Insert Your Title Here FirstName Surname† Department Name Institution/University Name City State Country XXXXXXXXXX SMART HOME ROBOT FirstName Surname Department Name Institution/University Name City...

1 answer below »
2nd part of the smart home robot assignment


Insert Your Title Here FirstName Surname† Department Name Institution/University Name City State Country [email protected] SMART HOME ROBOT FirstName Surname Department Name Institution/University Name City State Country [email protected] FirstName Surname Department Name Institution/University Name City State Country [email protected] ABSTRACT Smart home robots can provide specific chores in the home. It provides the capability for interacting and responding to individuals at home. The key integration point includes use of voice control support. This can help in extending controlling robots for providing awareness and functionality. KEYWORDS DDoS attack, Wireless connection, Gateway Software, Local network and Wireless chips ACM REFERENCE FORMAT J. Pierce, 2019. Lamps, Curtains, Robots: 3 scenarios for the future of the smart home. In Proceedings of the 2019 on Creativity and Cognition (pp. 423-424). INTRODUCTION Smart home robot is considered as the other hand and soul of the home system. It provides the owner with some level of empathetic interaction. The control unit and interface provides the capability for controlling the smart home technologies. This provides the ability for predicting the environmental needs of the owner.  REVIEW OF HOW CYBER-ATTACKS HAPPENED TO THE SMART SYSTEM Man-in-the-middle Attacker breaches can disable the vulnerable system. It creates a disastrous scenario for the service provider with the use of affected models. The device can be spoofed and the information can be manipulated easily by hackers.  Data and identity theft The data that is generated can provide a cyber attacker with the ample amount of the target personal information. This can be a potential way for exploiting the fraud information. This can disrupt the service of the host that is connected to the internet.  Device hijacking The attacker can hijack the device and have complete control over the device. This attack is difficult to detect because the attacker does not change the basic functionality for the device.  Distributed Denial of Service DDoS attack is the attempt that can render the machine and network source and it becomes unavailable for the intended user. Under this attack, the incoming traffic is flooded that originates from the source. This makes it easier for hackers to stop the cyber offensive by blocking the single source. SYSTEM ARCHITECTURE Components IoT Device The device includes sensors that can help in monitoring the surrounding environments. It is connected with the software with the use of wireless connection Gateway Software The software is used for connecting with the device on the local network. It provides basic functionality with basic functions for implementation and onboarding the devices.  Smarthome Application It provides a quick way for using computing devices. This can be used for performing multiple functions within the local network Cloud Software This software provides a simple way for applications to create user accounts in accessing the system with the use of a local network.  Internal and external connections The internal connection includes ports that will be used inside the box for the internal connection to the sensor, wireless chips and input device. It is selected for specific wireless standards and sensors. The external connection can be used for continuous data downloads, connecting with another device and firmware updates. It includes use of a USB connection inside the box and it provides the ability for addressing the IoT device.  Key technologies The key technology includes use of sensing technology that consists of basic-resolution cameras and low-range sensors. Along with these sensors, this uses a vision system that can help in achieving greater level of autonomy that can help in accomplishing tasks with better accuracy and faster speed.  VULNERABILITY ANALYSIS AND COUNTERMEASURE Mutual Authentication This process will ensure that the data originated from the legitimate device. It provides the cryptographic algorithm for involving asymmetric and symmetric key that can be used for two-way authentication.  Encryption Protection of the data ensures that the information has a secret decryption key for accessing transmission of data. It provides a process for taking plain text that can help in protecting the confidentiality of the data. It provides a way for scrambling the data to the authorized user for understanding the information. This proceeds in predictable and logical way that allows for receiving the encrypted data with the use of right key. Security monitoring and analysis It can help in capturing the data on the overall state of the system including connectivity traffic and endpoint devices. The data can be analyzed for detecting the possible security violations and potential threats to the device. This ensures that the endpoint devices are secured for data manipulation.  RELATED WORKS AND SUMMARY Smart home robots include the key integration point with voice control support. It provides with the extended control for bringing functionality and awareness to robot. It provides with key feature will help in delivering engagement and activation through the physical movement. ACKNOWLEDGMENTS In the preparation of the assignment, I have taken the guidance and help of respected person that deserve my deepest gratitude. I would like to expand my gratitude to those who have provided direct and indirect guidance in completion of this assignment. REFERENCES [1] C. Lohr, P. Tanguy and Y. Chen, 2017. Plug and play your robot into your smart home: Illustration of a new framework. KI-Künstliche Intelligenz, 31(3), pp.283-289. [2] J. Pierce, 2019. Lamps, Curtains, Robots: 3 scenarios for the future of the smart home. In Proceedings of the 2019 on Creativity and Cognition (pp. 423-424). [3] M. Luria, G. Hoffman and O. Zuckerman, 2017, May. Comparing social robot, screen and voice interfaces for smart-home control. In Proceedings of the 2017 CHI conference on human factors in computing systems (pp. 580-628).
Answered 2 days AfterAug 25, 2021

Answer To: Insert Your Title Here FirstName Surname† Department Name Institution/University Name City State...

