Dynamic Intelligence Gathering on The Internet of Things
Society is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vu...
Main Author: | |
---|---|
Format: | Others |
Language: | English |
Published: |
Uppsala universitet, Institutionen för informationsteknologi
2019
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280 |
id |
ndltd-UPSALLA1-oai-DiVA.org-uu-393280 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-uu-3932802019-09-19T04:22:55ZDynamic Intelligence Gathering on The Internet of ThingsengLeander, AndreasUppsala universitet, Institutionen för informationsteknologi2019Engineering and TechnologyTeknik och teknologierSociety is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vulnerabilities. Penetration testers are professionals working to secure the connected society from cyber attacks. An attempt at preparing penetration testers and facilitating their work of securing connected devices and systems using connected devices by compiling a list of popular communication protocols has been made. The analysed communication protocols are: Zigbee, MQTT, AMQP, LoraWAN, 6LoWPan, Bluetooth/Bluetooth low energy, ANT, Enhanced Shockburst, Long term evolution and Z-wave. The compilation includes the protocol architecture, known vulnerabilities and tools for penetration testing. The compiled information can be used to scope which knowledge and tools might be required to perform a security analysis of a device or setup running one of the analysed protocols. Cyber attacks and counter measures are constantly evolving therefore a method for continuous updating of this compilation has been proposed. If an information bank on vulnerabilities and tools is to be useful in the future, updating and reviewing needs to be incorporated in the work flow to ensure that the most recent vulnerabilities and tools are included. By keeping an updated information bank, knowledge can be shared between penetration testers and continuously expanded. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280UPTEC IT, 1401-5749 ; 19014application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Engineering and Technology Teknik och teknologier |
spellingShingle |
Engineering and Technology Teknik och teknologier Leander, Andreas Dynamic Intelligence Gathering on The Internet of Things |
description |
Society is connecting more and more devices to the internet. There are many benefits to using connected devices, such as continuous monitoring of critical systems, easy access from various locations and device data collection. The backside of all of these interconnected devices are cyber security vulnerabilities. Penetration testers are professionals working to secure the connected society from cyber attacks. An attempt at preparing penetration testers and facilitating their work of securing connected devices and systems using connected devices by compiling a list of popular communication protocols has been made. The analysed communication protocols are: Zigbee, MQTT, AMQP, LoraWAN, 6LoWPan, Bluetooth/Bluetooth low energy, ANT, Enhanced Shockburst, Long term evolution and Z-wave. The compilation includes the protocol architecture, known vulnerabilities and tools for penetration testing. The compiled information can be used to scope which knowledge and tools might be required to perform a security analysis of a device or setup running one of the analysed protocols. Cyber attacks and counter measures are constantly evolving therefore a method for continuous updating of this compilation has been proposed. If an information bank on vulnerabilities and tools is to be useful in the future, updating and reviewing needs to be incorporated in the work flow to ensure that the most recent vulnerabilities and tools are included. By keeping an updated information bank, knowledge can be shared between penetration testers and continuously expanded. |
author |
Leander, Andreas |
author_facet |
Leander, Andreas |
author_sort |
Leander, Andreas |
title |
Dynamic Intelligence Gathering on The Internet of Things |
title_short |
Dynamic Intelligence Gathering on The Internet of Things |
title_full |
Dynamic Intelligence Gathering on The Internet of Things |
title_fullStr |
Dynamic Intelligence Gathering on The Internet of Things |
title_full_unstemmed |
Dynamic Intelligence Gathering on The Internet of Things |
title_sort |
dynamic intelligence gathering on the internet of things |
publisher |
Uppsala universitet, Institutionen för informationsteknologi |
publishDate |
2019 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-393280 |
work_keys_str_mv |
AT leanderandreas dynamicintelligencegatheringontheinternetofthings |
_version_ |
1719252867785687040 |