{"title":"Testing the Security ESP32 Internet of Things Devices","authors":"Oleksii Barybin, E. Zaitseva, Volodymyr Brazhnyi","doi":"10.1109/PICST47496.2019.9061269","DOIUrl":null,"url":null,"abstract":"The physical model of a handmade IoT system that includes device for measuring temperature based on ESP32, WiFi home network and web interface was proposed and implemented upon laboratory scale. The result of the experiment based on this model to attempt to gain unauthorized access to the transmitted data was successful. Attack scenario was formulated and consist of four stages: gaining unauthorized access to a network, network traffic interception and analysis, create fake ESP32 client and disconnecting original ESP32 from a server. It is shown that the attacker, who has the basic knowledge and skills in working with common wireless network hacking tools and a basic knowledge of ESP32 and ESP32 programming skills can access the system and send fake information to the web interface. To reduce the probability of the proposed scenario it is recommended to use TCP instead of UDP.","PeriodicalId":6764,"journal":{"name":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","volume":"10 1","pages":"143-146"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"18","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PICST47496.2019.9061269","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 18
Abstract
The physical model of a handmade IoT system that includes device for measuring temperature based on ESP32, WiFi home network and web interface was proposed and implemented upon laboratory scale. The result of the experiment based on this model to attempt to gain unauthorized access to the transmitted data was successful. Attack scenario was formulated and consist of four stages: gaining unauthorized access to a network, network traffic interception and analysis, create fake ESP32 client and disconnecting original ESP32 from a server. It is shown that the attacker, who has the basic knowledge and skills in working with common wireless network hacking tools and a basic knowledge of ESP32 and ESP32 programming skills can access the system and send fake information to the web interface. To reduce the probability of the proposed scenario it is recommended to use TCP instead of UDP.