IoT devices can be found in almost any type of situation as the availability and viability of them has surged in the last decade with technological advancements. The purpose of this project is to investigate how secure these types of devices, in particular a robot vacuum cleaner, actually are if an ill intended actor tries to interfere with the device. Different methods used in the sphere of threat modeling and penetration testing were applied and tested with the result coming back positive. The robot vacuum cleaner was successfully compromised and the privacy of the owner could be violated applying the attacks used. The current way of thinking about privacy and security of IoT devices could therefore need to be reviewed
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a la...
Earlier research has shown that robots can provoke social responses in people, and that robots often...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
IoT devices can be found in almost any type of situation as the availability and viability of them h...
This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cl...
Currently, the widespread diffusion of intelligent objects connected to the Internet and continuousl...
peer reviewedRobots and autonomous systems in general are set to suffer similar cybersecurity proble...
With the advancements made in the field of data science, smart IoT devices are be-coming increasingl...
Internet connection to the billions of objects and tools means an increase in potential security vul...
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led...
The Internet of Things (IoT) is one of the most extensive technological evolution of the computing n...
The Internet of robotic things (IoRT) is the combination of different technologies including cloud c...
The purpose of this thesis is to analyze ethical hacking efforts and penetration testing of embedded...
The Internet is driving force on how we communicate with one another, from posting messages and imag...
The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects, gi...
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a la...
Earlier research has shown that robots can provoke social responses in people, and that robots often...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...
IoT devices can be found in almost any type of situation as the availability and viability of them h...
This study revolves around the safety of IoT devices, more specifically how safe the robot vacuum cl...
Currently, the widespread diffusion of intelligent objects connected to the Internet and continuousl...
peer reviewedRobots and autonomous systems in general are set to suffer similar cybersecurity proble...
With the advancements made in the field of data science, smart IoT devices are be-coming increasingl...
Internet connection to the billions of objects and tools means an increase in potential security vul...
The growth of the Internet of Things (IoT), and demand for low-cost, easy-to-deploy devices, has led...
The Internet of Things (IoT) is one of the most extensive technological evolution of the computing n...
The Internet of robotic things (IoRT) is the combination of different technologies including cloud c...
The purpose of this thesis is to analyze ethical hacking efforts and penetration testing of embedded...
The Internet is driving force on how we communicate with one another, from posting messages and imag...
The Internet of Things (IoT) aims at transforming everyday objects into smart or virtual objects, gi...
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a la...
Earlier research has shown that robots can provoke social responses in people, and that robots often...
The rapidly adopted idea of everyday devices being interconnected and controllable from across the g...