DSpace Repository

Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device

Show simple item record

dc.contributor.author Çepik, Hilal
dc.contributor.author Aydın, Ömer
dc.contributor.author Dalkılıç, Gökhan
dc.date.accessioned 2021-05-07T12:11:24Z
dc.date.available 2021-05-07T12:11:24Z
dc.date.issued 2021-03-02
dc.identifier.citation Çepik, H.; Aydın, Ö.; Dalkılıç, G. (2021). Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. Proceedings , 74(1), p.p 1-10. DOI: https://doi.org/10.3390/proceedings2021074001 tr_TR
dc.identifier.uri https://www.mdpi.com/2504-3900/74/1/1/pdf
dc.identifier.uri https://doi.org/10.3390/ proceedings2021074001
dc.identifier.uri http://hdl.handle.net/20.500.12397/13930
dc.description With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared. tr_TR
dc.description.abstract With virtual assistants, both changes and serious conveniences are provided in human life. For this reason, the use of virtual assistants is increasing. The virtual assistant software has started to be produced as separate devices as well as working on phones, tablets, and computer systems. Google Home is one of these devices. Google Home can work integrated with smart home systems and various Internet of Things devices. The security of these systems is an important issue. As a result of attackers taking over these systems, very serious problems may occur. It is very important to take the necessary actions to detect these problems and to take the necessary measures to prevent possible attacks. The purpose of this study is to test whether an attack that attackers can make to these systems via network time protocol will be successful or not. Accordingly, it has been tried to attack the wireless connection established between Google Home and an Internet of Things device over the network time protocol. Attack results have been shared. tr_TR
dc.language.iso en tr_TR
dc.publisher Proceedings tr_TR
dc.rights info:eu-repo/semantics/openAccess
dc.subject Google Home tr_TR
dc.subject Internet of Things tr_TR
dc.subject wireless connection tr_TR
dc.subject security tr_TR
dc.subject privacy tr_TR
dc.subject security threats tr_TR
dc.subject security attacks tr_TR
dc.subject network time protocol tr_TR
dc.subject NTP tr_TR
dc.subject SNTP tr_TR
dc.subject IFTTT tr_TR
dc.subject If This Then That tr_TR
dc.subject Arduino tr_TR
dc.subject Man-in-the-middle tr_TR
dc.subject Network Time Protocol tr_TR
dc.subject Simple Network Time Protocol tr_TR
dc.title Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device tr_TR
dc.type Article tr_TR


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search DSpace


Advanced Search

Browse

My Account