This document discusses setting up a home internet of things (IoT) system securely. It recommends creating a guest network using the existing router to separate internet access for 3 laptops, 1 gaming system, and a home security system. While subnetting could further separate the connections, it is not needed for this small home network. The document provides instructions for testing the connections by pinging addresses and recommendations for basic security measures like changing default passwords and using WPA2-PSK encryption.
Introduction to setting up a home IoT system, emphasizing secure connections for devices, whether at home or in industry.
Discussion on the components of a home IoT system including devices like laptops, gaming systems, and security, ranging from simple to complex configurations.
Overview of ways to connect multiple devices to the internet, highlighting the use of guest networks without needing extra hardware.
Explanation of subnetting limitations for home systems, followed by methods to test internet connections via ping commands.
Key security practices for home IoT systems including changing default passwords, using dynamic addressing, and securing connections with encryption.
Personal reflections on challenges faced with subnetting and security setup, emphasizing the importance of mistakes for learning in tech setups.
Introduction
IoT is veryprevalent today and
connecting all the parts of that
system securely is paramount!
Either in industry or at home.
This Photo by Unknown Author is licensed under CC BY-SA-NC
System
The system thatwe will discuss will be
a home system. This can consist of
something as simple as a computer and
TV, or as complicated as an entire smart
home. The system we will discuss will
include 3 laptops, 1 gaming system, and
a home security system.
5.
Connections
Since we willhave 3 distinct types of devices, we will
need a way to allow each one to access the internet
separately.
There are a few ways to do this. We can add a separate
connection for each through our ISP. We can create a
guest network using the current router. We can add a
separate router for each connection. Lastly there is
software that can do this for us.
6.
Connection
Since this willbe a small
network, we really don’t need
the expense of an extra router
or even software to help us.
The best idea would be to
create a guest network using
the present router which is
simply done.
7.
Subnetting
In this casewe will not need subnetting.
Unfortunately, we can not use subnetting as it was
meant to be used with an at home router. We would
need an enterprise router. The idea of subnetting is
to use a subnet mask (255.255.255.0/24) and
change it to (255.255.255.128/25) that way we can
create two subnets from the first number of the last
octet. From there we could create 2 subnets on that
mask and then we could break down to another
subnet for the third.
Pinging the
address
Once theaddresses have been set
we need to test the connection.
One of the best ways to test this is
to use ping command. This will let
us know if the connection is good
or not.
10.
Security
Some simple yeteffective things we can do to
secure our system are
1. Change the default password on everything!
2. Use dynamic addressing where possible.
3. Use WPA2-PSK and AES encryption where you
can.
11.
Challenges and Takeaways
Some of the bigger challenges for me would be using the sub -netting
and setting up the security. The main issue is to make some
mistakes so that I can learn. I must dig into these issues to truly
understand them. When dealing with a job that can be somewhat
problematic. I can do it I just need to be able to make mistakes in
order to learn. There aint nothing to it but to do it, over and over
again.