Identifying and Implementing Common Tactics to Disrupt IoT Device Functionality Over TCP/IP Stacks

The proliferation of Internet of Things (IoT) devices in home automation systems has introduced unprecedented convenience but also raised serious concerns regarding security vulnerabilities [1]. This paper delves into the exploration of common vulnerabilities present in IoT-based home automation sys...

Full description

Saved in:
Bibliographic Details
Published inIEEE International Symposium on Computational Intelligence and Informatics pp. 87 - 92
Main Authors Hajdu, Szabolcs, Kis, Gerlinda Boglarka, Fekete, Albert Zsombor, Kutasi, Denes Nimrod
Format Conference Proceeding
LanguageEnglish
Published IEEE 19.11.2024
Subjects
Online AccessGet full text
ISSN2471-9269
DOI10.1109/CINTI63048.2024.10830827

Cover

More Information
Summary:The proliferation of Internet of Things (IoT) devices in home automation systems has introduced unprecedented convenience but also raised serious concerns regarding security vulnerabilities [1]. This paper delves into the exploration of common vulnerabilities present in IoT-based home automation systems and proposes easily implemented solutions to disrupt their functionality. Through a comprehensive analysis of popular IoT devices, protocols, and communication channels, we identify key vulnerabilities that expose these systems to potential attacks, encompassing unauthorized access, data breaches, and device manipulation. Our findings contribute to the ongoing discourse on securing IoT devices and systems, emphasizing the need for proactive measures to safeguard user privacy, data integrity, and overall system reliability. By disseminating easily deployable solutions, we intend to foster a safer and more resilient environment for the growing landscape of IoT home automation.
ISSN:2471-9269
DOI:10.1109/CINTI63048.2024.10830827