Taxonomy of IoT Vulnerabilities

Although a plethora of security mechanisms currently exist aiming at enhancing IoT security, many research and operational problems remain unsolved, raising various concerns and thus undermining the confidence in the IoT paradigm. To put forward a new perspective related to IoT security, in this chapter, the taxonomy of IoT vulnerabilities in the context of various dimensions is given and potential future directions are discussed.

[1]  Salvatore J. Stolfo,et al.  A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan , 2010, ACSAC '10.

[2]  Ata Elahi,et al.  ZigBee Wireless Sensor and Control Network , 2009 .

[3]  Assia Tria,et al.  Modeling a node capture attack in a secure wireless sensor networks , 2016, 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT).

[4]  Elisa Bertino,et al.  Kalis — A System for Knowledge-Driven Adaptable Intrusion Detection for the Internet of Things , 2017, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).

[5]  Michael Backes,et al.  Hey, You Have a Problem: On the Feasibility of Large-Scale Web Vulnerability Notification , 2016, USENIX Security Symposium.

[6]  Nasir Ghani,et al.  A first empirical look on internet-scale exploitations of IoT devices , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[7]  Luiz Affonso Guedes,et al.  Availability Issues in Wireless Visual Sensor Networks , 2014, Sensors.

[8]  Adi Shamir,et al.  Extended Functionality Attacks on IoT Devices: The Case of Smart Lights , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[9]  Audrey A. Gendreau,et al.  Survey of Intrusion Detection Systems towards an End to End Secure Internet of Things , 2016, 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud).

[10]  W. Liu,et al.  A unified architecture for integrating energy harvesting IoT devices with the Mobile Edge Cloud , 2018, 2018 IEEE 4th World Forum on Internet of Things (WF-IoT).

[11]  Asaf Shabtai,et al.  Advanced Security Testbed Framework for Wearable IoT Devices , 2016, ACM Trans. Internet Techn..

[12]  Bruno Sinopoli,et al.  Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence , 2017, IEEE Communications Magazine.

[13]  Rajeev Kumar Kanth,et al.  Distributed internal anomaly detection system for Internet-of-Things , 2016, 2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC).

[14]  Wade Trappe,et al.  Low-Energy Security: Limits and Opportunities in the Internet of Things , 2015, IEEE Security & Privacy.

[15]  Thiemo Voigt,et al.  Intrusion Detection in the RPL-connected 6LoWPAN Networks , 2017, IoTPTS@AsiaCCS.

[16]  Ahmad-Reza Sadeghi,et al.  Security analysis on consumer and industrial IoT devices , 2016, 2016 21st Asia and South Pacific Design Automation Conference (ASP-DAC).

[17]  Karl N. Levitt,et al.  Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).

[18]  M. Shamim Hossain,et al.  Toward end-to-end biomet rics-based security for IoT infrastructure , 2016, IEEE Wireless Communications.

[19]  Pekka Toivanen,et al.  Security Threats in ZigBee-Enabled Systems: Vulnerability Evaluation, Practical Experiments, Countermeasures, and Lessons Learned , 2013, 2013 46th Hawaii International Conference on System Sciences.

[20]  Angelo Furfaro,et al.  Using virtual environments for the assessment of cybersecurity issues in IoT scenarios , 2017, Simul. Model. Pract. Theory.

[21]  J. Alex Halderman,et al.  Green Lights Forever: Analyzing the Security of Traffic Infrastructure , 2014, WOOT.

[22]  Yi Zhou,et al.  Understanding the Mirai Botnet , 2017, USENIX Security Symposium.

[23]  Varshanth R. Rao,et al.  Predictive node expiration based energy-aware source routing (PNEB ESR) protocol for wireless sensor networks , 2014, COMPUTE '14.

[24]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[25]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[26]  Farinaz Koushanfar,et al.  Heart-to-heart (H2H): authentication for implanted medical devices , 2013, CCS.

[27]  Xiangjian He,et al.  A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.

[28]  Shahin Farahani,et al.  ZigBee Wireless Networks and Transceivers , 2008 .

[29]  Wen Hu,et al.  Talos: Encrypted Query Processing for the Internet of Things , 2015, SenSys.

[30]  Sasu Tarkoma,et al.  Securebox: Toward Safer and Smarter IoT Networks , 2016, CAN@CoNEXT.

[31]  Dawn Song,et al.  Smart Locks: Lessons for Securing Commodity Internet of Things Devices , 2016, AsiaCCS.

[32]  Giuseppe Piro,et al.  Key Management Protocol with Implicit Certificates for IoT systems , 2015, IoT-Sys@MobiSys.

[33]  Zuyi Li,et al.  Modeling of Local False Data Injection Attacks With Reduced Network Information , 2015, IEEE Transactions on Smart Grid.

