A Digital Forensics Framework for Smart Environments

Total Page:16

File Type:pdf, Size:1020Kb

A Digital Forensics Framework for Smart Environments IoTDots: A Digital Forensics Framework for Smart Environments Leonardo Babun, Amit K. Sikder, Abbas Acar, and A. Selcuk Uluagac Cyber-Physical Systems Security Lab Department of Electrical & Computer Engineering, Florida International University 10555 West Flagler St. Miami, FL 33174 Email: flbabu002, asikd003, aacar001, suluagacg@fiu.edu Abstract—IoT devices and sensors have been utilized in a co- cameras, smart smoke detectors, presence sensors, and smart operative manner to enable the concept of a smart environment. thermostats, all controlled by a central hub. In such a setup, In these smart settings, abundant data is generated as a result the presence sensor can detect users and trigger the cameras of the interactions between devices and users’ day-to-day ac- to start recording while turning on the lights. At the same tivities. Such data contain valuable forensic information about time, the smart thermostat can become active and start events and actions occurring inside the smart environment and, lowering the room temperature. In this example, the smart if analyzed, may help hold those violating security policies accountable. Nonetheless, current smart app programming environment has control and gets feedback from the users’ platforms do not provide any digital forensics capability to activities to change the general state of the surroundings identify, trace, store, and analyze the IoT data. To overcome based on (1) what the users do, (2) the smart environment this limitation, we introduce IoTDots, a novel digital forensic setup policies, and (3) the state of the devices. framework for a smart environment such as smart homes and smart offices. IoTDots has two main components: IoTDots- Indeed, the interactions between devices and users in a Modifier and IoTDots-Analyzer. At compile time, IoTDots- smart environment generate data with tremendous forensic Modifier performs the source code analysis of smart apps, value. For instance, in the smart office setup previously detects forensically-relevant information, and automatically described, the changes in the presence sensor’s state may insert tracing logs. Then, at runtime, the logs are stored into a indicate the existence of individuals inside the smart office IoTDots database. Later, in the event of a forensic investigation, during unauthorized hours. Further, the smart environment the IoTDots-Analyzer applies data processing and machine data can give insights about the exact location of abrupt learning techniques to extract valuable and usable forensic spikes in temperature values or the presence of smoke information from the devices’ activity. In order to test the happening right before a fire incident. performance of IoTDots, we tested IoTDots in a realistic smart office environment with a total of 22 devices and sensors. Nonetheless, current IoT solutions do not provide any Also, we considered 10 different cases of forensic activities means for forensic analysis. In general, the limitation of and behaviors from users, apps, and devices. The evaluation available computing resources in the majority of the smart results show that IoTDots can achieve, on average, over 98% devices and the unique cloud-based architecture of IoT of accuracy on detecting user activities and over 96% accuracy makes it very challenging to store data inside the devices for on detecting the behavior of users, devices, and apps in a smart environment. Finally, IoTDots performance yields no forensic purposes. Indeed, the most popular IoT program- overhead to the smart devices and very minimal overhead ming platforms (e.g., Samsung SmartThings, openHab, etc.) to the cloud server. To the best of our knowledge, IoTDots do not provide any means to have access and indefinitely is the first lightweight forensic solution for IoT devices that store data in the cloud. Previous works have used the idea combines the collection of the forensically-relevant data from of logging to save data from smart apps and devices for a smart environment and the analysis of such data using further analysis of data provenance. For instance, in [1], the arXiv:1809.00745v1 [cs.CR] 3 Sep 2018 data processing and machine learning techniques for forensic authors propose an instrumental platform-centric approach purposes. Finally, we have made the IoTDots-Modifier available that logs activities from smart apps for data provenance. In online for the community. that work, however, the analysis considered the relationship Keywords—Digital forensics, Internet of Things, source code between devices, users, and smart apps while assuming analysis, logging. device integrity. This approach, while valid and useful, overlook the problem of tampered devices [2] that can cause the abnormal behavior of the smart environment. I. INTRODUCTION Without this analysis, the IoT forensic investigation would The Internet of Things (IoT) has quickly evolved as ignore additional threats coming from the compromised the network of Internet-enabled physical devices. The IoT devices [3], [4]. These threats can modify the state of the devices communicate with each other and interact with the smart environment by poisoning the forensic data or by users’ day-to-day activities through sensors. These capabil- leaking sensitive information that attackers can use to bypass ities have also enabled the concept of a smart environment. the security policies of the smart environment and gain Such an environment improves the quality of the life of the access, for instance, to restricted areas. In this paper, we people while handling a new set of data previously