Skip to main content

LUP Student Papers

LUND UNIVERSITY LIBRARIES

The security of communication protocols used for Internet of Things

Johari, Farhad LU (2015) In LU-CS-EX 2015-42 EDA920 20151
Department of Computer Science
Abstract
The thesis introduces a range of communication protocols used to implementing smart homes currently available on the market. Two protocols are chosen and theoretically analysed in depth. The analysis both describes how the protocols works and describes the measures taken in order to protect it against attacks from third parties. The theoretical evaluation analyses how susceptible the protocols are against the replay and eavesdropping attacks. The theoretical evaluation is followed by a case study where one of the communication protocols are analysed practically. During the case study a smart home using the chosen protocol is set up. The network is then attacked with the attacks described in the theoretical evaluation. The theoretical and... (More)
The thesis introduces a range of communication protocols used to implementing smart homes currently available on the market. Two protocols are chosen and theoretically analysed in depth. The analysis both describes how the protocols works and describes the measures taken in order to protect it against attacks from third parties. The theoretical evaluation analyses how susceptible the protocols are against the replay and eavesdropping attacks. The theoretical evaluation is followed by a case study where one of the communication protocols are analysed practically. During the case study a smart home using the chosen protocol is set up. The network is then attacked with the attacks described in the theoretical evaluation. The theoretical and practical outcomes are compared to see if they match. During this study the theoretical and practical outcome did not match due to faulty use of the protocol. The faulty use of the protocol prevented the equipment from differentiating authentic and inauthentic parties which made the equipment susceptible. However, the case study only represents a sample of the technology being used and the faulty use is caused by one manufacturer. Thus the protocol can not be deemed unsafe solely based on the outcome of the case study. (Less)
Please use this url to cite or link to this publication:
author
Johari, Farhad LU
supervisor
organization
alternative title
Säkerheten i kommunikationsprotokoll för Internet of Things
course
EDA920 20151
year
type
H3 - Professional qualifications (4 Years - )
subject
keywords
Home Automation, Protocol Analysis, Security, IoT, Internet of Things, Integration Solutions, Communication protocols, MSc
publication/series
LU-CS-EX 2015-42
report number
LU-CS-EX 2015-42
ISSN
1650-2884
language
English
id
7868964
date added to LUP
2015-09-18 08:00:40
date last changed
2015-09-18 08:00:40
@misc{7868964,
  abstract     = {{The thesis introduces a range of communication protocols used to implementing smart homes currently available on the market. Two protocols are chosen and theoretically analysed in depth. The analysis both describes how the protocols works and describes the measures taken in order to protect it against attacks from third parties. The theoretical evaluation analyses how susceptible the protocols are against the replay and eavesdropping attacks. The theoretical evaluation is followed by a case study where one of the communication protocols are analysed practically. During the case study a smart home using the chosen protocol is set up. The network is then attacked with the attacks described in the theoretical evaluation. The theoretical and practical outcomes are compared to see if they match. During this study the theoretical and practical outcome did not match due to faulty use of the protocol. The faulty use of the protocol prevented the equipment from differentiating authentic and inauthentic parties which made the equipment susceptible. However, the case study only represents a sample of the technology being used and the faulty use is caused by one manufacturer. Thus the protocol can not be deemed unsafe solely based on the outcome of the case study.}},
  author       = {{Johari, Farhad}},
  issn         = {{1650-2884}},
  language     = {{eng}},
  note         = {{Student Paper}},
  series       = {{LU-CS-EX 2015-42}},
  title        = {{The security of communication protocols used for Internet of Things}},
  year         = {{2015}},
}