Attack simulation on commercial IoT systems
DOI:
https://doi.org/10.31449/upinf.252Keywords:
attack defence, DoS attacks, IoT, poor authentication attacks, reply attacksAbstract
Internet of Things (IoT) defines smart devices with sensors and software that connect to other devices and systems for data analysis, control and automation purposes. Examples of such devices include smart lights, smart washers, dryers, dishwashers, thermostats, home security cameras, and others, most of which can be easily controlled via mobile applications. Due to the affordability and increasing prevalence of these devices, problems related to incomplete data sets and the absence of automated updates are also becoming more common, which is a key security and functional factor for devices that are constantly connected to the Internet. Attackers can exploit such security flaws to unlawfully collect personal data, disable devices, or misuse their computing power to build larger networks of infected devices (botnets).
The article discusses critical device problems through various attacks and their scope, as well as strategies for managing and preventing IoT attacks. It also analyzes major past attacks, and using widely available devices such as smart light bulbs and ventilation systems to demonstrate the ease of attack implementation. The paper also critically evaluates the current trend of replacing simple devices with "smart" versions, which, due to increased complexity and inadequate security design, is becoming an increasingly challenging and difficult-to-manage security issue in the modern digital environment.