Internet of Things Security: How to Keep IoT Devices Secure at Home

Team: 25

School: Multi-Eldorado/Manzano/Sandia

Area of Science: Computer Science/ Cyber Security


Interim: Internet of Things Security: How to Keep IoT Devices Secure at Home Team Number: 25 Team Members: Nancy Avila nancyavila.lpslover123@gmail.com Gwenevere Caouette gweneverecaouette@gmail.com Tiffany Chau doantiffany7418@gmail.com Priscila Flores precelaflores10@gmail.com Kyreen White hellu.kittycat2004@gmail.com Teacher(s): Sharee Lunsford lunsford@aps.edu Karen Glennon kglennon25@gmail.com Sponsor: Karen Glennon kglennon25@gmail.com Patty Meyer pmeyer2843@gmail.com Areas of Science: Computer Science/Cyber Security Definition of the Problem: Privacy has always been a top priority of society, the advancement of technology has brought breaches to that security. However useful technology may have been, many dilemmas have risen from the use of technology. Technology has advanced which has created situations where security breaches have occurred, also known as a vulnerable network. Technology has been used to inflict damage upon others in the form of hacking that can lead to exposing private information and discussions have started on how to keep areas secure. However, not every technological device is kept secure, if using Internet of Things (IoT) devices. For example, IoT devices are connected through Wi-Fi; hackers have used the “Evil Twin” and “Man in the Middle” to acquire private information through a fake or intercepted Wi-Fi. If hackers can get internet data and get all private information, then it is possible to control your home network. How can individuals keep smart devices secure at home? Problem Solution: We have set project goals. Preventing consumers from being hacked through IoT devices; will be the focus of our code. We will research and find out how to prevent IoT devices from being vulnerable to hackers. We have focused on background information about IoT electronics and building our code knowledge through the process of trial and error while looking at others network codes. Our code plan is put into steps: Step 1. Setting up a network for our code, Step 2. Prevent the IoT electronics from being hacked that we will get from research, Step 3. Code to prevent the Iot’s from being hacked, Step 4. We will work on including visualization in our work. In research we plan to look into many types of ways to prevent hackers from getting into commonly used IoT devices. Current IoT devices are very vulnerable because there appears to be weak security in the process of how they directly connect to the internet (sometimes even without a password). We have already researched different networks and have chosen the home network IoT devices, such as Google Home, because this seems to be the most popular IoT device for consumers. Our Progress: As of right now, we have started to further understand how IoT devices work and the different methods that hackers use to browse through your information via unprotected Wi-Fi. We have decided which IoT devices will need security increases based on our research that Google Home can connect many different smart home devices (lights, cameras, thermostats, TVs, remote controls, etc...) and how those devices aren’t secure with a password. Noticing which IoT is used on a daily basis, we decided to work with Google Home, the home network developed by Google. Our research has also encouraged us to understand different networks and how they connect to IoT devices. We have made progress in planning our code for this year on NetLogo, which has shown huge improvements compared to the beginning of the year. We have been more productive with our code. We learned new ways to code, simulating and solving the situation where a hacker and a vulnerable home network come into contact. Coding Plan: People connect to all kinds of IoT devices. The way an IoT device works is that it is connected to the main server that controls and shares information between all devices connected to it. The Main Server will be represented as a larger turtle connected to all the IoT devices which will be smaller turtles. Each turtle will be linked together to one source and share information to each other. When the device is protected from any virus it will turn green. We will place a threat (a hacker) in the main server and establish how they can go through the main server and hack into every single device. When the threat reaches the device, something will detect it and turn red. This shows how the device is no longer safe to use anymore and that all your information can now be shared with the world. Expected Results: Our programming should succeed in the results that Google Home will have more securities to recognize, detect, and prevent hacking. We expect that our code could help build a better defense system that will work with any IoT devices. Using this code, we can expect that the results will be useful for future situations. We expect our research to advance and to fully understand the home internet network. We want to find out a way to prevent hacking through IoT devices and have research that supports our code. Pages of References (n.d.). Retrieved from https://commotionwireless.net/docs/cck/networking/learn-wireless-basics/. Anatomy of An IoT Attack Retrieved from https://www.youtube.com/watch?v=GvLnb4YQHh0&t=1s AARP Fraud Watch Network Bhagat, V. (2019, November 28). What are the Pros and Cons of Internet of Things? Retrieved from https://www.pixelcrayons.com/blog/web/what-are-pros-and-cons-of-internet-of-things/. Cisco IoT Threat Defense. (2019, October 17). Retrieved from https://www.cisco.com/c/en/us/solutions/security/iot-threat-defense/index.html?CAMPAIGN=SC-00%20Unaligned%20Security&Country_Site=us&POSITION=Social+Media&REFERRING_SITE=YOUTUBE&CREATIVE=Cisco. Heubl, B. (2019, June 10). How to hack an IoT device. Retrieved from https://eandt.theiet.org/content/articles/2019/06/how-to-hack-an-iot-device. How to Connect IoT Device to the Internet. (n.d.). Retrieved from http://cactus.io/tutorials/web/connect-iot-device-to-the-internet. Internet of Things (IoT): Pros and Cons. (2018, February 27). Retrieved from https://www.keyinfo.com/pros-and-cons-of-the-internet-of-things-iot/. Internet of Things Security Retrieved from https://www.youtube.com/watch?v=pGtnC1jKpMg Porter, J. (2019, October 21). Security researchers expose new Alexa and Google Home vulnerability. Retrieved from https://www.theverge.com/2019/10/21/20924886/alexa-google-home-security-vulnerability-srlabs-phishing-eavesdropping. Symanovich, S. (n.d.). What is a VPN? Retrieved from http://us.norton.com/internetsecurity-privacy-what-is-a-vpn.html. Swimming with Sharks - Security in the Internet of Things: Joshua Corman at TEDxNapervillie https://www.youtube.com/watch?v=rZ6xoAtdF3o


Team Members:

  Gwenevere Caouette
  Nancy Avila
  Priscila Flores
  Kyreen White

Sponsoring Teacher: Karen Glennon

Mail the entire Team