Skip to main content

Security Solution Based on Raspberry PI and IoT

  • Conference paper
  • First Online:
Cyberspace Safety and Security (CSS 2019)

Abstract

This project focuses on building and developing a secure smart home IoT system that can give near real-time information about the status of the home, with the aid of cloud and wireless sensor communication technologies. In this paper, the capabilities and limitations of smart home systems were researched. The project built a smart Internet of Things (IoT) system for the security of the home. This project uses inexpensive and commercially available hardware, and the software solutions were developed based on open source packages. The performance and the security of the home IoT system were tested. Further security analysis was conducted to analyse the vulnerabilities of the connected IoT devices. The solutions presented in this paper are applicable to the real world and not limited to a controlled environment.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shields, N.: Urban development: why investors are growing more interested in smart cities (2018). http://uk.businessinsider.com/siemens-head-urban-development-martin-powell-investors-interested-smart-cities-2018-3

  2. Gov.UK: The UK’s leadership in smart cities (2018). https://www.gov.uk/government/speeches/the-uks-leadership-in-smart-cities

  3. Beckel, C., Serfas H., Moritz G.: Requirements for smart home applications and realization with WS4D-pipesBox. De Bosch (2011)

    Google Scholar 

  4. Montag, A.: Former NSA privacy expert: here’s how likely it is that your Amazon Echo will be hacked (2018). https://www.cnbc.com/2018/09/04/ex-nsa-privacy-expert-how-likely-your-amazon-echo-is-to-be-hacked.html. Accessed Jun 2019

  5. Taylor, A.: The 17 biggest data breaches of the 21st century (2018). https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html. Accessed Jun 2019

  6. Dinculeana, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol. Appl. Sci. J. 9(5), 848 (2019). https://doi.org/10.3390/app9050848

    Article  Google Scholar 

  7. Tabassum, A., Ahmed, F., Ahmed, Z.: Smart home security using Raspberry PI. Int. J. Sci. Res. Eng. Technol. 4(7), 164–169 (2018)

    Google Scholar 

  8. Nath, R.K., Bajpai, R., Thapliyal, H.: IoT based indoor location detection system for smart home environment. In: 2018 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, pp. 1–3 (2018). https://doi.org/10.1109/icce.2018.8326225

  9. Dey, P., Syed, S., Mitul, J., Ahmed, N.: Embedded system for automatic door access using face recognition. Int. Res. J. Eng. Technol. 06(06), 67–70 (2018). e-ISSN: 2395-0056

    Google Scholar 

  10. Sahani, M., Nanda, C., Sahu, A.K., Pattnaik, B.: Web-based embedded door access control and home security system. In: International Conference on Circuit, Power and Computing Technologies (ICCPCT), pp. 1–6 (2015). https://doi.org/10.1109/iccpct.2015.7159473

  11. Apthorpe, N., Reisman, D., Feamster, N.: A smart home is no castle: privacy vulnerabilities of encrypted IoT traffic. Princeton University, Princeton, New Jersey (2017)

    Google Scholar 

  12. Raccoon, L.B.S.: The chaos model and the chaos cycle. SIGSOFT Softw. Eng. Notes 20(1), 55–66 (1995). https://doi.org/10.1145/225907.225914. ACM Digital Library, New York

    Article  Google Scholar 

  13. MetalKey: UnrealIRCD 3.2.8.1 Backdoor Command Execution (2017). https://metalkey.github.io/unrealircd-3281-backdoor-command-execution.html

  14. Espressif: ESP8266 - Low-power, highly-integrated Wi-Fi solution (2019). https://www.espressif.com/en/products/hardware/esp8266ex/overview

  15. Kremser, S.: esp8266_deauther (2018). https://github.com/spacehuhn/esp8266_deauther. Accessed Jun 2019

  16. Xie, W., Cheng, X.: Imbalanced big data classification based on virtual reality in cloud computing. Multimedia Tools Appl., 1–18 (2019). http://dx.doi.org/10.1007/s11042-019-7317-x

  17. Yu, G., Xu, J., Cheng, X.: Platform of quality evaluation system for multimedia video communication based NS2. J. Ambient Intell. Humanized Comput., 1–12 (2018). https://doi.org/10.1007/s12652-018-1164-x. Print ISSN: 1868-5137, Online ISSN: 1868-5145

  18. Xie, X., Yuan, T., Zhou, X., Cheng, X.: Research on trust model in container-based cloud service. Comput. Mater. Continua 56(2), 273–283 (2018). https://doi.org/10.3970/cmc.2018.03587. ISSN: 1546-2218 (printed), ISSN: 1546-2226

    Article  Google Scholar 

  19. Gao, C., Lv, S., Wei, Y., Wang, Z., Liu, Z., Cheng, X.: an effective searchable symmetric encryption with enhanced security for mobile devices. IEEE Access 6, 38860–38869 (2018). ISSN 2169-3536

    Article  Google Scholar 

  20. Wang, C., Zhao, Z., Gong, L., Zhu, L., Liu, Z., Cheng, X.: A distributed anomaly detection system for in-vehicle network using HTM. IEEE Access 6(1), 9091–9098 (2018)

    Article  Google Scholar 

  21. Wang, C., et al.: Accurate Sybil attack detection based on fine-grained physical channel information. Sensors 18(3), 878 (2018). ISSN 1424-8220

    Article  Google Scholar 

  22. Dinculeană, D., Cheng, X.: Vulnerabilities and limitations of MQTT protocol used between IoT devices. Appl. Sci. J. 9(5), 848 (2019). https://doi.org/10.3390/app9050848. Special issue “Access Control Schemes for Internet of Things”

    Article  Google Scholar 

  23. Shi, F., Chen, Z., Cheng, X.: Behaviour modelling and individual recognition of sonar transmitter for secure communication in UASNs. IEEE Access (2019). https://doi.org/10.1109/access.2019.2923059. Print ISSN: 2169-3536, Online ISSN: 2169-3536

  24. Men, J., et al.: Finding sands in the eyes: vulnerabilities discovery in IoT with EUFuzzer on human machine interface. IEEE Access 7, 103751–103759 (2019)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaochun Cheng .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ali, B., Cheng, X. (2019). Security Solution Based on Raspberry PI and IoT. In: Vaidya, J., Zhang, X., Li, J. (eds) Cyberspace Safety and Security. CSS 2019. Lecture Notes in Computer Science(), vol 11983. Springer, Cham. https://doi.org/10.1007/978-3-030-37352-8_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-37352-8_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-37351-1

  • Online ISBN: 978-3-030-37352-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics