Dynamic Intelligence Gathering on The Internet of Things

Society is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vu...

Full description

Bibliographic Details
Main Author: Leander, Andreas
Format: Others
Language:English
Published: Uppsala universitet, Institutionen för informationsteknologi 2019
Subjects:
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280
id ndltd-UPSALLA1-oai-DiVA.org-uu-393280
record_format oai_dc
spelling ndltd-UPSALLA1-oai-DiVA.org-uu-3932802019-09-19T04:22:55ZDynamic Intelligence Gathering on The Internet of ThingsengLeander, AndreasUppsala universitet, Institutionen för informationsteknologi2019Engineering and TechnologyTeknik och teknologierSociety is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vulnerabilities. Penetration testers are professionals working to secure the connected society from cyber attacks. An attempt at preparing penetration testers and facilitating their work of securing connected devices and systems using connected devices by compiling a list of popular communication protocols has been made. The analysed communication protocols are: Zigbee, MQTT, AMQP, LoraWAN, 6LoWPan, Bluetooth/Bluetooth low energy, ANT, Enhanced Shockburst, Long term evolution and Z-wave. The compilation includes the protocol architecture, known vulnerabilities and tools for penetration testing. The compiled information can be used to scope which knowledge and tools might be required to perform a security analysis of a device or setup running one of the analysed protocols. Cyber attacks and counter measures are constantly evolving therefore a method for continuous updating of this compilation has been proposed. If an information bank on vulnerabilities and tools is to be useful in the future, updating and reviewing needs to be incorporated in the work flow to ensure that the most recent vulnerabilities and tools are included. By keeping an updated information bank, knowledge can be shared between penetration testers and continuously expanded. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280UPTEC IT, 1401-5749 ; 19014application/pdfinfo:eu-repo/semantics/openAccess
collection NDLTD
language English
format Others
sources NDLTD
topic Engineering and Technology
Teknik och teknologier
spellingShingle Engineering and Technology
Teknik och teknologier
Leander, Andreas
Dynamic Intelligence Gathering on The Internet of Things
description Society is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vulnerabilities. Penetration testers are professionals working to secure the connected society from cyber attacks. An attempt at preparing penetration testers and facilitating their work of securing connected devices and systems using connected devices by compiling a list of popular communication protocols has been made. The analysed communication protocols are: Zigbee, MQTT, AMQP, LoraWAN, 6LoWPan, Bluetooth/Bluetooth low energy, ANT, Enhanced Shockburst, Long term evolution and Z-wave. The compilation includes the protocol architecture, known vulnerabilities and tools for penetration testing. The compiled information can be used to scope which knowledge and tools might be required to perform a security analysis of a device or setup running one of the analysed protocols. Cyber attacks and counter measures are constantly evolving therefore a method for continuous updating of this compilation has been proposed. If an information bank on vulnerabilities and tools is to be useful in the future, updating and reviewing needs to be incorporated in the work flow to ensure that the most recent vulnerabilities and tools are included. By keeping an updated information bank, knowledge can be shared between penetration testers and continuously expanded.
author Leander, Andreas
author_facet Leander, Andreas
author_sort Leander, Andreas
title Dynamic Intelligence Gathering on The Internet of Things
title_short Dynamic Intelligence Gathering on The Internet of Things
title_full Dynamic Intelligence Gathering on The Internet of Things
title_fullStr Dynamic Intelligence Gathering on The Internet of Things
title_full_unstemmed Dynamic Intelligence Gathering on The Internet of Things
title_sort dynamic intelligence gathering on the internet of things
publisher Uppsala universitet, Institutionen för informationsteknologi
publishDate 2019
url http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280
work_keys_str_mv AT leanderandreas dynamicintelligencegatheringontheinternetofthings
_version_ 1719252867785687040