untapped. introduce IoTDots, a novel digital forensic framework for For instance, smart offices can be equipped with a set of smart environments. IoTDots has two main components: state-of-the-art gadgets like smart lights, smart surveillance IoTDots-Modifier (ITM) and IoTDots-Analyzer (ITA). The ITM analyzes smart applications looking for forensically- devices including smart lights, smart thermostats, relevant information inside the apps. Then, the smart apps motion sensors, etc. and 22 devices in total. are modified by inserting specific logs that will send the • Our results demonstrate that IoTDots achieves very forensic data to the IoTDots Logs Database (ITLD) at high accuracy on revealing forensic-relevant activi- runtime. Later, in a case of a forensic investigation, the ITA ties and behavior inside the smart environment. applies data processing and machine learning techniques on the ITLD data to comprehensively learn the state of the smart • Finally, since IoTDots focuses on forensic-relevant environment and the users’ behavior at the time of interest data only, its performance does not represent ad- of the forensic analysis. IoTDots considers the events and ditional overhead in terms of computing resources actions inferred from the ITLD data and the security policies to the smart devices and minimal overhead to the defined for the smart environment to detect potential security cloud-based servers. violations from users, devices, or smart apps. Organization: The rest of this paper is organized as follows. Specifically, IoTDots will look for users performing In Section II, we present the background information. Then, activities that potentially violate the security policies inside a use case and the threat model are described in Section III. a smart environment. Also, IoTDots will use the relationship Section IV details the architecture of IoTDots and Section between devices’ states to detect users trying to remove, dis- V describes the data processing and machine learning tech- able, or tamper IoT devices and/or malicious apps modifying niques utilized by the proposed forensic framework. Then, the data extracted from the smart environment. the evaluation results are analyzed in Section VI, followed by the benefits, challenges, limitations of IoTDots and future We evaluate IoTDots in a smart environment con- work in Section VII. Finally, the related work in Section VIII taining different types of devices including smart lights, and the conclusions in Section IX complete the paper. smart thermostats, motion sensors, etc. Experimental results demonstrate that IoTDots performs very well on detecting, II. BACKGROUND storing, and processing forensically-relevant data from the smart environment. Specifically, for activity detection, our Digital Forensics: The term digital forensics refers to the framework achieves up to 98% accuracy for both time- investigation and the uncovering of any kind of evidence dependent1 and time-independent2 activities. On the other from electronic devices containing digital data. The most hand, for the case of behavior detection, our framework basic application of digital forensics investigations is to achieves 96% accuracy. Additionally, a detailed performance either support or oppose the hypothesis proposed in a case analysis shows that no overhead is imposed to the smart before a court. Frequently, digital forensics requires the devices and minimal overhead is imposed to the use of analysis of physical evidence directly related to people’s physical memory and latency on the cloud-based servers as presence in the event scene such as an audio or video a result of utilizing IoTDots. file. In other cases, a more deep investigation of more technical evidence such as network data or mobile device Summary of Contributions: The contribution of this work forensics may be required. Complex cases may require the are as follows: combination of both types of analysis. • We propose IoTDots, a novel digital forensic
Recommended publications
  • Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems
    Dangerous Skills: Understanding and Mitigating Security Risks of Voice-Controlled Third-Party Functions on Virtual Personal Assistant Systems Nan Zhang∗, Xianghang Mi∗, Xuan Fengy∗, XiaoFeng Wang∗, Yuan Tianz and Feng Qian∗ ∗Indiana University, Bloomington Email: fnz3, xmi, xw7, [email protected] yBeijing Key Laboratory of IOT Information Security Technology, Institute of Information Engineering, CAS, China Email: [email protected] zUniversity of Virginia Email: [email protected] Abstract—Virtual personal assistants (VPA) (e.g., Amazon skills by Amazon and actions by Google1) to offer further Alexa and Google Assistant) today mostly rely on the voice helps to the end users, for example, order food, manage bank channel to communicate with their users, which however is accounts and text friends. In the past year, these ecosystems known to be vulnerable, lacking proper authentication (from the user to the VPA). A new authentication challenge, from the VPA are expanding at a breathtaking pace: Amazon claims that service to the user, has emerged with the rapid growth of the VPA already 25,000 skills have been uploaded to its skill market to ecosystem, which allows a third party to publish a function (called support its VPA (including the Alexa service running through skill) for the service and therefore can be exploited to spread Amazon Echo) [1] and Google also has more than one thousand malicious skills to a large audience during their interactions actions available on its market for its Google Home system with smart speakers like Amazon Echo and Google Home. In this paper, we report a study that concludes such remote, large- (powered by Google Assistant).
