Program Analysis of Commodity IoT Applications for Security and Privacy: Challenges and Opportunities

被引:71
|
作者
Celik, Z. Berkay [1 ,3 ]
Fernandes, Earlence [2 ,4 ]
Pauley, Eric [1 ,5 ]
Tan, Gang [1 ,5 ]
Mcdaniel, Patrick [1 ,5 ]
机构
[1] Penn State Univ, University Pk, PA 16802 USA
[2] Univ Washington, Seattle, WA 98195 USA
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[4] Univ Wisconsin Madison, Dept Comp Sci, Madison, WI 53706 USA
[5] Penn State Univ Penn State, Dept Comp Sci & Engn, State Coll, PA 16802 USA
基金
美国国家科学基金会;
关键词
IoT security and privacy; IoT programming platforms; program analysis; INTERNET; THINGS;
D O I
10.1145/3333501
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive-new applications are being used in nearly every conceivable environment, which leads to the adoption of device-based interaction and automation. However, IoT has also raised issues about the security and privacy of these digitally augmented spaces. Program analysis is crucial in identifying those issues, yet the application and scope of program analysis in IoT remains largely unexplored by the technical community. In this article, we study privacy and security issues in IoT that require program-analysis techniques with an emphasis on identified attacks against these systems and defenses implemented so far. Based on a study of five IoT programming platforms, we identify the key insights that result from research efforts in both the program analysis and security communities and relate the efficacy of program-analysis techniques to security and privacy issues. We conclude by studying recent IoT analysis systems and exploring their implementations. Through these explorations, we highlight key challenges and opportunities in calibrating for the environments in which IoT systems will be used.
引用
收藏
页数:30
相关论文
共 50 条
  • [1] Editorial: Blockchain in Industrial IoT Applications: Security and Privacy Advances, Challenges, and Opportunities
    Choo, K. -K. R.
    Yan, Z.
    Meng, W.
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (06) : 4119 - 4121
  • [2] Security and privacy issues of physical objects in the IoT:Challenges and opportunities
    Xuanxia Yao
    Fadi Farha
    Rongyang Li
    Ismini Psychoula
    Liming Chen
    Huansheng Ning
    Digital Communications and Networks, 2021, 7 (03) : 373 - 384
  • [3] Security and privacy issues of physical objects in the IoT: Challenges and opportunities
    Yao, Xuanxia
    Farha, Fadi
    Li, Rongyang
    Psychoula, Ismini
    Chen, Liming
    Ning, Huansheng
    DIGITAL COMMUNICATIONS AND NETWORKS, 2021, 7 (03) : 373 - 384
  • [4] IoT Privacy and Security: Challenges and Solutions
    Tawalbeh, Lo'ai
    Muheidat, Fadi
    Tawalbeh, Mais
    Quwaider, Muhannad
    APPLIED SCIENCES-BASEL, 2020, 10 (12):
  • [5] Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities
    Li, Shancang
    Song, Houbing
    Iqbal, Muddesar
    SENSORS, 2019, 19 (08):
  • [6] Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions
    Bharati, Subrato
    Podder, Prajoy
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [7] Security and privacy in vehicular communications: Challenges and opportunities
    Bernardini, Cesar
    Asghar, Muhammad Rizwan
    Crispo, Bruno
    VEHICULAR COMMUNICATIONS, 2017, 10 : 13 - 28
  • [8] Security and Privacy in Smart Cities: Challenges and Opportunities
    Cui, Lei
    Xie, Gang
    Qu, Youyang
    Gao, Longxiang
    Yang, Yunyun
    IEEE ACCESS, 2018, 6 : 46134 - 46145
  • [9] Vehicular Internet: Security & Privacy Challenges and Opportunities
    Zaidi, Kamran
    Rajarajan, Muttukrishnan
    FUTURE INTERNET, 2015, 7 (03) : 257 - 275
  • [10] Security and Privacy in Smart Farming: Challenges and Opportunities
    Gupta, Maanak
    Abdelsalam, Mahmoud
    Khorsandroo, Sajad
    Mittal, Sudip
    IEEE ACCESS, 2020, 8 : 34564 - 34584