Using IoT Devices to Implement Home?Security
John Eberechukwunemerem, BSc.
IT Security Manager, || Oracle Cloud Certified || Cybersecurity Analyst, || Cloud Admin, || InfoSec Researcher, || Cybersecurity Consultant,||
Introduction
In today’s interconnected world, enhancing physical security through IoT devices offers a dynamic blend of convenience and robust protection. This lab exercise demonstrates how to integrate various IoT devices?—?such as a siren, doors, motion sensor, and webcam?—?into a comprehensive home security system. Using Packet Tracer, we will connect these devices to a secure wireless network, configure MAC address filtering to ensure only authorized devices can access the network, and register each device with a remote monitoring server. Through hands-on configuration and testing, this lab provides practical insights into how IoT technology can be leveraged to monitor, control, and protect your home environment effectively.
Objectives Part 1: Connect IoT Devices to the Network
Part 2: Add IoT Devices to the Registration Server
Part 3: Explore IoT Security Device Functionality
Background / Scenario In an attempt to increase the physical security of your home, you have decided to install some Internet of Things (IoT) devices to allow you to remotely monitor your home while you are away. In this lab, we will install an IoT device to enhance home security. we will then configure all the IoT devices to connect to the wireless network and communicate with a remote IoT registration server.
Instructions Part 1: Connect IoT Devices to the Network In this part, we will connect IoT devices to the wireless network and implement MAC address filtering.
Step 1: Connect the Siren to the Door a. Locate the Siren and Doors.
b. In the toolbar at the bottom, click Connections > IoT Custom Cable, which is the second to last option.
c. Click Siren > DO interface,and then click Doors > DO interface.
d. Press and hold the ALT key and then click the door to open and close it. Notice that opening the door will now activate the siren.
Step 2: Associate all IoT Devices to HomeNet wireless network. The Wireless Router is pre-configured to use WPA2-PSK and MAC Address filtering to control who can associate with the network and which devices can use the network to transfer traffic. All new devices must conform to the current configuration.
a. Locate the four wireless IoT devices:
Siren
Doors
Motion_Sensor
Webcam
b. Click Siren, and then Config tab> Wireless0.
c. Configure the SSID and Authentication mode.
SSID: HomeNet
Authentication: WPA2-PSK
Pass Phrase: ciscorocks
d. In IP Configuration, click DHCP. Verify the device received an IP address from the 192.168.0.0/24 network.
Note: It may be necessary to toggle between Static and DHCP to force Packet Tracer to converge on your settings.
e. Record the MAC address for the IoT device. Format the addresses with colons between each two hexadecimal numbers instead of a period between each four hexadecimal numbers. This format is required for the next step when you will apply MAC address filtering.
Siren MAC address: 00:90:2B:C8:C6:E2
Doors MAC address: 00:0A:F3:DB:2E:37
Motion_Sensor MAC address: 00:40:0B:39:21:24
Webcam MAC address: 00:D0:58:D1:C4:11
f. Repeat these steps for each IoT device.
Step 3: Configure MAC address filtering to allow the IoT devices. a. Click Desktop PC > Desktop tab> Web Browser.
b. Login to the Wireless Router at 192.168.0.1. Use admin as both the username and password.
c. Click Wireless Router > GUI tab.
d. Click Wireless, and then Wireless MAC Filter.
e. Verify that the filter is enabled for the 2.4 GHz wireless port and that it is set to permit PCs to access the wireless network.
f. Add the four IoT device MAC addresses to the table.
g. Scroll to the bottom and click Save Settings.
h. The Wireless Router will reboot. Close the Web Browser, and then click IP Configuration. If necessary, toggle the DHCP and Static buttons to renew the IP configuration so that Desktop PC has an IP address from the 192.168.0.0/24 network.
Part 2: Add IoT Devices to the Registration Server In this part, we will sign up for an account with a IoT remote monitoring service. We will then register the IoT devices to communicate with the service. This will allow us to remotely monitor the IoT devices through a web portal.
Step 1: Create an account on the ISP IoT Registration Server. a. On Desktop PC > Desktop tab> Web Browser.
b. Navigate to https://10.3.0.125.
c. Click Sign up now and create a new account with username HomeUser and password Pa$$w0rd.
Step 2: Register each IoT device with the Registration Server Each of the four IoT devices must be registered with a registration server to remotely monitor and manage the device. Repeat the following steps for each IoT device.
a. Click the device > Config tab > Settings under GLOBAL.
b. Scroll to the IoT section at the bottom of the page and enter the following information:
Select Remote Server
Server Address: 10.3.0.125
User Name: HomeUser
Password: Pa$$w0rd
c. Click Connect button. The button will change to Connecting and then to Refresh in a few seconds. The IoT device is now registered with the server.
Note: If it does not change to Refresh then you may have entered the information incorrectly. Therefore, re-enter the information and repeat this step.
d. Repeat the above steps to register all the IoT devices.
Step 3: Verify all devices are registered. a. Return to the Web Browser on the Desktop PC. If necessary, browse to 10.3.0.125 and login with username HomeUser and password Pa$$w0rd.
b. Verify all four IoT devices are registered on the server.
Part 3: Explore IoT Security Device Functionality In this part, you will explore the functionality of the IoT devices and monitor their states on the IoT Registration Server.
Step 1: Observe and control IoT devices from the registration server. a. From the Web Browser on the Desktop PC, click each section for each IoT device to display device details.
What is the status of each device? All devices is showing “On” indicating they have an active connection to the IoT registration server.
b. Click the red rectangle under Doors to activate it.
What happened? The siren and door rectangles simultaneously changed to green indicating that they are now active. This also confirms that they are linked. In the living room, the door is open and the siren is red.
c. Click the door rectangle again to deactivate the device.
What happened? The siren and door rectangles simultaneously turned red indicating that they are no longer active.
Reflection Questions 1. What advantages do IoT enabled devices provide for home security?
IoT devices are easy to install and configure. They can also make use of existing home network security techniques to enhance their security.
2. What is the advantage of using a registration server for IoT enabled devices?
The registration server allows IoT devices to be remotely monitored and controlled. This allowed for video surveillance and monitoring of important services from remote locations.
3. What types of IoT enabled devices are used for home security?
Fire alarms, video monitoring devices, entry alarms, motion sensors, water sensors, device monitoring, etc.
Conclusion
Upon completing this lab, you have successfully established a secure IoT framework to enhance home security. The process involved connecting IoT devices to the network, implementing MAC address filtering for added security, and registering each device with a remote server for centralized monitoring. By exploring these devices' functionality, you have verified their connectivity and operational status and gained valuable insights into the advantages of IoT-enabled home security systems. This exercise underscores the importance of secure integration and remote management in modern security solutions, empowering you to build more resilient and responsive ph