scholarly journals Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk

Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lüders

The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like CCTV cameras, IP phones, and oscilloscopes, is overwhelming for end-users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors. This serves as the basis for automatic vulnerability assessment to be presented in a future paper.

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4107
Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lueders

The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.


Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lüders

The introduction of the Internet of Things (IoT), i.e. the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like CCTV cameras, IP phones, and oscilloscopes, is overwhelming for end-users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.


2019 ◽  
Vol 16 (10) ◽  
pp. 4374-4378 ◽  
Author(s):  
Sakshi Anand ◽  
Avinash Sharma

Internet of Things (IoT) is a permeative affair that is gaining heights with every passing day thus changing the way society has been living till now. Living in an era where every “thing” will be connected to the Internet is no more a dream. Now we can see people using IoT on daily basis like in the field of education, agriculture, transportation, healthcare, science and many more. Ranging from smart watches to automated machines in industries people have started using IoT for both personal and commercial purposes. With the talk of linking devices to the Internet comes the concept of Cloud. Before IoT was revolutionized, the main purpose of Cloud was to act upon relentless task involving factors like scalability, elasticity, adaptability and multitenancy. But as Internet of Things started gaining heights, there was a need to fulfill the demand of responding and managing issues and outcomes on the go, thus enhancing the features of Cloud making it omnipresent, nimble and flexible on demand. Now remotely tasks such as configuring, reviewing, updating, accessing the condition, extracting data etc. on IoT devices can be easily performed. But this added ease from the IoT Cloud exposed the IoT devices to various risks. In this paper we will be discussing different security issues that arise in IoT devices if the IoT Cloud gets compromised.


Complexus ◽  
2006 ◽  
Vol 3 (1-3) ◽  
pp. 119-130 ◽  
Author(s):  
Gábor Simon ◽  
József Stéger ◽  
Péter Hága ◽  
István Csabai ◽  
Gábor Vattay

Author(s):  
I.O. Sushyn ◽  
D.A. Minochkin

The article considers the method of increasing the security of Internet of Things technologies. Users fear the consequences of Internet security violations. Therefore, digital security must be designed from zero and at all points of the system so vulnerabilities do not jeopardize the whole system in a certain part. The risk must be reduced throughout the life cycle, especially in view of its scaling and geographical expansion. The Internet of Things consists of a large number of inexpensive devices. IoT devices usually have limited memory and battery power, which gives very limited computing and communication capabilities. The use of encryption/decryption algorithms should not require large resources, and the frequency range is limited. It is also a large-scale network that supports mass connections. Network transmission protocols must include many new features, such as multi-transient routing, shared relay, dynamic access, and other to meet this demand. It is extremely difficult to manage and distribute private keys with this network setup. A variety of usage scenarios require different QoS and security levels. Nowadays IoT plays an important role in many scenarios and has great potential for further dissemination. There is a need to increase the efficiency of a particular enterprise, processes, so the number of interactive things that create smart areas (houses, offices, warehouses, cities) is growing. The implementation of this areas reaches a variety of technologies, which vulnerable from the found attacks over time, leading to significant losses, as data and time. There are many suggestions that address target issue after finding a vulnerability, but this may not be effective enough. Therefore, it was proposed to create a method that can solve a set of problems simultaneously by combining PKI secure authentication and honeypots. It will not only detect new vulnerabilities and attacks faster, but also waste attackers' resources (all captured attacks will be identified and attacker profiles created).


MIS Quarterly ◽  
2016 ◽  
Vol 40 (4) ◽  
pp. 849-868 ◽  
Author(s):  
Kunpeng Zhang ◽  
◽  
Siddhartha Bhattacharyya ◽  
Sudha Ram ◽  
◽  
...  

Sign in / Sign up

Export Citation Format

Share Document