Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

Jean-Paul A. Yaacoub , Hassan N. Noura , Ola Salman , Ali Chehab
{"title":"Ethical hacking for IoT: Security issues, challenges, solutions and recommendations","authors":"Jean-Paul A. Yaacoub ,&nbsp;Hassan N. Noura ,&nbsp;Ola Salman ,&nbsp;Ali Chehab","doi":"10.1016/j.iotcps.2023.04.002","DOIUrl":null,"url":null,"abstract":"<div><p>In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"3 ","pages":"Pages 280-308"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Internet of Things and Cyber-Physical Systems","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667345223000238","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2023/4/25 0:00:00","PubModel":"Epub","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

Abstract

In recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
物联网的道德黑客:安全问题、挑战、解决方案和建议
近年来,针对各种物联网系统、网络、服务器、设备和应用的攻击急剧增加,特别是自2021年以来,物联网设备的数量达到358.2亿;到2025年,这一数字可能达到754.4亿。因此,针对物联网领域的安全相关攻击预计将进一步增加,其影响风险将严重影响底层物联网系统、网络、设备和应用。采用标准的安全(对抗)措施并不总是有效的,特别是在资源受限的物联网设备存在的情况下。因此,有必要在物联网系统层面进行渗透测试。然而,主要问题是物联网由各种各样的物联网设备、固件、硬件、软件、应用程序/web服务器、网络和通信协议组成。因此,为了减少这些攻击对物联网系统的影响,强烈建议在物联网的不同层面(终端设备、基础设施和用户)进行定期渗透测试和道德黑客模拟,这可以被视为一种合适的解决方案。因此,本文的重点是通过道德黑客方法和工具来解释、分析和评估物联网系统中安全漏洞的技术和非技术方面。这将提供可根据评估的风险采用的实用安全解决方案。此过程可被视为模拟攻击,目的是识别任何物联网实体(终端设备、网关或服务器)或固件中的任何可利用漏洞或/和安全漏洞。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
13.80
自引率
0.00%
发文量
0
期刊最新文献
Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities UMetaBE-DPPML: Urban metaverse & blockchain-enabled decentralised privacy-preserving machine learning verification and authentication with metaverse immersive devices LoRa for multihop communication in internet of underground things under fading environments Advanced Machine Learning in Smart Grids: An overview AOA-SMA-EGRUAttNet: A hybrid feature selection and dual-stream attention-based intrusion detection framework for IIoT systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1