Sok: Security Evaluation of Home-Based Iot Deployments

Total Page:16

File Type:pdf, Size:1020Kb

Sok: Security Evaluation of Home-Based Iot Deployments SoK: Security Evaluation of Home-Based IoT Deployments Omar Alrawi∗, Chaz Lever∗, Manos Antonakakis∗, Fabian Monrosey ∗Georgia Institute of Technology falrawi, chazlever, [email protected] yUniversity of North Carolina at Chapel Hill [email protected] Abstract—Home-based IoT devices have a bleak reputation cyber operations [1]. To make matters worse, some vendors regarding their security practices. On the surface, the insecurities leave service backdoors in their devices that are later dis- of IoT devices seem to be caused by integration problems that covered and exploited by botnets [13]. Even unsophisticated may be addressed by simple measures, but this work finds that to be a naive assumption. The truth is, IoT deployments, at criminal groups are taking advantage of the rampant insecu- their core, utilize traditional compute systems, such as embedded, rities to run distributed denial-of-service (DDoS) attacks [2]. mobile, and network. These components have many unexplored Unfortunately, cleanup efforts and vulnerability patching are challenges such as the effect of over-privileged mobile applica- far from perfect, and as additional devices come online, the tions on embedded devices. threats that target them become versatile, which enables them Our work proposes a methodology that researchers and practitioners could employ to analyze security properties for to spread even further [14]. To systematically address these home-based IoT devices. We systematize the literature for home- security issues, researchers need to understand the landscape based IoT using this methodology in order to understand attack by conducting measurements and in-depth studies to classify techniques, mitigations, and stakeholders. Further, we evaluate 45 and address the vulnerabilities. There are ample research devices to augment the systematized literature in order to identify efforts for home-based IoT security, but they are scattered. Our neglected research areas. To make this analysis transparent and easier to adapt by the community, we provide a public portal to community needs an understanding of the current literature, a share our evaluation data and invite the community to contribute derivation of insights, and an identification of security gaps. their independent findings. The insights would allow the research community to formalize what insecurities are perpetuated, what are the proposed mit- I. INTRODUCTION igations, and what responsibilities stakeholders bear. Further, Security problems involving Internet of Things (IoT) con- these in-depth studies and classifications of literature can guide tinue to cause severe operational issues with high-profile the community to help prioritize their efforts. attacks [1], mass exploitation of devices [2], and eye-catching In this work, we propose a modeling methodology to study headlines about “exotic” device hacking [3]. The demand for home-based IoT devices and evaluate their security posture IoT devices — especially in the multi-billion-dollar residential based on component analysis, namely: the IoT device, the market [4] — has created a modern-day gold rush. New companion mobile application, the cloud endpoints, and the and established companies are rushing to grab a piece of associated communication channels. Leveraging our approach, the IoT market. As time-to-market and production costs take we systematize the research literature for home-based IoT priority over prudent security practices, the all-too-familiar devices to understand attack techniques, proposed mitigations, sight of compromised IoT devices is numbing. Researchers and stakeholder responsibilities. We use the knowledge to and vendors are playing catch-up to address IoT insecurities, derive insights and identify research opportunities for our com- but much of the efforts are indistinct and ad-hoc. munity. Additionally, we evaluate 45 home-based IoT devices Several working groups and market leaders have proposed that are available on the market today and provide an overview standardizations for IoT devices [5]–[12], but unfortunately, of their security properties across the IoT components. they have not agreed on a solution. Additionally, the het- Based on the systematization and evaluation, we compare erogeneity of home-based IoT devices contributes to these the insights found between both approaches showing the insecurities because although core functionalities are alike, commonalities and differences. We provide a list of mitiga- specific features based on the device type can be vastly tions for each component and propose strategies for different different. For example, an IoT vacuum cleaner and a home stakeholders to address the issues found. Most importantly, assistant device may use an embedded Linux operating system, we establish a portal1 where we invite our fellow researchers, but the running services on the device will be different. These vendors, and power-users to contribute new device evaluations differences make it difficult to analyze diverse home-based IoT and to reproduce our results using the published dataset and products. proposed methodology. State-sponsored adversaries are well aware of these predica- ments, and they have taken advantage to run sophisticated 1The evaluation portal is available online at: https://yourthings.info. Fig. 1: Typical home-based IoT setup. Fig. 2: Single IoT deployment. Fig. 3: IoT graph model. Cloud Endpoint s edrVendor/User Vendor Cloud Endpoint s c1 c0 d2 ∗ d0 a0 d1 LE Devices IoT Hub Mobile Apps Smart TV LE Devices IoT Hub Mobile Apps II. METHODOLGY • Permissions refers to a mobile application