Demo: IoT Man-in-the-Middle Attack

Video

Description

This Demo involves a small IoT wireless network using state-of-the-art IETF standards (6LowPAN, RPL, CoAP), the IoT nodes are driven from outside the IoT network using end-to-end connectivity IPv6-CoAP messages; we implement a Man-in-the-Middle attack that disrupts the normal behavior of the system.

The demo aims at highlighting the need for source-authentication and authorization enforcement of information even inside a trusted IoT network, these services must be offered ent-to-end.

This example use case involves a robot arm pouring beverages into two cups.