Analysis of Security Vulnerabilities for IoT Devices

被引:6
|
作者
Kim, Hee-Hyun [1 ]
Yoo, Jinho [1 ]
机构
[1] Sangmyung Univ, Dept Business Adm, Seoul, South Korea
来源
关键词
CVE Vulnerability; CVSS IoT Device; Security Vulnerabilities;
D O I
10.3745/JIPS.03.0178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the number of Internet of Things (IoT) devices has been increasing exponentially. These IoT devices are directly connected to the internet to exchange information. IoT devices are becoming smaller and lighter. However, security measures are not taken in a timely manner compared to the security vulnerabilities of IoT devices. This is often the case when the security patches cannot be applied to the device because the security patches are not adequately applied or there is no patch function. Thus, security vulnerabilities continue to exist, and security incidents continue to increase. In this study, we classified and analyzed the most common security vulnerabilities for IoT devices and identify the essential vulnerabilities of IoT devices that should be considered for security when producing IoT devices. This paper will contribute to reducing the occurrence of security vulnerabilities in companies that produce IoT devices. Additionally, companies can identify vulnerabilities that frequently occur in IoT devices and take preemptive measures.
引用
收藏
页码:489 / 499
页数:11
相关论文
共 50 条
  • [1] An Experimental Analysis of Security Vulnerabilities in Industrial IoT Devices
    Jiang, Xingbin
    Lora, Michele
    Chattopadhyay, Sudipta
    [J]. ACM TRANSACTIONS ON INTERNET TECHNOLOGY, 2020, 20 (02)
  • [2] System Hardening and Security Monitoring for IoT Devices to Mitigate IoT Security Vulnerabilities and Threats
    Choi, Seul-Ki
    Yang, Chung-Huang
    Kwak, Jin
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 906 - 918
  • [3] IoT: Internet of Threats? A Survey of Practical Security Vulnerabilities in Real IoT Devices
    Meneghello, Francesca
    Calore, Matteo
    Zucchetto, Daniel
    Polese, Michele
    Zanella, Andrea
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (05): : 8182 - 8201
  • [4] IoT Security: A review of vulnerabilities and security protocols
    Varma, Ravi Kiran P.
    Priyanka, M.
    Krishna, Vamsi B. S.
    Raju, Subba K., V
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, 14 (02): : 509 - 520
  • [5] On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids
    Mathas, Christos-Minas
    Vassilakis, Costas
    Kolokotronis, Nicholas
    Zarakovitis, Charilaos C.
    Kourtis, Michail-Alexandros
    [J]. ENERGIES, 2021, 14 (10)
  • [6] Hybrid Firmware Analysis for Known Mobile and IoT Security Vulnerabilities
    Sun, Pengfei
    Garcia, Luis
    Salles-Loustau, Gabriel
    Zonouz, Saman
    [J]. 2020 50TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN 2020), 2020, : 373 - 384
  • [7] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Carlos M. Mejía-Granda
    José L. Fernández-Alemán
    Juan M. Carrillo-de-Gea
    José A. García-Berná
    [J]. Medical & Biological Engineering & Computing, 2024, 62 : 257 - 273
  • [8] Security vulnerabilities in healthcare: an analysis of medical devices and software
    Mejia-Granda, Carlos M.
    Fernandez-Aleman, Jose L.
    Carrillo-de-Gea, Juan M.
    Garcia-Berna, Jose A.
    [J]. MEDICAL & BIOLOGICAL ENGINEERING & COMPUTING, 2024, 62 (01) : 257 - 273
  • [9] Security Vulnerabilities in Consumer IoT Applications
    Shakdher, Arjun
    Agrawal, Suyash
    Yang, Baijian
    [J]. 2019 IEEE 5TH INTL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY) / IEEE INTL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC) / IEEE INTL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2019, : 1 - 6
  • [10] Vulnerabilities in Hub Architecture IoT Devices
    Visan, Bogdan Alexandru
    Lee, Jiyoon
    Yang, Baijian
    Smith, Anthony H.
    Matson, Eric T.
    [J]. 2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 83 - 88