    [Show full text]
  • Home Automation Controller Automate Your World
    Home Automation Controller Automate Your World with the HomeSeer HomeTroller-SEL Our new HomeTroller is an advanced home automation controller that’s designed to simplify your life by integrating and automating the major systems of your home! Use it to monitor and control lighting, appliances, climate, security, irrigation, window shades and home entertainment equipment. Key Features Keep tabs on your home while you’re away! Built-in web server for remote access anywhere. Ensure your family is safe! Easy-to-use web interface allows easy access and control with any web browser. Receive announcements, alerts and reminders! Supports the widest variety of user interfaces, including Conserve energy and lower utility bills! wall controllers, touchscreens, smart phones and tablets. Compatible with a wide variety of technologies including Remotely control door locks and thermostats! Z-Wave®, X10, UPB™, Insteon® and many others. Designed for voice control by microphone and mobile HomeTroller supports the widest variety of user device. interfaces available. Choose from multi-button scene Creates alerts, announcements and reminders by email controllers, touchscreens, tablets and smart phones! and text message. Mix and match any combination of interfaces you like to Includes calendar-based functions for easy scheduling. suit the needs of your family. Automation events may be created ‘on-the-fly’ with voice commands. The built-in web server allows you to access your home Fanless, diskless design for silent operation and ultra-high while you’re away at work or on vacation. Easily keep durability. tabs on your home and family with any web browser. Ultra low power consumption conserves energy and lowers utility bills.
    [Show full text]
  • No Recharging Or Power Stealing. It's the Smart Thermostat Pros Trust
    No recharging or power stealing. It’s the smart thermostat Pros trust. 5-YEAR PRO INSTALL WARRANTY Get our 3-year standard warranty plus 2 years for pro purchase and install. Here’s why pros love us. Here’s why consumers love us. RELIABLY POWERED CONTROL FROM ANYWHERE, ANYTIME No common wire? No problem. Your ecobee comes with a Customers can easily control temperature and settings Power Extender Kit so it doesn’t rely on other equipment from anywhere with an Apple Watch, Android, or to charge itself. iOS device. COMPATIBLE WITH MOST AVERAGE 23% SAVINGS* ecobee3 lite works with most HVAC systems including When customers bring home the ecobee3 lite, they radiant heating systems, multistage, and dual fuel save an average of 23% annually on heating and heat pumps. ecobee.com/compatibility cooling costs. *Learn more at ecobee.com/savings EASY INSTALLATION UPDATES YOU AS NEEDED Installation takes 30 minutes or less in most cases. We also ecobee3 lite monitors heating and cooling systems, and offer easy access to HVAC tech support, wiring diagrams, alerts customers if it senses something is wrong. and manuals if you ever need assistance. SUPPORT HOURS Available 8am–10pm (Mon–Fri) and 9am–9pm (Sat-Sun). 1.866.518.6740 | [email protected] Apple, iPhone, iPad, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. HomeKit is a trademark of Apple Inc. Use of the HomeKit logo means that an electronic accessory has been designed to connect specifically to iPod, iPhone, or iPad, respectively, and has been certified by the developer to meet Apple performance standards.
