Open Access. Powered by Scholars. Published by Universities.®
Digital Communications and Networking Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
Articles 1 - 3 of 3
Full-Text Articles in Digital Communications and Networking
Iot Garden Frost Alarm, Andrew James
Iot Garden Frost Alarm, Andrew James
Honors Theses
Home gardeners are faced with yearly challenges due to spring frosts harming young plants. This is frequently mitigated by covering crops with frost blankets, but only on nights when a frost is predicted. In areas with less predictable climate, an unexpected frost can kill vulnerable plants, reducing the amount of food produced. A system is proposed and designed here to use internet of things (IoT) technology to enable a small weather station in the home garden to report current climate data and predict frosts, then alert the gardener in time for them to cover their plants.
The system as designed …
An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla
An Inside Vs. Outside Classification System For Wi-Fi Iot Devices, Paul Gralla
Dartmouth College Undergraduate Theses
We are entering an era in which Smart Devices are increasingly integrated into our daily lives. Everyday objects are gaining computational power to interact with their environments and communicate with each other and the world via the Internet. While the integration of such devices offers many potential benefits to their users, it also gives rise to a unique set of challenges. One of those challenges is to detect whether a device belongs to one’s own ecosystem, or to a neighbor – or represents an unexpected adversary. An important part of determining whether a device is friend or adversary is to …
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long
Theses and Dissertations
In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …