Threat model for securing internet of things (IoT) network at device-level

Internet of Things - Tập 11 - Trang 100240 - 2020
Syed Rizvi1, Ryan Pipetti1, Nicholas McIntyre1, Jonathan Todd1, Iyonna Williams1
1Information Sciences and Technology, Penn State University, Altoona, PA USA

Tài liệu tham khảo

Minerva, 2015, Towards a definition of the Internet of Things (IoT), IEEE Internet Initiat., 13 Maple, 2017, Security and privacy in the internet of Things, 2017 J. Cyber Policy, 2, 155 Statista Research Department, “IoT: number of connected devices worldwide 2012-2025,” Statista, 19 Feb2020. Available at:https://www.statista.com/statistics/471264/iot-number-of-connected-devices-worldwide/ Verizon Communications, Inc., “2018 Verizon Data Breach Investigations Report,” 11th ed, 2018. Sruoginis, 2017 Katzis, 2016, The challenges of balancing safety and security in implantable medical devices Cusack, 2017, Assessment of security vulnerabilities in wearable devices, 42 Rios, 2017 National Heart, Lung, and Blood Institute, “Pacemakers,” United States Department of Health and Human Services. Roberti, 2015, The internet of hacked things, RFID J., 16 S. Northcutt, “The Attack Surface Problem,” SANS Technology Institute. Available at:https://www.sans.edu/cyber-research/security-laboratory/article/did-attack-surface “Practical Ways to Misuse a Router,” Blogger.com, 16 June2017. Available at:http://blog.ptsecurity.com/2017/06/practical-ways-to-misuse-router.html Kovacs, 2016 Lin, 2016, IoT privacy and security challenges for smart home environments, 2016 MDPI Journal, 7 Fernandes, 2016, Security analysis of emerging smart home applications, 22 Cusack, 2017, Evaluating IP surveillance camera vulnerabilities, 25 Cekerevac, 2017, Internet of things and the man-in-the-middle attacks - security and economic risks, MEST Journal, 5, 15, 10.12709/mest.05.05.02.03 Tweneboah-Koduah, 2017, Cyber security threats to IoT applications and service domains, 95, 169 Fan, 2016, A secure RFID application revocation scheme for IoT, 99, 2027 Mitrokotsa, 2016, Classifying RFID attacks and defenses, 12, 491 Kaur, 2016, A survey on security attacks in wireless sensor networks, Int. J. Adv. Res. Comput. Sci., 7, 10 Wu, 2017, A countermeasure to SQL injection attack for cloud environment, Wirel. Pers. Commun., 96, 5279, 10.1007/s11277-016-3741-7 Alexiou, 2016, Formal security analysis of near field communication using model checking, Comput. Secur., 60, 1, 10.1016/j.cose.2016.03.002 Islam, 2015, 3, 678 Drepeper, 2009, 8 Felt, 2011, The effectiveness of application permissions, 15 E. Rescorla and N. Modadugu, “Data Transport Layer Security 1.2,” The Internet Society, April 2006. ISSN: 2070-1721 Tschofenig, 2016 Sen, 2009, A survey on wireless sensor network security, Int. J. Commun. Netw. Inf. Secur., 1, 55 Kang, 2015, Button-based method for the prevention of near field communication relay attacks, Int. J. Commun. Syst., 28, 1628, 10.1002/dac.2751 Duhan, 2014, A two-tier defence against SQL injection, 12 Pipetti, 2018, An attack vector for IoT networks Martin, 2004, Denial-of-service attacks on battery-powered mobile computers, 309 Rizvi, 2020, Identifying the attack surface for IoT network, Internet Things, 9, 10.1016/j.iot.2020.100162 S. Rizvi, N. McIntyre and J. Ryoo, “Computing security scores for IoT device vulnerabilities,” 2019 IEEE 5th International Conference on Software Security and Assurance (IEEE ICSSA), July 25-26, St. Pölten, Lower Austria, Austria, (in press). Shakhov, 2018, 18 “The Growth in Connected IoT Devices Is Expected to Generate 79.4ZB of Data in 2025, According to a New IDC Forecast,” IDC, 18-Jun-2019. Available at:https://www.idc.com/getdoc.jsp?containerId=prUS45213219. 2016, Healthcare IoT device installations: global estimates 2020, Statista, 26 2019, IoT-focused cyberattacks are the new normal, Irdeto, 03 Shwartz, 2018, Opening Pandora’s box: effective techniques for reverse engineering IoT devices, 1