Araştırma Makalesi
BibTex RIS Kaynak Göster
Yıl 2022, Cilt: 18 Sayı: 1, 53 - 58, 25.03.2022
https://doi.org/10.18466/cbayarfbe.856119

Öz

Kaynakça

  • Zhang, N, Mi, X, Feng, X, Wang, X, Tian, Y, Qian, F. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. https://arxiv.org/pdf/1805.01525.pdf
  • Alrawi, O, Lever, C, Antonakakis, M, Monrose, F. 2019 SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy. San Francisco, Ca. 20-22 May 2019. Doi:10.1109/SP.2019.00013
  • Park, M, James JI. 2018. Preliminary Study of a Google Home Mini. Journal of Digital Forensics 2018 June, 12(1). https://arxiv.org/pdf/2001.04574
  • Caputo, D, Verderame, L, Ranieri, A, Merlo, A, & Caviglione, L. 2020. Fine- hearing Google Home: why silence will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(1), 35-53. https://doi.org/10.22667/JOWUA.2020.03.31.035
  • Çepik, H, Aydın, Ö, Dalkılıç, G. 2020. Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir, Turkey. 09-11.12.2020.
  • Google Nest, https://en.wikipedia.org/wiki/Google_Nest_(smart_speakers) (accessed at 07.01.2021).
  • Google Home specifications. Google Home Help. Google. Retrieved December 6, 2017.
  • Demmitt, J. 2015. "Google's Nest Labs plans top secret project at new Seattle engineering center". Geekwire.
  • Statt, N, Bohn, D. 2019. Google Nest: Why Google finally embraced Nest as its smart home brand". The Verge. Retrieved October 9, 2019.
  • Blynk. http://www.blynk.cc/. (accessed at 07.01.2021).
  • Mills, D. 1995. Simple network time protocol (SNTP). RFC 1769, University of Delaware. https://www.hjp.at/doc/rfc/rfc1769.html. (accessed at 07.01.2021).
  • Uy, M. 2020. Bluetooth Basics. Lifewire web site. Retrieved from https://www.lifewire.com/what-is-bluetooth-2377412, (accessed at 07.01.2021).
  • Imperva 2020. Ping of Death (POD). Imperva, Inc. Web site. Retrived from https://www.imperva.com/learn/ddos/ping-of-death/, (accessed at 07.01.2021).
  • Huegen, C. A. 1998. Network-Based Denial of Service Attacks. IEEE Transactions on Information Theory.
  • Singh, A. 2013. Instant Kali Linux. Packt Publishing Ltd.
  • l2ping, https://linux.die.net/man/1/l2ping (accessed at 07.01.2021).
  • https://github.com/Anlos0023/bluedoser (accessed at 07.01.2021).
  • Bluetooth Dos Attack Script, https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT (accessed at 07.01.2021).
  • Debian, https://en.wikipedia.org/wiki/Debian (accessed at 07.01.2021).
  • Blues, http://www.bluez.org/ (accessed at 07.01.2021).
  • HciTool, https://linux.die.net/man/1/hcitool (accessed at 07.01.2021).

Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini

Yıl 2022, Cilt: 18 Sayı: 1, 53 - 58, 25.03.2022
https://doi.org/10.18466/cbayarfbe.856119

Öz

In today’s technology world, Virtual personal assistants (VPA) have become very common and most people have started making their homes smart using these VPAs. Although different companies have different assistants, Google Home Mini (GHM) will be our focus in this paper. The first device, Google Home, was released in November 2016 and then GHM was released after a year, in October 2017. GHM has many features such as playing music, setting reminders, setting kitchen timer and controlling smart home devices. Although GHM might be reliable against cyber-attacks, devices, which are paired with GHM, could be attacked and these cyber-attacks can lead to severe problems. Cyber-attack issues become more important to us, specifically if the devices controlled by GHM are vital devices such as oven, fire alarm, security camera. In this article, we will represent Denial of Service (DOS) attacks applied against devices which are paired with GHM. In this study, Bluedoser, L2ping, Bluetooth Dos Script which are software in Kali Linux platform were used in order to perform DoS attack and some devices were used such as Google Home Mini, Headphone, 2 speakers as victim device. Successful results were observed on Bluetooth headphone.

