An Experimental Framework for Investigating Security and Privacy of IoT Devices View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-10-11

AUTHORS

Ali Tekeoglu , Ali Şaman Tosun

ABSTRACT

With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices. More... »

PAGES

63-83

Book

TITLE

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

ISBN

978-3-319-69154-1
978-3-319-69155-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5

DOI

http://dx.doi.org/10.1007/978-3-319-69155-8_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1092151059


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "SUNY Polytechnic Institute", 
          "id": "https://www.grid.ac/institutes/grid.441535.2", 
          "name": [
            "Network Computer Security Department, SUNY Polytechnic Institute, 100 Seymour Ave., 13502, Utica, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tekeoglu", 
        "givenName": "Ali", 
        "id": "sg:person.013160700155.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013160700155.72"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The University of Texas at San Antonio", 
          "id": "https://www.grid.ac/institutes/grid.215352.2", 
          "name": [
            "Computer Science Department, The University of Texas at San Antonio, One UTSA Circle, 78249, San Antonio, TX, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tosun", 
        "givenName": "Ali \u015eaman", 
        "id": "sg:person.015274407763.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015274407763.52"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/956981.956983", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045437036"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1653662.1653691", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052290405"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/msp.2009.26", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061423219"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2012.16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094209237"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcomw.2015.7179371", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094284133"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/pccc.2014.7017050", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094757003"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icccn.2015.7288421", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095217837"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mass.2016.051", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095486930"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2017-10-11", 
    "datePublishedReg": "2017-10-11", 
    "description": "With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices.", 
    "editor": [
      {
        "familyName": "Traore", 
        "givenName": "Issa", 
        "type": "Person"
      }, 
      {
        "familyName": "Woungang", 
        "givenName": "Isaac", 
        "type": "Person"
      }, 
      {
        "familyName": "Awad", 
        "givenName": "Ahmed", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-69155-8_5", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-69154-1", 
        "978-3-319-69155-8"
      ], 
      "name": "Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments", 
      "type": "Book"
    }, 
    "name": "An Experimental Framework for Investigating Security and Privacy of IoT Devices", 
    "pagination": "63-83", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-69155-8_5"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "ddea57ec3f9a1e342acdcf94bbcdfd5642272db8b9fb7146257dbce15d286a82"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1092151059"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-69155-8_5", 
      "https://app.dimensions.ai/details/publication/pub.1092151059"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T04:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000325_0000000325/records_100778_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-319-69155-8_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      23 PREDICATES      34 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-69155-8_5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N75244e42c9a84ab99e6187043bb242fc
4 schema:citation https://doi.org/10.1109/icccn.2015.7288421
5 https://doi.org/10.1109/infcomw.2015.7179371
6 https://doi.org/10.1109/mass.2016.051
7 https://doi.org/10.1109/msp.2009.26
8 https://doi.org/10.1109/pccc.2014.7017050
9 https://doi.org/10.1109/sp.2012.16
10 https://doi.org/10.1145/1653662.1653691
11 https://doi.org/10.1145/956981.956983
12 schema:datePublished 2017-10-11
13 schema:datePublishedReg 2017-10-11
14 schema:description With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices.
15 schema:editor N57748f292cbe4396a00e8ef6799d41b6
