Cybersecurity Majors Win Design Expo Senior Design Competition


Senior Design students

Four Bachelor of Science in Cybersecurity majors took first place in the Senior Design category of Design Expo 2022 for their project, “222: IoMT Device Security.” The students–Jacson Ott, Stu Kernstock, Trevor Hornsby, and Matthew Chau–are among the more than 1,000 students who participated in the event. Their winning project was sponsored by the Department of Applied Computing (AC) and advised by AC faculty member Guy Hembroff, Applied Computing. View the winning project, and all the Senior Design projects entered by College of Computing students, below. View the Enterprise projects entered in Design Expo 2022 here.

The annual Design Expo is Michigan Tech’s annual showcase for experiential, discovery-based learning. Each spring the event showcases the work of more than 1,000 students from Enterprise and Senior/Capstone Design programs. Student teams from all five Colleges–Business, Computing, Engineering, Forest Resources and Environmental Science, and Sciences and Arts–were represented. The 2022 Design Expo is generously supported by industry and university event sponsorship. View all Design Expo 2022 Senior Design entries here.

222: IoMT Device Security (Senior Design)

Our team researched the current security of Internet of Medical Things (IoMT) wearable devices. We have tested a wide selection of different smartwatches and accompanying smartphones for a number of different potential vulnerabilities. These include physical attacks, sniffing, man in the middle, dos, reverse application engineering, and more. The main purpose is to identify common weaknesses in security across this field, and to provide suggestions for mediation.

Play 222: IoMT Device Security video
Preview image for 222: IoMT Device Security video

222: IoMT Device Security

The goal of this project is to test the possibilities of security vulnerabilities between the connection of an Apple Watch and an iPhone. This is relevant because Apple devices are the most popular fitness tracking device on the market, and research shows that Bluetooth is vulnerable to certain attacks. This is especially true with its counterpart Bluetooth Low Energy, which has recently been tested for its security. We are currently in our second phase, where we are testing connections with a multitude of tools.

204: Bluetooth Attacks on Medical Wearables (Senior Design)

The goal of this project is to test the possibilities of security vulnerabilities between the connection of an Apple Watch and an iPhone. This is relevant because Apple devices are the most popular fitness tracking device on the market, and research shows that Bluetooth is vulnerable to certain attacks. This is especially true with its counterpart Bluetooth Low Energy, which has recently been tested for its security. We are currently in our second phase, where we are testing connections with a multitude of tools.

Play 204: Bluetooth Attacks on Medical Wearables video
Preview image for 204: Bluetooth Attacks on Medical Wearables video

204: Bluetooth Attacks on Medical Wearables

212: Drone-Based Crack Detection System (Senior Design)

The goal of the Drone-Based Crack Detection System is to reduce the cost and risk to workers who are inspecting areas that may be unsafe. With the use of Intel RealSense, a Raspberry Pi, and Artificial Intelligence (AI), the drone will be able to detect and label cracks in infrastructure. The drone will send live video feedback to the user with a screenshot to save. This data collected will be used to train the AI continuously.

216: Emergency Situation Solar Generator (Senior Design)

Our team was tasked with developing an affordable power source that can be resupplied via renewable solar power. The main purpose of this generator is to be deployed and used for communications and other low-voltage systems following extreme weather conditions that disable local power and disrupt the local energy supply chain.

Play 216: Emergency Situation Solar Generator video
Preview image for 216: Emergency Situation Solar Generator video

216: Emergency Situation Solar Generator

219: High Availability Cybersecurity Kit (Senior Design)

Our team developed the High Availability Cybersecurity Kit (H.A.C.K.), a low-cost cybersecurity training kit for middle school and high school students. H.A.C.K. will introduce the concepts of networking, Linux, Raspberry Pi, password cracking, wireless attacks, and much more. Modules with tutorials will lead students through the activities with a focus on experimentation and exploration, hopefully lighting a spark of curiosity that could lead into a career in cybersecurity.

Play 219: High Availability Cybersecurity Kit (H.A.C.K.) video
Preview image for 219: High Availability Cybersecurity Kit (H.A.C.K.) video

219: High Availability Cybersecurity Kit (H.A.C.K.)

223: IoT Course Development for CNSA Curriculum (Senior Design)

The goal of this project is to implement some topic that is not covered sufficiently enough within the CNSA curriculum. We first determined that topics surrounding the Internet of Things would be a sufficient topic. We then created ten labs, ten modules, homework, and a final exam for topics surrounding IoT, including data administration, IoT security and protocols, history, modern and future use of IoT, cloud and fog computing, analytics, and implementation of IoT. Upon completion of the modules we began a lab-testing phase to finalize our project. Currently, we are using IoT-based hardware including nest cameras, raspberry pi pico, and raspberry pi, to test security and implementation based IoT techniques.

Play 223: IoT Course Development for CNSA Curriculum video
Preview image for 223: IoT Course Development for CNSA Curriculum video

223: IoT Course Development for CNSA Curriculum

240: Project Athena (Senior Design)

The goal of this project is to help with the creation of a learning management system (LMS). Our team is split into two subteams–research and technical. The research subteam’s main tasks are market and user research through customer discovery methods such as conducting interviews with various end users. The technical subteam is using Adobe XD to design an automated grading pipeline. The subteams will come together to perform usability testing on the prototype design and collect user feedback to share with the client.

Play 240: Project Athena video
Preview image for 240: Project Athena video

240: Project Athena

256: WarDriving IoT (Senior Design)

Our project is composed of two focused subgroups: Offensive Red Team and Defensive Blue Team. The goal for Red Team is to utilize IoT hardware and complimentary open-source software to perform penetration testing on a network. Phases of Red Team’s project will include detection, intrusion, and attacking devices on a network while keeping cost to a minimum. The goal for Blue Team is to utilize IoT hardware and software to defend a network. Blue Team’s focus is set up in three phases: basic network setup, advanced user setup, and network lockdown. Each phase will incorporate different levels of configuration and introduce new IoT devices and software to help monitor and defend against Red Team’s attack vectors.

Play 256: WarDriving IoT video
Preview image for 256: WarDriving IoT video

256: WarDriving IoT