• Find People
  • Campus Map
  • PiratePort
  • A-Z
    • About
    • Submit
    • Browse
    • Login
    View Item 
    •   ScholarShip Home
    • Dissertations and Theses
    • Master's Theses
    • View Item
    •   ScholarShip Home
    • Dissertations and Theses
    • Master's Theses
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

    All of The ScholarShipCommunities & CollectionsDateAuthorsTitlesSubjectsTypeDate SubmittedThis CollectionDateAuthorsTitlesSubjectsTypeDate Submitted

    My Account

    Login

    Statistics

    View Google Analytics Statistics

    Securing Internet-of-Things Devices

    Thumbnail
    View/ Open
    FIX-MASTERSTHESIS-2021.pdf (924.1Kb)

    Show full item record
    Author
    Fix, Leigh
    Abstract
    Smart home devices, also known as the Internet of Things (IoT) devices, are utilized more and more each day. As these devices grow in popularity, users connect to personal and private networks with devices that were unheard of ten years ago. The problem examined in this study is the security posture of IoT devices. Attackers are finding it relatively easy to access data on personal IoT devices. As the researcher, I examined the vulnerability of various types of IoT devices. IoT has allowed the public to take devices with them, creating a larger footprint, opening multiple attack vectors to exploit the data we produce daily. Ideally, these devices should be secure out of the box, so that users can trust the devices they have connected. Smart home technologies allow both autonomous and managed connections to a variety of network-connected devices. Using the penetration-testing framework known as the Information Systems Security Assessment Framework, the vulnerabilities present on these devices were examined. Kali Linux provided the best platform when trying to breach the IoT devices. Utilizing Kali Linux, I was able to breach more devices than using ParrotOS or Commando VM. Of the different types of IoT devices examined in this study, Kasa was the most susceptible to a breach. I was able to determine the IP address and hostnames of all 15 devices. On 47% (7 of 15) of the IoT devices, I was able to obtain the location of the rooms these devices were in. On 80% (12 of 15) of the IoT devices, I was able to render them useless with a DoS attack. This study will contribute to the overall body of knowledge specific to the security and vulnerability of IoT devices and provide information for users who are likely to utilize them.
    URI
    http://hdl.handle.net/10342/9717
    Subject
     attack vectors; smart home; attackers; exploit 
    Date
    2021-12-01
    Citation:
    APA:
    Fix, Leigh. (December 2021). Securing Internet-of-Things Devices (Master's Thesis, East Carolina University). Retrieved from the Scholarship. (http://hdl.handle.net/10342/9717.)

    Display/Hide MLA, Chicago and APA citation formats.

    MLA:
    Fix, Leigh. Securing Internet-of-Things Devices. Master's Thesis. East Carolina University, December 2021. The Scholarship. http://hdl.handle.net/10342/9717. January 31, 2023.
    Chicago:
    Fix, Leigh, “Securing Internet-of-Things Devices” (Master's Thesis., East Carolina University, December 2021).
    AMA:
    Fix, Leigh. Securing Internet-of-Things Devices [Master's Thesis]. Greenville, NC: East Carolina University; December 2021.
    Collections
    • Master's Theses
    Publisher
    East Carolina University

    xmlui.ArtifactBrowser.ItemViewer.elsevier_entitlement

    East Carolina University has created ScholarShip, a digital archive for the scholarly output of the ECU community.

    • About
    • Contact Us
    • Send Feedback