Project Overview

The Protected IoT Security and Threat Analysis/Response (PI-STAR) is an IoT-based security system designed to provide wireless security to a room with confidential information. It uses a variety of sensor modules to determine the threat level and probability of a compromising incident within a room. The system then displays real-time attack and threat level information on a web interface for continuous monitoring. Additionally, the system uses advanced security to protect against both cyber and physical attacks. Finally, the system is able to respond to critical threats by triggering an alarm and encrypting sensitive information on an external medium.

The system consists of sensor modules throughout the room as well as within the box node containing the sensitive information.

PI-STAR was created by Ibiyemi Abiodun, Simon Abrelat, Sidhesh Desai, and Grace Pfohl as part of an internship at the Georgia Tech Research Institute CIPHER-TMPO Lab.

Network

The IoT network is based on a star structure with each of the sensor modules communicating with a mother node via MQTT. In general, the sensor data is transferred from the sensors, to the Arduino UNOs, to the Raspberry Pis, which are the basis for the IoT connections.

Learn More

Threat Analysis

PI-STAR uses mathematical algorithms to determine the threat levels based on the sensor data.

Learn More

Security

PI-STAR utilizes three types of security to protect the security system against a wide range of attacks. This includes cyber attacks as well as certain physical attacks. Overall, this security is designed to ensure that the security system of the room is never compromised by an attacker.

Learn More

Data Handling

The room sensor data arrives at the gateway node after multiple transfers between devices and is populated into an SQLite database and used to determine the threat level of the room algorithmically. Meanwhile, the most recent sensor readings are displayed to the user on a front end Python web application in a numerical format. The current and historic threat level is displayed graphically and the current threat level is also relayed in a summary statement.

Learn More

View Our GitHub Page