• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • Tagged with
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Illuminating threats : Exploring cybersecurity threats in smart bulbs and illuminating a path to enhanced protection

Formosinho, Francisco January 2024 (has links)
There are serious security risks with the growing use of IoT devices. Historically, manufacturers prioritized profit over security due to high demand, a perspective that has evolved but remains a challenge. With this, the security of IoT devices has been overlooked, especially regarding smart bulbs, as they tend to be bundled with other IoT devices by the research community, and consequently not receive the attentionthey require. This thesis aims to identify and analyze potential threats regarding smart bulbs, and it does so by exploring proactive strategies in order to mitigate vulnerabilities. To understand the challenges smart bulbs face, some of the current applicable legislation, cyber attacks, defense mechanisms, and vulnerabilities were analyzed. Then, a network topology and a data flow diagram of a home network with smart bulbs was developed. Consequently, layers were assigned to the smart bulb, and threat modeling was performed on a each layer using STRIDE. This procedure was then formalized with a framework that encapsulates the stages of analysing the smart bulb’s landscape through threat modeling. This work contributes to the research community’s body of knowledge by providing valuable insights detailing the smart bulb’s landscape, not only through the framework but also through the conducted threat modeling, the data flow diagrams, and the information gathered regarding the threats to smart bulb security.

Page generated in 0.0538 seconds