Analysis of Security Vulnerabilities for IoT Devices

被引:6
|
作者
Kim, Hee-Hyun [1 ]
Yoo, Jinho [1 ]
机构
[1] Sangmyung Univ, Dept Business Adm, Seoul, South Korea
来源
关键词
CVE Vulnerability; CVSS IoT Device; Security Vulnerabilities;
D O I
10.3745/JIPS.03.0178
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Recently, the number of Internet of Things (IoT) devices has been increasing exponentially. These IoT devices are directly connected to the internet to exchange information. IoT devices are becoming smaller and lighter. However, security measures are not taken in a timely manner compared to the security vulnerabilities of IoT devices. This is often the case when the security patches cannot be applied to the device because the security patches are not adequately applied or there is no patch function. Thus, security vulnerabilities continue to exist, and security incidents continue to increase. In this study, we classified and analyzed the most common security vulnerabilities for IoT devices and identify the essential vulnerabilities of IoT devices that should be considered for security when producing IoT devices. This paper will contribute to reducing the occurrence of security vulnerabilities in companies that produce IoT devices. Additionally, companies can identify vulnerabilities that frequently occur in IoT devices and take preemptive measures.
引用
收藏
页码:489 / 499
页数:11
相关论文
共 50 条
  • [31] Automated Security Analysis for Real-World IoT Devices
    Brun, Lelio
    Hasuo, Ichiro
    Ono, Yasushi
    Sekiyama, Taro
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL WORKSHOP ON HARDWARE AND ARCHITECTURAL SUPPORT FOR SECURITY AND PRIVACY, HASP 2023, 2023, : 29 - 37
  • [32] Poster Abstract: Analysis of Cyber-Security Vulnerabilities of Interconnected Medical Devices
    Xu, Yanchen
    Tran, Daniel
    Tian, Yuan
    Alemzadeh, Homa
    [J]. 2019 4TH IEEE/ACM INTERNATIONAL CONFERENCE ON CONNECTED HEALTH: APPLICATIONS, SYSTEMS AND ENGINEERING TECHNOLOGIES (CHASE), 2019, : 23 - 24
  • [33] Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
    Omar Andrade, Roberto
    Guun Yoo, Sang
    Ortiz-Garces, Ivan
    Barriga, Jhonattan
    [J]. APPLIED SCIENCES-BASEL, 2022, 12 (06):
  • [34] Static analysis for discovering IoT vulnerabilities
    Pietro Ferrara
    Amit Kr Mandal
    Agostino Cortesi
    Fausto Spoto
    [J]. International Journal on Software Tools for Technology Transfer, 2021, 23 : 71 - 88
  • [35] Modelling an IoT Testbed in Context with the Security Vulnerabilities of South Africa
    Nair, Kishor Krishnan
    Dube, Erick
    Lefophane, Samuel
    [J]. PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 244 - 248
  • [36] Analysis of Security Vulnerabilities and Countermeasures
    Son, Hyun-Min
    Joo, Nak-Keun
    Choi, Hyun-Taek
    Lee, Hyun-Cheol
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2019, 19 (02): : 200 - 206
  • [37] Analyzing Security Approaches for Threats,Vulnerabilities, and attacks in an IoT Environment
    Tyagi, Himani
    Kumar, Rajendra
    [J]. 2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL PERFORMANCE EVALUATION (COMPE-2021), 2021, : 227 - 233
  • [38] Static analysis for discovering IoT vulnerabilities
    Ferrara, Pietro
    Mandal, Amit Kr
    Cortesi, Agostino
    Spoto, Fausto
    [J]. INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER, 2021, 23 (01) : 71 - 88
  • [39] An analysis of Bluetooth security vulnerabilities
    Hager, CT
    Midkiff, SF
    [J]. WCNC 2003: IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE RECORD, VOLS 1-3, 2003, : 1825 - 1831
  • [40] Efficient Security Solutions for IoT Devices
    Alfaleh, Faleh
    Elkhediri, Salim
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (04) : 698 - 707