Survey of IoT Device Security Detection

被引:0
|
作者
Zhang Y. [1 ,2 ]
Li J. [1 ,2 ]
Song X. [1 ,2 ]
Fan Y. [3 ]
Lu Y. [4 ]
Zhang R. [1 ,2 ]
Wang Z. [1 ,2 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
[3] School of Cyberspace Security, Chengdu University of Information Technology, Chengdu
[4] China Academy of Information and Communications, Beijing
关键词
certification standards; IoT device security; laws and regulations; risk detection; security assessment;
D O I
10.7544/issn1000-1239.202330482
中图分类号
学科分类号
摘要
At present, IoT (Internet of things) devices have been widely used in people’s daily life, and their security is closely related to individuals, enterprises and even countries. The increasing importance of IoT devices has also attracted a growing number of attacks. To address the security challenges IoT devices faced, various countries and regions have formulated numerous laws and regulations, security evaluation and certification standards related to IoT device security. We summarize and organize the existing research status in this field. We firse discuss the security threats IoT devices faced and explore the different attack surfaces for IoT devices based on a hierarchical logic division. Furthermore, we analyze and summarize the existing security laws, regulations, security evaluation, and certification status, while focusing on the research on IoT security risk detection cutting-edge technologies from five aspects: chip Trojan horse detection, Interface security risk detection, wireless protocol security, firmware risk detection and application, and service security risk detection. Finally, the possible future development direction of this field is summarized and prospected, in order to provide reference and help for the security development of our country’s future IoT device products. © 2023 Science Press. All rights reserved.
引用
收藏
页码:2271 / 2290
页数:19
相关论文
共 144 条
  • [1] Xenofontos C, Zografopoulos I, Konstantinou C, Et al., Consumer, commercial, and industrial IoT (in) security: Attack taxonomy and case studies[J], IEEE Internet of Things Journal, 9, 1, pp. 199-221, (2021)
  • [2] Bosong Li, Anqi Chang, Jiaxing Zhang, Internet of things botNet seriously threatens network infrastructure security——Analysis of Dyn company's botNet attack[J], Information Security Research, 2, 11, (2016)
  • [3] Cimpanu Catalin, Ukraine says it stopped a VPNFilter attack on a Chlorine distillation station
  • [4] Vpnfilter malware attacked critical infrastructure in Ukraine
  • [5] Zhe's cat Tang, APT28 attack and control methods fot IoT devices (networks)
  • [6] Data on Roomba vacuum cleaner leaked
  • [7] Labumbard J., Enterprise vulnerability management: US08789192B2 [P], (2014)
  • [8] Tanner D A, Hinchliffe A, Santos D., Threat assessment: Blackcat ransomware
  • [9] Abdulsattar K, Al-omary A., A survey: Security issues in IoT environment and IoT architecture[C], Proc of the 3rd Smart Cities Symp, pp. 298-304, (2020)
  • [10] Veluvarthi R, Rameswarapu A, Kalyan A K V S, Et al., Security and privacy threats of IoT devices: A & short review[C], Proc of the 2023 4th Int Conf on Signal Processing and Communication (ICSPC), pp. 32-37, (2023)