Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks 2019
DOI: 10.1145/3317549.3323411
|View full text |Cite
|
Sign up to set email alerts
|

Deployment optimization of IoT devices through attack graph analysis

Abstract: The Internet of things (IoT) has become an integral part of our life at both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, low resources, the diversity of vendors, and proprietary firmware. Moreover, short range communication protocols (e.g., Bluetooth or ZigBee) open additional opportunities for the lateral movement of an attacker within an organization. Thus, the type and location of IoT devices may significantly change the level of network security of t… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 20 publications
(10 citation statements)
references
References 42 publications
0
5
0
Order By: Relevance
“…Similarly, Butun et al (2019) found that "scalability, transparency and reliability are the most prominent issues to be solved in terms of security-related initiatives" (p. 20). Another challenge associated with the IoT is highlighted by Agmon (2019) who declared that "the competitive IoT device market forces vendors to try and get their products out as fast as they can, prioritizing functionality and the user experience, while ignoring the security aspect" (p. 14). Considering IoT layered architecture, Cvitić et al (2015) have demonstrated that "the first layer (perception one) has the biggest security risk due to the specific limitations of devices and the transmission technology used at this layer" (p. 738).…”
Section: Challenges With the Iot Technologiesmentioning
confidence: 99%
“…Similarly, Butun et al (2019) found that "scalability, transparency and reliability are the most prominent issues to be solved in terms of security-related initiatives" (p. 20). Another challenge associated with the IoT is highlighted by Agmon (2019) who declared that "the competitive IoT device market forces vendors to try and get their products out as fast as they can, prioritizing functionality and the user experience, while ignoring the security aspect" (p. 14). Considering IoT layered architecture, Cvitić et al (2015) have demonstrated that "the first layer (perception one) has the biggest security risk due to the specific limitations of devices and the transmission technology used at this layer" (p. 738).…”
Section: Challenges With the Iot Technologiesmentioning
confidence: 99%
“…Over the years, various methods have been developed as a means of evaluating the security risks associated with the IoT. Among those methods, IoT attack graphs [44], [45], [46] provide a comprehensive view of attacks, and can assist in identifying multi-hop high-risk attack paths in a large-scale environment. A different objective was addressed in [47], where the authors aimed at quantifying the ease of IoT-related attack execution.…”
Section: Risk Assessment In the Iotmentioning
confidence: 99%
“…Electric power grids can be abstracted as a network to identify abnormal power states [ 8 ]. As the IoT and sensor networks become increasingly pervasive in our live, network analysis has been applied to mitigate emerging security issues [ 9 ]. In addition, in healthcare field, a network can analyze the spread of disease such as MERS and COVID-19 [ 10 ].…”
Section: Introductionmentioning
confidence: 99%