Abstract

With the prosperity of the Internet of Things (IoT) industry environment, the variety and quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart homes, smart wear, smart manufacturing, smart cars, smart medical care, and many other life-related fields. With it, security vulnerabilities of IoT devices are emerging endlessly. The proliferation of security vulnerabilities will bring severe risks to users’ privacy and property. This paper first describes the research background, including IoT architecture, device components, and attack surfaces. We review state-of-the-art research on IoT device vulnerability discovery, detection, mitigation, and other related works. Then, we point out the current challenges and opportunities by evaluation. Finally, we forecast and discuss the research directions on vulnerability analysis techniques of IoT devices.

Highlights

  • Internet of Things (IoT) is becoming the most popular and practical online platform

  • We evaluate the current research of vulnerability analysis on IoT devices

  • IoT security researchers have discovered a large number of application vulnerabilities developed by manufacturers, including backdoors that are unknown for some reason

Read more

Summary

Introduction

Internet of Things (IoT) is becoming the most popular and practical online platform. It connects various sensors and controllers to the Internet and helps to achieve seamless communication between people and things. The total number of current active IoT devices has reached 7 billion [1] They have been widely used in smart homes, smart wear, smart manufacturing, smart car, smart medical care, and many other life-related fields. We find that the current study focuses on IoT security issues and lack analysis techniques. In this kind of vulnerability analysis, they mainly focus on vulnerability discovery and detection and lack attention to the techniques of vulnerability mitigation. We evaluate the current research of vulnerability analysis on IoT devices.

IoT Architecture
Device Composition
Attack Surface
Attack Surface on the Hardware Layer
Attack Surface on the Software Layer
Attack Surface on the Protocol Interface Layer
Research on the Basic Framework of Vulnerability Analysis
Research on Vulnerability Discovery
Dynamic Analysis Method
Static Analysis Method
Research on Vulnerability Detection
Network Scanning Method
Similarity Detection Method
Research on Vulnerability Mitigation
Automated Patch Generation
Access Control Method
Discussion
Evaluation
Challenges
Opportunities
Research Directions
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call