IEEE/ICACT20220314 Slide.11        [Big Slide]       [YouTube] Oral Presentation
in the following picture. We have used the TCP, UDP, ICMP, and ARP filters for the Wireshark packet captures. We have a router for the wireless connection towards the IoT devices. The IoT devices are a smart socket, plug, phone, watch, and cameras, and the mini-hub. And we have used raspberry-pi for the simulation of the MQTT broker and we have the end-user devices and in these end-user devices, we have installed a deliberately vulnerable machine. And also, we have installed the sensors such as sensors for the door and the sensor for the light. You can see here that we have one attacking machine which is using the Kali Linux operating system in order to launch different attacks.

[Go to Next Slide]
Select Voice: