Unleashing IoT Security: Assessing the Effectiveness of Best Practices in Protecting Against Threats

08/23/2023
by   Philipp Pütz, et al.
0

The Internet of Things (IoT) market is rapidly growing and is expected to double from 2020 to 2025. The increasing use of IoT devices, particularly in smart homes, raises crucial concerns about user privacy and security as these devices often handle sensitive and critical information. Inadequate security designs and implementations by IoT vendors can lead to significant vulnerabilities. To address these IoT device vulnerabilities, institutions, and organizations have published IoT security best practices (BPs) to guide manufacturers in ensuring the security of their products. However, there is currently no standardized approach for evaluating the effectiveness of individual BP recommendations. This leads to manufacturers investing effort in implementing less effective BPs while potentially neglecting measures with greater impact. In this paper, we propose a methodology for evaluating the security impact of IoT BPs and ranking them based on their effectiveness in protecting against security threats. Our approach involves translating identified BPs into concrete test cases that can be applied to real-world IoT devices to assess their effectiveness in mitigating vulnerabilities. We applied this methodology to evaluate the security impact of nine commodity IoT products, discovering 18 vulnerabilities. By empirically assessing the actual impact of BPs on device security, IoT designers and implementers can prioritize their security investments more effectively, improving security outcomes and optimizing limited security budgets.

READ FULL TEXT
research
09/20/2022

Toward Identification and Characterization of IoT Software Update Practices

Software update systems are critical for ensuring systems remain free of...
research
09/08/2022

Evaluating the Future Device Security Risk Indicator for Hundreds of IoT Devices

IoT devices are present in many, especially corporate and sensitive, net...
research
05/03/2019

HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices (Extended Version)

Internet of Things (IoT) devices have become ubiquitous and are spread a...
research
05/14/2021

Consumer, Commercial and Industrial IoT (In)Security: Attack Taxonomy and Case Studies

Internet of Things (IoT) devices are becoming ubiquitous in our lives, w...
research
12/07/2020

The Challenges with Internet of Things for Business

Many companies consider IoT as a central element for increasing competit...
research
09/02/2022

Security Best Practices: A Critical Analysis Using IoT as a Case Study

Academic research has highlighted the failure of many Internet of Things...
research
09/24/2019

Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure

The security of the Internet of Things (IoT) has attracted much attentio...

Please sign up or login with your details

Forgot password? Click here to reset