    [Show full text]
  • Homeseer HS3 - End User Documentation
    HomeSeer HS3 - End User Documentation User Manual Created: Tuesday, March 04, 2014 Copyright © HomeSeer Technologies LLC. All Rights Reserved. HomeSeer HS3 - End User Documentation copyright © HomeSeer Technologies LLC. All rights reserved. http://www.homeseer.com The information contained in this document is subject to change without notice. This document contains proprietary information which is protected by copyright. All rights are reserved. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of HomeSeer Technologies LLC. Table of Contents Chapter 1: Welcome HS3 1 Chapter 2: QuickStart 2 First Things First 2 Installing Hardware Interfaces 3 Installing Software Interfaces 4 Creating Devices 4 Creating Events 5 Remote Access 6 Chapter 3: Using Events 8 Event Triggers 9 Event Actions 10 Chapter 4: Setup 12 General 12 Network 13 Email 15 Voice 16 Custom 16 Chapter 5: Text-To-Speech 18 Using Replacement Variables 18 Chapter 6: Voice Recognition 20 Chapter 7: Scripting 25 About Scripts 25 Common Scripting Questions 25 Creating A Script 26 Debugging Scripts 27 Executing Single Script Statements 27 User Supported Scripts 28 VB.NET Scripts and NameSpaces 29 Applications and Plugins 30 System Information 30 AppStarting 31 DebugMode 31 GetAppPath 32 InterfaceVersion 33 IsLicensed 33 ShuttingDown 34 SystemUptime 34 SystemUpTimeTS 35 Version 36 System Functions 36 BackupDB 37 PowerFailRecover 38 ScheduleFile 38 Shutdown 39 System 39 INI File Editing 40 ClearINISection 40
    [Show full text]
  • Homeseer HS4-Pi Install Guide
    HomeSeer HS4-Pi Install Guide This guide will allow you as the user to use your Raspberry Pi to run HS4. When installed on the Raspberry Pi, HS4-Pi creates an ultra-small, powerful Z-Wave home automation gateway controller. Requirements: • Raspberry Pi2, Pi3, Pi3 B+, or Pi4 • Blank microSD Card of 16GB* or bigger • SD Card reader Downloads: • HomeSeer Rasp-Pi Image (Full 1.6GB) • Etcher (image flashing) Full Image Procedure (option 1): 1. Download the HS4PiV3-071320.zip from the link above. 2. Once the download is finished, extract the HS4PiV3-071320 from the zip folder. This may take up to 20 minutes. 3. Download, install, and run Etcher. 4. Insert blank SD card into SD card reader. 5. Select the HS4PiV2-071320 file and the correct drive letter of your SD card. Click Flash. The process could take up to 20 minutes. 6. Once the flash completes, remove your SD card and insert into your Pi. 7. Boot up will take about a minute. Go to find.homeseer.com to start using HS4! Note: root pw = homeseerpi | homeseer pw = hsthsths4 Click here for the complete HS4 Quick-Start Guide. Click here for the getting started video. Click here for more help with HS4. Troubleshooting Rasp-Pi All customers have lifetime support. Initially you have 30 Day Priority Phone Support and after that you have support through our Help Desk (helpdesk.homeseer.com) and our community based Message Board (board.homeseer.com). *Some 16GB SD card’s capacity may be a few MBs short of the required size due to manufacturers.
    [Show full text]
  • Hometroller S6 Getting Started Guide
    HomeTroller S6 Getting Started Guide Congratulations on your purchase! Your HomeTroller S6 is ready to put you in control of your home. Please take a few minutes to read through this guide to familiarize yourself with the steps required to set up your Z-Wave network and your HomeTroller. STEP #1 – HomeTroller S6 Initial Setup To begin using HS3 you will need to setup your HomeTroller S6. Follow these steps: HomeTroller Hardware Installation a) Unpack the HomeTroller and AC power supply. b) Connect a monitor, mouse, and keyboard for initial set up. (The unit is also accessible remotely using VNC or find.homeseer.com) c) Connect an Ethernet cable to your HomeTroller and to a network port on your internet router. (Wifi can be configured if desired) d) Connect the AC power adapter to your HomeTroller to begin the boot process. The HomeTroller will power on by itself. Accessing the HomeTroller Web Interface If you do not have a keyboard, mouse, and monitor, then you will want to access the controller from a web browser on another computer in your home. The method below should work with any browser on any device (mobile or desktop). a) Navigate to http://find.homeseer.com b) Click the “Search” button. Your HomeSeer system should now appear at the bottom. c) Click the IP address hyperlink to access your system’s web interface. Registering your HomeTroller You must register your unit to allow HS3 to boot up fully and automatically every time a restart occurs. This requires a monitor and keyboard, remote desktop, or using VNC (see section 2) Note: License codes are included on a sticker on the bottom of your HomeTroller S6.
