Date of Award


Document Type


Degree Name

Master of Science in Information Systems and Technology


Information and Decision Sciences

First Reader/Committee Chair

Shayo, Conrad Ph.D and Becerra, Benjamin Ph.D


This culminating project conducted an analysis of IoT security breach case studies. The analysis identified numerous vulnerable points: software failure, node tampering attack, eavesdropping, code injection, unauthorized access, social engineering attack, hardware exploitation, and node insertion. It therefor seems that even with the proper tests conducted on vulnerabilities to discover solutions, regular end users are unable to apply patches or other technical solutions to protect themselves. This project solely focuses on analyzing of comprehensive IoT security services that come with devices connected to home network. The devices are those provided by the big three: Amazon, Google, and Microsoft, on the communication between platform and devices, how they are protected, and how costs vary depending on different situations. Also, performance differences were analyzed among different solutions based on three different scenarios with different number of settings to give a deeper insight to users. There are comparisons throughout the paper, but it is to help normal users make better choices depending on their different situations and purpose of usage.