SoK: Security Evaluation of Home-Based IoT Deployments

被引:194
|
作者
Alrawi, Omar [1 ]
Lever, Chaz [1 ]
Antonakakis, Manos [1 ]
Monrose, Fabian [2 ]
机构
[1] Georgia Inst Technol, Atlanta, GA 30332 USA
[2] Univ N Carolina, Chapel Hill, NC USA
基金
美国国家科学基金会;
关键词
D O I
10.1109/SP.2019.00013
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Home-based IoT devices have a bleak reputation regarding their security practices. On the surface, the insecurities of IoT devices seem to be caused by integration problems that may be addressed by simple measures, but this work finds that to be a naive assumption. The truth is, IoT deployments, at their core, utilize traditional compute systems, such as embedded, mobile, and network. These components have many unexplored challenges such as the effect of over-privileged mobile applications on embedded devices. Our work proposes a methodology that researchers and practitioners could employ to analyze security properties for home-based IoT devices. We systematize the literature for home-based IoT using this methodology in order to understand attack techniques, mitigations, and stakeholders. Further, we evaluate 45 devices to augment the systematized literature in order to identify neglected research areas. To make this analysis transparent and easier to adapt by the community, we provide a public portal to share our evaluation data and invite the community to contribute their independent findings.
引用
收藏
页码:1362 / 1380
页数:19
相关论文
共 50 条
  • [1] Exploring The Security Issues in Home-Based IoT Devices Through Denial of Service Attacks
    Toutsop, Otily
    Das, Sanchari
    Kornegay, Kevin
    [J]. 2021 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, INTERNET OF PEOPLE, AND SMART CITY INNOVATIONS (SMARTWORLD/SCALCOM/UIC/ATC/IOP/SCI 2021), 2021, : 407 - 415
  • [2] An IOT Architecture for Home-Based Elderly Healthcare
    Guo, Yang
    Bai, Guohua
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON MANAGEMENT AND ENGINEERING (CME 2014), 2014, : 329 - 337
  • [3] SoK: Investigation of Security and Functional Safety in Industrial IoT
    Tomur, Emrah
    Gulen, Utku
    Soykan, Elif U.
    Ersoy, Mehmet Akif
    Karakoc, Ferhat
    Karacay, Leyli
    Comak, Pinar
    [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 226 - 233
  • [4] IoT Based Smart Security and Home Automation
    Somani, Shradha
    Solunke, Parikshit
    Oke, Shaunak
    Medhi, Parth
    Laturkar, P. P.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [5] A Security Evaluation of IMS Deployments
    Park, Frank S.
    Patnaik, Devdutt
    Amrutkar, Chaitrali
    Hunter, Michael T.
    [J]. 2008 2ND INTERNATIONAL CONFERENCE ON INTERNET MULTIMEDIA SERVICES ARCHITECTURE AND APPLICATION (IMSAA), 2008, : 179 - 184
  • [6] SoK: Context Sensing for Access Control in the Adversarial Home IoT
    He, Weijia
    Zhao, Valerie
    Morkved, Olivia
    Siddiqui, Sabeeka
    Fernandes, Earlence
    Hester, Josiah
    Ur, Blase
    [J]. 2021 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P 2021), 2021, : 37 - 53
  • [7] IoT based Smart home : Security Aspects and security architecture
    Ray, Abhay Kumar
    Bagwari, Ashish
    [J]. 2020 IEEE 9TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS AND NETWORK TECHNOLOGIES (CSNT 2020), 2020, : 218 - 222
  • [8] Security-Oriented Architecture for Managing IoT Deployments
    Zuquete, Andre
    Gomes, Helder
    Amaral, Joao
    Oliveira, Carlos
    [J]. SYMMETRY-BASEL, 2019, 11 (10):
  • [9] HOME-BASED WITHDRAWAL: A PROGRAM EVALUATION
    Kotevski, Dimce
    Tooley, Rebecca
    Forsythe, Marcus
    [J]. DRUG AND ALCOHOL REVIEW, 2011, 30 : 51 - 51
  • [10] AN EVALUATION OF HOME-BASED RESPITE CARE
    UPSHUR, CC
    [J]. MENTAL RETARDATION, 1982, 20 (02): : 58 - 62