Questions tagged [security]

For questions relating to the security of IoT devices (especially those connected directly to the internet) and how to mitigate these issues or avoid them altogether. Do not confuse this with device safety (If it gets hacked it's a security question, if it explodes it's a safety question).

Use this tag for questions that are about the security of IoT devices (especially those connected directly to the internet) and how to mitigate these issues or avoid them altogether.

The Internet of Things involves objects and entities collectively known as Things. These Things have unique identifiers and the ability to automatically transfer data over a network. As access to Things is over the Internet, security is crucial.

Consider the question check list if your question fits the tag. You can also look at the example questions. If this tag doesn't fit your question have a look below at somehow related tags that might fit your question better.

Question checklist

  • Is the question about the security of IoT devices, setups or networks?
  • Is the question NOT about safety? (if it burns, it's about safety; if it's hacked, then it's security.)
  • Does the question describe clearly what security issue is the concern or is to be avoided?

Example questions

Not what you are looking for?

  • Use for questions about setting up and configuring networks for your IoT devices in general.
  • Use for questions about the operational safety of devices.
  • Consider asking on Information Security Stack Exchange if your question has no IoT connection whatsoever.
145 questions
130
votes
4 answers

How can I stop Alexa from ordering things if it hears a voice on TV?

According to The Register, lots of Amazon Echo devices were accidentally triggered by a presenter saying 'Alexa ordered me a dollhouse'. Telly station CW-6 said the blunder happened during a Thursday morning news package about a Texan six-year-old…
Aurora0001
  • 18,520
  • 13
  • 55
  • 169
56
votes
8 answers

Securing small home automation setup

I have a small home automation lab (that I keep saying I'll expand, but haven't). In this setup, I have a control system to control lights (utilizing the x10 protocol), blinds, a Nest thermostat and two web cams. With the recent record setting DDoS…
Andy
  • 663
  • 5
  • 11
40
votes
5 answers

Can I monitor my network for rogue IoT device activity?

In order to mitigate or manage the risk from having some of the devices on my home network compromised, is it feasible to monitor network traffic so as to detect a compromise? I'm specifically interested in solutions which don't require me to be a…
Sean Houlihane
  • 10,524
  • 2
  • 26
  • 62
31
votes
3 answers

Intercepting web traffic going over cellular network

If you can plug a device into the wall, or use it in Wi-Fi, it's easy to see the traffic with software like WireShark. But it seems more tricky to do it with a device that uses LTE/3G or other cellular networks to communicate. If I'm worried about a…
WayToDoor
  • 816
  • 7
  • 15
30
votes
3 answers

What are the best security practices to secure a remote IoT camera?

I have done a bit of home automation such as building a remote camera that can be turned on via SSH locally and publishes images on a Raspberry Pi run Linux server. I'm curious, though, as to what protocols are best followed when your security is…
Zeitsperre
  • 905
  • 6
  • 23
28
votes
4 answers

How can I check if my IoT devices are infected with the Mirai worm?

I've recently heard about the Mirai worm, which infects vulnerable routers, IoT devices and other internet-connected appliances with insecure passwords. Mirai is suspected of being the cause of some of the largest DDoS attacks in history: Dyn…
Aurora0001
  • 18,520
  • 13
  • 55
  • 169
27
votes
7 answers

Could a blockchain really prevent malware in the Internet of Things?

This article claims that using a blockchain-based security system for an IoT network would prevent some types of attacks: Blockchain technology may help offer an answer. Gada observes that blockchain offers inherent security not present in current,…
Aurora0001
  • 18,520
  • 13
  • 55
  • 169
23
votes
5 answers

Is there any advantage in encrypting sensor data that is not private?

Some sites, such as this article on end-to-end encryption for IoT, suggest that all traffic sent across the IoT network should be encrypted, saying: Enterprises, government agencies and other organizations should take adopt [sic] an…
Aurora0001
  • 18,520
  • 13
  • 55
  • 169
20
votes
4 answers

Is my Samsung Smart TV vulnerable to the "weeping angel" attack?

On CNet, there's a report about Samsung UNF 8000 smart TVs being vulnerable to a hack developed by the CIA: In June 2014, the CIA and UK's MI5 held a joint workshop to improve the "Weeping Angel" hack, which appears to have specifically targeted…
Aurora0001
  • 18,520
  • 13
  • 55
  • 169
19
votes
2 answers

How do I secure communication between app and IoT device?

I am currently working on a project that includes Bluetooth communication between a mobile application (currently using the Ionic platform) and an embedded device. For comparison, our product is similar to a smart lock. Security is of utmost…
Joel Brewer
  • 441
  • 3
  • 15
18
votes
2 answers

How to implement Wi-Fi for a headless IoT device?

Recently I purchased a TP-Link HS100 smart plug which I configured using an app and all is working well. Now I am trying to understand the underlying software and hardware architecture for such an implementation. Based on simple Google searches, the…
Mahendra Gunawardena
  • 1,550
  • 11
  • 30
17
votes
2 answers

What simple security tests can I perform on my MQTT network?

I am about to set up an MQTT network at home. I want to build up some knowledge by practical exercises. It would be a small network with the broker hosted on my laptop (Windows 7) and some Raspberry Pi powered client. Also I am thinking about making…
Bence Kaulics
  • 7,843
  • 8
  • 42
  • 90
17
votes
1 answer

Secure Home Network Partition for IoT Devices

What is the best approach to partitioning IoT devices from non-IoT devices at home? I have heard that setting up separate networks, one for IoT devices and one for everything else, is a good approach. This can be thought of as a three router "Y"…
soundslikeodd
  • 291
  • 1
  • 10
17
votes
3 answers

Is the Subscriber-Publisher pattern applicable also to actuators?

There are tons of tutorials on the web, especially with RabbitMQ, on how to publish sensor data; for example, temperature, humidity, etc. Just publish the value to a message queue and anybody can consume it. So far so good. But how about actuators?…
Mat
  • 273
  • 1
  • 6
17
votes
3 answers

What is the difference between a DDoS attack and a PDoS attack?

I've read a certain amount about the Mirai worm, a virus that attacks Internet of Things devices using default usernames and passwords and essentially is wired to produce a Distributed Denial of Service (DDoS). However, I've recently read about…
anonymous2
  • 4,902
  • 3
  • 22
  • 49
1
2 3
9 10