Вы находитесь на странице: 1из 27

TEAM Betatesters &

Editor-in-Chief

Joanna Kretowicz 

Proofreaders
joanna.kretowicz@eforensicsmag.com
Lee McKenzie
Editors:
Hammad Arshed
Marta Sienicka

sienicka.marta@hakin9.com Olivier Caleff

Dominika Zdrodowska Ali Abdollahi


dominika.zdrodowska@eforensicsmag.com
Robert Fling
Marta Strzelec

marta.strzelec@eforensicsmag.com Paul Mellen

Bartek Adach Bernhard Waldecker


bartek.adach@pentestmag.com
Avi Benchimol
Proofreader:
Lee McKenzie Sunny Wear

Senior Consultant/Publisher: 
 Ivan Gutierrez Agramont


Paweł Marciniak 
John Webb
CEO: 

Joanna Kretowicz 
 David Molik
joanna.kretowicz@eforensicsmag.com 
Da Co
Marketing Director: 

Joanna Kretowicz 

joanna.kretowicz@eforensicsmag.com

DTP 

Marta Sienicka

sienicka.marta@hakin9.com

Cover Design
Hiep Nguyen Duc
Joanna Kretowicz

Publisher 

Hakin9 Media Sp. z o.o.

02-676 Warszawa

ul. Postępu 17D 

Phone: 1 917 338 3631 

www.hakin9.org

All trademarks, trade names, or logos mentioned or used are the


property of their respective owners.

The techniques described in our articles may only be used in private,


local networks. The editors hold no responsibility for misuse of the
presented techniques or consequent data loss.
Dear Readers!

In the last days of summer we want to give you something special - an edition dedicated to Raspberry Pi, and

other hardwares.

We start with the main article, ”Hacking with Raspberry Pi 4”. Recently a new version of Raspberry Pi was

released, Raspberry Pi 4, some of you maybe already had a chance to play with it, but maybe you are wondering

what more can it do? We have a detailed tutorial for you written by our expert, Daniel W. Dieterle. What will you

learn from this article? First, you will read about the capabilities of RPi 4, is it better than the last version? Or

maybe not? In the next article Dan focused on installing Kali Linux on a Raspberry Pi. Going further, he ran

several Kali tools on this platform. Want to know the outcome? You must definitely read the article!

What’s next?

You will read about the usage of Raspberry Pi with ICS and how effective such integration can be. How can

Raspberry Pi  be used to secure cloud data center? All this, and more, can be found in this edition.

If you are not a fan of Raspberry Pi, we also have articles dedicated to Arduino and ESP8266. You will read how

to create a laser system to secure your home. Furthermore, we will show you how the Arduino can be used as a

teaching platform.

We also recommend to check article dedicated to key-logging. Our author presents how to explore the body

key-logging approach, and to do it he designed and built a body key-logger and have used it on a commercially

available safe. What to know the outcome? Read the article!

Special thanks to all of the contributors, reviewers, and proofreaders involved in the process of creation of this

issue.

Enjoy the reading,

Hakin9 Editorial Team


5
6
7
Hacking with
Raspberry Pi 4
Daniel W. Dieterle
Hacking with Raspberry Pi 4

The Raspberry Pi 4 is here and better than ever! This major upgrade makes the Raspberry Pi a more viable desktop
solution, which also means it is a better platform for ethical hackers and pentesters. In this article, we will quickly
brush through the new features of the Pi 4 and then get right into using it as a tool for ethical hacking. We will
specifically look at installing and using the PenTesters Framework (PTF) on Raspbian Buster.

What’s New - Power, Cases, Compatibility

The new (and long awaited) RPi flagship1 is much faster than the Pi 3 series. It also now sports dual 4Kp60 video
connectors. These are micro HDMI connectors, so you will most likely need cable adapters. Another change is that the
Pi 4 comes with three different RAM amounts. Holding to tradition, the 1GB RAM version is $35, same as the Pi 3B+.
The 2GB board is $45 and 4GB model is $55. It also has 4 USB (two USB-2 and two new USB-3) ports and Gigabit
ethernet.

The new Pi 4 power connector is a USB-C connector type. It also requires more power than the Pi 3B+. The official
Raspberry Pi 4 power supply now provides 3A, compared to the 2.5A recommended for the Pi 3. There have been some
reported issues with trying to use a Pi 3 series power adapter with a Pi 4. So, it is best when buying a Pi 4, to order a Pi
4 power supply as well.