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf N602d0ae8c6de4d488baf3b0d2a69bb9a
20 schema:name An Experimental Framework for Investigating Security and Privacy of IoT Devices
21 schema:pagination 63-83
22 schema:productId N46d72c370b25454ebe832570b75d07b9
23 Nd5eb12836ca94a3ba384977bda0939c5
24 Nf9770d0a53634ef2a8617e65d5b303a3
25 schema:publisher Nca2d893e818e4ef08d10ca8b5718d533
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092151059
27 https://doi.org/10.1007/978-3-319-69155-8_5
28 schema:sdDatePublished 2019-04-16T04:59
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher Neaac387e4fd64b2381263721e09c2204
31 schema:url https://link.springer.com/10.1007%2F978-3-319-69155-8_5
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N0689571940d8442d9e1eb8bfc78d4d81 rdf:first N6cb918d75e384a52ab251f7494853dc2
36 rdf:rest Nd4b842003dea4f02891834702e23ef17
37 N3b29925fe6664537a9a5239907f0e6e0 rdf:first sg:person.015274407763.52
38 rdf:rest rdf:nil
39 N46d72c370b25454ebe832570b75d07b9 schema:name doi
40 schema:value 10.1007/978-3-319-69155-8_5
41 rdf:type schema:PropertyValue
42 N57748f292cbe4396a00e8ef6799d41b6 rdf:first Nec8354a2cd304c65aa65dfbfe9679b10
43 rdf:rest N0689571940d8442d9e1eb8bfc78d4d81
44 N602d0ae8c6de4d488baf3b0d2a69bb9a schema:isbn 978-3-319-69154-1
45 978-3-319-69155-8
46 schema:name Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
47 rdf:type schema:Book
48 N6cb918d75e384a52ab251f7494853dc2 schema:familyName Woungang
49 schema:givenName Isaac
50 rdf:type schema:Person
51 N75244e42c9a84ab99e6187043bb242fc rdf:first sg:person.013160700155.72
52 rdf:rest N3b29925fe6664537a9a5239907f0e6e0
53 Nca2d893e818e4ef08d10ca8b5718d533 schema:location Cham
54 schema:name Springer International Publishing
55 rdf:type schema:Organisation
56 Nd4b842003dea4f02891834702e23ef17 rdf:first Nea0a7ba8c2a74e0ab45c722c4779bfbc
57 rdf:rest rdf:nil
58 Nd5eb12836ca94a3ba384977bda0939c5 schema:name readcube_id
59 schema:value ddea57ec3f9a1e342acdcf94bbcdfd5642272db8b9fb7146257dbce15d286a82
60 rdf:type schema:PropertyValue
61 Nea0a7ba8c2a74e0ab45c722c4779bfbc schema:familyName Awad
62 schema:givenName Ahmed
63 rdf:type schema:Person
64 Neaac387e4fd64b2381263721e09c2204 schema:name Springer Nature - SN SciGraph project
65 rdf:type schema:Organization
66 Nec8354a2cd304c65aa65dfbfe9679b10 schema:familyName Traore
67 schema:givenName Issa
68 rdf:type schema:Person
69 Nf9770d0a53634ef2a8617e65d5b303a3 schema:name dimensions_id
70 schema:value pub.1092151059
71 rdf:type schema:PropertyValue
72 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
73 schema:name Information and Computing Sciences
74 rdf:type schema:DefinedTerm
75 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
76 schema:name Data Format
77 rdf:type schema:DefinedTerm
78 sg:person.013160700155.72 schema:affiliation https://www.grid.ac/institutes/grid.441535.2
79 schema:familyName Tekeoglu
80 schema:givenName Ali
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013160700155.72
82 rdf:type schema:Person
83 sg:person.015274407763.52 schema:affiliation https://www.grid.ac/institutes/grid.215352.2
84 schema:familyName Tosun
85 schema:givenName Ali Şaman
86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015274407763.52
87 rdf:type schema:Person
88 https://doi.org/10.1109/icccn.2015.7288421 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095217837
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1109/infcomw.2015.7179371 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094284133
91 rdf:type schema:CreativeWork
92 https://doi.org/10.1109/mass.2016.051 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095486930
93 rdf:type schema:CreativeWork
94 https://doi.org/10.1109/msp.2009.26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061423219
95 rdf:type schema:CreativeWork
96 https://doi.org/10.1109/pccc.2014.7017050 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094757003
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1109/sp.2012.16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094209237
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1145/1653662.1653691 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052290405
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1145/956981.956983 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045437036
103 rdf:type schema:CreativeWork
104 https://www.grid.ac/institutes/grid.215352.2 schema:alternateName The University of Texas at San Antonio
105 schema:name Computer Science Department, The University of Texas at San Antonio, One UTSA Circle, 78249, San Antonio, TX, USA
106 rdf:type schema:Organization
107 https://www.grid.ac/institutes/grid.441535.2 schema:alternateName SUNY Polytechnic Institute
108 schema:name Network Computer Security Department, SUNY Polytechnic Institute, 100 Seymour Ave., 13502, Utica, NY, USA
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...