{"title":"Robustness Evaluation of Cyber Physical Systems through Network Protocol Fuzzing","authors":"T. Ananda, Gitanjali Simran T, S. T, S. D, R. P.","doi":"10.1109/ICACCE46606.2019.9079995","DOIUrl":null,"url":null,"abstract":"With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.","PeriodicalId":317123,"journal":{"name":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 International Conference on Advances in Computing and Communication Engineering (ICACCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICACCE46606.2019.9079995","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
With the technological explosion of Internet of Things(IoT) and the conception of every particle being tied to the Internet, the “security” of these globally connected nodes is critical. The availability and reliability of these networked nodes can be guaranteed by securing the physical nodes and the data associated with them but more importantly by ensuring the network security associated with their communication stack. Thus, in this paper we evaluate the security robustness of the Network protocols associated with these networking capable devices through Fuzzing or corner case checks. Through the Fuzz assessments, we can assess the node behavior when the various applications are under fuzz and establish the security damage/robustness associated with it. This supplies a point of node vulnerability to be fixed before the node connects with a global network.