022 - Marrakech, Morocco
Duration: Mar 28 2022Mar 30 2022

Publication series

Name5th Conference on Cloud and Internet of Things, CIoT 2022

Conference

Conference5th Conference on Cloud and Internet of Things, CIoT 2022
Country/TerritoryMorocco
CityMarrakech
Period3/28/223/30/22

Keywords

  • Denial of Service (DoS) attacks
  • Internet of Things (IoT)
  • Kali Linux
  • Man-in-the-Middle (MiM) attack
  • Smart home security cameras

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint

Dive into the research topics of 'Investigating the Robustness of IoT Security Cameras against Cyber Attacks∗'. Together they form a unique fingerprint.

Cite this