IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices

被引:451
作者
Meneghello, Francesca [1 ]
Calore, Matteo [1 ]
Zucchetto, Daniel [1 ]
Polese, Michele [1 ]
Zanella, Andrea [1 ]
机构
[1] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
关键词
Attacks; devices; Internet of Things (IoT); security; PHYSICAL UNCLONABLE FUNCTIONS; INTRUSION DETECTION; THINGS; ENERGY; MANAGEMENT; GENERATOR; HARDWARE; PRIVACY; SCHEME; TRUST;
D O I
10.1109/JIOT.2019.2935189
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) is rapidly spreading, reaching a multitude of different domains, including personal health care, environmental monitoring, home automation, smart mobility, and Industry 4.0. As a consequence, more and more IoT devices are being deployed in a variety of public and private environments, progressively becoming common objects of everyday life. It is hence apparent that, in such a scenario, cybersecurity becomes critical to avoid threats like leakage of sensible information, denial of service (DoS) attacks, unauthorized network access, and so on. Unfortunately, many low-end IoT commercial products do not usually support strong security mechanisms, and can hence be target of-or even means for-a number of security attacks. The aim of this article is to provide a broad overview of the security risks in the IoT sector and to discuss some possible counteractions. To this end, after a general introduction to security in the IoT domain, we discuss the specific security mechanisms adopted by the most popular IoT communication protocols. Then, we report and analyze some of the attacks against real IoT devices reported in the literature, in order to point out the current security weaknesses of commercial IoT solutions and remark the importance of considering security as an integral part in the design of IoT systems. We conclude this article with a reasoned comparison of the considered IoT technologies with respect to a set of qualifying security attributes, namely integrity, anonymity, confidentiality, privacy, access control, authentication, authorization, resilience, self organization.
引用
收藏
页码:8182 / 8201
页数:20
相关论文
共 118 条
[1]  
Alexander R., 2012, 6550 RFC INT ENG TAS
[2]   Your Location has been Shared 5,398 Times! A Field Study on Mobile App Privacy Nudging [J].
Almuhimedi, Hazim ;
Schaub, Florian ;
Sadeh, Norman ;
Adjerid, Idris ;
Acquisti, Alessandro ;
Gluck, Joshua ;
Cranor, Lorrie ;
Agarwal, Yuvraj .
CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, :787-796
[3]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[4]  
[Anonymous], 2014, J. Adv. Comput. Sci. Technol., DOI DOI 10.14419/JACST.V3I2.3321
[5]  
[Anonymous], 2017, BLUENRG BLUET LOW EN
[6]  
[Anonymous], 2014, CONSTRAINED APPL PRO
[7]  
[Anonymous], 2011, TRUE SYSTEM ON CHIP
[8]  
[Anonymous], LORAWAN 1 1 SPECIFIC
[9]  
[Anonymous], 2003, 802154 IEEE
[10]  
[Anonymous], 2016, OPEN EFFECT REPORT