Deepti answered on Aug 27 2021
142 Votes
Insert Your Title Here
FirstName Surname† Department Name Institution/University Name City State Country [email protected]
SMART HOME ROBOT
FirstName Surname Department Name Institution/University Name City State Country [email protected]
FirstName Surname Department Name Institution/University Name City State Country [email protected]
ABSTRACT
Smart home robots can provide specific chores in the home. It provides the capability for interacting and responding to individuals at home. The key integration point includes use of voice control support. This can help in extending controlling robots for providing awareness and functionality.

Robots are becoming mainstream in closely interacting with families and households in several ways. However, robot technology is insecure in a variety of ways posing serious threat to the owners and animals that it operates around. This paper describes the key components used in the architecture of a Smart home robot. It further discovers critical vulnerabilities and cybersecurity issues and highlights the countermeasures that can prevent the cyberattacks.
KEYWORDS
DDoS attack, Wireless connection, Gateway Software, Local network and Wireless chips
ACM REFERENCE FORMAT
J. Pierce, 2019. Lamps, Curtains, Robots: 3 scenarios for the future of the smart home. In Proceedings of the 2019 on Creativity and Cognition (pp. 423-424).
INTRODUCTION
Smart home robot is considered as the other hand and soul of the home system. It provides the owner with some level of empathetic interaction. The control unit and interface provides the capability for controlling the smart home technologies. This provides the ability for predicting the environmental needs of the owner. 
The following sections include the elaborate discussion on system architecture of Smart Home Robots, their vulnerabilities and cyberattacks. The main components of the system include IoT Device, gateway software, app, cloud and internal and external connections. The major vulnerability issues include weak authentication, weak default configuration, weak cryptography, insecure communication and privacy issues. Cyberattacks that the system can suffer due to these vulnerabilities include Man in the middle attack, Distributed denial of service attack, device hijacking and data and identity theft. The countermeasures to prevent the cyberattacks are included in the last section.

SYSTEM ARCHITECTURE
Components
IoT Device
The device includes sensors that can help in monitoring the surrounding environments. It is connected with the software with the use of wireless connection
Gateway Software
The software is used for connecting with the device on the local network. It provides basic functionality with basic functions for implementation and onboarding the devices. 
Smarthome Application
It provides a quick way for using computing devices. This can be used for performing multiple functions within the local network
Cloud Software
This software provides a simple way for applications to create user accounts in accessing the system with the use of a local network. 
Internal and external connections
The internal connection includes ports that will be used inside the box for the internal connection to the sensor, wireless chips and input device. It is selected for specific wireless standards and sensors.
The external connection can be used for continuous data downloads, connecting with another device and firmware updates. It includes use of a USB connection inside the box and it provides the ability for addressing the IoT device. 
Key technologies
The key technology includes use of sensing technology that consists of basic-resolution cameras and low-range sensors. Along with these sensors, this uses a vision system that can help in achieving greater level of autonomy that can help in accomplishing tasks with better accuracy and faster speed. 
THREATS, VULNERABILITIES AND ATTACKS
Weak Default Configuration
Smart home robots come with features which can be programmed through robot’s software services. If these features are not securely configured for authorized users or lack password protection, they are susceptible to attacks. Insecure features and features with default passwords are difficult to be protected or disabled. This can enable attacker to abuse the functionality of robot since default passwords are publicly available. System misconfigurations and gaps can also be exploited by attackers to gain access into the robot network and access sensitive information. If the servers and operating systems are not upgraded, the vulnerabilities of the robots can easily be exploited by attackers to carry out attacks and steal valuable information.
These vulnerabilities pose serious threat as it offers an easy point of entry to attackers to exploit the system. Server configurations in enabled state allow attackers to determine the robot system flaws and gives them access to extra information. The threats and attacks on smart home robot are possible due to these vulnerabilities include malware attacks, ransomware and phishing attacks.
Weak or Missing Authorization
Users should be authorized to use any system including robots. If the robot system fails to guard against unauthorized access, the attackers can easily use some features without valid credentials and control the robot from remote location. Services like mobile applications, computer software and internet services can be remotely accessed and thus critical functions like programming of robots, receiving external commands, returning robot information can be exploited.
Network Vulnerability
The servers and equipment become vulnerable if no physical protection and no software protection is in place for the smart home robot through upgrades and patches. Unpatched Operating systems are vulnerable to viruses like malware, social engineering attacks. Malware includes Trojans, worms that can be installed on servers or robot connected to network. Malware can provide remote control to an attacker through infected robot, send spam and steal sensitive data. Social engineering attacks are caused when users unintentionally give away personal information like username and password. This attack involves malicious activities through human interactions. Attackers psychologically manipulate legitimate users into making security mistakes or giving up sensitive...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here