ABSTRACT

This chapter presents a number of examples of problematic or compromised IoT devices, and illustrate the trade-offs that often are when designing such devices. To get an idea of the current situation of security and IoT we will look into a number of recent events, where IoT devices were compromised. Smart meters are a broad term for devices that monitors energy usage, such as heat and electricity, sometimes extending into also other utilities such as water supply, and transmit this information to e.g. utility companies who bills the customer accordingly. Security weaknesses have also been found in more “serious” IoT health device systems, some of which include active devices which can severely impact a person’s health if used with malicious intent. The devices, including cameras, mentioned in the introductory discussion the Mirai botnet are examples of such devices, but in this case the devices attacks were used as weapons towards other services rather than for malicious activities targeting their owners.