4.8 Article

Vulnerability Studies and Security Postures of IoT Devices: A Smart Home Case Study

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 10, Pages 10102-10110

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2983983

Keywords

Smart homes; Software; Google; Encryption; Cameras; Internet of Things; Abuse cases; cyber security; home automation; Internet of Things (IoT); misuse cases; security postures; smart devices; smart homes; vulnerabilities

Funding

  1. U.S. Government
  2. National Science Foundation Scholarship for Service [DUE-1662469]
  3. U.S. Department of Education

Ask authors/readers for more resources

Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether it is the way we conduct our day-to-day activities inside our home, or the way we control our home environments remotely. Unbeknownst to the users, with the adoption of these smart home technologies, their personal space becomes vulnerable to security and privacy attacks. We conducted studies of vulnerabilities and security posture of smart home IoT devices. We started with a literature review on known vulnerability studies of the IoT devices, considering four categories of attacks: 1) physical; 2) network; 3) software; and 4) encryption. We then conducted our own vulnerability experiments that compared security postures between well known and lesser known vendors through misuse and abuse case analysis, followed by a review of coverage in major vulnerability databases. Based on our analysis, the main finding was the need for a stronger focus on the security posture of lesser known vendor devices as they are often less regulated and faceless scrutiny.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available