Investigating the Robustness of IoT Security Cameras against Cyber Attacks

被引:3
|
作者
Trabelsi, Zouheir [1 ]
机构
[1] UAE Univ, Al Ain, U Arab Emirates
关键词
Internet of Things (IoT); Smart home security cameras; Kali Linux; Denial of Service (DoS) attacks; Man-in-the-Middle (MiM) attack;
D O I
10.1109/CIOT53061.2022.9766814
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Internet of Things (IoT) become widely used in various domains. Particularly, consumers are increasingly using IoT devices to build smart homes. These IoT devices can collect data and enable users to manage and secure their smart home environment. However, IoT devices are the target of malicious users and activities. Hence, the security is particularly important for IoT based smart home devices. This paper aims to experimentally evaluate the robustness and resilience of a particular type of IoT devices, known as smart home security cameras, against several common cyber attacks. The attack platform is Kali Linux operation system, which is installed with different types of penetration-testing and cyber-attack programs. The experimental results demonstrate clearly that the evaluated smart home security cameras are very vulnerable to the tested cyber-attacks, and do not deploy built-in efficient security features. As a consequence, this investigation contributes to confirm the belief that most current IoT based smart home devices are designed and built without sufficient security considerations and solutions and may not be very reliable in untrust and unsafe environments.
引用
收藏
页码:17 / 23
页数:7
相关论文
共 50 条
  • [1] BLOCKCHAIN TECHNOLOGIES FOR SECURITY AGAINST CYBER ATTACKS
    Antonyan, Elena A.
    Rybakova, Olga S.
    BULLETIN OF THE NATIONAL ACADEMY OF SCIENCES OF THE REPUBLIC OF KAZAKHSTAN, 2020, (04): : 21 - 26
  • [2] Robustness of Asymmetric Cyber-Physical Power Systems Against Cyber Attacks
    Lai, Rong
    Qiu, Xiaoyu
    Wu, Jiajing
    IEEE ACCESS, 2019, 7 : 61342 - 61352
  • [3] IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
    Kalaria, Rudri
    Kayes, A. S. M.
    Rahayu, Wenny
    Pardede, Eric
    Salehi, S. Ahmad
    COMPUTERS & SECURITY, 2024, 146
  • [4] Return on security investment against cyber attacks on availability
    Min, Byoung Joon
    Yoo, Seung Hwan
    Ryu, Jong Ho
    Seo, Dong Il
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 2, 2006, 3981 : 270 - 278
  • [5] Investigating IoT Systems Security Attacks using Network Forensics
    Mishra, Ayushi
    Bagade, Priyanka
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [6] Processor Anchor to Increase the Robustness Against Fault Injection and Cyber Attacks
    Danger, Jean-Luc
    Facon, Adrien
    Guilley, Sylvain
    Heydemann, Karine
    Kuhne, Ulrich
    Merabet, Abdelmalek Si
    Timbert, Michael
    Pecatte, Baptiste
    CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2020), 2021, 12244 : 254 - 274
  • [7] Cyber Security - IoT
    Naik, Swapnil
    Maral, Vikas
    2017 2ND IEEE INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRONICS, INFORMATION & COMMUNICATION TECHNOLOGY (RTEICT), 2017, : 764 - 767
  • [8] Security Protocols Against Cyber Attacks in the Distribution Automation System
    Lim, I. H.
    Hong, S.
    Choi, M. S.
    Lee, S. J.
    Kim, T. W.
    Lee, S. W.
    Ha, B. N.
    IEEE TRANSACTIONS ON POWER DELIVERY, 2010, 25 (01) : 448 - 455
  • [9] Security of SCADA Systems Against Cyber-Physical Attacks
    Do, Van Long
    Fillatre, Lionel
    Nikiforov, Igor
    Willett, Peter
    IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 2017, 32 (05) : 28 - 45
  • [10] Security Attacks on IoT
    Okul, S.
    Aydin, M. Ali
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ENGINEERING (UBMK), 2017, : 1 - 5