Many existing Pi 3 cases do not work with Pi 4. The small changes in the board layout make it so Pi 4s just will not fit
in many Pi 3 cases. This leaves existing Pi 3 case owners with two solutions.

1. Purchase a Pi 4 specific case

2. Carefully modify an existing Pi 3 case

An X-Acto or utility knife can help with option 2, but proceed at your own risk, you could destroy your case. Also be
very careful that you don’t cut yourself. If your Pi 4 almost fits in your case and only minor adjustments need to be

9
Hacking with Raspberry Pi 4

made, it may be worth attempting to modify the case. But if it is not even close, it may be better to just order a new Pi 4
case.

Figure 1 – RPi3 7” touchscreen case modified for the Pi 4 by widening port holes

Compatibility “Concerns”

The Pi 4 is allegedly backward compatible with the Pi 3 – well, sort of. A lot of software for the Pi 3 simply does not
work on the Pi 4 at this time. If you are using Raspbian, you must run the new “Buster” version for the Pi 4. Also, not
all versions of Kali Linux work with the Pi 4, you must use the Kali Linux versions marked as Pi 4 compatible. This is
currently only the 32 - bit version of Kali for the Pi, but they are working on updating the 64-bit version. Lastly, a lot of
pre-built images for the Pi 3 simply will not work until they are updated for the Pi 4.

If you want to move your really cool Pi 3 image you have been rocking over to your Pi 4, that may not work either.
Raspberry Pi says you might be able to do an in-place upgrade of some Pi 3 installs, but I’ve tried taking several
working Pi 3 MicroSD cards, plugged them into the Pi 4 and none of them booted. So, most likely your best bet is to
start with a clean OS install for your Pi 4 systems.

All right, enough intro, let’s get to hacking!

10
Evaluation of
6LoWPAN over
Bluetooth Low
Energy
Varat Chawathaworncharoen

Vasaka Visoottiviset

Ryousei Takano
Evaluation of 6LoWPAN over Bluetooth Low Energy

IPv6 over Low power Wireless Personal Area Network (6LoW-PAN) is an emerging technology to enable ubiquitous
IoT services. However, there are very few studies of the performance evaluation on real hardware environments. This
paper demonstrates the feasibility of 6LoWPAN through conducting a preliminary performance evaluation of a
commodity hardware environment, including Bluetooth Low Energy (BLE) network, Raspberry Pi, and a laptop PC.
Our experimental results show that the power consumption of 6LoWPAN over BLE is one-tenth lower than that of IP
over WiFi; the performance significantly depends on the distance between devices and the message size; and the
communication completely stops when bursty traffic transfers. This observation provides our optimistic conclusions
on the feasibility of 6LoWPAN although the maturity of implementations is a remaining issue.

1. INTRODUCTION

The Internet of Things (IoT) is an IT system based on a network of smart objects embedded with a sensor, software,
and connectivity to exchange data with service providers. In the vision of Trillion Sensors Universe [3], for example, a
tremendous amount of smart objects will be deployed everywhere on the earth, and each of them has connectivity to
the Internet, either directly or indirectly through gateways. To provide such a ubiquitous connectivity with several
restrictions to power, memory space, network bandwidth, and processing resources [2], IPv6 over Low-power
Wireless Per-sonal Area Network (6LoWPAN) [6], which is standardizing by IETF, is a promising technology.

In terms of the link layer, several low-power wireless technologies, including ZigBee/IEEE 802.15.4, Bluetooth Low
Energy, and Wi-SUN, have been developed for supporting IoT applications and services. Bluetooth Low Energy (BLE)
[1] or Bluetooth Smart aims at enabling low-cost sensors to exchange data for a short distance, and it has a wide range
of applications, including smart watches, home electronics, location-based services such as Apple’s iBeacon and
Google’s Eddystone. The Bluetooth specification version 4.1 or newer is required for IPv6 over BLE links [7]. Although
the standardization process is ongoing, some operating systems have already supported it in advance.

In this article, we demonstrate the feasibility of 6LoWPAN over BLE through conducting experiments on a commodity
hardware environment. Our contribution is a preliminary performance evaluation of 6LowPAN over BLE, including
the power consumption comparing with both wired and wireless Ethernet technologies, the impact of the distance
between devices and the message size on the throughput, and the application performance based on MQTT.

