As the rapid expansion of the Internet of Things (IoT) has taken place across major fields such as healthcare and environmental monitoring, the security and robustness of IoT systems have increasingly gained importance. This thesis outlines the development and deployment of an end-to-end IoT testbed for the evaluation of the impact of common cybersecurity threats. The testbed comprises various healthcare and environmental sensors via microcontrollers (Arduino) and edge devices (Raspberry Pi), utilizing various communication protocols such as MQTT, BLE, CoAP, and I2C. The network was simulated with cyberattacks such as Denial of Service (DoS) and brute-force attacks to quantify the vulnerability and response behavior of the system. Traffic data gathered during regular and attack scenarios was logged and analyzed for attack patterns. The findings indicate key security vulnerabilities in lightweight IoT protocols and provide the foundation for further research on building intrusion detection and prevention systems tailored to resource-restricted environments.
Design and Evaluation of an IoT Cybersecurity Testbed with Multi-Protocol Support
SADATAKHAVI, ABBAS
2024/2025
Abstract
As the rapid expansion of the Internet of Things (IoT) has taken place across major fields such as healthcare and environmental monitoring, the security and robustness of IoT systems have increasingly gained importance. This thesis outlines the development and deployment of an end-to-end IoT testbed for the evaluation of the impact of common cybersecurity threats. The testbed comprises various healthcare and environmental sensors via microcontrollers (Arduino) and edge devices (Raspberry Pi), utilizing various communication protocols such as MQTT, BLE, CoAP, and I2C. The network was simulated with cyberattacks such as Denial of Service (DoS) and brute-force attacks to quantify the vulnerability and response behavior of the system. Traffic data gathered during regular and attack scenarios was logged and analyzed for attack patterns. The findings indicate key security vulnerabilities in lightweight IoT protocols and provide the foundation for further research on building intrusion detection and prevention systems tailored to resource-restricted environments.| File | Dimensione | Formato | |
|---|---|---|---|
|
Thesis_Sadatakhavi.pdf
Accesso riservato
Dimensione
770.25 kB
Formato
Adobe PDF
|
770.25 kB | Adobe PDF |
The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License
https://hdl.handle.net/20.500.12608/87710