Security modeling and analysis of cross-protocol IoT devices
Version 2 2024-06-18, 17:59Version 2 2024-06-18, 17:59
Version 1 2017-01-01, 00:00Version 1 2017-01-01, 00:00
conference contribution
posted on 2024-06-18, 17:59 authored by M Ge, JB Hong, H Alzaid, DS Kim© 2017 IEEE. In the Internet of Things (IoT), smart devices are connected using various communication protocols, such as Wi-Fi, ZigBee. Some IoT devices have multiple built-in communication modules. If an IoT device equipped with multiple communication protocols is compromised by an attacker using one communication protocol (e.g., Wi-Fi), it can be exploited as an entry point to the IoT network. Another protocol (e.g., ZigBee) of this IoT device could be used to exploit vulnerabilities of other IoT devices using the same communication protocol. In order to find potential attacks caused by this kind of cross-protocol devices, we group IoT devices based on their communication protocols and construct a graphical security model for each group of devices using the same communication protocol. We combine the security models via the cross-protocol devices and compute hidden attack paths traversing different groups of devices. We use two use cases in the smart home scenario to demonstrate our approach and discuss some feasible countermeasures.
History
Related Materials
- 1.
Location
Sydney, New South WalesLanguage
engPublication classification
E1.1 Full written paper - refereedPagination
1043-1048Start date
2017-08-01End date
2017-08-04ISBN-13
9781509049059Title of proceedings
TrustCom 2017 : Proceedings of the 2017 IEEE International Conference on Trust, Security and Privacy in Computing and CommunicationsEvent
Trust, Security and Privacy in Computing and Communications. Conference (2017 : Sydney, New South Wales)Publisher
IEEEPlace of publication
Piscataway, N.J.Usage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorksRefWorks
BibTeXBibTeX
Ref. managerRef. manager
EndnoteEndnote
DataCiteDataCite
NLMNLM
DCDC