The rest of the article is organized into the following sections: Section 2 presents an overview of a network protocol
stack supporting IoT services, Section 3 shows our experimental results in a commodity software and hardware
environment, Section 4 demonstrates a simple MQTT application as a use case of IoT services, and finally Section 5
summarizes the article and briefly mentions future work.

2. IOT PROTOCOLS

Figure 1 shows a typical 6LoWPAN protocol stack from the physical layer to the application layer. Though 6LoWPAN
is originally designed for IEEE 802.15.4-based networks [6], currently 6LoWPAN over BLE is under the process of

12
Kali Linux
Raspberry Pi
Daniel W. Dieterle
Kali Linux Raspberry Pi

Disclaimer: This article uses the test lab, which is a private LAN that includes Metasploitable2 & Metasploitable3
test Virtual Machines as targets. The Metasploitable systems are purposefully vulnerable, so do not use them in a
production or “live” environment. This information is for educational use only. Never attempt to access systems or
use these techniques against systems that you do not own, this is illegal and you could go to jail. Also, check your
area laws on using scanning tools, as these may also be illegal in some locations. Use a static free environment when
using Raspberry Pis and, due to their small size, Pis can be a bit fragile, so proceed at your own risk.

In this article, we will cover installing Kali Linux on a Raspberry Pi. We will also see how to run several Kali tools on
this platform. As I assume the reader has used Kali Linux before, the goal is to show how to get up and running quickly
on a Raspberry Pi, not necessarily to show how to run each individual tool. Most of the tools work just like they would
in a full PC install of Kali, though some of the tools, like Hashcat, apparently don’t have ARM compatible binaries and
are not included in the Kali Pi version.

Surf to the Offensive Security Website:

https://www.offensive-security.com/kali-linux-arm-images/

Navigate to the Kali ARM images and then select the Raspberry Pi branch. Download the version of Raspberry Pi for
the Pi that you have. I used a Pi3b+ for this article, so I downloaded the Kali Linux Raspberry Pi 3 64-bit image. If you
have a Pi 4, you must download the Pi 4 version of Kali.

14
IoT: NodeMCU
12e X Arduino
Uno
Dr Antonio Carlos Bento
IoT: NodeMCU 12e X Arduino Uno, Results of an Experimental and Comparative Survey

This study presents the results obtained in experimental and comparative research involving the devices Nodemcu 12e
and Arduino UNO, carried out in 2017, focusing mainly on the positive and negative points presented by the different
devices when using a WiFi network. The data collection was an experimental research with the devices, applying the
heuristic classification of William J. Clancey, considering personal experience when using these types of equipment.
After obtaining the data, proceeded to consolidate, categorize, and analyze the quantitative and qualitative results.
There was a perception about the results that point out the pros and cons of the different technologies, among these
are, ease of configuration; the centralization of resources; ease and difficulties. Incounterpoint, the Arduino Uno
device was demonstrated with little capacity, and needed to add new devices for communication via WiFi. This way,
Nodemcu 12e has almost the same market value, but already has the WiFi feature internally, in addition to having
greater capacity and ease of use.

1. INTRODUCTION

The motivation for the development of this work originated from personal and group experiences, in which the main
advance and use of resources for residential automation was observed, solely because it is a trend that is being applied
in different areas such as robotics, residential and industrial automation, as shown by the studies presented by
Zabadal and Castro [19]. As general objectives, the use of Arduino Uno and Nodemcu 12e devices should be analyzed,
with the specific objectives being to carry out WiFi connection tests and their configurations.

The results should be of the quantitative and qualitative type, as a comparison between the consolidated values is
necessary, as well as a detailed analysis of the use of the devices, pointing out their strengths and weaknesses, focusing
on the development tools and method of application and use.

2. APPLICATION OF METHODOLOGY
The methodology used follows the models presented by Silva [16] and Marconi and Lakatos [12], as Silva presents
[16]: during an experimental research using the observational and experimental method, which may somehow reflect
its feeling about the problem, the applicable hypotheses are observed with real suggestions, which may somehow
contribute with data to be analyzed and compared, thus having a greater focus on the object of study.

According to Marconi and Lakatos [12], field research is the one used to obtain information and/or knowledge about a
problem, for which a response or hypothesis is sought, or, still discover new phenomena or the relations between
them.