    [Show full text]
  • Home Automation Controller Automate Your World with the Homeseer Hometroller
    Home Automation Controller Automate Your World with the HomeSeer HomeTroller™ Our new HomeTroller is an advanced home automation controller that’s designed to simplify your life by integrating and automating the major systems of your home! Use it to monitor and control lighting, appliances, climate, security, telephones, irrigation, window shades and home entertainment equipment. Key Features Keep tabs on your home while you’re away! Built-in web server for remote access anywhere. Ensure your family is safe! Easy-to-use web interface allows easy access and control Receive announcements, alerts and reminders! with any web browser. Supports the widest variety of user interfaces, including in Conserve energy and lower utility bills! -wall button controllers, touchscreens, wireless remotes, PDAs, PocketPCs, cellphones and voice (microphones). Retrieve phone messages by web or phone! Compatible with a wide variety of technologies and HomeTroller supports the widest variety of user companies including Lutron®, Leviton®, Z-Wave®, interfaces available. Choose from in-wall button UPB®, Insteon® and many others. controllers, touchscreens, wireless remotes, Designed for voice control by microphone and telephone. Creates alerts, announcements and reminders by email, microphones, PDAs, PocketPCs, telephones (voice telephone and text message. and touch-tone control) and personal computers. Mix Supports complete telephone messaging with caller ID and match any combination of interfaces you like to suit announcements (w/optional telephone interface). the needs of your family. Includes calendar-based functions for easy scheduling. Automation events may be created ‘on-the-fly’ using voice The built-in web server allows you to access your home commands. while you’re away at work or on vacation.
    [Show full text]
  • Homeseer HS3 Quick-Start Guide
    HomeSeer HS3 Quick-Start Guide Welcome to HomeSeer’s newest installment of our Home Automation Software! HS3 provides a new interface, a more efficient application, a brand new and more robust event engine, and many newly added features that only HS3 can provide you! Here is a guide to get you started. For any further assistance please refer to the online help files. STEP #1 – HS3 Initial Setup To begin using HS3 you will need to download and install the application. HS3 Installation/Setup a) Download HS3 from www.homeseer.com/downloads. b) Once the download has finished, run the file. c) You will now be prompted to click next and more than likely install Microsoft .Net Framework ver. 4.0. Let that install. Once finished proceed with the installation of HS3. d) Once HS3 is finished, restart your computer. (If you want HS3 to boot up upon the start-up of your computer, copy the HS3 application shortcut to your Startup folder in your Start Menu. e) Once the computer has restarted you can now start HomeSeer. f) To access HomeSeer from another computer use find.homeseer.com to locate HS3 on your network. Otherwise, HS3 will automatically show the web interface once startup is complete. Registering your HomeTroller You must register your unit to allow HS3 to boot up fully. Your license would have been emailed to your HomeSeer shop email address. You can get your licenses from https://homeseer.com/licensing-issues/ or contact us. a) Go to the Tools dropdown navigation at the top and click on Setup.
    [Show full text]
  • Utilitee Market Analysis Report – First Version”
    Ref. Ares(2018)5602201 - 31/10/2018 Utility Business Model Transformation through human-centric behavioural interventions and ICT tools for Energy Efficiency D6.3 UtilitEE Market Report – First Version Version number: 0.7 Dissemination Level: PU Lead Partner: SOLINTEL Due date: 31/10/2018 Type of deliverable: R STATUS: Final Copyright © 2018 UtilitEE Project This project has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement No 768600 D6.3 UtilitEE Market Report – First Version Published in the framework of: UtilitEE - Utility Business Model Transformation through human-centric behavioural interventions and ICT tools for Energy Efficiency UtilitEE website: www.utilitee.eu Authors: Hugo Grasset – Solintel Dimitris Panopoulos – Suite 5 Evangelos Zacharis – Hypertech Eva Muñoz – ETRA I+D Revision and history chart: VERSION DATE EDITORS COMMENT Creation of ToC for consolidation of market 0.1 31/08/2018 Solintel analysis and research Assessment of ToC and contribution on utility 0.2 20/09/2018 Solintel level solutions. 0.3 10/10/2018 Solintel First draft of D6.3 0.3 12/10/2018 Suite 5 Comments and feedback to be addressed 0.4 26/10/2018 Solintel Final version for review 0.5 30/10/2018 Suite 5 Final comments and additions 0.6 31/10/2018 ETRA Review process 0.7 31/10/2018 Hypertech E.C. Submission Disclaimer: This document reflects only the author’s views and the Commission is not responsible for any use that may be made of the information contained there 2 D6.3 UtilitEE Market Report – First Version Table of content 1 Executive summary ..............................................................................
