scholarly journals Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk

Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lüders

The introduction of the Internet of Things (IoT), i.e. the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like CCTV cameras, IP phones, and oscilloscopes, is overwhelming for end-users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.

Sensors ◽  
2019 ◽  
Vol 19 (19) ◽  
pp. 4107
Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lueders

The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world.


Author(s):  
Sharad Agarwal ◽  
Pascal Oser ◽  
Stefan Lüders

The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like CCTV cameras, IP phones, and oscilloscopes, is overwhelming for end-users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors. This serves as the basis for automatic vulnerability assessment to be presented in a future paper.


Author(s):  
Naheeda Praveen ◽  
Shweta Srivastava

According to Internet World Stats' statistics (2012), more than two billion people are linked to the Internet and this number shows that 30 per cent of the world population use the Internet. As a result, this can be used as an efficient marketing platform. The convenience of online shopping renders it to be an emerging trend among consumers. Online shopping involves sharing of personal and financial information from the buyer. This makes the e-tailer to stand in a fiduciary position against the buyer and he is required to act for the sole benefit of the buyer. He has to duly address the security issues involved in the online shopping transactions and exhibit highest order of diligence and care. This paper aims at identifying the potential security threats involved in the online shopping transactions and the remedial measures adopted by the e-commerce companies. The paper also exemplifies from Indian e-commerce as demonetization, along with rapid digitalization, has not paved the way for cashless transactions, but also, for the e-commerce crimes.


2019 ◽  
Vol 16 (10) ◽  
pp. 4374-4378 ◽  
Author(s):  
Sakshi Anand ◽  
Avinash Sharma

Internet of Things (IoT) is a permeative affair that is gaining heights with every passing day thus changing the way society has been living till now. Living in an era where every “thing” will be connected to the Internet is no more a dream. Now we can see people using IoT on daily basis like in the field of education, agriculture, transportation, healthcare, science and many more. Ranging from smart watches to automated machines in industries people have started using IoT for both personal and commercial purposes. With the talk of linking devices to the Internet comes the concept of Cloud. Before IoT was revolutionized, the main purpose of Cloud was to act upon relentless task involving factors like scalability, elasticity, adaptability and multitenancy. But as Internet of Things started gaining heights, there was a need to fulfill the demand of responding and managing issues and outcomes on the go, thus enhancing the features of Cloud making it omnipresent, nimble and flexible on demand. Now remotely tasks such as configuring, reviewing, updating, accessing the condition, extracting data etc. on IoT devices can be easily performed. But this added ease from the IoT Cloud exposed the IoT devices to various risks. In this paper we will be discussing different security issues that arise in IoT devices if the IoT Cloud gets compromised.


Author(s):  
Anjum Nazir Qureshi Sheikh ◽  
Asha Ambhaikar ◽  
Sunil Kumar

The internet of things is a versatile technology that helps to connect devices with other devices or humans in any part of the world at any time. Some of the researchers claim that the number of IoT devices around the world will surpass the total population on the earth after a few years. The technology has made life easier, but these comforts are backed up with a lot of security threats. Wireless medium for communication, large amount of data, and device constraints of the IoT devices are some of the factors that increase their vulnerability to security threats. This chapter provides information about the attacks at different layers of IoT architecture. It also mentions the benefits of technologies like blockchain and machine learning that can help to solve the security issues of IoT.


2022 ◽  
Vol 54 (7) ◽  
pp. 1-34
Author(s):  
Sophie Dramé-Maigné ◽  
Maryline Laurent ◽  
Laurent Castillo ◽  
Hervé Ganem

The Internet of Things is taking hold in our everyday life. Regrettably, the security of IoT devices is often being overlooked. Among the vast array of security issues plaguing the emerging IoT, we decide to focus on access control, as privacy, trust, and other security properties cannot be achieved without controlled access. This article classifies IoT access control solutions from the literature according to their architecture (e.g., centralized, hierarchical, federated, distributed) and examines the suitability of each one for access control purposes. Our analysis concludes that important properties such as auditability and revocation are missing from many proposals while hierarchical and federated architectures are neglected by the community. Finally, we provide an architecture-based taxonomy and future research directions: a focus on hybrid architectures, usability, flexibility, privacy, and revocation schemes in serverless authorization.