Field research involves university-level students who have had access to assessments and disciplines in ODL at the
institution. This field research compared the different results and experiences of the individuals, through a
consolidation of results, which can provide a more detailed analysis and familiarity with the problem, considering the
standard use of the solutions with the presented proposal.

16
Body Keylogging
Paz Hameiri
Body Keylogging

Numeric keypads are now used to protect money, valuable goods, information and physical access, which makes them
lucrative targets for criminals. The custom architecture of these devices makes it hard for an attacker to design or to
deploy either a hardware-based or a software-based key-logging device. Cameras can be used for keypad tracking, but
are limited by light conditions, shooting angles, line of sight, etc. In this paper, I suggest a new type of key-logging
device that detects keystrokes by analyzing the interaction between the user’s body and the device. Time-of-Flight
sensors can be used to track body movements and by crossing this information with the rigid layout of the keypad, it is
possible to reveal which key was pressed at any time. If the device generates audio feedback, the sound can be tracked
by a microphone. This can improve successful code detection. To explore the body key-logging approach, I’ve designed
and built a body key-logger and have used it on a commercially available safe. A field test of the device yielded a
success rate of 92% for key press detection. In this paper, I introduce the device, its tracking techniques and the
algorithms used for keystroke detection. I review the device’s performance, discuss countermeasures for blocking this
kind of attack and suggest future research.

Introduction

Cyber criminals and security researchers have employed different approaches to capture keystrokes on keyboards and
keypads. Devices used to capture keystrokes are known as key-loggers. While the common numeric keypads used in
safes and electronic door locks may offer an attacker immediate entry, that person needs intimate knowledge of the
architecture of the device’s hardware and software in order to build a customized key-logger. Deployment of a
key-logger is difficult since manufacturers build the devices so that only trained personnel know how to access the
circuits without damaging the device or tripping the tamper alarm.

In this paper, I propose a new approach to key-logging. Since common keyboards and keypads have rigid user
interfaces, it is possible to detect keystrokes by tracking the user’s body movements and crossing that information with
the layout of the keypad. Body tracking technology is commercially available and already in use for gesture recognition
and computer vision.

The aim of this paper is to alert users to the risks of body tracking technology for the purpose of key-logging. To
explore these risks, I designed and built a body key-logging "proof-of-concept" device from commercially available
components and demonstrated its functionality on the keypad of a commercially available safe.

Malicious key loggers

Malicious key loggers’ most fundamental requirement is to track keystrokes of an unsuspecting user in order to reveal
the data to the person who planted the key-logger. Researchers, including Olzak [1] and Creutzburg [2], divide
key-loggers into two main categories – software-based and hardware based. Software-based key-loggers are installed
on the victim’s device or on a device that is connected to the victim’s device. Hardware-based key-loggers are based on
dedicated hardware, whose main purpose is to act like a key-logger. Hardware-based devices are either connected to
the victim’s device or installed close to the victim’s device to monitor various physical emissions. Simple hardware

18
CLOUDS-Pi: A
Low-Cost Raspberry-Pi
based Testbed for
Software-Defined-Net
working in Cloud Data
Centers
Adel Nadjaran Toosi

Jungmin Son

Rajkumar Buyya
CLOUDS-Pi: A Low-Cost Raspberry-Pi based Testbed for
Software-Defined-Networking in Cloud Data Centers

Software Defined Networking (SDN) is rapidly transforming the networking ecosystem of cloud computing data
centers. However, replicating SDN-enabled cloud infrastructures to conduct practical research in this domain requires
a great deal of effort and capital expenditure. In this article, we present the CLOUDS-Pi platform, a testbed for
conducting research on SDN-enabled cloud computing. Open vSwitch (OVS) is integrated with Raspberry-Pi’s,
low-cost embedded computers to build a network of OpenFlow switches. We provide two use cases and perform
validation and performance evaluation for our testbed. We also discuss benefits and limitations of CLOUDS-Pi
specifically and SDN in general.

1. INTRODUCTION

Software-defined networking (SDN) is an emerging approach to computer networking that separates the tightly
coupled control and data (forwarding) planes in traditional networking devices. Thanks to this separation, SDN can
provide a logically centralized view of the network in a single point of management. This is achieved via open
interfaces and abstraction of lower-level functionalities and transforms the network to a programmable platform that
can dynamically adapt its behavior. Early supporters of SDN were those believing network device vendors were not
meeting service providers’ needs, especially regarding innovation and development of features. Other supporters tried
harnessing their inexpensive processing power of commodity hardware to run their network. The need for such agile,
flexible, and cost-efficient computer networks has consequently formed the nucleus for the global efforts toward SDN
[13].

