Security Analysis on Consumer and Industrial IoT Devices

被引:0
|
作者
Wurm, Jacob [1 ]
Hoang, Khoa [1 ]
Arias, Orlando [1 ]
Sadeghi, Ahmad-Reza [2 ]
Jin, Yier [1 ]
机构
[1] Univ Cent Florida, Dept Elect & Comp Engn, Orlando, FL 32816 USA
[2] Tech Univ Darmstadt, Darmstadt, Germany
关键词
INTERNET; THINGS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The fast development of Internet of Things (IoT) and cyber-physical systems (CPS) has triggered a large demand of smart devices which are loaded with sensors collecting information from their surroundings, processing it and relaying it to remote locations for further analysis. The wide deployment of IoT devices and the pressure of time to market of device development have raised security and privacy concerns. In order to help better understand the security vulnerabilities of existing IoT devices and promote the development of low-cost IoT security methods, in this paper, we use both commercial and industrial IoT devices as examples from which the security of hardware, software, and networks are analyzed and backdoors are identified. A detailed security analysis procedure will be elaborated on a home automation system and a smart meter proving that security vulnerabilities are a common problem for most devices. Security solutions and mitigation methods will also be discussed to help IoT manufacturers secure their products.
引用
收藏
页码:519 / 524
页数:6
相关论文
共 50 条
  • [41] A Metric for Measuring IoT Devices Security Levels
    Bonilla, Rafael, I
    Crow, Juan
    Basantes, Luigi
    Cruz, Luis
    2017 IEEE 15TH INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, 15TH INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, 3RD INTL CONF ON BIG DATA INTELLIGENCE AND COMPUTING AND CYBER SCIENCE AND TECHNOLOGY CONGRESS(DASC/PICOM/DATACOM/CYBERSCI, 2017, : 704 - 709
  • [42] Lizard cipher for IoT security on constrained devices
    Kusyanti A.
    Primananda R.
    Saputro K.J.
    International Journal of Advanced Computer Science and Applications, 2019, 10 (11): : 507 - 511
  • [43] Security in product lifecycle of IoT devices: A survey
    Yousefnezhad, Narges
    Malhi, Avleen
    Framling, Kary
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
  • [44] Remote Security Management Server for IoT Devices
    Yoon, Seungyong
    Kim, Jeongyeo
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2017, : 1162 - 1164
  • [45] Lizard Cipher for IoT Security on Constrained Devices
    Kusyanti, Ari
    Primananda, Rakhmadhany
    Saputro, Kalbuadi Joyo
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2019, 10 (11) : 507 - 511
  • [46] Introduction to EM Information Security for IoT devices
    Hayashi, Yuichi
    Verbauwhede, Ingrid
    Radasky, William A.
    2018 JOINT IEEE INTERNATIONAL SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY AND 2018 IEEE ASIA-PACIFIC SYMPOSIUM ON ELECTROMAGNETIC COMPATIBILITY (EMC/APEMC), 2018, : 735 - 738
  • [47] Are ConsumersWilling to Pay for Security and Privacy of IoT Devices?
    Emami-Naeini, Pardis
    Dheenadhayalan, Janarth
    Agarwal, Yuvraj
    Cranor, Lorrie Faith
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 1505 - 1522
  • [48] Guest Editorial: Security on Mobile and IoT Devices
    Athanasopoulos, Elias
    Portokalidis, Georgios
    Lindorfer, Martina
    IET INFORMATION SECURITY, 2020, 14 (04) : 367 - 367
  • [49] Designing for Security Within and Between IoT Devices
    Borowczak, Mike
    Cooley, Rafer
    Wolf, Shaya
    2018 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2018, : 684 - 689
  • [50] Consumer IoT: Security Vulnerability Case Studies and Solutions
    Alladi, Tejasvi
    Chamola, Vinay
    Sikdar, Biplab
    Choo, Kim-Kwang Raymond
    IEEE CONSUMER ELECTRONICS MAGAZINE, 2020, 9 (02) : 17 - 25