An Experimental Framework for Investigating Security and Privacy of IoT Devices View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2017-10-11

AUTHORS

Ali Tekeoglu , Ali Şaman Tosun

ABSTRACT

With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices. More... »

PAGES

63-83

Book

TITLE

Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments

ISBN

978-3-319-69154-1
978-3-319-69155-8

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5

DOI

http://dx.doi.org/10.1007/978-3-319-69155-8_5

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1092151059


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "SUNY Polytechnic Institute", 
          "id": "https://www.grid.ac/institutes/grid.441535.2", 
          "name": [
            "Network Computer Security Department, SUNY Polytechnic Institute, 100 Seymour Ave., 13502, Utica, NY, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tekeoglu", 
        "givenName": "Ali", 
        "id": "sg:person.013160700155.72", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013160700155.72"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "The University of Texas at San Antonio", 
          "id": "https://www.grid.ac/institutes/grid.215352.2", 
          "name": [
            "Computer Science Department, The University of Texas at San Antonio, One UTSA Circle, 78249, San Antonio, TX, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Tosun", 
        "givenName": "Ali \u015eaman", 
        "id": "sg:person.015274407763.52", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015274407763.52"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1145/956981.956983", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1045437036"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1653662.1653691", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052290405"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/msp.2009.26", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061423219"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2012.16", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094209237"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/infcomw.2015.7179371", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094284133"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/pccc.2014.7017050", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094757003"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icccn.2015.7288421", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095217837"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/mass.2016.051", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095486930"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2017-10-11", 
    "datePublishedReg": "2017-10-11", 
    "description": "With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices.", 
    "editor": [
      {
        "familyName": "Traore", 
        "givenName": "Issa", 
        "type": "Person"
      }, 
      {
        "familyName": "Woungang", 
        "givenName": "Isaac", 
        "type": "Person"
      }, 
      {
        "familyName": "Awad", 
        "givenName": "Ahmed", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-319-69155-8_5", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-319-69154-1", 
        "978-3-319-69155-8"
      ], 
      "name": "Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments", 
      "type": "Book"
    }, 
    "name": "An Experimental Framework for Investigating Security and Privacy of IoT Devices", 
    "pagination": "63-83", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-319-69155-8_5"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "ddea57ec3f9a1e342acdcf94bbcdfd5642272db8b9fb7146257dbce15d286a82"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1092151059"
        ]
      }
    ], 
    "publisher": {
      "location": "Cham", 
      "name": "Springer International Publishing", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-319-69155-8_5", 
      "https://app.dimensions.ai/details/publication/pub.1092151059"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-16T04:59", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000325_0000000325/records_100778_00000000.jsonl", 
    "type": "Chapter", 
    "url": "https://link.springer.com/10.1007%2F978-3-319-69155-8_5"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-319-69155-8_5'


 

This table displays all metadata directly associated to this object as RDF triples.

109 TRIPLES      23 PREDICATES      34 URIs      19 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-319-69155-8_5 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N074aaf282bec4c96a7878ae290f1692e
4 schema:citation https://doi.org/10.1109/icccn.2015.7288421
5 https://doi.org/10.1109/infcomw.2015.7179371
6 https://doi.org/10.1109/mass.2016.051
7 https://doi.org/10.1109/msp.2009.26
8 https://doi.org/10.1109/pccc.2014.7017050
9 https://doi.org/10.1109/sp.2012.16
10 https://doi.org/10.1145/1653662.1653691
11 https://doi.org/10.1145/956981.956983
12 schema:datePublished 2017-10-11
13 schema:datePublishedReg 2017-10-11
14 schema:description With the rapid growth of Internet-of-Things (IoT) devices, security and privacy issues emerged as a potential roadblock for widespread adoption. Preliminary research indicates that many types of IoT devices have serious vulnerabilities. It is not easy to investigate security and privacy issues since each type of device is different and manual experiments need to be conducted on the device. In this paper, we propose a framework for investigation of security and privacy issues of IoT devices. The framework consists of four components, a testbed, set of topics to be investigated, a set of experiments for each topic investigated and a final report. Fundamental approach used in the framework is to capture layer 2 and layer 3 packets and to analyze the packets for various features. Proposed framework is low cost and is based on off-the-shelf hardware and open source software. Using the framework, we can investigate security and privacy issues of many IoT devices including HDMI sticks, IP cameras, activity trackers, smartwatches and drones. A large set of topics can be investigated on IoT devices using the framework including vulnerability issues, protocol security, firmware updates, authentication issues and privacy violations. Sample experimental results show the promise of the proposed framework. We believe this framework will serve as the foundation for a general automated framework to investigate security and privacy issues of most IoT devices.
15 schema:editor Nead60ec63aee4bac90bfe1bf584d0987
16 schema:genre chapter
17 schema:inLanguage en
18 schema:isAccessibleForFree false
19 schema:isPartOf Nca32ced1dee746de997fc01aa21103cb
20 schema:name An Experimental Framework for Investigating Security and Privacy of IoT Devices
21 schema:pagination 63-83
22 schema:productId N15bdecb3ffba4630a21a2d603fbca75a
23 Na23b6a14516c45f09d9a97e51e813e96
24 Ne1616c7cd15c445c962cec50e3952cd8
25 schema:publisher Nd686e66fc4c547959420a686e2181285
26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1092151059
27 https://doi.org/10.1007/978-3-319-69155-8_5
28 schema:sdDatePublished 2019-04-16T04:59
29 schema:sdLicense https://scigraph.springernature.com/explorer/license/
30 schema:sdPublisher N198c74c2900747a1b90c802b8f4e4e1f
31 schema:url https://link.springer.com/10.1007%2F978-3-319-69155-8_5
32 sgo:license sg:explorer/license/
33 sgo:sdDataset chapters
34 rdf:type schema:Chapter
35 N074aaf282bec4c96a7878ae290f1692e rdf:first sg:person.013160700155.72
36 rdf:rest Nc869ab0729014f93a62146eb9f319d7f
37 N15bdecb3ffba4630a21a2d603fbca75a schema:name readcube_id
38 schema:value ddea57ec3f9a1e342acdcf94bbcdfd5642272db8b9fb7146257dbce15d286a82
39 rdf:type schema:PropertyValue
40 N198c74c2900747a1b90c802b8f4e4e1f schema:name Springer Nature - SN SciGraph project
41 rdf:type schema:Organization
42 N20d0270859cb47fe8735e9eb62abb81f schema:familyName Awad
43 schema:givenName Ahmed
44 rdf:type schema:Person
45 N5d0ff126bb414d33a8c6e47b8e82eca7 schema:familyName Traore
46 schema:givenName Issa
47 rdf:type schema:Person
48 N9e71d377e2d64677898ed3260d243544 schema:familyName Woungang
49 schema:givenName Isaac
50 rdf:type schema:Person
51 Na23b6a14516c45f09d9a97e51e813e96 schema:name dimensions_id
52 schema:value pub.1092151059
53 rdf:type schema:PropertyValue
54 Nc5d571f4ff1f424eb05f6f16b855394f rdf:first N20d0270859cb47fe8735e9eb62abb81f
55 rdf:rest rdf:nil
56 Nc869ab0729014f93a62146eb9f319d7f rdf:first sg:person.015274407763.52
57 rdf:rest rdf:nil
58 Nca32ced1dee746de997fc01aa21103cb schema:isbn 978-3-319-69154-1
59 978-3-319-69155-8
60 schema:name Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments
61 rdf:type schema:Book
62 Nd686e66fc4c547959420a686e2181285 schema:location Cham
63 schema:name Springer International Publishing
64 rdf:type schema:Organisation
65 Nda7f7ad639224f008dac0c1bb2245f9a rdf:first N9e71d377e2d64677898ed3260d243544
66 rdf:rest Nc5d571f4ff1f424eb05f6f16b855394f
67 Ne1616c7cd15c445c962cec50e3952cd8 schema:name doi
68 schema:value 10.1007/978-3-319-69155-8_5
69 rdf:type schema:PropertyValue
70 Nead60ec63aee4bac90bfe1bf584d0987 rdf:first N5d0ff126bb414d33a8c6e47b8e82eca7
71 rdf:rest Nda7f7ad639224f008dac0c1bb2245f9a
72 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
73 schema:name Information and Computing Sciences
74 rdf:type schema:DefinedTerm
75 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
76 schema:name Data Format
77 rdf:type schema:DefinedTerm
78 sg:person.013160700155.72 schema:affiliation https://www.grid.ac/institutes/grid.441535.2
79 schema:familyName Tekeoglu
80 schema:givenName Ali
81 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013160700155.72
82 rdf:type schema:Person
83 sg:person.015274407763.52 schema:affiliation https://www.grid.ac/institutes/grid.215352.2
84 schema:familyName Tosun
85 schema:givenName Ali Şaman
86 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015274407763.52
87 rdf:type schema:Person
88 https://doi.org/10.1109/icccn.2015.7288421 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095217837
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1109/infcomw.2015.7179371 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094284133
91 rdf:type schema:CreativeWork
92 https://doi.org/10.1109/mass.2016.051 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095486930
93 rdf:type schema:CreativeWork
94 https://doi.org/10.1109/msp.2009.26 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061423219
95 rdf:type schema:CreativeWork
96 https://doi.org/10.1109/pccc.2014.7017050 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094757003
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1109/sp.2012.16 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094209237
99 rdf:type schema:CreativeWork
100 https://doi.org/10.1145/1653662.1653691 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052290405
101 rdf:type schema:CreativeWork
102 https://doi.org/10.1145/956981.956983 schema:sameAs https://app.dimensions.ai/details/publication/pub.1045437036
103 rdf:type schema:CreativeWork
104 https://www.grid.ac/institutes/grid.215352.2 schema:alternateName The University of Texas at San Antonio
105 schema:name Computer Science Department, The University of Texas at San Antonio, One UTSA Circle, 78249, San Antonio, TX, USA
106 rdf:type schema:Organization
107 https://www.grid.ac/institutes/grid.441535.2 schema:alternateName SUNY Polytechnic Institute
108 schema:name Network Computer Security Department, SUNY Polytechnic Institute, 100 Seymour Ave., 13502, Utica, NY, USA
109 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...