[34]  J. Alex Halderman,et al.  Analysis of the HTTPS certificate ecosystem , 2013, Internet Measurement Conference.

[35]  Shahriar Mirabbasi,et al.  Wireless Energy Harvesting for Internet of Things , 2014 .

[36]  Georgios Kambourakis,et al.  DDoS in the IoT: Mirai and Other Botnets , 2017, Computer.

[37]  Thiemo Voigt,et al.  SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.

[38]  Raheem A. Beyah,et al.  Who's in Control of Your Control System? Device Fingerprinting for Cyber-Physical Systems , 2016, NDSS.

[39]  He Wang,et al.  MoLe: Motion Leaks through Smartwatch Sensors , 2015, MobiCom.

[40]  J. Alex Halderman,et al.  A Search Engine Backed by Internet-Wide Scanning , 2015, CCS.

[41]  Niraj K. Jha,et al.  A Comprehensive Study of Security of Internet-of-Things , 2017, IEEE Transactions on Emerging Topics in Computing.

[42]  Mark Mohammad Tehranipoor,et al.  Hardware security meets biometrics for the age of IoT , 2016, 2016 IEEE International Symposium on Circuits and Systems (ISCAS).

[43]  Nasir D. Memon,et al.  Internet-scale Probing of CPS: Inference, Characterization and Orchestration Analysis , 2017, NDSS.

[44]  Nicholas Hopper,et al.  Vampire Attacks: Draining Life from Wireless Ad Hoc Sensor Networks , 2013, IEEE Transactions on Mobile Computing.

[45]  Qi Alfred Chen,et al.  ContexloT: Towards Providing Contextual Integrity to Appified IoT Platforms , 2017, NDSS.

[46]  J. Jithish,et al.  Sybil attack in IOT: Modelling and defenses , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[47]  Max Mühlhäuser,et al.  Multi-stage attack detection and signature generation with ICS honeypots , 2016, NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium.

[48]  Salvatore J. Stolfo,et al.  When Firmware Modifications Attack: A Case Study of Embedded Exploitation , 2013, NDSS.

[49]  Yan Wang,et al.  Friend or Foe?: Your Wearable Devices Reveal Your Personal PIN , 2016, AsiaCCS.

[50]  Haytham Elmiligi,et al.  Multi-dimensional analysis of embedded systems security , 2016, Microprocess. Microsystems.

[51]  Sean Carlisto de Alvarenga,et al.  A survey of intrusion detection in Internet of Things , 2017, J. Netw. Comput. Appl..

[52]  Blase Ur,et al.  The Current State of Access Control for Smart Devices in Homes , 2013 .

[53]  Zhizhang Chen,et al.  Power Analysis Attacks Against IEEE 802.15.4 Nodes , 2016, COSADE.

[54]  Barton P. Miller,et al.  An empirical study of the robustness of Windows NT applications using random testing , 2000 .

[55]  Imran A. Zualkernan,et al.  Internet of things (IoT) security: Current status, challenges and prospective measures , 2015, 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST).

[56]  Márk Félegyházi,et al.  CryPLH: Protecting Smart Energy Systems from Targeted Attacks with a PLC Honeypot , 2014, SmartGridSec.

[57]  Yuguang Fang,et al.  Defending Against Physical Destruction Attacks on Wireless Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[58]  Aref Meddeb,et al.  6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).

[59]  Rajkumar Buyya,et al.  Aneka Cloud Application Platform and Its Integration with Windows Azure , 2011, ArXiv.

[60]  Radha Poovendran,et al.  Node capture attacks in wireless sensor networks: A system theoretic approach , 2010, 49th IEEE Conference on Decision and Control (CDC).

[61]  Chang-Seop Park,et al.  A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications , 2017, IEEE Sensors Journal.

[62]  Virgil D. Gligor,et al.  A key-management scheme for distributed sensor networks , 2002, CCS '02.

[63]  Atul Prakash,et al.  FlowFence: Practical Data Protection for Emerging IoT Application Frameworks , 2016, USENIX Security Symposium.

[64]  Mansour Sheikhan,et al.  Hybrid of anomaly-based and specification-based IDS for Internet of Things using unsupervised OPF based on MapReduce approach , 2017, Comput. Commun..

[65]  Raheem A. Beyah,et al.  Rethinking the Honeypot for Cyber-Physical Systems , 2016, IEEE Internet Computing.

[66]  Nasir Ghani,et al.  Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations , 2019, IEEE Communications Surveys & Tutorials.

[67]  Baojiang Cui,et al.  A Novel Fuzzing Method for Zigbee Based on Finite State Machine , 2014, Int. J. Distributed Sens. Networks.

