The security of communication protocols used for Internet of Things

University essay from Lunds universitet/Institutionen för datavetenskap

Abstract: The thesis introduces a range of communication protocols used to implementing smart homes currently available on the market. Two protocols are chosen and theoretically analysed in depth. The analysis both describes how the protocols works and describes the measures taken in order to protect it against attacks from third parties. The theoretical evaluation analyses how susceptible the protocols are against the replay and eavesdropping attacks. The theoretical evaluation is followed by a case study where one of the communication protocols are analysed practically. During the case study a smart home using the chosen protocol is set up. The network is then attacked with the attacks described in the theoretical evaluation. The theoretical and practical outcomes are compared to see if they match. During this study the theoretical and practical outcome did not match due to faulty use of the protocol. The faulty use of the protocol prevented the equipment from differentiating authentic and inauthentic parties which made the equipment susceptible. However, the case study only represents a sample of the technology being used and the faulty use is caused by one manufacturer. Thus the protocol can not be deemed unsafe solely based on the outcome of the case study.

  AT THIS PAGE YOU CAN DOWNLOAD THE WHOLE ESSAY. (follow the link to the next page)