Research Article

Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework

Table 4

System security tests and results.

TestProcessObservationRemarks

Wireless network penetration testingUsed industry-standard penetration testing tools and frameworks, including Aircrack-ng.The remote penetration testing device was placed within the network. The wireless network audit began with a full sweep of the 2.4 GHz wireless frequencies, where numerous busy networks were found1. It uses the preshared key for network access by sniffing the network while forcing an existing client off the network
2. Capturing of a WPA2 handshake attack
3. Nonidentification of clients connecting to the hidden SSIDs during the audit period, and therefore, it was not possible to unmask them
A scan was made for Cisco Discovery Protocol (CDP) traffic, which would have disclosed further information about the network. CDP was not found to be running across the public guest network, and VLAN hopping was unsuccessful
Risk level: extremely low