Figure 3 below shows how each device performed in the access control testing. ■ Almost all of the devices had some form of open-port vulnerability. This would enable intruders to communicate with or gain access to the devices. ■ Both the Belkin Smart Cam and HP Envy printer exposed a wide range of open ports. ■ Disturbingly, both the HP printer and DLink camera had no protection for remote access. ■ The last three columns show that most of the devices were susceptible to at least one form of DDoS attack. Open Ports (TCP) Open Ports (UDP) Vulnerable Ports Weak Passwords ICMP DDoS UDP DDoS Num. of TCP Connections Access Control Phillips Hue Light Bulb C C C A B C C Belkin Switch C C A A C C C Samsung Smart Cam C C C A C C C Belkin Smart Cam C C C A C B C Awair Air Monitor B B A A C C A HP Envy Printer C C C A A A C LIFX Bulb A B A A C B A Canary Camera A A A A C A A TP-Link Switch C C C A C C C Amazon Echo C C A A B C C Samsung Smart Things C B C A C C C Pixstar Photo Frame A C A A TP Link Camera C C C C C B C Belkin Motion Sensor C C A A C B C Nest Smoke Alarm B C A A Netatmo Camera C C C A C B C Dlink Camera C C C C C B C Hello Barbie Companion C A A A C A A Withings Sleep Monitor C C C A Nest Drop Camera A B A A A A Devices Netatmo Weather Station Reflection Attack Rating We evaluated all of the devices in their ability to "reflect" traffic and overload a victim's network, forcing it to shut down. "Amplification" is a type of reflection attack [13]. In this case, the reflection is achieved by gaining a response from an innocent IoT device to a spoofed IP address (a victim machine or server). During an amplification attack, an attacker sends a query with a forged IP address (the victim's) to the reflector (the IoT device), pro mp t ing it to reply to that address with a response. With numerous fake queries being sent out, and with several IoT devices replying si multaneously, the victim's network is overwhelmed by the sheer number of responses it's asked to make. Figure 4 below shows how each device performed. ■ Most of the devices were unable to withstand an ICMP reflection attack. ■ All dev ice s, except the LIFX light bulb, were su sc ep t i ble t o r e f l e c t i n g s ome for m of attack. ■ The Samsung Smart Cam was vulnerable across a number of protocols. A A C C Triby Speaker C A A C Withings Weighing Scale A A A A Chromecast A A A C A A C A A C Key: TCP: Transmission Control Protocol UDP: User Datagram Protocol ICMP: Internet Control Message Protocol DDoS: Dedicated Denial of Service Figure 3. Access control. 78 IEEE Technology and Society Magazine ∕ JUNE 2018