Cloud computing [4] is a successful computing paradigm, which delivers computing resources residing in providers’
data centers as a service over the internet on a pay-as-you-go basis. With the growing adoption of cloud, data centers
hosting cloud services are rapidly expanding in size and number. Therefore, resource management in clouds’
large-scale infrastructure becomes a challenging issue. In the meantime, SDN is increasingly being accepted as the
new generation of networks in cloud data centers where there is a need for efficient management of large multi-tenant
networks of such dynamic and ever-changing environments. In fact, SDN not only reduces the complexity seen in
today’s cloud data center networks but also helps providers manage network services from a central venue.

The peaceful meeting of cloud computing and SDN depends on significant innovation and research activities to fuse
together. However, evaluation and experimentation of SDN-based applications for cloud environments presents many
challenges in complexity, scaling, accuracy, and efficiency [5]. Moreover, rapid and affordable prototyping of
SDN-enabled clouds is difficult and significant capital expenditure is required to replicate practical implementations,
obstructing the evaluation of research in this domain. Even though software emulators such as Mininet [10] expedite
rapid prototyping of SDN on a single machine, there is insufficient support for network dynamicity and the
performance of virtualized hosts and Virtual Machines (VMs) in such tools [9].

With these issues in mind, this article proposes the system architecture and design of CLOUDS-Pi, our testbed
platform in the CLOUDS laboratory for conducting research on SDN-enabled cloud computing. We focus on the cost
effectiveness of our setup by reusing existing equipment and coping with the budget and space limitations of an

20
An Intelligent
Tutoring System
for Training on
ARDUINO
Islam Albatish

Msbah J. Mosa

Samy S. Abu-Naser
An Intelligent Tutoring System for Training on ARDUINO

This article aims at helping trainees to overcome the difficulties they face when dealing with Arduino platform by
describing the design of a desktop-based intelligent tutoring system. The main idea of this system is a systematic
introduction to the concept of the Arduino platform. The system shows the circuit boards of Arduino that can be
purchased at low cost or assembled from freely-available plans, and an open-source development environment and
library for writing code to control the broad topic of Arduino platform.

The system is adaptive with the trainee’s progress. It functions as a special tutor who deals with trainees according to
their levels and skills. Evaluation of the system has been applied on professional and unprofessional trainees in this
field, and the results were good.

1. INTRODUCTION

An intelligent tutoring system (ITS) is software that aims to provide immediate and specific instruction and feedback
to trainees, typically without referring to a human trainer. The goal of ITSs is to facilitate learning in an evocative and
efficient way by using different computing techniques. ITSs have proven their abilities in both official education and
professional situations. There is a strong association between intelligent tutoring, cognitive learning theories and
design. An ITS aims to solve the problem of over-dependency of trainees over trainers for superiority education. It
intends to offer access to high-class education to every trainee, consequently improving the whole educational system
[1].

One of the advantages of ITS is its ability to deal with different fields. For instance, there are many different
microcontroller development platforms available for use in training and prototyping with electronics, used for
everything from new musical instruments to intelligent electronics projects, custom input devices and interactive art
pieces. These tools attempt to decrease the difficulty of working with electronics and increase the number of people
who can experiment with the medium. One of these open-source tools is the Arduino prototyping platform, which
makes working with electronic components easy, cheap, and quick [2]. The Arduino is a microcontroller development
platform paired with an intuitive programming language that can develop by using the Arduino integrated
development environment (IDE) software. By equipping the Arduino with sensors, actuators, lights, speakers, add-on
modules (called shields), and other integrated circuits, it can turn the Arduino into a programmable “brain” for just
about any control system [3].

This article presents an intelligent tutoring system for training on the Arduino platform

2. LITERATURE REVIEW

There are many research papers and ITS tools that have been developed in many fields, such as medical, educational,
and computer science fields. There are various intelligent tutoring systems designed and developed for educational
purposes. Some of these ITS are designed for teaching such as [4-6], effectiveness of e-learning [7], A comparative
study between Animated Intelligent Tutoring Systems (AITS) and Video-based Intelligent Tutoring Systems (VITS)

22
Laser Based
Security System
Using Arduino
UNO
Parmita Mondal

Madhusree Mondal
Laser Based Security System Using Arduino UNO

Our article examines the design and implementation of a novel laser security system for detecting intruders. The
superior advantage of using a laser is secrecy: the intruder isn’t aware a security system is installed in entry points like
doors and windows, as lasers can travel long distances and are almost invisible. When somebody crosses it, the circuit
senses the discontinuity and trips the buzzer, which doesn’t stop until someone turns it off manually. It is among the
most affordable indoor/outdoor security systems, with plenty of features. For example, it can send a photo of an
intruder to a registered email address with the help of LDR and ESP WIFI modules. And best, its efficient and requires
very little power.

I. INTRODUCTION

Researchers are using improved technology to find solutions for trespassing and theft. When referring to home
automation and security, laser based security has always been considered one of the easiest and cheapest forms.
Researchers from Bangladesh have designed a laser security system for inland agriculture, like prawns. Here, the
number of laser beams is decided by LDRs which are connected to an Arduino board. The Arduino is programmed so
it will make a decision whether to send an alert to a desired number [1]. Lasers travel long distances without scattering
and are almost invisible, so this characteristic can be used to build an invisible boundary of a sensitive area. If anyone
wants to build an area with a single beam, mirrors can be used to reflect the laser, providing a low energy and high
performance solution of scale [2]. Laser security systems are useful in high leverage environments and the installation
process is easy. Home and personal possession security is a major contemporary concern. With increasing intrusion
and thefts, companies are investing a considerable amount of money on home security. To handle these problems,
light dependent resistors are used in the laser security systems [4-5]. Researchers from Malaysia have developed a
multilevel system with different sensor nodes as input elements, while the output elements respond to the signals
received from inputs. The sensor nodes include an alarm, presence detecting circuit, and a camera [6]. The idea of
securing boundaries from unauthorized entries has been coined. This is achieved by implementing advanced
technologies like object detection, identification, distance sensing, and activity tracking [8]. Researcher Sarvesh Suhas
Kapre and his team designed a hardware circuit which includes gas and PIR sensors, main fuse failure detectors,
smoke sensors, and an 8 bit P89V51RD2 microcontroller. If the microcontroller senses an intrusion, it will send an
SMS message to the registered mobile number. The microcontroller can initiate household electrical appliances
according to the SMS message received from GSM modem of the user [9]. Researchers from China have developed a
system using WSN and GSM technology. It can detect theft, fire, and gas leaks, sending messages to the owner. The
hardware consists of a single chip C5081F310, wireless receiving and sending chip CC1100, and Siemens TC35 GSM
module [10]. Employing sensors like PIR cameras, using GSM to detect the presence of an intruder becomes very
expensive when integrated with an LCD panel or camera. Thus, researcher Suresh S. and his team have an affordable
home automation system by employing PIR, temperature, and humidity sensors to sense changes in motion,
temperature and humidity. Here, all the activities are maintained by an Atmega microcontroller. During any intrusion,
the owner of the house is informed by a text message sent through the GSM module [11].

24
Raspberry PI Based
Cyber-Defensive Industrial
Control System With
Redundancy And Intrusion
Detection

Navneet Meachery

Rijul Nair
Raspberry PI Based Cyber-Defensive Industrial
Control System With Redundancy And Intrusion

In our present day, global data communication, inexpensive Internet connection and fast paced software development,
security has become more and more of an issue. Security is one of the basic requirements in today's world as any type
of interaction and storage of data on the internet is becoming unassertive. Protecting the information access and data
integrity are the basic security characteristics of computer security. In this system, we have propounded a system
which is capable of detecting fire, any gas leakages or if any unauthorized entries have been made and provide the
location of the affected region. Raspberry Pi 3 has been used to control this process by integrated with a couple of
sensors and cameras. When the fire or smoke sensors detects something they signal the camera and then activates the
alarm and the sprinkler motor. The cameras provide a confirmation of the fire and take photographs in order to avoid
any false alarm accusations or for insurance purposes. The system will immediately send a message along with the
image of the affected spot and device location to the registered email ids which may include the nearby fire brigade. In
the case of an intruder or unauthorized entry, the PIR sensor detects it and the camera captures the image and then
activate the alarm. An admin can confirm or deny the impeachment by observing the photographs the system send to
the registered email ids.

1. Introduction

Information is strategic resource, organizations spend a significant amount of their budget on managing information
resources. Computer security have several security related objectives among them the three fundamental objective are:
Secrecy i.e. to protect information; Incorruptibility, to protect information accuracy; lastly Access, to ensure
information delivery. It is necessary to put high priority to system security, minimize loop holes and secure the
computer system against intrusion. Today's standard of security implement a configured firewall along with an
intrusion detection system. If an intruder is able to acquire a weakness in the network by scanning the host network,
he can easy penetrate into the system and obtain valuable data. If an intruder is masking his identity for a firewall
enabled service, intrusion detection systems cannot minimize the damages.

Most of the security approaches now a day’s focus on effectiveness rather than efficiency of the security system. One of
the aggressive for of defense mechanism that has come to the fore are Honeypots. It acts as a Booby trap equipment
which are configured as a system weakness to attract intruders and gather all the information to eliminate future
attacks thus eliminating security loopholes, these are known as Honeypots. For example honeypots like Honeyd1 are
already being used to detect attackers and protect information.

The proposed architecture is based on Raspberry Pi using a range of sensors such as flame sensor, gas sensor and
intrusion detection sensor for detecting the problem and reporting it .This architecture puts forth a simple, cost
effective and an autonomous deployment in any environment.

2. Methodology

The security system uses Raspberry pi as a major component. The computer is connected to the raspberry pi and
which is in turn connected to the sensors. The computer programs the raspberry pi with certain criterion and how

26
Android-Based Smart
Power Outlet
Switching Device
Using ESP8266
Enabled WiFi Module
Dennis A. Martillano

Rondolf G. Reyes

Ian Robert Miranda

Kevin Lester C. Diaz


Android-Based Smart Power Outlet Switching Device Using ESP8266 Enabled WiFi Module

The merging of the physical and digital worlds is the result of technological advancement and a new chapter in the
story of today’s networked world governed by internet. Having the advantage of merging allows changes to be adopted
regarding organization, manipulation, and control of nearly anything via networked technology. This leads to the
Internet of Things (IoT), which can be defined as the interconnection of uniquely identifiable embedded computing
devices within the existing internet infrastructure. IoT is an emerging technology that allows interconnection of
everything beyond what is expected. This study aims to engage in research, modeling and implementation of an
integrated technology that will blend WiFi development board modules built on ESP8266 based modules,
microcontrollers, and elements of IoT to form an intelligent environment. The primary focus is to allow smart power
outlet sources of devices to be controlled and monitored via the internet and/or local wireless area network by infusing
standardized elements of IoT, communication protocols, mobile, and web applications.

I. INTRODUCTION

Internet of Things is the intelligent network of everyday physical objects that contains embedded technology to
communicate, sense, and interact with their internal states or the external environment [1]. Typically, IoT is expected
to offer advanced connectivity of devices, systems, and services that goes beyond machine-to-machine
communications (M2M) and covers a variety of protocols, domains, and applications [2]. More than just hype, IoT is a
crucial, fundamental shift in technological advancement that dramatically impacts existing businesses, infrastructures,
and even private institutions.

A specific application of IoT does not necessarily require huge implementation in initial research, but rather a small
set up that can be both achievable and impactful.

In this study, the focus is a specific department in an institution catering to the management of devices and their
power outlet sources in a computer laboratory set-up. Personnel make sure the devices are completely turned on when
needed and off when not required. In addition, this study would like to highlight the potential opportunities with
expansion and innovation that the identified institution is committing to its stakeholders.

The physical expansion of the institution would mean the need for expanded monitoring and controlling of devices
and their power sources. This presents an opportunity in utilizing existing internet infrastructure of the target
institution, and incorporating IoT key elements blended with mobile and web technology, and communication
protocol in controlling devices and power outlet sources, thus promoting an intelligent environment.

II. LITERATURE REVIEW

To identify the requirements, elements, and status of IoT that can help in achieving the primary goal, the study
considered collecting and analyzing an overview of IoT, architectures, and vital technologies, its impact, elements,
framework, use, and applications. A systematic literature review in [3] identifies real time needs, efficient power
consumptions of applications, and access to an open and interoperable cloud system as requirements in IoT. The study

28

Вам также может понравиться