being over- The contribution of our work is two-fold, the systemati- privileged. zation of literature and the evaluation of home-based IoT • Programming refers to the mobile application containing devices. The work relies on an abstract model that segments vulnerable implementations, including improper use of IoT deployments into components, which we apply to the cryptographic protocols. research literature and the device evaluations uniformly. • Data protection refers to the mobile application hard coding sensitive information. A. Abstraction Model Overview The communication of the components have two attack cat- We propose an abstract model to represent IoT deployments egories, encryption and man-in-the-middle (MITM) that are and their topologies. Figure1 is an example of an IoT con- defined as follows: nected home with multiple devices. The approach involves • Encryption refers to lack of encryption or support of segmenting each device into its respective topology as shown weak encryption protocols. in Figure2. Formally, we define an IoT deployment as a set • MITM refers to the susceptibility to a man-in-the-middle of vertices V and edges E as illustrated in Figure3. Overall, attack. our abstract model has four main components: a set of devices The cloud endpoint shares the following attack categories with (D), a set of cloud endpoints (C), a set of mobile applications devices and communication edges: vulnerable services, weak (A), and a set of communication channels (E). authentications, and encryption, as defined above. where: A; C; D ⊂ V ; D : fdi; i 2 Zg; Mitigation. The mitigation categories, patching and frame- work C : fcj; j 2 Zg; A : fak; k 2 Zg; , span all four components. Patching refers to mitigating E : fe ; l 2 g an attack vector by patching the components through vendor l Z updates or user attentiveness. The framework category miti- For each device deployment, we construct a representative gates fundamental problems that require a new approach. graph and examine the security properties for each component. Stakeholders. The stakeholder categories, vendors and end- B. Security Properties users, span all four components. These categories indicate which stakeholder is responsible for mitigation. Figure1 The security properties have three categories: attack vectors, segments the IoT deployment into vendor-and-user-controlled mitigations, and stakeholders. Attack vectors are the methods networks. The cloud endpoint is controlled and mitigated by used to circumvent the security of the IoT system. The the vendor, while the components within the home network mitigations define which measures should be taken to address may expose configuration parameters so users can disable the attack vectors. Lastly, the stakeholders represent the party vulnerable features. For example, if the device has a known responsible for mitigation. default password and the vendor allows users to change the Attack Vector. The device has three attack categories: vulner- default password, then the end-user can change the password able services, weak authentications, and default configurations to secure the device. that are defined as follows: • Vulnerable services refers to vulnerabilities in running C. Systematization Approach services. The systematization uses the proposed abstract model, • Weak authentications refers to weak or guessable cre- which presents the literature uniformly across the categories dentials. discussed earlier identifying their attack techniques, proposed • Default configurations refers to the device operating mitigations, and stakeholder responsibilities. Each work can with insecure factory settings. fit into one or more of the IoT components. The literature for The mobile application has three attack categories, permis- the systematization is chosen based on the following criteria: sions, programming, and data protection that are defined as • Merit: The work is unique and among the first to explore
Recommended publications
  • Internet of Things Network Study
    Internet of Things Network Study By Masters in Embedded and Cyber-Physical Systems Research Advisor Dan Cregg Team members Ta-Yu Chiu Neha Sadhvi Yidi Fan Ricky Yang Contents 1.Thesis Statement 3 2. Introduction 3 3. Objectives 3 4. Equipment and Devices 3 5. Network Protocols in Study 4 6. Testing Environment 6 7. Number of devices under Test 6 8. Network Layer Frequency 6 9. Physical Layer Frequency 6 10. Test Setup 7 11. Results 8 12. Constraints 13 13. Conclusion 14 14. References 14 15. Acknowledgements 15 16. Contacts 15 1.Thesis Statement As the use of smart embedded devices grows in our daily life, current networking technologies are expected to be strained beyond their original intent. Consumers face unacceptable performance as nodes are increased and network bandwidth is consumed in physically constraining environments. Various network types and use cases, thus, are explored to determine current failure points in common IoT home smart devices. 2. Introduction At the time of this report, there has been an unprecedented uptake in the use of ‘smart’ devices in the home. The introduction of voice recognition platforms such as Google Home and Amazon Alexa has fueled the use of small, inexpensive, connected sensing and control devices. Controls for Heating and Air Conditioning have been popular, as well as various sensors for doors, windows, etc.. Perhaps the most pervasive has been the acceptance of these types of systems for lighting control. Due to the sheer number of nodes available in a home, lighting nodes to be controlled is very large. This research will focus on various types of network technologies with the goal of physically simulating small to large sets of devices to determine acceptable response time.