2021 ◽  
Vol 17 (1) ◽  
pp. 260-264
Author(s):  
Alexandru VULPE ◽  
Raluca ANDREI ◽  
Alexandru BRUMARU ◽  
Octavian FRATU

Abstract: With the development of mobile devices and the advent of smartphones, the Internet has become part of everyday life. Any category of information about weather, flight schedule, etc. it is just a click away from the keyboard. This availability of data has led to a continuous increase in connectivity between devices, from any corner of the world. Combining device connectivity with systems automation allows the collection of information, its analysis and implicitly decision-making on the basis of information. Their introduction and continued expansion of devices that communicate in networks (including the Internet) have made security issues very important devices as well as for users. One of the main methodologies that ensures data confidentiality is encryption, which protects data from unauthorized access, but at the cost of using extensive mathematical models. Due to the nature of IoT devices, the resources allocated to a device can be constrained by certain factors, some of which are related to costs and others to the physical limitations of the device. Ensuring the confidentiality of data requires the use of encryption algorithms for these interconnected devices, which provide protection while maintaining the operation of that device. The need for these types of algorithms has created conditions for the growth and development of the concept of lightweight encryption, which aim to find encryption systems that can be implemented on these categories of devices, with limited hardware and software requirements. The paper proposes a lightweight cryptographic algorithm implemented on a microcontroller system, comparing its performances with those of the already existing system (based on x86).


Author(s):  
Mykola Ryzhkov ◽  
Anastasiia Siabro

Achievements in the sphere of automatization and telecommunication are an essential component of transformation of the international peace and security system. This article presents, that consequences of changes are of a dual character. On the one hand, new technologies are becoming an important component of society modernization strategies in developing countries, on the other hand, they can be used for armament modernization or creation of new means of confrontation in modern international relations. APR countries face the most relevant issue of information technologies usage. The article deals with the process of discussion of new challenges and threats to international security, emerging as a result of development and large-scale implementation of information-communication technologies. Positions of states regarding the adoption of resolution in the sphere of international information security were studied through examples of Japan, India, and China. It is proved in the article, that information technologies have become an important component of the security system in the world. Technologies usage may lead to steady international development as well as to information arms race. That is why working out a common position on international information security issues is of crucial importance. It is within the framework of the UN, that different states of the world are given an opportunity to express their visions of the problem of international information security and work out common approaches to its solution. The article shows, that states’ positions have similar as well as different features. For instance, all states express concern regarding possible limitation of technology transfer for the establishment of a more controlled international political environment. But states’ positions have major differences as to mechanisms of information security provision. Thus, Japan and India strive to achieve a balanced system of international information security, which should at the same time have preventive mechanisms against the emergence of threats in the information and science and technology spheres and guarantee continuation of scientific-technological development, which is a crucial component of development and modernization strategies in many countries of the world. China came forward with position of strong regulation of international information security issues and suggested framing of corresponding regulations of the states’ conduct in the cyberspace.


2021 ◽  
Vol 10 (1) ◽  
pp. 73-88
Author(s):  
Enrique Orduña-Malea ◽  
Cristina I. Font-Julian ◽  
José Antonio Ontalba-Ruipérez ◽  
Raúl Compés-López

Globalisation, the Internet and social media have changed the kind of actors with influence in the wine industry and the way these actors create signals to communicate credible information about experience and trust attributes. Among the most prestigious experts in the world of wine are the Masters of Wine (MW). Although initially devoted to international trade, they have spread their activities and their opinion is more and more appreciated by producers and consumers. The main objective of this article is to determine this community of experts’ behaviour on Twitter. In order to do so, four factors (presence, activity, impact and community) have been considered. All Twitter profiles belonging to users awarded with the MW qualification were identified and analysed. In addition, a set of 35,653 tweets published by the MWs were retrieved and analysed through descriptive statistics. The results show MWs on Twitter as high attractors (number of followers), moderate publishers (original contents published), moderate influencers (number of likes and retweets), and low interactors (number of friends and mentions to other users). These findings reveal that the MW community is not using Twitter to gain or reinforce their reputation as an accredited expert in the wine industry, giving more influential space on Twitter to consumers and amateurs.


2018 ◽  
Author(s):  
Henry Tranter

Security is always at the forefront of developing technologies. One can seldom go a week without hearing of a new data breach or hacking attempt from various groups around the world, often taking advantage of a simple flaw in a system’s architecture. The Internet of Things (IoT) is one of these developing technologies which may be at risk of such attacks. IoT devices are becoming more and more prevalent in everyday life. From keeping track of an individual’s health, to suggesting meals from items available in an individual’s fridge, these technologies are taking a much larger role in the personal lives of their users. With this in mind, how is security being considered in the development of these technologies? Are these devices that monitor individual’s personal lives just additional vectors for potential data theft? Throughout this survey, various approaches to the development of security systems concerning IoT devices in the home will be discussed, compared, and contrasted in the hope of providing an ideal solution to the problems this technology may produce.


Sign in / Sign up

Export Citation Format

Share Document