The use of IoT devices in criminal activities

dc.contributor.advisorAdda, Mo
dc.contributor.authorAlsuwat, Adnan
dc.date.accessioned2023-11-07T08:22:19Z
dc.date.available2023-11-07T08:22:19Z
dc.date.issued2023-11-07
dc.description.abstractDue to the widespread application of Internet of Things devices, these devices have become susceptible to unlawful use and exploitation by cybercriminals. It is possible for an assailant to use IoT devices for criminal purposes, such as information gathering, cryptographic secret extraction, modifying their programming, or replacing them with malicious devices under the attacker's control. This project aims to find out how criminals use Internet of Things devices to carry out criminal activities. In addition, it aims to find out the parts and systems of some of these devices through which hackers can reach their illegal goals. The findings of this report show that 17% of smartphone users in Saudi Arabia and the United Kingdom have had their devices hacked, and 44% of smart car owners believe that criminals can hack their smart cars. In conclude , it is evident from this report that Internet of Things devices are used in a wide range of criminal activities that affect both individuals and society. It appears that attackers could directly target the physical assets of users or acquire access to the data on their IoT devices. It is clear that hackers attempt to gain access to the application server, where the data is stored, and they also target the data to modify or use it for nefarious purposes while it is transmitted over Wi-Fi or Bluetooth. Furthermore, the report recommends authenticating any connection to IoT devices and using intrusion detection systems to protect and secure IoT devices from hacking.
dc.format.extent61
dc.identifier.urihttps://hdl.handle.net/20.500.14154/69590
dc.language.isoen
dc.publisherSaudi Digital Library
dc.subjectInternet of Things (IoT) – Cybercriminals
dc.titleThe use of IoT devices in criminal activities
dc.typeThesis
sdl.degree.departmentComputing Postgraduate Programme
sdl.degree.disciplineCyber Security & Forensic Information Technology
sdl.degree.grantorUniversity of Portsmouth
sdl.degree.nameMaster Degree in Cyber Security & Forensic Information Technology

Files

Copyright owned by the Saudi Digital Library (SDL) © 2025