Uploaded by Adjawo Abdul Rahim

h

advertisement
1.7 General Overview of the Research Design
As a part of the present study, a vulnerability test was performed, which incorporated the theoretical
basis of how disparate manufactured systems interconnect. The vulnerability test assisted in meeting the
research objectives. In particular, the vulnerability tests pertained to various wireless sensor network
(WSN) products, ubiquitous networks, and pervasive computing in the categories of appliances,
Smartphones, multimedia systems, lighting, heating, and home alarm systems, as these elements are
most pertinent in the systems considered within the Smart Home domain. Devices operating within the
Smart Home domain either consume user data or traverse the construct of availability-based systems.
The case studies comprising this research were conducted in a controlled environment. The first case
study focused on counter- reconnaissance efforts to enhance discovery of possible cyber intrusions
relevant to an IoT network, as well as determine the propensity of cyber intrusions to implant into the
IoT network. The reconnaissance and discovery efforts helped determine how secure Smart Home
technology IoT systems are independent of other connected devices. The second case study focused on
the effectiveness of a proposed Debian 7 based (open source Intrusion Detection Software (IDS))
solution. Finally, the aim of the third case study was to explore the IoT object behavior as it applies to
the handling of cyber security and safety, resilience to cyber-threats, and personally identifiable
information.I
Download