| Literature DB >> 32947950 |
Ladislav Huraj1, Marek Šimon1, Tibor Horák2.
Abstract
Smart devices along with sensors are gaining in popularity with the promise of making life easier for the owner. As the number of sensors in an Internet of Things (IoT) system grows, a question arises as to whether the transmission between the sensors and the IoT devices is reliable and whether the user receives alerts correctly and in a timely manner. Increased deployment of IoT devices with sensors increases possible safety risks. It is IoT devices that are often misused to create Distributed Denial of Service (DDoS) attacks, which is due to the weak security of IoT devices against misuse. The article looks at the issue from the opposite point of view, when the target of a DDoS attack are IoT devices in a smart home environment. The article examines how IoT devices and the entire smart home will behave if they become victims of a DDoS attack aimed at the smart home from the outside. The question of security was asked in terms of whether a legitimate user can continue to control and receive information from IoT sensors, which is available during normal operation of the smart home. The case study was done both from the point of view of the attack on the central units managing the IoT sensors directly, as well as on the smart-home personal assistant systems, with which the user can control the IoT sensors. The article presents experimental results for individual attacks performed in the case study and demonstrates the resistance of real IoT sensors against DDoS attack. The main novelty of the article is that the implementation of a personal assistant into the smart home environment increases the resistance of the user's communication with the sensors. This study is a pilot testing the selected sensor sample to show behavior of smart home under DDoS attack.Entities:
Keywords: DDoS; Internet of Things; IoT sensors; personal assistants; security; smart home
Year: 2020 PMID: 32947950 PMCID: PMC7570978 DOI: 10.3390/s20185298
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.576
Figure 1Various components of Internet of Things.
Figure 2SYN flood Distributed Denial of Service (DDoS) attack.
Figure 3HTTP Get flood DDoS attack.
Figure 4SSL/TLS flood DDoS attack.
Figure 5Structure of Ansible real-time attack environment for DDoS experimentation.
Figure 6Fibaro system: (a) Gateway for Fibaro system management—Home Center 3; (b) Fibaro Wall Plug.
Figure 7Philips Hue lighting system: (a) Philips Hue Bridge 2.0; (b) Smart LED bulbs Philips Hue White 9W E27 model LWB010.
Figure 8Amazon Alexa ecosystem.
Figure 9Smart-home controller Athom Homey Pro 2.0.
Figure 10Echo Dot (3rd Gen)—Smart speaker with Alexa.
Figure 11Google Home EU.
Figure 12Structure of experimental environment.
A brief overview of the cases used during the experimental testing.
| Scenario | Attacked Device | Controlling Mobile App | Testing Sensor | Wireless Protocol |
|---|---|---|---|---|
| Scenario 1 | Philips Hue Bridge | Philips Hue app | smart-bulb | ZigBee |
| Scenario 1 | Fibaro Home Center 3 | Fibaro Home Center app | wall plug | Z-Wave |
| Scenario 2 | Philips Hue Bridge | Homey app | smart-bulb | ZigBee |
| Scenario 2 | Philips Hue Bridge | Amazon Alexa app | smart-bulb | ZigBee |
| Scenario 2 | Philips Hue Bridge | Google Home app | smart-bulb | ZigBee |
| Scenario 2 | Fibaro Home Center 3 | Homey app | wall plug | Z-Wave |
| Scenario 2 | Fibaro Home Center 3 | Amazon Alexa app | wall plug | Z-Wave |
| Scenario 2 | Fibaro Home Center 3 | Google Home app | wall plug | Z-Wave |
| Scenario 3 | Athom Homey | Homey app | smart-bulb | ZigBee |
| Scenario 3 | Amazon Echo Dot | Amazon Alexa app | smart-bulb | ZigBee |
| Scenario 3 | Google Home | Google Home app | smart-bulb | ZigBee |
| Scenario 3 | Athom Homey | Homey app | wall plug | Z-Wave |
| Scenario 3 | Amazon Echo Dot | Amazon Alexa app | wall plug | Z-Wave |
| Scenario 3 | Google Home | Google Home app | wall plug | Z-Wave |
Destination ports for DDoS attack.
| Attacked Device | Attacked |
|---|---|
| Philips Hue Bridge | 80, 443, 8080 |
| Fibaro Home Center 3 | 80, 443 |
| Athom Homey | 80, 443 |
| Amazon Echo Dot | 1080, 8888 |
| Google Home | 8008, 8443 |
A brief overview of the scenarios used during the experimental testing.
| Scenario | Attacked Device | Controlling Mobile App | Testing Sensor | Communication |
|---|---|---|---|---|
| Scenario 1 | Philips Hue Bridge | Philips Hue app | smart-bulb | With restrictions |
| Scenario 1 | Fibaro Home Center 3 | Fibaro Home Center app | wall plug | With restrictions |
| Scenario 2 | Philips Hue Bridge | Homey app | smart-bulb | Inoperable |
| Scenario 2 | Philips Hue Bridge | Amazon Alexa app | smart-bulb | Fully |
| Scenario 2 | Philips Hue Bridge | Google Home app | smart-bulb | Fully |
| Scenario 2 | Fibaro Home Center 3 | Homey app | wall plug | Fully |
| Scenario 2 | Fibaro Home Center 3 | Amazon Alexa app | wall plug | Inoperable |
| Scenario 2 | Fibaro Home Center 3 | Google Home app | wall plug | Fully |
| Scenario 3 | Athom Homey | Homey app | smart-bulb | Inoperable |
| Scenario 3 | Amazon Echo Dot | Amazon Alexa app | smart-bulb | Fully |
| Scenario 3 | Google Home | Google Home app | smart-bulb | Fully |
| Scenario 3 | Athom Homey | Homey app | wall plug | Inoperable |
| Scenario 3 | Amazon Echo Dot | Amazon Alexa app | wall plug | Fully |
| Scenario 3 | Google Home | Google Home app | wall plug | Fully |