Difference between revisions of "Cyber Security of Social Robots and the Internet of Things"
From REU@MU
(→Milestones) |
(→Milestones) |
||
(14 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
* Brainstorm and research the literature on security threats and vulnerabilities pertaining to such IoT systems. Focus on those that are specific to systems including personal assistants. | * Brainstorm and research the literature on security threats and vulnerabilities pertaining to such IoT systems. Focus on those that are specific to systems including personal assistants. | ||
* Outline possible ways to protect from at least one such threat/vulnerability. | * Outline possible ways to protect from at least one such threat/vulnerability. | ||
+ | * Exploit at least one of the system's possible threats/vulnerabilities | ||
* Interact with Google Home; record voice commands and responses; comment on usability. | * Interact with Google Home; record voice commands and responses; comment on usability. | ||
==Milestones== | ==Milestones== | ||
{| class="wikitable" | {| class="wikitable" | ||
+ | |- | ||
+ | |Week || Description || Status | ||
|- | |- | ||
!Week 1 - Orientation and Research General Topics | !Week 1 - Orientation and Research General Topics | ||
− | | | + | | |
− | + | * Go through orientation and get set up in lab | |
+ | * Research general topics such as networking layers and different IoT architectures; learn about the sensors and microcontrollers that will be used in this project | ||
+ | |Complete | ||
|- | |- | ||
− | + | !Week 2 - Start Learning Latex and Further Research into Different IoT Architectures | |
− | Week 2 - Start Learning Latex and Further Research into Different IoT Architectures | + | | |
− | + | * Decide on the IoT software architecture we want to use for our project, at least to start with, while keeping the cybersecurity ramifications in mind | |
− | + | * Start learning Latex and adding research papers to bibliography | |
− | + | * Set up Google Home | |
− | + | |Complete | |
− | Week 3 - Write the code for one microcontroller and sensor setup | + | |- |
− | + | !Week 3 - Write the code for one microcontroller and sensor setup | |
− | + | | | |
− | + | * Learn how to create a network connection between this microcontroller and another device (e.g. laptop) that belongs to the same Wifi network | |
− | Week 4 - | + | * Connect to a third party, free cloud |
− | + | |Complete | |
− | + | |- | |
− | + | !Week 4 - Work on find some Cybersecurity Vulnerabilities with the Social Robot | |
− | Week 5 - | + | | |
− | + | * Create appropriate network connections to the cloud and/or to devices in the same Wifi network | |
− | Week 6 - If everything is complete by this point, add the robot to the system. | + | * Work on presentation |
− | + | * Start working on robot | |
− | Week 7 - Brainstorm and research the security vulnerabilities of the system; try to compromise the system. | + | |Complete |
− | + | |- | |
− | Week 8 - Continue work on compromising and protecting the system; start writing research paper | + | !Week 5 - Work on Microsoft Cognitive Vision and Presentation |
− | + | | | |
− | Week 9 - Continue work from previous two weeks; create poster. | + | |Complete |
− | + | |- | |
− | Week 10 - Finish research paper and poster | + | !Week 6 - If everything is complete by this point, add the robot to the system. |
+ | | | ||
+ | |Complete | ||
+ | |- | ||
+ | !Week 7 - Brainstorm and research the security vulnerabilities of the system; try to compromise the system. | ||
+ | | | ||
+ | |Complete | ||
+ | |- | ||
+ | !Week 8 - Continue work on compromising and protecting the system; start writing research paper | ||
+ | | | ||
+ | |Complete | ||
+ | |- | ||
+ | !Week 9 - Continue work from previous two weeks; create poster. | ||
+ | | | ||
+ | |Complete | ||
+ | |- | ||
+ | !Week 10 - Finish research paper and poster | ||
+ | | | ||
+ | |Complete | ||
+ | |- | ||
+ | |} |
Latest revision as of 22:13, 3 August 2017
Researcher: Matthew Kinzler Mentor: Dr. Debbie Perouli
Goals
- Learn about common practices developers use to build an Internet of Things (IoT) system where some action is taken based on sensor data.
- Learn how to setup and program at least one personal assistant or social robot (such as Google Home or the JD Humanoid from EZ Robots)
- Design and develop an IoT system that includes at least one sensor producing data that is sent to a personal assistant. The data will either be communicated directly or through a cloud connection.
- Brainstorm and research the literature on security threats and vulnerabilities pertaining to such IoT systems. Focus on those that are specific to systems including personal assistants.
- Outline possible ways to protect from at least one such threat/vulnerability.
- Exploit at least one of the system's possible threats/vulnerabilities
- Interact with Google Home; record voice commands and responses; comment on usability.
Milestones
Week | Description | Status |
Week 1 - Orientation and Research General Topics |
|
Complete |
---|---|---|
Week 2 - Start Learning Latex and Further Research into Different IoT Architectures |
|
Complete |
Week 3 - Write the code for one microcontroller and sensor setup |
|
Complete |
Week 4 - Work on find some Cybersecurity Vulnerabilities with the Social Robot |
|
Complete |
Week 5 - Work on Microsoft Cognitive Vision and Presentation | Complete | |
Week 6 - If everything is complete by this point, add the robot to the system. | Complete | |
Week 7 - Brainstorm and research the security vulnerabilities of the system; try to compromise the system. | Complete | |
Week 8 - Continue work on compromising and protecting the system; start writing research paper | Complete | |
Week 9 - Continue work from previous two weeks; create poster. | Complete | |
Week 10 - Finish research paper and poster | Complete |