Design of a Secure Wireless Home Automation System with an Open Home Automation Bus (OpenHAB 2) Framework
Table 4
System security tests and results.
Test
Process
Observation
Remarks
Wireless network penetration testing
Used industry-standard penetration testing tools and frameworks, including Aircrack-ng.The remote penetration testing device was placed within the network. The wireless network audit began with a full sweep of the 2.4 GHz wireless frequencies, where numerous busy networks were found
1. It uses the preshared key for network access by sniffing the network while forcing an existing client off the network 2. Capturing of a WPA2 handshake attack 3. Nonidentification of clients connecting to the hidden SSIDs during the audit period, and therefore, it was not possible to unmask them
A scan was made for Cisco Discovery Protocol (CDP) traffic, which would have disclosed further information about the network. CDP was not found to be running across the public guest network, and VLAN hopping was unsuccessful Risk level: extremely low