A Survey on Verification of Security and Safety in IoT Systems

被引:2
作者
Abuserrieh, Lobna [1 ]
Alalfi, Manar H. [1 ]
机构
[1] Toronto Metropolitan Univ, Dept Comp Sci, Toronto, ON M5B 2K3, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
IoT; safety; security; program analysis; model driven engineering (MDE); DOMAIN-SPECIFIC LANGUAGE; INTERNET; THINGS; OBJECTS;
D O I
10.1109/ACCESS.2024.3413071
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Internet of Things (IoT) has been rapidly growing in the past few years in all life disciplines. IoT provides automation and smart control across various domains, including home automation, healthcare, and automotive. Given the tremendous number of connected IoT devices, this growth leads to enormous automatic interactions among sizable IoT apps in their environment, making IoT apps smarter and more interesting to their users. However, unintended interactions and potential malicious behaviors within IoT apps can pose serious security and safety risks, particularly for non-expert users unfamiliar with their IoT automation processes. Therefore, robust verification tools are crucial to ensure these systems are safe and secure. In this light, this paper surveys current tools and approaches designed to verify security and safety properties in IoT systems. Our survey explores program analysis techniques utilized in the current literature to verify IoT applications' security and safety. Furthermore, our paper introduces classification and categorization attributes that help understand the research landscape within this domain. We conclude by discussing challenges with current verification techniques and propose potential solutions to support the verification of IoT systems' security and safety. The results from our survey are significant, as they can guide future research efforts in developing IoT systems that are more secure and safer for all users.
引用
收藏
页码:138627 / 138645
页数:19
相关论文
共 96 条
[1]   Scalable Analysis of Interaction Threats in IoT Systems [J].
Alhanahnah, Mohannad ;
Stevens, Clay ;
Bagheri, Hamid .
PROCEEDINGS OF THE 29TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2020, 2020, :272-285
[2]   SoK: Security Evaluation of Home-Based IoT Deployments [J].
Alrawi, Omar ;
Lever, Chaz ;
Antonakakis, Manos ;
Monrose, Fabian .
2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, :1362-1380
[3]  
Altertech Group, Industrial and Home Iot
[4]  
Amazon AWS, 2021, Free Cloud Computing Services
[5]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[6]   A survey on IoT platforms: Communication, security, and privacy perspectives [J].
Babun, Leonardo ;
Denney, Kyle ;
Celik, Z. Berkay ;
McDaniel, Patrick ;
Uluagac, A. Selcuk .
COMPUTER NETWORKS, 2021, 192
[7]   A Survey of Symbolic Execution Techniques [J].
Baldoni, Roberto ;
Coppa, Emilio ;
D'Elia, Daniele Cono ;
Demetrescu, Camil ;
Finocchi, Irene .
ACM COMPUTING SURVEYS, 2018, 51 (03) :1-39
[8]   Securing Cross-App Interactions in IoT Platforms [J].
Balliu, Musard ;
Merro, Massimo ;
Pasqua, Michele .
2019 IEEE 32ND COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2019), 2019, :319-334
[9]   Security Best Practices: A Critical Analysis Using IoT as a Case Study [J].
Barrera, David ;
Bellman, Christopher ;
Van Oorschot, Paul .
ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2023, 26 (02)
[10]   A Model-Driven Methodology to Accelerate Software Engineering in the Internet of Things [J].
Berrouyne, Imad ;
Adda, Mehdi ;
Mottu, Jean-Marie ;
Tisi, Massimo .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (20) :19757-19772