Security Analysis of the Amazon Echo Dot

Robert Brinson, Hayden Wimmer, Queen Booker

Research output: Contribution to journalArticlepeer-review

Abstract

Internet of Things (IoT) devices have the capacity to send data over Internet connections with small amounts of processing memory, limiting their ability to offer state-of-the art security functions. Because IoT devices can connect to so many different devices, the limited security makes them vulnerable to several types of attacks that could lead to access to sensitive personal data. Amazon introduced the Echo Dot in 2016 as a lower cost alternative to the popular Echo, making the Echo Dot available to many more households concomitantly increase the number of vulnerable households. Because of its potential reach, it is important to know if the Echo Dot is a secure device. In this study, we examine the vulnerability of the Echo Dot and compare our results to prior research on the Echo.

Original languageAmerican English
JournalIssues in Information Systems
Volume22
DOIs
StatePublished - Jan 1 2021

Disciplines

  • Computer Sciences

Keywords

  • Design
  • Experimentation
  • IoT
  • Security

Fingerprint

Dive into the research topics of 'Security Analysis of the Amazon Echo Dot'. Together they form a unique fingerprint.

Cite this