Investigating the Robustness of IoT Security Cameras against Cyber Attacks

被引:3
|
作者
Trabelsi, Zouheir [1 ]
机构
[1] UAE Univ, Al Ain, U Arab Emirates
关键词
Internet of Things (IoT); Smart home security cameras; Kali Linux; Denial of Service (DoS) attacks; Man-in-the-Middle (MiM) attack;
D O I
10.1109/CIOT53061.2022.9766814
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In recent years, Internet of Things (IoT) become widely used in various domains. Particularly, consumers are increasingly using IoT devices to build smart homes. These IoT devices can collect data and enable users to manage and secure their smart home environment. However, IoT devices are the target of malicious users and activities. Hence, the security is particularly important for IoT based smart home devices. This paper aims to experimentally evaluate the robustness and resilience of a particular type of IoT devices, known as smart home security cameras, against several common cyber attacks. The attack platform is Kali Linux operation system, which is installed with different types of penetration-testing and cyber-attack programs. The experimental results demonstrate clearly that the evaluated smart home security cameras are very vulnerable to the tested cyber-attacks, and do not deploy built-in efficient security features. As a consequence, this investigation contributes to confirm the belief that most current IoT based smart home devices are designed and built without sufficient security considerations and solutions and may not be very reliable in untrust and unsafe environments.
引用
收藏
页码:17 / 23
页数:7
相关论文
共 50 条
  • [31] Detecting Cyber Security Attacks against a Microservices Application using Distributed Tracing
    Jacob, Stephen
    Qiao, Yuansong
    Lee, Brian
    ICISSP: PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2021, : 588 - 595
  • [32] Security of unmanned aerial vehicle systems against cyber-physical attacks
    Rani, Chaitanya
    Modares, Hamidreza
    Sriram, Raghavendra
    Mikulski, Dariusz
    Lewis, Frank L.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2016, 13 (03): : 331 - 342
  • [33] Vulnerability retrospection of security solutions for software-defined Cyber-Physical System against DDoS and IoT-DDoS attacks
    Snehi, Manish
    Bhandari, Abhinav
    COMPUTER SCIENCE REVIEW, 2021, 40
  • [34] MODERN QUANTUM TECHNOLOGIES OF INFORMATION SECURITY AGAINST CYBER-TERRORIST ATTACKS
    Korchenko, Oleksandr
    Vasiliu, Yevhen
    Gnatyuk, Sergiy
    AVIATION, 2010, 14 (02) : 58 - 69
  • [35] CYBER ATTACKS - UNPRECEDENTED THREAT TO SECURITY
    Repez, Filofteia
    Deaconu, Gheorghe
    PROCEEDINGS INTERNATIONAL CONFERENCE MILITARY SCIENCE UNIVERSE, SELECTED PAPERS, 2011, : 446 - 450
  • [36] Mitigation of cyber attacks assuring security with conglomerate edict based intrusion detection system in IoT
    L Vidyashree
    Sādhanā, 2022, 47
  • [37] Cyber security attacks on robotic platforms
    Bhardwaj A.
    Avasthi V.
    Goundar S.
    Network Security, 2019, 2019 (10) : 13 - 19
  • [38] Mitigation of cyber attacks assuring security with conglomerate edict based intrusion detection system in IoT
    Vidyashree, L.
    Suresha
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (02):
  • [39] Snaring Cyber Attacks on IoT Devices with Honeynet
    Oza, Antara Durgesh
    Kumar, Gardas Naresh
    Khorajiya, Moin
    Tiwari, Vineeta
    COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [40] A CANVASS ON CYBER SECURITY ATTACKS AND COUNTERMEASURES
    Gupta, Shubhi
    Vashisht, Swati
    Singh, Divya
    2016 1ST INTERNATIONAL CONFERENCE ON INNOVATION AND CHALLENGES IN CYBER SECURITY (ICICCS 2016), 2016, : 31 - 35