TY - GEN
T1 - An attack vector for IoT networks
AU - Rizvi, Syed
AU - Pipetti, Ryan
AU - McIntyre, Nicholas
AU - Todd, Jonathan
N1 - Publisher Copyright:
© 2018 IEEE.
Copyright:
Copyright 2020 Elsevier B.V., All rights reserved.
PY - 2018/7
Y1 - 2018/7
N2 - The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.
AB - The advent of the twenty-first century has seen a myriad of amazing technological advancements. The Internet of Things (IoT) is a prime example of technological capabilities at its finest. The IoT is a series of interconnected devices capable of sending and receiving data over existing network infrastructure, but why does this matter? Technology is becoming a conventional commodity, while the uses are endless, technological advancement constitutes a very serious risk. Any device that is connected to the Internet poses a heightened security risk. These risks have the potential of compromising the device and its users. Therefore, the understanding of device-level security is critical to protect the users from various security threats. To provide a holistic view of IoT security, the investigated devices are broken down with respect to different domains (e.g., healthcare, commerce, and home). Specifically, this paper presents a survey of frequently used devices with a common vulnerability scoring system (CVSS) for each investigated IoT domain. This will be an attempt to identify the pivotal device vulnerabilities and determine which attack vectors are predominately exploited in IoT networks.
UR - http://www.scopus.com/inward/record.url?scp=85085613775&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85085613775&partnerID=8YFLogxK
U2 - 10.1109/ICSSA45270.2018.00019
DO - 10.1109/ICSSA45270.2018.00019
M3 - Conference contribution
AN - SCOPUS:85085613775
T3 - Proceedings - 2018 4th International Conference on Software Security and Assurance, ICSSA 2018
SP - 39
EP - 44
BT - Proceedings - 2018 4th International Conference on Software Security and Assurance, ICSSA 2018
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 4th International Conference on Software Security and Assurance, ICSSA 2018
Y2 - 26 July 2018 through 27 July 2018
ER -