    [Show full text]
  • Woo Project Overview
    WoO Approach General Overview WF-IoT 2014 Mihaela Brut, Patrick Gatellier Thales Services, France Ilyoung Chong, Hankuk University of Foreign Studies, Korea 6th Of March 2014 2 / 01: Scientific and Business Context Scientific and Business Context 3 / Context – IoT and WoT gather more and more devices IoT boom: u Since 2007: more devices than people are connected to Internet (Cisco IoT IBSG, 2011) u In 2020: 50 billions devices will be connected to Internet (Ericson, 2010) u In 2020: the global M2M business (large industry, solution providers, connectivity providers) will reach 260 milliards Euros (Machina Research, 2012); u By 2020: IoT will add $1,9 trillion to the global economy (Gartner, 2013) => huge business application development (WoT & Future Internet boom) People connected to Internet resulted in Web 1.0, 2.0, 3.0 … applications What can we imagine about the future of the connected devices? 4 / Context – status of IoT and WoT business Huge deployment of smart devices and sensors, resulting in huge amount of data collected, not exploited in real-time, nor outside a closed system: u Smart metering => filtered data is selected for billing purposes, and various statistic analysis are accomplished £ If a third party (e.g. insurance company) is interested in specific data, no legal framework and no technical support u Smart homes: each equipment is able to switch in secure mode, and to send information or alarm messages, eventually to receive remote control commands £ France: government investment in “sensing” the elder people homes
    [Show full text]
  • Hypermedia Apis for Sensor Data: a Pragmatic Approach to the Web of Things
    Hypermedia APIs for Sensor Data: A pragmatic approach to the Web of Things The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Russell, Spencer, and Joseph Paradiso. “Hypermedia APIs for Sensor Data: A Pragmatic Approach to the Web of Things.” Proceedings of the 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (2014). As Published http://dx.doi.org/10.4108/icst.mobiquitous.2014.258072 Publisher European Union Digital Library/ICST Version Author's final manuscript Citable link http://hdl.handle.net/1721.1/103763 Terms of Use Creative Commons Attribution-Noncommercial-Share Alike Detailed Terms http://creativecommons.org/licenses/by-nc-sa/4.0/ Hypermedia APIs for Sensor Data A pragmatic approach to the Web of Things Spencer Russell Joseph A. Paradiso [email protected] [email protected] Responsive Environments Group MIT Media Lab Massachusetts Institute of Technology Cambridge, MA, USA ABSTRACT dards and protocols such as AllJoyn1 and MQTT2, other As our world becomes more instrumented, sensors are ap- projects [20] seek to use existing application-level Web stan- pearing in our homes, cars, and on our bodies [12]. These dards such as HTTP to provide an interface that is more sensors are connected to a diverse set of systems and pro- familiar to developers, and also that can take advantage of tocols driven by cost, power, bandwidth, and more. De- tooling and infrastructure already in place for the World spite this heterogeneous infrastructure, we need to be able Wide Web. These efforts are often dubbed the Web of to build applications that use that data, and the most value Things, which reflects the relationships to existing Web stan- comes from integrating these disparate sources together.
    [Show full text]
  • Required Submission Information for Each Award
    I. Market Overview The network system protocols market closely follows the trends in home and building automation markets. Home and building controls can effectively be performed through wireless and powerline platforms. In addition, several manufacturers produce systems based on proprietary protocols. Any changes in the home or building automations markets have a direct impact on the market demand for these platforms. The residential segment forms a major portion of the application for these platforms, driven by a growing awareness about the benefits rendered through home automation. In 2005, revenues for the North American home automation market were estimated at $1,268.9 million and the market is expected to witness steady growth in the future. As a result of this, the protocols market is also experiencing healthy growth. Another crucial trend in this industry is the developing shift from proprietary platforms to open ones, which offers interoperability and more flexibility to end- users. The industry is also witnessed an increasing interest in wireless solutions, which in turn has driven the markets for radio frequency (RF) platforms. Although wireless solutions have been able to make some headway in the home automation market, some critics remain unconvinced of their effectiveness in terms of reliability. On the other hand, powerline communication offers more reliability and an extended reach. Hence, there is a need for simple and affordable protocol that can offer the benefits of both RF and powerline platforms. Moreover, the use of this open platform is likely to enable end-users to choose from a range of products, which is not feasible when using native or proprietary platforms.
