Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices

This paper presents and implements an integrated set of the system and method called vulnerability scanning for the Internet of things, including the scanning scheme of the background application service and the front desk vulnerability. The scheme not only has the advantages of passive scanning and active scanning, but can scan the security holes in the internet-connected intelligent devices commonly used in Wi-Fi, Bluetooth LE, ZigBee and RFID communications. By the vulnerability scanning system to the network layer and application layer traffic analysis, it can accurately scan some specific vulnerabilities existing in smart devices, as well as be a real-time online vulnerability analysis system given suggestion.

[1]  Xu Shiguo,et al.  Application Research of Embedded Database SQLite , 2009, 2009 International Forum on Information Technology and Applications.

[2]  Xiaowei Li,et al.  SNAMP: A Multi-sniffer and Multi-view Visualization Platform for Wireless Sensor Networks , 2006, 2006 1ST IEEE Conference on Industrial Electronics and Applications.

[3]  Amit Dvir,et al.  A joint framework of passive monitoring system for complex wireless networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[4]  J. Spragins Computer networks, Third edition [Books] , 1996, IEEE Network.