Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

PUCIT

Punjab University College of Information Technology

Final Project Proposal


TABLE OF CONTENTS

FINAL PROJECT PROPOSAL GUIDE.....................................................................................................2


1.1 PROJECT TITLE.........................................................................................................................................................................3
1.2 PROJECT OVERVIEW STATEMENT.....................................................................................................................................3
1.3 PROJECT GOALS & OBJECTIVES........................................................................................................................................3
1.4 Project Success Criteria........................................................................................................................................................4
1.5 Tools and technologies used with reasoning.........................................................................................4
➢ Project Title
Threats and vulnerabilities in IoT systems for Smart Home Environment.

➢ Project Overview Statement


We will be demonstrating the pentesting of the IoT devices in a silmulated and controlled environment.
Our task is to provide with a report containing all the vulnerabilities, their methodologies and their
counter measures.

➢ Project Goals & Objectives


Smart homes have become popular because of IoT devices that can improve the quality of life of
individuals. However, Internet-connected nature raises new concerns as private data becomes
accessible, often without the owner's awareness. Any system with the features of remote management,
and wireless communication medium is always susceptible to security issues. And IoT devices are the
weakest link in this environment. It is said that the level of security is the same as the Security of the
weakest link. Without security for IoT devices, any connected object can be hacked. Once hackers gain
control, they can exfiltrate the user's digital data. So, the purpose of this project is to research, design,
and develop a method to identify the threats and vulnerabilities in the smart home environment based
on IoT devices.
Project Title: : Threats and vulnerabilities in IoT systems for Smart Home Environment.

Group Leader: Hurara Israr (BSCSF19A511)

Name Roll # Email Address Signature


Abdullah Kaleem BCSF19A538 Bcsf19a538@pucit.edu.pk
Sandhu
Tanzeel ur Rehman BCSF19A516 Bcsf19a516@pucit.edu.pk

Ahmed Ghani BCSF19A532 Bcsf19a532@pucit.edu.pk

Hurara Israr BCSF19A511 Bcsf19a511@pucit.edu.pk


Project Goal:

Design and develop a testing method to identify the threat actors in our

network.

Objectives:
Sr.# Objectives
1 To research different IoT-based smart home environments

2 To research the literature on security challenges faced by smart


home systems
3 To conduct data analysis to identify the vulnerabilities of IoT-based
smart home systems.
4 To reflect on the outcomes, and challenges, and suggest
future research in this field.
Project Success criteria: We will do a complete pentest and provide a report with all
the vulnerabilities, their methodologies and also provide their counter measures.

Assumptions:
 The IoT devices should be in the same network as the attacker.
 There is no firewall or IDS/IPS implemented on the network.

Risks and Obstacles


 Failure to communicate with the IoT device.
 Failure to simulate a controlled environment for the IoT.

Organization Address: Punjab University – Faculty of Computer and Information


Technology (Quaid-e-Azam Campus), Near Suparco, Samsani Road, Lahore, Punjab,
Pakistan.

Type of project: Research & Development

Suggested Project Supervisor: Dr. Shahid Farid

Approved By:

Date: 2nd October 2023

 Tools and technologies used with reasoning

Tools Reason for Use


IoT GOAT.vmdk To simulate the IoT network
Kali/Ubuntu Attacker Machine

You might also like