A Comparative Reverse Engineering Analysis of Smart Pet IoT Devices
Honors Capstone Project
1
Advisor(s)
Dr. Estell
Confirmation
1
Document Type
Paper
Location
ONU McIntosh Center; Activities Room
Start Date
21-4-2026 5:15 PM
End Date
21-4-2026 5:30 PM
Abstract
The rapid growth of consumer Internet of Things (IoT) devices has led to the widespread adoption of smart pet products. This project focuses on evaluating the security implementations of three such devices: a security camera used for pet monitoring that connects to a mobile application using cloud connectivity, a remote-controlled interactive cat toy that utilizes Bluetooth capabilities, and an automatic litter box that uses Wi-Fi and cloud capabilities to send data to a companion mobile app. To develop a better understanding of these devices’ communication patterns, control logic, and security assumptions, tools such as Bluetooth protocol scanners, network traffic analysis software, and mobile application inspection tools were used to identify communication flows and control mechanisms. These findings provide insight into how commercially available pet devices are designed with security in mind, exploring common design patterns, trust boundaries, and potential areas of concern.
Recommended Citation
August, Macy Jayne, "A Comparative Reverse Engineering Analysis of Smart Pet IoT Devices" (2026). ONU Student Research Colloquium. 12.
https://digitalcommons.onu.edu/student_research_colloquium/2026/Papers/12
Restricted
Available to ONU community via local IP address and ONU login.
A Comparative Reverse Engineering Analysis of Smart Pet IoT Devices
ONU McIntosh Center; Activities Room
The rapid growth of consumer Internet of Things (IoT) devices has led to the widespread adoption of smart pet products. This project focuses on evaluating the security implementations of three such devices: a security camera used for pet monitoring that connects to a mobile application using cloud connectivity, a remote-controlled interactive cat toy that utilizes Bluetooth capabilities, and an automatic litter box that uses Wi-Fi and cloud capabilities to send data to a companion mobile app. To develop a better understanding of these devices’ communication patterns, control logic, and security assumptions, tools such as Bluetooth protocol scanners, network traffic analysis software, and mobile application inspection tools were used to identify communication flows and control mechanisms. These findings provide insight into how commercially available pet devices are designed with security in mind, exploring common design patterns, trust boundaries, and potential areas of concern.