Using IoT Devices to Implement Home?Security

Using IoT Devices to Implement Home?Security


Introduction

In today’s interconnected world, enhancing physical security through IoT devices offers a dynamic blend of convenience and robust protection. This lab exercise demonstrates how to integrate various IoT devices?—?such as a siren, doors, motion sensor, and webcam?—?into a comprehensive home security system. Using Packet Tracer, we will connect these devices to a secure wireless network, configure MAC address filtering to ensure only authorized devices can access the network, and register each device with a remote monitoring server. Through hands-on configuration and testing, this lab provides practical insights into how IoT technology can be leveraged to monitor, control, and protect your home environment effectively.

Objectives Part 1: Connect IoT Devices to the Network

Part 2: Add IoT Devices to the Registration Server

Part 3: Explore IoT Security Device Functionality

Background / Scenario In an attempt to increase the physical security of your home, you have decided to install some Internet of Things (IoT) devices to allow you to remotely monitor your home while you are away. In this lab, we will install an IoT device to enhance home security. we will then configure all the IoT devices to connect to the wireless network and communicate with a remote IoT registration server.

Instructions Part 1: Connect IoT Devices to the Network In this part, we will connect IoT devices to the wireless network and implement MAC address filtering.

Step 1: Connect the Siren to the Door a. Locate the Siren and Doors.

b. In the toolbar at the bottom, click Connections > IoT Custom Cable, which is the second to last option.

c. Click Siren > DO interface,and then click Doors > DO interface.

d. Press and hold the ALT key and then click the door to open and close it. Notice that opening the door will now activate the siren.

Opened Door
Closed Door

Step 2: Associate all IoT Devices to HomeNet wireless network. The Wireless Router is pre-configured to use WPA2-PSK and MAC Address filtering to control who can associate with the network and which devices can use the network to transfer traffic. All new devices must conform to the current configuration.

a. Locate the four wireless IoT devices:

Siren

Doors

Motion_Sensor

Webcam

b. Click Siren, and then Config tab> Wireless0.

c. Configure the SSID and Authentication mode.

SSID: HomeNet

Authentication: WPA2-PSK

Pass Phrase: ciscorocks

d. In IP Configuration, click DHCP. Verify the device received an IP address from the 192.168.0.0/24 network.

Note: It may be necessary to toggle between Static and DHCP to force Packet Tracer to converge on your settings.

e. Record the MAC address for the IoT device. Format the addresses with colons between each two hexadecimal numbers instead of a period between each four hexadecimal numbers. This format is required for the next step when you will apply MAC address filtering.

Siren MAC address: 00:90:2B:C8:C6:E2

Doors MAC address: 00:0A:F3:DB:2E:37

Motion_Sensor MAC address: 00:40:0B:39:21:24

Webcam MAC address: 00:D0:58:D1:C4:11

f. Repeat these steps for each IoT device.

Step 3: Configure MAC address filtering to allow the IoT devices. a. Click Desktop PC > Desktop tab> Web Browser.

b. Login to the Wireless Router at 192.168.0.1. Use admin as both the username and password.

c. Click Wireless Router > GUI tab.

d. Click Wireless, and then Wireless MAC Filter.

e. Verify that the filter is enabled for the 2.4 GHz wireless port and that it is set to permit PCs to access the wireless network.

f. Add the four IoT device MAC addresses to the table.

g. Scroll to the bottom and click Save Settings.

h. The Wireless Router will reboot. Close the Web Browser, and then click IP Configuration. If necessary, toggle the DHCP and Static buttons to renew the IP configuration so that Desktop PC has an IP address from the 192.168.0.0/24 network.

Part 2: Add IoT Devices to the Registration Server In this part, we will sign up for an account with a IoT remote monitoring service. We will then register the IoT devices to communicate with the service. This will allow us to remotely monitor the IoT devices through a web portal.

Step 1: Create an account on the ISP IoT Registration Server. a. On Desktop PC > Desktop tab> Web Browser.

b. Navigate to https://10.3.0.125.

c. Click Sign up now and create a new account with username HomeUser and password Pa$$w0rd.

Step 2: Register each IoT device with the Registration Server Each of the four IoT devices must be registered with a registration server to remotely monitor and manage the device. Repeat the following steps for each IoT device.

a. Click the device > Config tab > Settings under GLOBAL.

b. Scroll to the IoT section at the bottom of the page and enter the following information:

Select Remote Server

Server Address: 10.3.0.125

User Name: HomeUser

Password: Pa$$w0rd

c. Click Connect button. The button will change to Connecting and then to Refresh in a few seconds. The IoT device is now registered with the server.

