dc.contributor.author |
Çepik, Hilal
|
|
dc.contributor.author |
Aydın, Ömer
|
|
dc.contributor.author |
Dalkılıç, Gökhan
|
|
dc.date.accessioned |
2021-05-07T12:11:24Z |
|
dc.date.available |
2021-05-07T12:11:24Z |
|
dc.date.issued |
2021-03-02 |
|
dc.identifier.citation |
Çepik, H.; Aydın, Ö.; Dalkılıç, G. (2021). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. Proceedings , 74(1), p.p 1-10. DOI: https://doi.org/10.3390/proceedings2021074001 |
tr_TR |
dc.identifier.uri |
https://www.mdpi.com/2504-3900/74/1/1/pdf |
|
dc.identifier.uri |
https://doi.org/10.3390/ proceedings2021074001 |
|
dc.identifier.uri |
http://hdl.handle.net/20.500.12397/13930 |
|
dc.description |
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared. |
tr_TR |
dc.description.abstract |
With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared. |
tr_TR |
dc.language.iso |
en |
tr_TR |
dc.publisher |
Proceedings |
tr_TR |
dc.rights |
info:eu-repo/semantics/openAccess |
|
dc.subject |
Google Home |
tr_TR |
dc.subject |
Internet of Things |
tr_TR |
dc.subject |
wireless connection |
tr_TR |
dc.subject |
security |
tr_TR |
dc.subject |
privacy |
tr_TR |
dc.subject |
security threats |
tr_TR |
dc.subject |
security attacks |
tr_TR |
dc.subject |
network time protocol |
tr_TR |
dc.subject |
NTP |
tr_TR |
dc.subject |
SNTP |
tr_TR |
dc.subject |
IFTTT |
tr_TR |
dc.subject |
If This Then That |
tr_TR |
dc.subject |
Arduino |
tr_TR |
dc.subject |
Man-in-the-middle |
tr_TR |
dc.subject |
Network Time Protocol |
tr_TR |
dc.subject |
Simple Network Time Protocol |
tr_TR |
dc.title |
Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device |
tr_TR |
dc.type |
Article |
tr_TR |