Smart Home, It's Vulnerability Assessment Through Penetration Testing

Authors

  • Kranthi Kondru Department of EEE, Usha Rama College of Engineering and Technology, Telaprolu, Andhra Pradesh, India
  • Purnima Kancharla UG Student, dept. of EEE Usha Rama College Of Engineering And College
  • Manikanta Darlanka Department of EEE, Usha Rama College of Engineering and Technology, Telaprolu, Andhra Pradesh, India
  • Bhuvan Chandu Sathuluri Department of EEE, Usha Rama College of Engineering and Technology, Telaprolu, Andhra Pradesh, India

DOI:

https://doi.org/10.54060/a2zjournals.jieee.126

Keywords:

Smart home, Penetration Testing, Vulnerability Assessment, Kali Linux

Abstract

Smart home systems, driven by IoT technologies, offer automation and remote control of household devices but also introduce significant security risks. This project develops a smart home prototype using Arduino Uno, ESP32, and relays to simulate common automation features. The goal is to assess system vulnerabilities through penetration testing techniques. Various security weaknesses were identified using Kali Linux tools like Nmap, Wireshark, and Metasploit, including insecure communication and poor authentication. The study highlights the importance of proactive testing and proposes mitigation strategies to enhance smart home security. This research emphasizes the need for integrating cybersecurity practices in smart home development to prevent potential threats and ensure a secure IoT environment.

Downloads

Download data is not yet available.

References

N. Raut, S. Samaila Kasimu Ahmad, V. K. Nagarkar, C. S. Satya Prasad, and N. Long, “The Role of Smart Home Tech-nologies in Promoting Sustainable Lifestyles: Marketing Innovations for Eco-Friendly Con-sumer Behavior,” in 2025 First International Conference on Advances in Computer Science, Electrical, Electronics, and Communication Technol-ogies (CE2CT), pp. 873–878, 2025.

B. D. Davis, J. C. Mason, and M. Anwar, “Vulnerability studies and security postures of IoT devices: A smart home case study,” IEEE Internet Things J., vol. 7, no. 10, pp. 10102–10110, 2020, doi: 10.1109/JIOT.2020.2983983.

G. Chu and A. Lisitsa, “Penetration testing for internet of things and its automation,” in 2018 IEEE 20th Interna-tional Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), 2018, doi: 10.1109/HPCC/SmartCity/DSS.2018.00244.

N. Moustafa, B. Turnbull, and K.-K. R. Choo, “Towards automation of vulnerability and exploitation identification in IIoT networks,” in 2018 IEEE International Conference on Industrial Internet (ICII), pp. 139-145, 2018, doi: 10.1109/ICII.2018.00023

A. B. H. Nazarudin, S. Yogarayan, S. F. A. Razak, M. F. A. Abdullah, A. Azman, and D. Kumar, “Comprehensive Re-view of Penetration Testing Approaches on Internet of Things (IoT) Devices,” in 2024 International Conference on Intelligent Cybernetics Technology & Applications (ICICyTA), Bali, Indonesia, pp. 1060–1065, 2024, doi: 10.1109/ICICYTA64807.2024.10913269.

A. Fayoumi, S. Sobati-Moghadam, A. Rajaiyan, C. Oxley, P. F. Montero, and A. Dahmani, “The Cybersecurity Risks of Using Internet of Things (IoT) and Surveys of End-Users and Providers Within the Domiciliary Care Sector,” in 2022 Sixth International Conference on Smart Cities, Internet of Things and Applications (SCIoT), Mashhad, Iran, Islamic Republic, pp. 1–7, 2022, doi: 10.1109/SCIoT56583.2022.9953634.

N. A. Khan, A. Awang, and S. A. A. Karim, “Security in internet of things: A review,” IEEE Access, vol. 10, pp. 104649–104670, 2022, doi: 10.1109/ACCESS.2022.3209355

N. M. Allifah and I. A. Zualkernan, “Ranking security of IoT-based smart home consumer devices,” IEEE Access, vol. 10, pp. 18352–18369, 2022, doi: 10.1109/ACCESS.2022.3148140.

E. Anthi, L. Williams, M. Slowinska, G. Theodorakopoulos, and P. Burnap, “A supervised intrusion detection system for smart home IoT devices,” IEEE Internet Things J., vol. 6, no. 5, pp. 9042–9053, 2019, doi: 10.1109/JIOT.2019.2926365.

A. Chakraborty and A. Kc, “Penetration testing IoT devices to discover critical vulnerabilities,” in 2024 2nd Interna-tional Conference on Recent Advances in Information Technology for Sustainable Development (ICRAIS), Manipal, In-dia, pp. 54–59, 2024, doi: 10.1109/ICRAIS62903.2024.10811719

A. Bazilah Husna Nazarudin, S. Yogarayan, S. F. A. Razak, M. Fikri Azli Abdullah, A. Azman, and D. Kumar, “2024 In-ternational Conference on Intelligent Cybernetics Technology & Applications (ICICyTA),” pp. 1060–1065, 2024.

Downloads

Published

2025-04-25

How to Cite

[1]
Kranthi Kondru, P. Kancharla, Manikanta Darlanka, and Bhuvan Chandu Sathuluri, “Smart Home, It’s Vulnerability Assessment Through Penetration Testing”, J. Infor. Electr. Electron. Eng., vol. 6, no. 1, pp. 1–7, Apr. 2025.

CITATION COUNT

Issue

Section

Research Article

Categories