[68]  Jie Wu,et al.  Defending Resource Depletion Attacks on Implantable Medical Devices , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[69]  Alexandros G. Fragkiadakis,et al.  A lightweight framework for secure life-logging in smart environments , 2013, Inf. Secur. Tech. Rep..

[70]  Juan Lopez,et al.  Firmware modification attacks on programmable logic controllers , 2013, Int. J. Crit. Infrastructure Prot..

[71]  Amee A. Patel,et al.  A Novel Proposal for Defending against Vampire Attack in WSN , 2015, 2015 Fifth International Conference on Communication Systems and Network Technologies.

[72]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[73]  Michail Maniatakos,et al.  Impact of firmware modification attacks on power systems field devices , 2015, 2015 IEEE International Conference on Smart Grid Communications (SmartGridComm).

[74]  Stephen Dunlap,et al.  An evaluation of modification attacks on programmable logic controllers , 2014, Int. J. Crit. Infrastructure Prot..

[75]  Luca Bruno,et al.  AVATAR: A Framework to Support Dynamic Security Analysis of Embedded Systems' Firmwares , 2014, NDSS.

[76]  Dengguo Feng,et al.  Side-Channel Attacks: Ten Years After Its Publication and the Impacts on Cryptographic Module Security Testing , 2005, IACR Cryptol. ePrint Arch..

[77]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[78]  Zhao Yang Dong,et al.  A Review of False Data Injection Attacks Against Modern Power Systems , 2017, IEEE Transactions on Smart Grid.

[79]  Mark Mohammad Tehranipoor,et al.  Protecting endpoint devices in IoT supply chain , 2015, 2015 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).

[80]  Apostolis Zarras,et al.  Automated Dynamic Firmware Analysis at Scale: A Case Study on Embedded Web Interfaces , 2015, AsiaCCS.

[81]  Alex Biryukov,et al.  Side-Channel Attacks Meet Secure Network Protocols , 2017, ACNS.

[82]  Bradley Reaves,et al.  An open virtual testbed for industrial control system security research , 2012, International Journal of Information Security.

[83]  Thomas R. Henderson,et al.  Host Identity Protocol Version 2 (HIPv2) , 2015, RFC.

[84]  Carsten Bormann,et al.  6LoWPAN: The Wireless Embedded Internet , 2009 .

[85]  Óscar García-Morchón,et al.  Securing the IP-based internet of things with HIP and DTLS , 2013, WiSec '13.

[86]  Eric Rescorla,et al.  Datagram Transport Layer Security Version 1.2 , 2012, RFC.

[87]  Sheetal Kalra,et al.  A lightweight biometrics based remote user authentication scheme for IoT services , 2017, J. Inf. Secur. Appl..

[88]  Gunasekaran Manogaran,et al.  HIoTPOT: Surveillance on IoT Devices against Recent Threats , 2018, Wirel. Pers. Commun..

[89]  Federico Chiariotti,et al.  A game-theoretic analysis of energy-depleting jamming attacks , 2019, 2017 International Conference on Computing, Networking and Communications (ICNC).

[90]  Jun Zhao,et al.  On Resilience and Connectivity of Secure Wireless Sensor Networks Under Node Capture Attacks , 2017, IEEE Transactions on Information Forensics and Security.

[91]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[92]  Levente Buttyán,et al.  XCS based hidden firmware modification on embedded devices , 2011, SoftCOM 2011, 19th International Conference on Software, Telecommunications and Computer Networks.

[93]  Andrei V. Gurtov,et al.  Two-phase authentication protocol for wireless sensor networks in distributed IoT applications , 2014, 2014 IEEE Wireless Communications and Networking Conference (WCNC).

[94]  Dinil Mon Divakaran,et al.  DEFT: A Distributed IoT Fingerprinting Technique , 2019, IEEE Internet of Things Journal.

[95]  Cristina Alcaraz,et al.  Key management systems for sensor networks in the context of the Internet of Things , 2011, Comput. Electr. Eng..

[96]  Zheng Gong,et al.  A Practical One-Time File Encryption Protocol for IoT Devices , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).

[97]  Adrian Perrig,et al.  Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[98]  Aurélien Francillon,et al.  A Large-Scale Analysis of the Security of Embedded Firmwares , 2014, USENIX Security Symposium.

[99]  Antonio Iera,et al.  The Internet of Things: A survey , 2010, Comput. Networks.

[100]  Yuval Elovici,et al.  ProfilIoT: a machine learning approach for IoT device identification based on network traffic analysis , 2017, SAC.

[101]  Ali Saman Tosun,et al.  Investigating Security and Privacy of a Cloud-Based Wireless IP Camera: NetCam , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[102]  Mohsen Guizani,et al.  Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications , 2015, IEEE Communications Surveys & Tutorials.

[103]  Andrei V. Gurtov,et al.  PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications , 2014, Int. J. Distributed Sens. Networks.

