Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

05/14/2021
by   Christos Xenofontos, et al.
0

Internet of Things (IoT) devices are becoming ubiquitous in our lives, with applications spanning from the consumer domain to commercial and industrial systems. The steep growth and vast adoption of IoT devices reinforce the importance of sound and robust cybersecurity practices during the device development life-cycles. IoT-related vulnerabilities, if successfully exploited can affect, not only the device itself, but also the application field in which the IoT device operates. Evidently, identifying and addressing every single vulnerability is an arduous, if not impossible, task. Attack taxonomies can assist in classifying attacks and their corresponding vulnerabilities. Security countermeasures and best practices can then be leveraged to mitigate threats and vulnerabilities before they emerge into catastrophic attacks and ensure overall secure IoT operation. Therefore, in this paper, we provide an attack taxonomy which takes into consideration the different layers of IoT stack, i.e., device, infrastructure, communication, and service, and each layer's designated characteristics which can be exploited by adversaries. Furthermore, using nine real-world cybersecurity incidents, that had targeted IoT devices deployed in the consumer, commercial, and industrial sectors, we describe the IoT-related vulnerabilities, exploitation procedures, attacks, impacts, and potential mitigation mechanisms and protection strategies. These (and many other) incidents highlight the underlying security concerns of IoT systems and demonstrate the potential attack impacts of such connected ecosystems, while the proposed taxonomy provides a systematic procedure to categorize attacks based on the affected layer and corresponding impact.

READ FULL TEXT

page 1

page 8

page 9

page 12

page 16

page 22

page 23

research
07/12/2020

On Runtime Software Security of TrustZone-M based IoT Devices

Internet of Things (IoT) devices have been increasingly integrated into ...
research
11/20/2021

VoIP Can Still Be Exploited – Badly

VoIP phones are early representatives as well as present enhancers of th...
research
10/04/2018

Shakedown: compiler-based moving target protection for Return Oriented Programing attacks on an industrial IoT device

Cybercriminals use Return Oriented Programming techniques to attack syst...
research
08/03/2022

Abusing Commodity DRAMs in IoT Devices to Remotely Spy on Temperature

The ubiquity and pervasiveness of modern Internet of Things (IoT) device...
research
08/23/2023

Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

The Internet of Things (IoT) market is rapidly growing and is expected t...
research
12/05/2019

Leveraging Operational Technology and the Internet of Things to Attack Smart Buildings

In recent years, the buildings where we spend most part of our life are ...
research
12/28/2019

How Secure Is Your IoT Network?

The proliferation of IoT devices in smart homes, hospitals, and enterpri...

Please sign up or login with your details

Forgot password? Click here to reset