    [Show full text]
  • Zigbee, Bluetooth LE, Enocean, Wavenis, Insteon and UWB *Ms
    Proc. of the Intl. Conf. on Recent Trends In Computing and Communication Engineering -- RTCCE 2013 Copyright © Institute of Research Engineers and Doctors. All rights reserved. ISBN: 978-981-07-6184-4 doi:10.3850/ 978-981-07-6184-4_60 A Comparative Study of Wireless Technologies: Zigbee, Bluetooth LE, Enocean, Wavenis, Insteon and UWB *Ms. Harneet kaur, #Ms. Sukesha Sharma Abstract-The major design challenge of home automation is to powered and battery less with low power radio frequency choose best standard for controlling devices in existing home (RF). Radio frequency having a biggest advantage over environments without any changes in infrastructure. In recent infrared (IR) that new devices can easily be added or removed years Zigbee was the promising technology for home from the network. Individual devices forming a network and automation. But, nowadays there are some other standards all are working together in harmony. After forming a network which give their best for controlling home devices. This paper presents an overview of different wireless communication there are certain events that takes place like manual events, standards by comparing their main features in terms of various timed events and triggered events. All devices are connected metrics such as range, frequency band, maximum node count, to common network and controlled by a central regulation security, and cost. and control unit. There are three types of controls systems such as: -Individually control system: Only one appliance or function Keywords: Wireless technologies, Bluetooth LE, Zigbee, is controlled in these systems. For example a remote control Enocean, Insteon, Wavenis, UWB. unit. -Distributed control systems: Controller elements are not in Introduction central location in these systems, they are distributed In today’s life because of huge amount of standards available throughout the network and controlled by one or more in the market choosing the best one is the biggest challenge.
    [Show full text]
  • Home Control Assistant Version 12 Appendixes
    Home Control Assistant Version 12 Appendixes WWW.HCATech.com The information contained in this document is subject to change without notice. Advanced Quonset Technology, Inc. provides this information “as is” without warranty of any kind, either expressed or implied, but not limited to the implied warranty of mechantability and fitness for a particular purpose. Advanced Quonset Technology, Inc. may improve or change the product at any time without further notice; this document does not represent a commitment on the part of Advanced Quonset Technology, Inc. The software described in this document is furnished under a license agreement or nondisclosure agreement. The software may be used or copied only in accordance with the terms of the licensing agreement. Windows is a registered trademark, and Windows NT is a trademark of Microsoft Corporation. All other product names and services identified in this document are trademarks or registered trademarks of their respective companies and are used throughout this document in editorial fashion only and for the benefit of such companies. No such uses, or the use of any trade name, is intended to convey an endorsement or other affiliation with Advanced Quonset Technology, Inc. © 2001-2013 Advanced Quonset Technology, Inc. All rights reserved. Printed in the U.S.A. November 15, 2013 Appendix 1 HCA versions and Interface Support..........................................................................................................1 Appendix 2 CM11 / CM15 ............................................................................................................................................3
    [Show full text]
  • Smart Homes and the New White Futurism
    Journal of Futures Studies 2021,Vol. 25(4) 45–56 DOI: 10.6531/JFS.202106_25(4).0004 Article Smart Homes and the New White Futurism Adam Richard Rottinghaus1,* 1Assistant Professor of Media, Journalism & Film, Miami University, Williams Hall, 208, 350 Oak Ave., Oxford, OH, 45056, USA Abstract This article explores the consumer technology industry’s discourse about emerging Internet of Things smart home devices and sketches an outline of a “new white futurism.” New white futurism displaces prior consumer fantasies of labor-free living in smart homes and frames emerging smart home devices as tools for data-driven management of work/life balance in contemporary heteronormative, white, middle-class culture. The research draws on existing scholarly literature, archival documents, contemporary marketing discourses, and participant observation at CES in 2014 and 2018. The article concludes that it is crucial to reimagine cultural relationships to emerging technologies through Afro, Indigenous, and queer futuristic thought. Keywords Smart Homes, Emerging Technologies, Internet of Things, Futurism, Labor, Corporate Power This article explores the consumer technology industry’s discourse about emerging smart home devices and begins sketching the outlines of a “new white futurism.” New white futurism is a discourse from companies that promotes emerging smart home technologies as tools for data-driven management of work/life balance in contemporary heteronormative, white, middle-class culture. Since 2008 the consumer technology industry has increasingly focused on the Internet of Things (IoT) and connected smart homes as the dominant retail application. IoT smart home devices have precipitated a shift away from promoting imaginative technological futures that bring about changes in labor or culture in everyday life toward one of logistics and management that reproduce the status quo.
