Skip to main content

Smart Thermostat as a Part of IoT Attack

  • Conference paper
  • First Online:
Cybernetics and Automation Control Theory Methods in Intelligent Algorithms (CSOC 2019)

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 986))

Included in the following conference series:

Abstract

The Internet of Things is a rapidly growing global network of devices. Due to a rapid growth, security issues are also associated with Distributed Denial of Service attacks on these devices. Nowadays, cyber-attacks are a chronic Internet affair. There are two views of attacks. In the first view, the goal is to disrupt the flow of service in any way. This type of attack is called Denial of Service. In the second view, the goal is to abuse Internet of Things devices for attacking so that the device sends a packet to a non-existent port, and a response with an error automatically sends the device to an unsuspecting victim. The Internet of Things thermostat, which is popular in both, home and industrial areas, has been selected to investigate these types of attacks. The article illustrates the possibility of attacking the Internet of Things device as well as integrating the Distributed Reflection Denial of Service targeted attack device into specific victims.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Leporini, B., Buzzi, M.: Home automation for an independent living: investigating the needs of visually impaired people. In: ACM Proceedings of the Internet of Accessible Things. ACM, USA (2018)

    Google Scholar 

  2. Shaikh, F., et al.: Internet of malicious things: correlating active and passive measurements for inferring and characterizing internet-scale unsolicited IoT devices. IEEE Commun. Mag. 56(9), 170–177 (2018)

    Article  Google Scholar 

  3. Desmedt, Y.: Need to know to defend one’s home, or should one buy a WiFi enabled thermostat? In: Proceedings of the Second International Conference on Internet of things and Cloud Computing. ACM (2017)

    Google Scholar 

  4. HorvĂ¡thovĂ¡, D., SilĂ¡di, V., LackovĂ¡, E.: Phobia treatment with the help of virtual reality. In: 13th International Scientific Conference on Informatics, pp. 114–119. IEEE (2015)

    Google Scholar 

  5. Ă–lveckĂ½, M., GabriÅ¡ka, D.: Motion capture as an extension of web-based simulation. Appl. Mech. Mater. 513, 827–833 (2014)

    Article  Google Scholar 

  6. DirgovĂ¡ LuptĂ¡kovĂ¡, I., Å imon, M., PospĂ­chal, J.: Worst-case test network optimization for community detection method. In: Proceedings of the 8th Balkan Conference in Informatics. ACM (2017)

    Google Scholar 

  7. HosÅ¥oveckĂ½, M., NovĂ¡k, M., HorvĂ¡thovĂ¡, Z.: Problem-based learning: serious game in science education. In: ICEL 2017-Proceedings of the 12th International Conference on e-Learning, ACPI 2017, pp. 303–310 (2017)

    Google Scholar 

  8. Pervez, F., et al.: Wireless technologies for emergency response: a comprehensive review and some guidelines. IEEE Access 6, 71814–71838 (2018)

    Article  Google Scholar 

  9. Amadeo, M., et al.: Information-centric networking for the Internet of Things: challenges and opportunities. IEEE Netw. 30(2), 92–100 (2016)

    Article  Google Scholar 

  10. Å imon, M., Huraj, L., ÄŒerňanskĂ½, M.: Performance evaluations of IPTables firewall solutions under DDoS attacks. J. Appl. Math. Stat. Inform. 11(2), 35–45 (2015)

    Article  Google Scholar 

  11. Å imon, M., Huraj, L., HosÅ¥oveckĂ½, M.: IPv6 network DDoS attack with P2P grid. In: Creativity in Intelligent, Technologies and Data Science. Springer International Publishing, pp. 407–415 (2015)

    Google Scholar 

  12. Hofstede, R., Pras, A., Sperotto, A., Rodosek, G.D.: Flow-based compromise detection: lessons learned. IEEE Secur. Priv. 16(1), 82–89 (2018)

    Article  Google Scholar 

  13. Kolias, C., et al.: DDoS in the IoT: Mirai and other botnets. Computer 50(7), 80–84 (2017)

    Article  Google Scholar 

Download references

Acknowledgements

The work was supported by the grant VEGA1/0272/18 Holistic approach of knowledge discovery from production data in compliance with Industry 4.0 concept.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ladislav Huraj .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

HorĂ¡k, T., Huraj, L. (2019). Smart Thermostat as a Part of IoT Attack. In: Silhavy, R. (eds) Cybernetics and Automation Control Theory Methods in Intelligent Algorithms. CSOC 2019. Advances in Intelligent Systems and Computing, vol 986. Springer, Cham. https://doi.org/10.1007/978-3-030-19813-8_17

Download citation

Publish with us

Policies and ethics