A Dynamic Analysis Security Testing Infrastructure for Internet of Things

被引:0
|
作者
Wang, Yong [1 ]
Kjerstad, Elliot [1 ]
Belisario, Bailey [1 ]
机构
[1] Dakota State Univ, Beacom Coll Comp & Cyber Sci, Madison, SD 57042 USA
关键词
IoT; dynamic analysis; security testing; network traffic;
D O I
10.1109/mobisecserv48690.2020.9042949
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
IoT devices such as Google Home and Amazon Echo provide great convenience to our lives. Many of these IoT devices collect data including Personal Identifiable Information such as names, phone numbers, and addresses and thus IoT security is important. However, conducting security analysis on IoT devices is challenging due to the variety, the volume of the devices, and the special skills required for hardware and software analysis. In this research, we create and demonstrate a dynamic analysis security testing infrastructure for capturing network traffic from IoT devices. The network traffic is automatically mirrored to a server for live traffic monitoring and offline data analysis. Using the dynamic analysis security testing infrastructure, we conduct extensive security analysis on network traffic from Google Home and Amazon Echo. Our testing results indicate that Google Home enforces tighter security controls than Amazon Echo while both Google and Amazon devices provide the desired security level to protect user data in general. The dynamic analysis security testing infrastructure presented in the paper can be utilized to conduct similar security analysis on any IoT devices.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Internet of Things: Infrastructure, Architecture, Security and Privacy
    Alansari, Zainab
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Belgaum, Mohammad Riyaz
    Alshaer, Jawdat
    Soomro, Safeeullah
    Miraz, Mahdi H.
    2018 INTERNATIONAL CONFERENCE ON COMPUTING, ELECTRONICS & COMMUNICATIONS ENGINEERING (ICCECE), 2018, : 150 - 155
  • [2] Internet of Things Infrastructure for Security and Safety in Public Places
    Chatzimichail, Angelos
    Chatzigeorgiou, Christos
    Tsanousa, Athina
    Ntioudis, Dimos
    Meditskos, Georgios
    Andritsopoulos, Fotis
    Karaberi, Christina
    Kasnesis, Panagiotis
    Kogias, Dimitrios G.
    Gorgogetas, Georgios
    Vrochidis, Stefanos
    Patrikakis, Charalampos
    Kompatsiaris, Ioannis
    INFORMATION, 2019, 10 (11)
  • [3] Dynamic Defense Architecture for the Security of the Internet of Things
    Liu, Caiming
    Zhang, Yan
    Li, Zhonghua
    Zhang, Jiandong
    Qin, Hongying
    Zeng, Jinquan
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 390 - 393
  • [4] Strong Security and Privacy of RFID System for Internet of Things Infrastructure
    Das, Manik Lal
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING, SPACE 2013, 2013, 8204 : 56 - 69
  • [5] A Security Framework for the Internet of Things based on Public Key Infrastructure
    Ning, Hong
    CONSTRUCTION AND URBAN PLANNING, PTS 1-4, 2013, 671-674 : 3223 - 3226
  • [6] Analysis of Cloud Security and Internet of Things
    Qian, Peng
    Ding, Yaowei
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 513 - 516
  • [7] Analysis of the Security of Internet of Multimedia Things
    Lv, Zhihan
    Qiao, Liang
    Song, Houbing
    ACM TRANSACTIONS ON MULTIMEDIA COMPUTING COMMUNICATIONS AND APPLICATIONS, 2021, 16 (03)
  • [8] Analysis and Design of Security in Internet of Things
    Tian, Cuihua
    Chen, Xuhui
    Guo, Di
    Sun, Jinhua
    Liu, Ling
    Hong, Jiangshui
    2015 8TH INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS (BMEI), 2015, : 678 - 684
  • [9] Dynamic Lightweight Mechanism for Security and Performance in Internet of Things
    Diwan S.A.
    International Journal of Interactive Mobile Technologies, 2022, 16 (10) : 49 - 66
  • [10] The Analysis and Research on the Internet of Things Security Issues
    Xu, Xinyue
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ELECTRONICS, NETWORK AND COMPUTER ENGINEERING (ICENCE 2016), 2016, 67 : 461 - 464