Journal
IEEE INTERNET OF THINGS JOURNAL
Volume 7, Issue 10, Pages 10102-10110Publisher
IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2020.2983983
Keywords
Smart homes; Software; Google; Encryption; Cameras; Internet of Things; Abuse cases; cyber security; home automation; Internet of Things (IoT); misuse cases; security postures; smart devices; smart homes; vulnerabilities
Categories
Funding
- U.S. Government
- National Science Foundation Scholarship for Service [DUE-1662469]
- U.S. Department of Education
Ask authors/readers for more resources
Internet-of-Things (IoT) technology has revolutionized our daily lives in many ways-whether it is the way we conduct our day-to-day activities inside our home, or the way we control our home environments remotely. Unbeknownst to the users, with the adoption of these smart home technologies, their personal space becomes vulnerable to security and privacy attacks. We conducted studies of vulnerabilities and security posture of smart home IoT devices. We started with a literature review on known vulnerability studies of the IoT devices, considering four categories of attacks: 1) physical; 2) network; 3) software; and 4) encryption. We then conducted our own vulnerability experiments that compared security postures between well known and lesser known vendors through misuse and abuse case analysis, followed by a review of coverage in major vulnerability databases. Based on our analysis, the main finding was the need for a stronger focus on the security posture of lesser known vendor devices as they are often less regulated and faceless scrutiny.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available