
Project Idea
Take an example of a home automation system in which you have a mobile app to control your
rooms lighting, heating and cooling systems, appliances such as TV, etc. List all the components
that are being used in this home automation system and the connection methods such as Wi-Fi,
wired, and Bluetooth. Create a chart which describes the following:
• Security threats for this system.
• Security holes that hackers can exploit.
• Security best practices to setup this system.
• Exploits that may have happened in the past.
Chapter 12 Holistic View on IoT Security 321
Internet_of_Things_CH12_pp309-326.indd 321 9/3/2019 10:16:43 AM