Note: If it does not change to Refresh then you may have entered the information incorrectly. Therefore, re-enter the information and repeat this step.

d. Repeat the above steps to register all the IoT devices.

Step 3: Verify all devices are registered. a. Return to the Web Browser on the Desktop PC. If necessary, browse to 10.3.0.125 and login with username HomeUser and password Pa$$w0rd.

b. Verify all four IoT devices are registered on the server.

Server list

Part 3: Explore IoT Security Device Functionality In this part, you will explore the functionality of the IoT devices and monitor their states on the IoT Registration Server.

Step 1: Observe and control IoT devices from the registration server. a. From the Web Browser on the Desktop PC, click each section for each IoT device to display device details.

IoT Device status

What is the status of each device? All devices is showing “On” indicating they have an active connection to the IoT registration server.

b. Click the red rectangle under Doors to activate it.

What happened? The siren and door rectangles simultaneously changed to green indicating that they are now active. This also confirms that they are linked. In the living room, the door is open and the siren is red.

c. Click the door rectangle again to deactivate the device.

What happened? The siren and door rectangles simultaneously turned red indicating that they are no longer active.

Reflection Questions 1. What advantages do IoT enabled devices provide for home security?

IoT devices are easy to install and configure. They can also make use of existing home network security techniques to enhance their security.

2. What is the advantage of using a registration server for IoT enabled devices?

The registration server allows IoT devices to be remotely monitored and controlled. This allowed for video surveillance and monitoring of important services from remote locations.

3. What types of IoT enabled devices are used for home security?

Fire alarms, video monitoring devices, entry alarms, motion sensors, water sensors, device monitoring, etc.

Conclusion

Upon completing this lab, you have successfully established a secure IoT framework to enhance home security. The process involved connecting IoT devices to the network, implementing MAC address filtering for added security, and registering each device with a remote server for centralized monitoring. By exploring these devices' functionality, you have verified their connectivity and operational status and gained valuable insights into the advantages of IoT-enabled home security systems. This exercise underscores the importance of secure integration and remote management in modern security solutions, empowering you to build more resilient and responsive ph

要查看或添加评论,请登录

John Eberechukwunemerem, BSc.的更多文章

  • Hardening Wireless Router?Security

    Hardening Wireless Router?Security

    Introduction: In this lab exercise, we use Packet Tracer to simulate the configuration and hardening of a wireless…

  • INCIDENT RESPONSE DOCUMENTATION

    INCIDENT RESPONSE DOCUMENTATION

    Introduction Developing comprehensive incident response documentation is a fundamental practice for any cybersecurity…

  • Documenting Business Cybersecurity Issues

    Documenting Business Cybersecurity Issues

    Documenting Business Cybersecurity Issues Objectives: Part 1: Record your assessment of Athena’s cybersecurity issues…

  • Recommend Endpoint Security Measures

    Recommend Endpoint Security Measures

    In this lab, you will meet the following objectives: Objectives Part 1: Recommend Mitigation Procedures to Address…

  • Password Recovery and Hardening

    Password Recovery and Hardening

    Password Recovering and Hardening In this lab, we will use a tool to recover user passwords and change a user password…

  • Lab?-?Harden a Linux?System

    Lab?-?Harden a Linux?System

    In this lab, we will use a security auditing tool to discover system vulnerabilities and implement recommended…

  • UNDERSTANDING SOCIAL ENGINEERING:

    UNDERSTANDING SOCIAL ENGINEERING:

    Social engineering is on the rise in Nigeria, with the nation's growing presence in the digital economy adding a layer…

  • Ethical Hacking: Understanding the Spectrum of Hackers

    Ethical Hacking: Understanding the Spectrum of Hackers

    In the intricate realm of cybersecurity, ethical hacking emerges as a crucial tool in fortifying digital defenses…

    1 条评论
  • Understanding Malware and How to Stay Safe

    Understanding Malware and How to Stay Safe

    Malware is like a sneaky bad guy for your computer or phone. It is a short word for "Malicious Software," which means…

  • Perseverance is the key to success

    Perseverance is the key to success

    The weight of the world seemed to rest squarely on my shoulders as I trudged through another mundane day. At 25, I…