Abusing the Internet of Things
Another risk imposed by this situation is the possibility of the third-party infrastructure being compromised. This issue has be ...
which is played by the phone), the potential malicious entity will have prolonged access to the functionality even after returni ...
Earlier in the chapter, we looked at how researchers at UC San Diego and the University of Washington were able to exploit a con ...
A center console with IP address of 192.168.90.100 and the following services open: 22/tcp open ssh 53/tcp open domain 80/tcp ...
It is fascinating that the internal IP network in the Model S contains IP addresses that appear to be running the Linux operatin ...
Of course, it could also warm or cool your car to your preferences and select your favorite morning news stream. These new featu ...
going be attractive to a broad range of actors: hardware and software tinkerers, pranksters, nation-states, and groups that enga ...
state-sponsored activists, for various motives. In addition, it is unclear to owners what mecha- nisms and processes are being e ...
Secure Prototyping— littleBits and cloudBit With the announcement of the first-generation iPhone in 2007, Apple single- handedly ...
The consideration of how to secure an IoT device includes context, such as how the prod- uct may be used, and what types of thre ...
The USB power module powers the cloudBit projects. It can be powered using a USB cable or a wall adapter (Figure 7-2), both of w ...
FIGURE 7-3. The button module FIGURE 7-4. The cloudBit module Setting Up the cloudBit The first order of business is to set up t ...
FIGURE 7-5. Signing up for a littleBits account After signing up for an account, we can name our cloudBit module by going to htt ...
FIGURE 7-6. Naming our cloudBit module Once we have named our module, we are asked to power on the cloudBit (Figure 7-7). To do ...
Once the cloudBit is powered on, the light underneath the word Status on the module will start flashing. At this point, we need ...
FIGURE 7-8. Configuring the cloudBit Per the instructions, we hold down the setup button until the light blinks blue, and then l ...
FIGURE 7-9. Connecting to the cloudBit WiFi network Once we have connected to the WiFi network exposed by the cloudBit, our brow ...
FIGURE 7-10. WiFi networks detected by the cloudBit At this point, we will select our home WiFi network, which is TouchOfClass i ...
Designing the SMS Doorbell Now that we have our cloudBit module configured, we can use it to prototype a doorbell that sends us ...
module (such as a button module) sends a signal to the cloudBit. Select our cloudBit, named SMS_Door_Bell (Figure 7-6), from the ...
«
6
7
8
9
10
11
12
13
14
15
»
Free download pdf