Gheorghe Romeo Andreica, Liviu Bozga, Daniel Zinca, V. Dobrota
{"title":"基于gps的智能交通系统监控软件中针对物联网设备的拒绝服务和中间人攻击","authors":"Gheorghe Romeo Andreica, Liviu Bozga, Daniel Zinca, V. Dobrota","doi":"10.1109/RoEduNet51892.2020.9324865","DOIUrl":null,"url":null,"abstract":"The issue of information security in the IoT era is an essential aspect for all IoT devices that are connected to the Internet. If the technology is vulnerable, it allows hackers to exploit such systems in order to spy, harm, or disrupt their activity. This paper presents some security issues of a GPS-based monitoring solution for the automotive industry. Some penetration tests using DoS and MITM attacks were launched in an infrastructure with GPS-based data transmission devices and receiving servers. Preliminary countermeasures were suggested, as the Teltonika protocol involved in the initial system did not use encryption.","PeriodicalId":140521,"journal":{"name":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Denial of Service and Man-in-the-Middle Attacks Against IoT Devices in a GPS-Based Monitoring Software for Intelligent Transportation Systems\",\"authors\":\"Gheorghe Romeo Andreica, Liviu Bozga, Daniel Zinca, V. Dobrota\",\"doi\":\"10.1109/RoEduNet51892.2020.9324865\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The issue of information security in the IoT era is an essential aspect for all IoT devices that are connected to the Internet. If the technology is vulnerable, it allows hackers to exploit such systems in order to spy, harm, or disrupt their activity. This paper presents some security issues of a GPS-based monitoring solution for the automotive industry. Some penetration tests using DoS and MITM attacks were launched in an infrastructure with GPS-based data transmission devices and receiving servers. Preliminary countermeasures were suggested, as the Teltonika protocol involved in the initial system did not use encryption.\",\"PeriodicalId\":140521,\"journal\":{\"name\":\"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RoEduNet51892.2020.9324865\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 19th RoEduNet Conference: Networking in Education and Research (RoEduNet)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RoEduNet51892.2020.9324865","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Denial of Service and Man-in-the-Middle Attacks Against IoT Devices in a GPS-Based Monitoring Software for Intelligent Transportation Systems
The issue of information security in the IoT era is an essential aspect for all IoT devices that are connected to the Internet. If the technology is vulnerable, it allows hackers to exploit such systems in order to spy, harm, or disrupt their activity. This paper presents some security issues of a GPS-based monitoring solution for the automotive industry. Some penetration tests using DoS and MITM attacks were launched in an infrastructure with GPS-based data transmission devices and receiving servers. Preliminary countermeasures were suggested, as the Teltonika protocol involved in the initial system did not use encryption.