    [Show full text]
  • Better Life with Smart Media & Things
    Better Life with Smart media & things Innopia Technologies Inc. Why Smart Media Gateway for IoT Service? 1 Interactive media consumption with IoT devices 2 More effective information on TV interface 3 Always connected gateway at living room AllSeen Alliance Ecosystem LG AT&T Panasonic Microsoft Vodafone Technicolor Qualcomm Century Link Philips ADT Sony LGU+ Canon Haier Solution Service Operators CE Manufacturer Why Innopia for AllJoyn Solution? Specialty of Embedded Design House SW for Linux & Android experiences with platform various SoC Guaranteed Inter- Make media as one of operability with strong IoT smart home service expertise in HW & SW Innopia Advantages Innopia AllJoyn enabled product roadmap 1. AllJoyn 3. AllJoyn notification, 5. AllJoyn support Wi-Fi notification enabled control panel enabled Smart radar tracer for Smart TV wireless TV the multiple movement enablement stick streaming projector and presence monitoring MP CS CS Dev. Plan. 2. Smart home package 4. Multi-protocol including Wi-Fi power support smart media plug, Wi-Fi LED bulb and GW based on own GW stick based on AllJoyn bridge system AllJoyn framework for for AllJoyn control panel home automation, energy management with media entertainment Now Launching Launching Launching Launching available Q3, 2015 Q3, 2015 Q4, 2015 Q2, 2016 Smart Home Starter Package Wi-Fi Smart LED MagicCast Wi-Fi Smart Light Bulb - AllJoyn Gateway Power Plug Smart Media Service Use Cases 1 Interactive game with LED bulb 2 Home theater experience from media mode Smart Media Service Use Cases
    [Show full text]
  • Valorising the Iot Databox: Creating Value for Everyone Charith Perera1*, Susan Y
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES Trans. Emerging Tel. Tech. 2017; 28:e3125 Published online 11 November 2016 in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/ett.3125 RESEARCH ARTICLE Valorising the IoT Databox: creating value for everyone Charith Perera1*, Susan Y. L. Wakenshaw2, Tim Baarslag3, Hamed Haddadi4, Arosha K. Bandara1, Richard Mortier5, Andy Crabtree6, Irene C. L. Ng2, Derek McAuley6 and Jon Crowcroft5 1 School of Computing and Communications, The Open University, Walton Hall, Milton Keynes MK7 6AA, UK 2 Warwick Manufacturing Group, University of Warwick, Coventry CV4 7AL, UK 3 University of Southampton, Southampton SO17 1BJ, UK 4 School of Electronic Engineering and Computer Science, Queen Mary University of London, Mile End Road, London E1 4NS, UK 5 Computer Laboratory, University of Cambridge, Cambridge CB3 0FD, UK 6 School of Computer Science, University of Nottingham, Jubilee Campus, Nottingham NG8 1BB, UK ABSTRACT The Internet of Things is expected to generate large amounts of heterogeneous data from diverse sources including physical sensors, user devices and social media platforms. Over the last few years, significant attention has been focused on personal data, particularly data generated by smart wearable and smart home devices. Making personal data available for access and trade is expected to become a part of the data-driven digital economy. In this position paper, we review the research challenges in building personal Databoxes that hold personal data and enable data access by other parties and potentially thus sharing of data with other parties. These Databoxes are expected to become a core part of future data marketplaces. Copyright © 2016 The Authors Transactions on Emerging Telecommunications Technologies Published by John Wiley & Sons, Ltd.
