Abstract
People are living in the world where billions of IoT systems are connected to the Internet. They are sending and receiving data via network, and are controlled remotely. Many IoT systems do not have complex tasks to perform or to control. Because of that, they are built on cheap and weak hardware. Sometimes there are not enough resources to implement suitable, high-quality protection mechanism. The simplicity of the IoT system and its task lead the developer to leave the system unprotected. In this paper, the authors present how easy is to attack unprotected and protected systems. In three examples, they use free tools from Kali Linux to take control or disable systems. The know-how is also available through YouTube videos, thus any person with basic level of ICT skills can become a potential attacker or hacker. The goal of this article is to highlight the importance of protecting the IoT system, because by controlling even some simply process, the hackers can cause considerable damage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
What Are IoT Devices: https://www.simplilearn.com/iot-devices-article. Last accessed 21 Aug 2021
Nyikes, Z., Kovács T. A., Tokody D.: In situ testing of rail damages in accordance with Industry 4.0. Journal of Physics-Conference Series (1742-6588 1742-6596) 1045, 1–6 (2018). https://doi.org/10.1088/1742-6596/1045/1/012032
Kaspersky: https://www.kaspersky.com/resource-center/definitions/what-is-cyber-security
Balázs, Á., Nyikes, Z., Kovács, T.A.: Building protection with composite materials application. Key Eng. Mater. (1013-9826 1662-9795) 755, 286–291 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.286
Kali: https://www.kali.org/docs/introduction/what-is-kali-linux/. Last accessed 10 Sept 2021
Nyikes, Z.: Digital competence and the safety awareness base on the assessments results of the Middle East-European generations. Proc. Manuf. (2351-9789) 22, 916–922 (2018). https://doi.org/10.1016/j.promfg.2018.03.130
Kali: https://www.kali.org/tools. Last accessed 10 Sept 2021
Nyikes, Z.: Contemporary digital competency review. Interdiscip. Descr. Complex Syst. (1334-4684 1334-4676) 16(1), 124–131 (2018). https://doi.org/10.7906/indecs.16.1.9
Kali Tools: https://tools.kali.org/information-gathering/arp-scan. Last accessed 10 Sept 2021
Tcpdump: https://www.tcpdump.org/. Last accessed 10 Sept 2021
Linux nc command.: https://www.computerhope.com/unix/nc.htm/. Last accessed 10 Sept 2021
Null Byte.: https://www.youtube.com/watch?v=kXm8f9fhaxQ. Last accessed 11 Sept 2021
Learn CCTV.: https://learncctv.com/how-to-hack-cctv-camera/. Last accessed 11 Sept 2021
Nyikes, Z.: Creation proposal for the digital competency framework of the middle-east European region. Key Eng. Mater. (1013-9826 1662-9795) 755, 106–111 (2017). https://doi.org/10.4028/www.scientific.net/KEM.755.106
Nyikes, Z.: Information security issues of RFID. In: Szakál, A. (ed.) SAMI 2016: IEEE 14th International Symposium on Applied Machine Intelligence and Informatics 2016, pp. 111–114. IEEE, New York (2016) ISBN: 9781467387392
Kismet.: https://www.kismetwireless.net/. Last accessed 10 Sept 2021
Aireplay-ng | Penetration Testing Tools.: https://tools.kali.org/wireless-attacks/aireplay-ng. Last accessed 11 Aug 2021
WEP: The “Wired Equivalent Privacy” Algorithm. https://www.ieee802.org/11/Documents/DocumentArchives/1994_docs/1194249_scan.pdf. Last accessed 31 Aug 2021
Wi-Fi Alliance.: https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-announces-first-products-certified-for-wi-fi-protected-access. Last accessed 31 Aug 2021
HaXF4Rall.: https://haxf4rall.com/2017/08/19/cracking-wpawpa2-psk-encryption. Last accessed 10 Sept 2021
Aircrack-ng.: http://aircrack-ng.org/doku.php?id=airodump-ng. Last accessed 10 Sept 2021
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature B.V.
About this paper
Cite this paper
Pinter, R., Čisar, S.M. (2022). Need for Cybersecurity Solutions in IoT Systems. In: Kovács, T.A., Nyikes, Z., Fürstner, I. (eds) Security-Related Advanced Technologies in Critical Infrastructure Protection. NATO Science for Peace and Security Series C: Environmental Security. Springer, Dordrecht. https://doi.org/10.1007/978-94-024-2174-3_9
Download citation
DOI: https://doi.org/10.1007/978-94-024-2174-3_9
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-024-2173-6
Online ISBN: 978-94-024-2174-3
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)