Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users

Yeboah-Ofori, Abel ORCID: https://orcid.org/0000-0001-8055-9274 and Hawsh, Aden (2023) Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users. In: 2023 IEEE International Smart Cities Conference (ISC2), 24-27 September 2023, Bucharest, Romania.

[thumbnail of PDF/A]
Evil Twin Attacks on Smart Home IoT Devices for Visually Impaired Users.pdf - Accepted Version
Available under License Creative Commons Attribution.

Download (982kB) | Preview


Securing the Internet of Things (IoT) devices in a smart home has become inevitable due to the recent surge in the use of smart devices by the visually impaired. The visually impaired users rely heavily on these IoT devices and assistive technologies for guidance, medical usage, mobility help, voice recognition, news feeds and emergency communications. However, cyber attackers are deploying Evil Twin and Man-in-the-middle (MITM) attacks, among others, to penetrate the network, establish rogue Wi-Fi access points and trick victims into connecting to it, leading to interceptions, manipulation, exploitation, compromising the smart devices and taking command and control. The paper aims to explore the Evil Twin attack on smart devices and provide mitigating techniques to improve privacy and trust. The novelty contribution of the paper is three-fold: First, we identify the various IoT device vulnerabilities and attacks. We consider the state-of-the-art IoT cyberattacks on Smart TVs, Smart Door Lock, and cameras. Secondly, we created a virtual environment using Kali Linux (Raspberry Pi) and NetGear r7000 as the home router for our testbed. We deployed an Evil Twin attack to penetrate the network to identify the vulnerable spots on the IoT devices. We consider the Kill Chain attack approach for the attack pattern. Finally, we recommend a security mechanism in a table to improve security, privacy and trust. Our results show how vulnerabilities in smart home appliances are susceptible to attacks. We have recommended mitigation techniques to enhance the security for visually impaired users.

Item Type: Conference or Workshop Item (Paper)
Identifier: 10.1109/ISC257844.2023.10293225
Identifier: 10.1109/ISC257844.2023.10293225
Keywords: Privacy, Virtual environments, Smart homes, Speech recognition, Internet of Things, Security, Object recognition, IoT, Smart Homes, Visually Impaired, Cyber Security, Privacy
Subjects: Computing
Depositing User: Dr Abel Yeboah-Ofori
Date Deposited: 17 Jan 2024 10:00
Last Modified: 17 Jan 2024 10:00
URI: https://repository.uwl.ac.uk/id/eprint/10612


Downloads per month over past year

Actions (login required)

View Item View Item