[104]  Tsutomu Matsumoto,et al.  IoTPOT: A Novel Honeypot for Revealing Current IoT Threats , 2016, J. Inf. Process..

[105]  Stefan Savage,et al.  You've Got Vulnerability: Exploring Effective Vulnerability Notifications , 2016, USENIX Security Symposium.

[106]  Michael Schukat,et al.  A ZigBee honeypot to assess IoT cyberattack behaviour , 2017, 2017 28th Irish Signals and Systems Conference (ISSC).

[107]  Ali Saman Tosun,et al.  A Testbed for Security and Privacy Analysis of IoT Devices , 2016, 2016 IEEE 13th International Conference on Mobile Ad Hoc and Sensor Systems (MASS).

[108]  Yasir Arfat Malkani,et al.  A framework for securing mobile wireless sensor networks against physical attacks , 2016, 2016 International Conference on Emerging Technologies (ICET).

[109]  Mark Allman,et al.  Don't Forget to Lock the Back Door! A Characterization of IPv6 Network Security Policy , 2016, NDSS.

[110]  Vern Paxson,et al.  Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension , 2016, WWW.

[111]  Jean-Claude Bajard,et al.  A New Security Model for Authenticated Key Agreement , 2010, SCN.

[112]  Georg Carle,et al.  DTLS based security and two-way authentication for the Internet of Things , 2013, Ad Hoc Networks.

[113]  Meng Wu,et al.  Robust detection of false data injection attacks for data aggregation in an Internet of Things-based environmental surveillance , 2017, Comput. Networks.

[114]  Srinivasan Seshan,et al.  Handling a trillion (unfixable) flaws on a billion devices: Rethinking network security for the Internet-of-Things , 2015, HotNets.

[115]  Niraj K. Jha,et al.  Improving the Trustworthiness of Medical Device Software with Formal Verification Methods , 2013, IEEE Embedded Systems Letters.

[116]  Yuval Elovici,et al.  Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things , 2017, IoTPTS@AsiaCCS.

[117]  Peng Ning,et al.  False data injection attacks against state estimation in electric power grids , 2011, TSEC.

[118]  George Markowsky,et al.  Scanning for vulnerable devices in the Internet of Things , 2015, 2015 IEEE 8th International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).

[119]  Zinaida Benenson,et al.  All Your Bulbs Are Belong to Us: Investigating the Current State of Security in Connected Lighting Systems , 2016, ArXiv.

[120]  Rolf H. Weber,et al.  Cybersecurity in the Internet of Things: Legal aspects , 2016, Comput. Law Secur. Rev..

[121]  Peiyuan Zong,et al.  Understanding IoT Security Through the Data Crystal Ball: Where We Are Now and Where We Are Going to Be , 2017, ArXiv.

[122]  Heng Yin,et al.  Scalable Graph-based Bug Search for Firmware Images , 2016, CCS.

[123]  Simon Duquennoy,et al.  Secure Sharing of Partially Homomorphic Encrypted IoT Data , 2017, SenSys.

[124]  Olivier Festor,et al.  A Testing Framework for Discovering Vulnerabilities in 6LoWPAN Networks , 2012, 2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems.

[125]  Hsinchun Chen,et al.  Uninvited Connections: A Study of Vulnerable Devices on the Internet of Things (IoT) , 2014, 2014 IEEE Joint Intelligence and Security Informatics Conference.

[126]  Thiemo Voigt,et al.  Routing Attacks and Countermeasures in the RPL-Based Internet of Things , 2013, Int. J. Distributed Sens. Networks.

[127]  Jorge Sá Silva,et al.  Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues , 2015, IEEE Communications Surveys & Tutorials.

[128]  Joan Arnedo-Moreno,et al.  ZigBee/ZigBee PRO Security Assessment Based on Compromised Cryptographic Keys , 2010, 2010 International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.

[129]  Arkady B. Zaslavsky,et al.  Context Aware Computing for The Internet of Things: A Survey , 2013, IEEE Communications Surveys & Tutorials.

[130]  Kerstin Eder,et al.  The IoT Energy Challenge: A Software Perspective , 2018, IEEE Embedded Systems Letters.

[131]  Fredrik Österlind,et al.  A Sensor Network Simulator for the Contiki OS , 2006 .

[132]  Kishore Angrishi,et al.  Turning Internet of Things(IoT) into Internet of Vulnerabilities (IoV) : IoT Botnets , 2017, ArXiv.

[133]  Antonio Iera,et al.  Understanding the Internet of Things: definition, potentials, and societal role of a fast evolving paradigm , 2017, Ad Hoc Networks.

[134]  Robert H. Deng,et al.  Lightweight Break-Glass Access Control System for Healthcare Internet-of-Things , 2018, IEEE Transactions on Industrial Informatics.