Kaynakça

  • Zhang, N, Mi, X, Feng, X, Wang, X, Tian, Y, Qian, F. 2018. Understanding and Mitigating the Security Risks of Voice-Controlled Third-Party Skills on Amazon Alexa and Google Home. https://arxiv.org/pdf/1805.01525.pdf
  • Alrawi, O, Lever, C, Antonakakis, M, Monrose, F. 2019 SoK: Security Evaluation of Home-Based IoT Deployments. IEEE Symposium on Security and Privacy. San Francisco, Ca. 20-22 May 2019. Doi:10.1109/SP.2019.00013
  • Park, M, James JI. 2018. Preliminary Study of a Google Home Mini. Journal of Digital Forensics 2018 June, 12(1). https://arxiv.org/pdf/2001.04574
  • Caputo, D, Verderame, L, Ranieri, A, Merlo, A, & Caviglione, L. 2020. Fine- hearing Google Home: why silence will not protect your privacy. Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), 11(1), 35-53. https://doi.org/10.22667/JOWUA.2020.03.31.035
  • Çepik, H, Aydın, Ö, Dalkılıç, G. 2020. Security Vulnerability Assessment of Google Home Connection with an Internet of Things Device. 7th International Management Information Systems Conference. İzmir, Turkey. 09-11.12.2020.
  • Google Nest, https://en.wikipedia.org/wiki/Google_Nest_(smart_speakers) (accessed at 07.01.2021).
  • Google Home specifications. Google Home Help. Google. Retrieved December 6, 2017.
  • Demmitt, J. 2015. "Google's Nest Labs plans top secret project at new Seattle engineering center". Geekwire.
  • Statt, N, Bohn, D. 2019. Google Nest: Why Google finally embraced Nest as its smart home brand". The Verge. Retrieved October 9, 2019.
  • Blynk. http://www.blynk.cc/. (accessed at 07.01.2021).
  • Mills, D. 1995. Simple network time protocol (SNTP). RFC 1769, University of Delaware. https://www.hjp.at/doc/rfc/rfc1769.html. (accessed at 07.01.2021).
  • Uy, M. 2020. Bluetooth Basics. Lifewire web site. Retrieved from https://www.lifewire.com/what-is-bluetooth-2377412, (accessed at 07.01.2021).
  • Imperva 2020. Ping of Death (POD). Imperva, Inc. Web site. Retrived from https://www.imperva.com/learn/ddos/ping-of-death/, (accessed at 07.01.2021).
  • Huegen, C. A. 1998. Network-Based Denial of Service Attacks. IEEE Transactions on Information Theory.
  • Singh, A. 2013. Instant Kali Linux. Packt Publishing Ltd.
  • l2ping, https://linux.die.net/man/1/l2ping (accessed at 07.01.2021).
  • https://github.com/Anlos0023/bluedoser (accessed at 07.01.2021).
  • Bluetooth Dos Attack Script, https://github.com/crypt0b0y/BLUETOOTH-DOS-ATTACK-SCRIPT (accessed at 07.01.2021).
  • Debian, https://en.wikipedia.org/wiki/Debian (accessed at 07.01.2021).
  • Blues, http://www.bluez.org/ (accessed at 07.01.2021).
  • HciTool, https://linux.die.net/man/1/hcitool (accessed at 07.01.2021).
Toplam 21 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Tuğrul Yüksel 0000-0001-9863-5853

Ömer Aydın 0000-0002-7137-4881

Gökhan Dalkılıç 0000-0002-0130-1716

Yayımlanma Tarihi 25 Mart 2022
Yayımlandığı Sayı Yıl 2022 Cilt: 18 Sayı: 1

Kaynak Göster

APA Yüksel, T., Aydın, Ö., & Dalkılıç, G. (2022). Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. Celal Bayar University Journal of Science, 18(1), 53-58. https://doi.org/10.18466/cbayarfbe.856119
AMA Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. Mart 2022;18(1):53-58. doi:10.18466/cbayarfbe.856119
Chicago Yüksel, Tuğrul, Ömer Aydın, ve Gökhan Dalkılıç. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar University Journal of Science 18, sy. 1 (Mart 2022): 53-58. https://doi.org/10.18466/cbayarfbe.856119.
EndNote Yüksel T, Aydın Ö, Dalkılıç G (01 Mart 2022) Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. Celal Bayar University Journal of Science 18 1 53–58.
IEEE T. Yüksel, Ö. Aydın, ve G. Dalkılıç, “Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini”, CBUJOS, c. 18, sy. 1, ss. 53–58, 2022, doi: 10.18466/cbayarfbe.856119.
ISNAD Yüksel, Tuğrul vd. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar University Journal of Science 18/1 (Mart 2022), 53-58. https://doi.org/10.18466/cbayarfbe.856119.
JAMA Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. 2022;18:53–58.
MLA Yüksel, Tuğrul vd. “Performing DoS Attacks on Bluetooth Devices Paired With Google Home Mini”. Celal Bayar University Journal of Science, c. 18, sy. 1, 2022, ss. 53-58, doi:10.18466/cbayarfbe.856119.
Vancouver Yüksel T, Aydın Ö, Dalkılıç G. Performing DoS Attacks on Bluetooth Devices Paired with Google Home Mini. CBUJOS. 2022;18(1):53-8.