IoT Security: An End-to-End View and Case Study

05/15/2018
by   Zhen Ling, et al.
0

In this paper, we present an end-to-end view of IoT security and privacy and a case study. Our contribution is three-fold. First, we present our end-to-end view of an IoT system and this view can guide risk assessment and design of an IoT system. We identify 10 basic IoT functionalities that are related to security and privacy. Based on this view, we systematically present security and privacy requirements in terms of IoT system, software, networking and big data analytics in the cloud. Second, using the end-to-end view of IoT security and privacy, we present a vulnerability analysis of the Edimax IP camera system. We are the first to exploit this system and have identified various attacks that can fully control all the cameras from the manufacturer. Our real-world experiments demonstrate the effectiveness of the discovered attacks and raise the alarms again for the IoT manufacturers. Third, such vulnerabilities found in the exploit of Edimax cameras and our previous exploit of Edimax smartplugs can lead to another wave of Mirai attacks, which can be either botnets or worm attacks. To systematically understand the damage of the Mirai malware, we model propagation of the Mirai and use the simulations to validate the modeling. The work in this paper raises the alarm again for the IoT device manufacturers to better secure their products in order to prevent malware attacks like Mirai.

READ FULL TEXT
research
09/28/2022

A Unified View of IoT And CPS Security and Privacy

The concepts of Internet of Things (IoT) and Cyber Physical Systems (CPS...
research
01/19/2018

IoT Security Techniques Based on Machine Learning

Internet of things (IoT) that integrate a variety of devices into networ...
research
04/20/2020

Scalable and Secure Architecture for Distributed IoT Systems

Internet-of-things (IoT) is perpetually revolutionizing our daily life a...
research
02/14/2022

Vulnerability Assessment and Penetration Testing on IP cameras

IP cameras have always been part of the Internet of Things (IoT) and are...
research
10/17/2022

Detect and Classify IoT Camera Traffic

Deployment of IoT cameras in an organization threatens security and priv...
research
11/23/2022

Privacy-Enhancing Optical Embeddings for Lensless Classification

Lensless imaging can provide visual privacy due to the highly multiplexe...
research
08/04/2021

Combating Informational Denial-of-Service (IDoS) Attacks: Modeling and Mitigation of Attentional Human Vulnerability

This work proposes a new class of proactive attacks called the Informati...

Please sign up or login with your details

Forgot password? Click here to reset