2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017
DOI: 10.1109/isi.2017.8004904
|View full text |Cite
|
Sign up to set email alerts
|

Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
43
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 80 publications
(45 citation statements)
references
References 1 publication
0
43
0
2
Order By: Relevance
“…In their study, they included devices such as webcams, smart TVs, and printers, and then categorized the security risks associated with each device category. Similar to our study, Williams et al [11], used Shodan to discover IoT devices. However, they followed an active vulnerability assessment approach; whereas in our case we are interested in a passive vulnerability assessment approach [16].…”
Section: Related Workmentioning
confidence: 54%
See 2 more Smart Citations
“…In their study, they included devices such as webcams, smart TVs, and printers, and then categorized the security risks associated with each device category. Similar to our study, Williams et al [11], used Shodan to discover IoT devices. However, they followed an active vulnerability assessment approach; whereas in our case we are interested in a passive vulnerability assessment approach [16].…”
Section: Related Workmentioning
confidence: 54%
“…In our work, we use Shodan for three primary reasons: i) it has been repeatedly used by different security researchers as a tool of choice for conducting IoT security assessments (e.g. [10], [11]); ii) it comes with extensive and actively maintained documentation; and iii) it offers intuitive APIs and Graphical User Interfaces. These factors allow Shodan to be used by different users, including a low-skilled malicious threat agent.…”
Section: B Shodan Search Enginementioning
confidence: 99%
See 1 more Smart Citation
“…CIoT concerns the use of IoT in aspects related to the daily living of people and aims at increasing usefulness of technology in such context. It involves scenarios focused on the interconnection of consumer and devices, as well as of anything involving the users' environments such as homes, offices, and cities [30]. Vertical markets of CIoT comprise, for instance, Smart Cities, Connected Mobility, Smart Health.…”
Section: Iot Communication Backgroundmentioning
confidence: 99%
“…In [33], the authors demonstrate a systematic, scalable, scanning approach to identifying vulnerable devices exposed to the public internet, and highlight the vulnerable state of the internet of things. Using a search engine targeted for the IoT 7 , researchers were able to target pervasive consumer grade products and scan them using a security vulnerability scanner, and demonstrate that a significant portion of the internet was vulnerable to attacks similar to ones described earlier.…”
Section: Discussionmentioning
confidence: 99%