Design and implementation of automated IoT security testbed

被引:50
作者
Abu Waraga, Omnia [1 ]
Bettayeb, Meriem [2 ]
Nasir, Qassim [2 ]
Abu Talib, Manar [1 ]
机构
[1] Univ Sharjah, Dept Comp Sci, Sharjah, U Arab Emirates
[2] Univ Sharjah, Dept Elect & Comp Engn, Sharjah, U Arab Emirates
关键词
Internet of Things; IoT testbed; Vulnerability assessment; Automated testbed architecture; INTERNET; THINGS;
D O I
10.1016/j.cose.2019.101648
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emergence of technology associated with the Internet of Things (IoT) is reshaping our lives, while simultaneously raising many issues due to their low level of security, which attackers can exploit for malicious purposes. This research paper conducts a comprehensive analysis of previous studies on IoT device security with a focus on the various tools used to test IoT devices and the vulnerabilities that were found. Additionally, the paper contains a survey of IoT-based security testbeds in the research literature. In this research study, we introduce an open source platform for identifying weaknesses in IoT networks and communications. The platform is easily modifiable and extendible to enable the addition of new security assessment tests and functionalities. It automates security evaluation, allowing for testing without human intervention. The testbed reports the security problems of the tested devices and can detect all attacks made against the devices. It is also designed to monitor communications within the testbed and with connected devices, enabling the system to abort if malicious activity is detected. To demonstrate the capabilities of the proposed IoT security testbed, it is used to examine the vulnerabilities of two IoT devices: a wireless camera and a smart bulb. (C) 2019 Elsevier Ltd. All rights reserved.
引用
收藏
页数:17
相关论文
共 57 条
[1]  
Adjih C, 2015, 2015 IEEE 2ND WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P459, DOI 10.1109/WF-IoT.2015.7389098
[2]   What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLS [J].
Alashwali, Eman Salem ;
Rasmussen, Kasper .
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2018, PT II, 2018, 255 :468-487
[3]  
Alghamdi TA, 2013, TOP HIST PHIL, P163, DOI 10.1109/FGCT.2013.6767217
[4]   Internet of Things: A survey on the security of IoT frameworks [J].
Ammar, Mahmoud ;
Russello, Giovanni ;
Crispo, Bruno .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 38 :8-27
[5]  
[Anonymous], [No title captured]
[6]  
[Anonymous], [No title captured]
[7]  
[Anonymous], [No title captured]
[8]  
[Anonymous], 2015, P 2015 S BOOTC SCI S
[9]  
[Anonymous], 2016, ARXIV160803732
[10]  
[Anonymous], 2018, P ACMSE 2018 C