    [Show full text]
  • A Systematic Survey of Firmware Extraction Techniques for Iot Devices
    Breaking all the Things | A Systematic Survey of Firmware Extraction Techniques for IoT Devices Sebastian Vasile, David Oswald, and Tom Chothia University of Birmingham [email protected], [email protected], [email protected] Abstract. In this paper, we systematically review and categorize differ- ent hardware-based firmware extraction techniques, using 24 examples of real, wide-spread products, e.g. smart voice assistants (in particular Amazon Echo devices), alarm and access control systems, as well as home automation devices. We show that in over 45% of the cases, an exposed UART interface is sufficient to obtain a firmware dump, while in other cases, more complicated, yet still low-cost methods (e.g. JTAG or eMMC readout) are needed. In this regard, we perform an in-depth investiga- tion of the security concept of the Amazon Echo Plus, which contains significant protection methods against hardware-level attacks. Based on the results of our study, we give recommendations for countermeasures to mitigate the respective methods. 1 Introduction Extracting the firmware from IoT devices is a crucial first step when analysing the security of such systems. From a designer's point of view, preventing the firmware from falling into the hands of an adversary is often desirable: for in- stance, to protect cryptographic keys that identify a device and to impede prod- uct counterfeit or IP theft. The large variety of IoT devices results in different approaches to firmware extraction, depending on the device in question. Past work has looked at the state of security of IoT devices, e.g.
    [Show full text]
  • 2017 Iot & Consumer Electronics Guide
    PRESENTED BY 2017 IoT & CONSUMER ELECTRONICS ELECTRONICS COOLING® GUIDE SERIES | www.electronics-cooling.com 2017 IoT & CONSUMER ELECTRONICS GUIDE www.electronics-cooling.com | 2 | Electronics Cooling® Guide 2017 IoT & CONSUMER ELECTRONICS GUIDE TABLE OF CONTENTS Product Matrix (Thermal Management Manufacturers) 6 Product Selector 8 Electronics Cooling of Humans 10 MP DIVAKAR, PHD Technical Editor, Electronics Cooling Thermal Management in 12 Consumer-Grade Digital Cameras MP DIVAKAR, PHD Technical Editor, Electronics Cooling Thermal Management-Enabled 14 Products at CES 2017 MP DIVAKAR, PHD Technical Editor, Electronics Cooling Thermal Management of IoT 19 Hardware: Gateways MP DIVAKAR, PHD Technical Editor, Electronics Cooling Inductive Wireless Charging is 23 Now a Thermal Design Problem DR. VINIT SINGH NuCurrent, CTO REFERENCE SECTION Ecosystems 28 Overview of Components of 29 IoT & Consumer Electronics Products Design Aids & Tools 32 Calculations 33 Index of Advertisers 34 www.electronics-cooling.com | 3 | Electronics Cooling® Guide FOREWARD In this inaugural issue of Electronics Cooling®’s series of digital guides, IoT & Consumer Electronics, we seek to sup- ply you with the latest in thermal management of consumer electronics and the Internet of Things. The intent of these digital guides is to bring you a collection of articles and information on thermal management ma- terials. This issue features a brief description of the ecosystem for thermal management products, an overview of thermal management challenges, and some high-level descriptions of thermal design elements. We also feature more in-depth coverage in longer articles on select products. There are many unique challenges that every thermal management professional has to address with respect to IoT and Consumer Electronics products.
    [Show full text]
  • Google Onhub
    built for User Guide OnHub REV1.0.1 1910011984 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. TP-Link is a registered trademark of TP-Link Technologies Co., Ltd. Google, Google On, OnHub and other trademarks are owned by Google Inc. Other brands and product names are trademarks of their respective holders. Copyright © 2016 TP-Link Technologies Co., Ltd. All rights reserved. http://www.tp-link.com 1 FCC STATEMENT This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference in a residential installation. This equipment generates, uses and can radiate radio frequency energy and, if not installed and used in accordance with the instructions, may cause harmful interference to radio communications. However, there is no guarantee that interference will not occur in a particular installation. If this equipment does cause harmful interference to radio or television reception, which can be determined by turning the equipment off and on, the user is encouraged to try to correct the interference by one or more of the following measures: • Reorient or relocate the receiving antenna. • Increase the separation between the equipment and receiver. • Connect the equipment into an outlet on a circuit different from that to which the receiver is connected. • Consult the dealer or an experienced radio/ TV technician for help. This device complies with part 15 of the FCC Rules. Operation is subject to the following two conditions: ) 1 This device may not cause harmful interference.
    [Show full text]