
This paper examines the security of UDP-based data transmission between two ESP32 devices over a Wi-Fi Wireless network. In the experiment, one ESP32 functions as a server (receiver), and the other as a client (transmitter). Our method demonstrates that an attacker after gaining access to the network can successfully craft and send malicious data packets to the ESP32 server. The methodology used in this study involves gaining access to the network and analyzing network packets to identify the ESP32 server. Once the server is identified, we use the python Scapy tool to generate malicious data packets and inject them into the network affecting the ESP32 server communication. The results highlight the significant security risks of using UDP for data transmission in IoT systems. We conclude that secure alternatives, such as encrypted communication protocols, should be employed to ensure the confidentiality and integrity of transmitted data, rather than relying on UDP.
IoT, ESP32, security, UDP, data transmission, Wi-Fi, encryption
IoT, ESP32, security, UDP, data transmission, Wi-Fi, encryption
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
