An Overview of UPnP-based IoT Security: Threats, Vulnerabilities, and Prospective Solutions

11/04/2020
by   Golam Kayas, et al.
0

Advances in the development and increased availability of smart devices ranging from small sensors to complex cloud infrastructures as well as various networking technologies and communication protocols have supported the rapid expansion of Internet of Things deployments. The Universal Plug and Play (UPnP) protocol has been widely accepted and used in the IoT domain to support interactions among heterogeneous IoT devices, in part due to zero configuration implementation which makes it feasible for use in large-scale networks. The popularity and ubiquity of UPnP to support IoT systems necessitate an exploration of security risks associated with the use of the protocol for IoT deployments. In this work, we analyze security vulnerabilities of UPnP-based IoT systems and identify attack opportunities by the adversaries leveraging the vulnerabilities. Finally, we propose prospective solutions to secure UPnP-based IoT systems from adversarial operations.

READ FULL TEXT

page 3

page 5

research
02/21/2021

Survey on Enterprise Internet-of-Things Systems (E-IoT): A Security Perspective

As technology becomes more widely available, millions of users worldwide...
research
07/23/2020

On Manually Reverse Engineering Communication Protocols of Linux Based IoT Systems

IoT security and privacy has raised grave concerns. Efforts have been ma...
research
07/06/2020

Smart Home, security concerns of IoT

The IoT (Internet of Things) has become widely popular in the domestic e...
research
02/05/2022

Iota: A Framework for Analyzing System-Level Security of IoTs

Most IoT systems involve IoT devices, communication protocols, remote cl...
research
11/16/2017

Securing Heterogeneous IoT with Intelligent DDoS Attack Behavior Learning

The rapid increase of diverse Internet of things (IoT) services and devi...
research
10/09/2018

A software-defined architecture for control of IoT Cyberphysical Systems

Based on software-defined principles, we propose a holistic architecture...
research
01/27/2020

Verifying Software Vulnerabilities in IoT Cryptographic Protocols

Internet of Things (IoT) is a system that consists of a large number of ...

Please sign up or login with your details

Forgot password? Click here to reset