Difference between revisions of "Cyber Security of Social Robots and the Internet of Things"

From REU@MU
Jump to: navigation, search
(Milestones)
(Milestones)
 
(19 intermediate revisions by the same user not shown)
Line 2: Line 2:
 
Mentor: [http://www.marquette.edu/mscs/facstaff-perouli.shtml Dr. Debbie Perouli]
 
Mentor: [http://www.marquette.edu/mscs/facstaff-perouli.shtml Dr. Debbie Perouli]
  
 +
==Goals==
 +
*          Learn about common practices developers use to build an Internet of Things (IoT) system where some action is taken based on sensor data.
 +
*          Learn how to setup and program at least one personal assistant or social robot (such as Google Home or the JD Humanoid from EZ Robots)
 +
*          Design and develop an IoT system that includes at least one sensor producing data that is sent to a personal assistant. The data will either be communicated directly or through a cloud connection.
 +
*          Brainstorm and research the literature on security threats and vulnerabilities pertaining to such IoT systems. Focus on those that are specific to systems including personal assistants.
 +
*          Outline possible ways to protect from at least one such threat/vulnerability.
 +
*          Exploit at least one of the system's possible threats/vulnerabilities
 +
*          Interact with Google Home; record voice commands and responses; comment on usability.
 +
 
==Milestones==
 
==Milestones==
''Week 1 - Orientation and Research General Topics''
+
{| class="wikitable"
* Go through orientation and get set up in lab
+
|-
* Research general topics such as networking layers, different IoT architectures, and learn about the sensors and microcontrollers that will be used in this project
+
|Week || Description || Status
 
+
|-
''Week 2 - Start learning Latex, Research more into different IoT architectures, and figure out the layers used in this system''
+
!Week 1 - Orientation and Research General Topics
* Figure out the architecture we want to use for our project, at least to start with while keeping the cybersecurity ramifications in mind
+
|
* Start to learn Latex and add research papers to bibliography
+
* Go through orientation and get set up in lab  
 +
* Research general topics such as networking layers and different IoT architectures; learn about the sensors and microcontrollers that will be used in this project
 +
|Complete
 +
|-
 +
!Week 2 - Start Learning Latex and Further Research into Different IoT Architectures
 +
|         
 +
* Decide on the IoT software architecture we want to use for our project, at least to start with, while keeping the cybersecurity ramifications in mind
 +
* Start learning Latex and adding research papers to bibliography
 
* Set up Google Home
 
* Set up Google Home
 
+
|Complete
''Week 3 - Write the code for one microcontroller and sensor setup and connect to cloud''
+
|-
 
+
!Week 3 - Write the code for one microcontroller and sensor setup
''Week 4 - Write the code for the other microcontroller and sensor setup and connect that to the cloud, work on presentation''
+
|   
 
+
* Learn how to create a network connection between this microcontroller and another device (e.g. laptop) that belongs to the same Wifi network
''Week 5 - Connect Google Home to the system''
+
* Connect to a third party, free cloud
 
+
|Complete
''Week 6 - If everything is complete by this point, research the security vulnerabilities of the system and work on adding the robot''
+
|-
 
+
!Week 4 - Work on find some Cybersecurity Vulnerabilities with the Social Robot
''Week 7- Research the security vulnerabilities of the system and try to compromise the system''
+
|
 
+
* Create appropriate network connections to the cloud and/or to devices in the same Wifi network
''Week 8-Research the security vulnerabilities and try to compromise the system, also start writing research paper''
+
* Work on presentation
 
+
* Start working on robot
''Week 9 - Research security vulnerabilities, write research paper, and create poster''
+
|Complete
 
+
|-
''Week 10 - Finish Research paper and poster''
+
!Week 5 - Work on Microsoft Cognitive Vision and Presentation
 +
|
 +
|Complete
 +
|-
 +
!Week 6 - If everything is complete by this point, add the robot to the system.
 +
|
 +
|Complete
 +
|-
 +
!Week 7 - Brainstorm and research the security vulnerabilities of the system; try to compromise the system.
 +
|
 +
|Complete
 +
|-
 +
!Week 8 - Continue work on compromising and protecting the system; start writing research paper
 +
|
 +
|Complete
 +
|-
 +
!Week 9 - Continue work from previous two weeks; create poster.
 +
|
 +
|Complete
 +
|-
 +
!Week 10 - Finish research paper and poster
 +
|
 +
|Complete
 +
|-
 +
|}

Latest revision as of 22:13, 3 August 2017

Researcher: Matthew Kinzler Mentor: Dr. Debbie Perouli

Goals

  • Learn about common practices developers use to build an Internet of Things (IoT) system where some action is taken based on sensor data.
  • Learn how to setup and program at least one personal assistant or social robot (such as Google Home or the JD Humanoid from EZ Robots)
  • Design and develop an IoT system that includes at least one sensor producing data that is sent to a personal assistant. The data will either be communicated directly or through a cloud connection.
  • Brainstorm and research the literature on security threats and vulnerabilities pertaining to such IoT systems. Focus on those that are specific to systems including personal assistants.
  • Outline possible ways to protect from at least one such threat/vulnerability.
  • Exploit at least one of the system's possible threats/vulnerabilities
  • Interact with Google Home; record voice commands and responses; comment on usability.

Milestones

Week Description Status
Week 1 - Orientation and Research General Topics
  • Go through orientation and get set up in lab
  • Research general topics such as networking layers and different IoT architectures; learn about the sensors and microcontrollers that will be used in this project
Complete
Week 2 - Start Learning Latex and Further Research into Different IoT Architectures
  • Decide on the IoT software architecture we want to use for our project, at least to start with, while keeping the cybersecurity ramifications in mind
  • Start learning Latex and adding research papers to bibliography
  • Set up Google Home
Complete
Week 3 - Write the code for one microcontroller and sensor setup
  • Learn how to create a network connection between this microcontroller and another device (e.g. laptop) that belongs to the same Wifi network
  • Connect to a third party, free cloud
Complete
Week 4 - Work on find some Cybersecurity Vulnerabilities with the Social Robot
  • Create appropriate network connections to the cloud and/or to devices in the same Wifi network
  • Work on presentation
  • Start working on robot
Complete
Week 5 - Work on Microsoft Cognitive Vision and Presentation Complete
Week 6 - If everything is complete by this point, add the robot to the system. Complete
Week 7 - Brainstorm and research the security vulnerabilities of the system; try to compromise the system. Complete
Week 8 - Continue work on compromising and protecting the system; start writing research paper Complete
Week 9 - Continue work from previous two weeks; create poster. Complete
Week 10 - Finish research paper and poster Complete