Skip to content

Commit

Permalink
Update README for first release
Browse files Browse the repository at this point in the history
  • Loading branch information
davikawasaki committed Nov 18, 2017
1 parent cad29c2 commit c59d07d
Showing 1 changed file with 26 additions and 4 deletions.
30 changes: 26 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,10 @@ Considering the increase of IoT devices, this work proposes a weakness evaluatio

![Project Model with Raspberry Pi 3, DHT11 and Mobile App](https://raw.githubusercontent.com/davikawasaki/iot-security-vulnerability/master/imgs/project_model.png)

[Demo](https://security-raspberry-webserver.herokuapp.com/) - Loads VueJS PWA with socket connection.

> :warning: Due to Heroku Free One Dyno Plan, this demo can't run HTTP requests and websocket connection together. If you know a way to make this feasible in Heroku Cloud, send a PR or a message.
## TECHNOLOGIES & LIBRARIES

1) [Python 2.7](https://docs.python.org/2/)
Expand All @@ -24,19 +28,37 @@ Considering the increase of IoT devices, this work proposes a weakness evaluatio

9) [PWA](https://developers.google.com/web/progressive-web-apps/)

10) [Requests 2.18.4](http://docs.python-requests.org/en/master/)

11) [Gunicorn 19.7.1 - Only for Heroku Deployment](http://gunicorn.org/)

## IMPLEMENTATION

This project covers a IoT devices network using HTTP transmission between two Raspberry Pi 3 B model, which one of the Rasps collects the sensor temperature and the other one acts like a webserver with Flask to provide the temperature data to a mobile device - developed with VueJS 2 and PWA boilerplate. This way, the user can check if there's a fire with his/her mobile device.

As security will be in check, network transmissions will always have a Darth reading and modifying the collected data. The proposed solution aims to fight Darth (not Vader, but as evil as him) to ensure data integrity and confidentiality through cryptography techniques. This will ensure to the server to identify if the received information was tamperd or from a unknown source.
As security will be in check, network transmissions will always have a Darth reading and modifying the collected data. The proposed solution aims to fight Darth (not Vader, but as evil as him) to ensure data integrity and confidentiality through cryptography techniques. This will ensure to the server to identify if the received information was tampered or from a unknown source.

## STEPS

1\. [Raspberry Client Sensor Server (in development)](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/raspberry_client)
1\. [Raspberry Client Sensor Server](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/raspberry_client)

2\. [Raspberry Flask Webserver](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/raspberry_server)

3\. [Progressive Web App with VueJS](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/pwa)

4\. Tampering Data with Kali (in development)

## REFERENCES

[Flask Documentation](http://flask.pocoo.org/docs/0.12/)

[Flask Socket.io](https://flask-socketio.readthedocs.io/en/latest/)

[Flask Deployment on the Heroku Cloud](https://blog.miguelgrinberg.com/post/the-flask-mega-tutorial-part-xviii-deployment-on-the-heroku-cloud)

2\. [Raspberry Flask Webserver (in development)](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/raspberry_server)
[How to setup the DHT11 Humidity Sensor on the Raspberry Pi](http://www.circuitbasics.com/how-to-set-up-the-dht11-humidity-sensor-on-the-raspberry-pi/)

3\. [Progressive Web App with VueJS (in development)](https://github.com/davikawasaki/iot-security-vulnerability/tree/master/pwa)
[Process Types and the Procfile](https://devcenter.heroku.com/articles/procfile)

## AUTHORS

Expand Down

0 comments on commit c59d07d

Please sign in to comment.