Area of Science: Computer Science/ Cyber Security
Interim: Internet of Things Security: How to Keep IoT Devices Secure at Home
Team Number: 25
Team Members: Nancy Avila email@example.com
Gwenevere Caouette firstname.lastname@example.org
Tiffany Chau email@example.com
Priscila Flores firstname.lastname@example.org
Kyreen White email@example.com
Teacher(s): Sharee Lunsford firstname.lastname@example.org
Karen Glennon email@example.com
Sponsor: Karen Glennon firstname.lastname@example.org
Patty Meyer email@example.com
Areas of Science: Computer Science/Cyber Security
Definition of the Problem:
Privacy has always been a top priority of society, the advancement of technology has brought breaches to that security. However useful technology may have been, many dilemmas have risen from the use of technology. Technology has advanced which has created situations where security breaches have occurred, also known as a vulnerable network. Technology has been used to inflict damage upon others in the form of hacking that can lead to exposing private information and discussions have started on how to keep areas secure. However, not every technological device is kept secure, if using Internet of Things (IoT) devices. For example, IoT devices are connected through Wi-Fi; hackers have used the “Evil Twin” and “Man in the Middle” to acquire private information through a fake or intercepted Wi-Fi. If hackers can get internet data and get all private information, then it is possible to control your home network. How can individuals keep smart devices secure at home?
We have set project goals. Preventing consumers from being hacked through IoT devices; will be the focus of our code. We will research and find out how to prevent IoT devices from being vulnerable to hackers. We have focused on background information about IoT electronics and building our code knowledge through the process of trial and error while looking at others network codes.
Our code plan is put into steps: Step 1. Setting up a network for our code, Step 2. Prevent the IoT electronics from being hacked that we will get from research, Step 3. Code to prevent the Iot’s from being hacked, Step 4. We will work on including visualization in our work. In research we plan to look into many types of ways to prevent hackers from getting into commonly used IoT devices. Current IoT devices are very vulnerable because there appears to be weak security in the process of how they directly connect to the internet (sometimes even without a password). We have already researched different networks and have chosen the home network IoT devices, such as Google Home, because this seems to be the most popular IoT device for consumers.
As of right now, we have started to further understand how IoT devices work and the different methods that hackers use to browse through your information via unprotected Wi-Fi. We have decided which IoT devices will need security increases based on our research that Google Home can connect many different smart home devices (lights, cameras, thermostats, TVs, remote controls, etc...) and how those devices aren’t secure with a password. Noticing which IoT is used on a daily basis, we decided to work with Google Home, the home network developed by Google. Our research has also encouraged us to understand different networks and how they connect to IoT devices. We have made progress in planning our code for this year on NetLogo, which has shown huge improvements compared to the beginning of the year. We have been more productive with our code. We learned new ways to code, simulating and solving the situation where a hacker and a vulnerable home network come into contact.
People connect to all kinds of IoT devices. The way an IoT device works is that it is connected to the main server that controls and shares information between all devices connected to it. The Main Server will be represented as a larger turtle connected to all the IoT devices which will be smaller turtles. Each turtle will be linked together to one source and share information to each other. When the device is protected from any virus it will turn green. We will place a threat (a hacker) in the main server and establish how they can go through the main server and hack into every single device. When the threat reaches the device, something will detect it and turn red. This shows how the device is no longer safe to use anymore and that all your information can now be shared with the world.
Our programming should succeed in the results that Google Home will have more securities to recognize, detect, and prevent hacking. We expect that our code could help build a better defense system that will work with any IoT devices. Using this code, we can expect that the results will be useful for future situations. We expect our research to advance and to fully understand the home internet network. We want to find out a way to prevent hacking through IoT devices and have research that supports our code.
Pages of References
(n.d.). Retrieved from https://commotionwireless.net/docs/cck/networking/learn-wireless-basics/.
Anatomy of An IoT Attack Retrieved from
AARP Fraud Watch Network
Sponsoring Teacher: Karen Glennon
Mail the entire Team