    [Show full text]
  • Table of Contents
    Table of Contents 1 Overview ................................................................................................................................................ 9 1.1 Version Comparison ....................................................................................................................... 9 1.2 Acknowledgements .......................................................................................................................17 2 System Architecture ..............................................................................................................................18 2.1 Controller Selection .......................................................................................................................19 3 Installation .............................................................................................................................................21 3.1 Standalone .....................................................................................................................................21 3.1.1 Windows PC Host .................................................................................................................21 3.2 Homeseer .......................................................................................................................................22 3.3 Registration ....................................................................................................................................23 3.3.1 Standalone .............................................................................................................................23
    [Show full text]
  • No Recharging Or Power Stealing. It's the Smart Thermostat Pros
    No recharging or power stealing. It’s the smart thermostat Pros trust. 5-YEAR PRO INSTALL WARRANTY Get our 3-year standard warranty plus 2 years for pro purchase and install. Here’s why pros love us. Here’s why consumers love us. RELIABLY POWERED CONTROL FROM ANYWHERE, ANYTIME No common wire? No problem. Your ecobee comes with a Customers can easily control temperature and settings Power Extender Kit so it doesn’t rely on other equipment from anywhere with an Apple Watch, Android, or to charge itself. iOS device. COMPATIBLE WITH MOST AVERAGE 23% SAVINGS* ecobee3 lite works with most HVAC systems including When customers bring home the ecobee3 lite, they radiant heating systems, multistage, and dual fuel save an average of 23% annually on heating and heat pumps. ecobee.com/compatibility cooling costs. *Learn more at ecobee.com/savings EASY INSTALLATION UPDATES YOU AS NEEDED Installation takes 30 minutes or less in most cases. We also ecobee3 lite monitors heating and cooling systems, and offer easy access to HVAC tech support, wiring diagrams, alerts customers if it senses something is wrong. and manuals if you ever need assistance. TRY IT WITH ROOM SENSORS They measure temperature to help with hot and cold spots throughout the home, and detect occupancy to ensure savings. Sold separately. SUPPORT HOURS Available 8am–10pm (Mon–Fri) and 9am–9pm (Sat-Sun). 1.866.518.6740 | [email protected] Apple, iPhone, iPad, and iPod touch are trademarks of Apple Inc., registered in the U.S. and other countries. HomeKit is a trademark of Apple Inc.
    [Show full text]
  • PRO-100 Brochure.Pdf
    from scores of industry leaders. For the first time, you can truly take a custom ‘best of breed’ approach matching just the right systems for your clients based on needs and affordability… and the PRO-100 will integrate them all! Reliability The PRO-100 was designed to be the most reliable home controller available. The unit is free from any moving parts. There is no hard drive and no cooling fan to break down. An About Us embedded operating system provides the HomeSeer Technologies was formed in 1999 most reliable software platform. to serve the needs of the home automation community. Founder Richard Helmke was Web Based Management dissatisfied with software available at that time The system is managed using any web and set about to develop a new breed of home browser. This allows for easy configuration on automation software. Our first product, or off site. Remote access to the unit offers the HomeSeer HS1 became the world’s first web- ability to remotely manage the unit without enabled, voice controlled home automation traveling to the client site. Easily add/change program. Over the years, HomeSeer has schedules or troubleshoot issues from your evolved into the most flexible, powerful and office! easy to use program available with thousands of users worldwide. Today, HomeSeer is Mechanical Design considered by most to be the very best home The PRO-100 has a very small footprint automation program available. (11”wide x 7” deep x 2” high) and can be installed or mounted in a variety of locations. PRO-Series Since the unit is fan-less, it can be installed in Our PRO-Series division was created cabinets or other areas with limited ventilation.
    [Show full text]