Identifying and Implementing Common Tactics to Disrupt IoT Device Functionality Over TCP/IP Stacks
The proliferation of Internet of Things (IoT) devices in home automation systems has introduced unprecedented convenience but also raised serious concerns regarding security vulnerabilities [1]. This paper delves into the exploration of common vulnerabilities present in IoT-based home automation sys...
        Saved in:
      
    
          | Published in | IEEE International Symposium on Computational Intelligence and Informatics pp. 87 - 92 | 
|---|---|
| Main Authors | , , , | 
| Format | Conference Proceeding | 
| Language | English | 
| Published | 
            IEEE
    
        19.11.2024
     | 
| Subjects | |
| Online Access | Get full text | 
| ISSN | 2471-9269 | 
| DOI | 10.1109/CINTI63048.2024.10830827 | 
Cover
| Summary: | The proliferation of Internet of Things (IoT) devices in home automation systems has introduced unprecedented convenience but also raised serious concerns regarding security vulnerabilities [1]. This paper delves into the exploration of common vulnerabilities present in IoT-based home automation systems and proposes easily implemented solutions to disrupt their functionality. Through a comprehensive analysis of popular IoT devices, protocols, and communication channels, we identify key vulnerabilities that expose these systems to potential attacks, encompassing unauthorized access, data breaches, and device manipulation. Our findings contribute to the ongoing discourse on securing IoT devices and systems, emphasizing the need for proactive measures to safeguard user privacy, data integrity, and overall system reliability. By disseminating easily deployable solutions, we intend to foster a safer and more resilient environment for the growing landscape of IoT home automation. | 
|---|---|
| ISSN: | 2471-9269 | 
| DOI: | 10.1109/CINTI63048.2024.10830827 |