RMIT University
Browse

Security Modeling and Analysis of Cross-Protocol IoT Devices

conference contribution
posted on 2024-11-03, 14:46 authored by Mengmeng Ge, Jin-Bum Hong, Hani Alzaid, Dong Seong Kim
In the Internet of Things (IoT), smart devices are connected using various communication protocols, such as Wi-Fi, ZigBee. Some IoT devices have multiple built-in communication modules. If an IoT device equipped with multiple communication protocols is compromised by an attacker using one communication protocol (e.g., Wi-Fi), it can be exploited as an entry point to the IoT network. Another protocol (e.g., ZigBee) of this IoT device could be used to exploit vulnerabilities of other IoT devices using the same communication protocol. In order to find potential attacks caused by this kind of cross-protocol devices, we group IoT devices based on their communication protocols and construct a graphical security model for each group of devices using the same communication protocol. We combine the security models via the cross-protocol devices and compute hidden attack paths traversing different groups of devices. We use two use cases in the smart home scenario to demonstrate our approach and discuss some feasible countermeasures.

History

Related Materials

  1. 1.
  2. 2.
    ISBN - Is published in 9781509049073 (urn:isbn:9781509049073)

Start page

1043

End page

1048

Total pages

6

Outlet

Proceedings of the Joint 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (Trustcom/BigDataSE/ICESS)

Name of conference

Trustcom/BigDataSE/ICESS 2017

Publisher

IEEE

Place published

United States

Start date

2017-08-01

End date

2017-08-04

Language

English

Copyright

© 2017 IEEE

Former Identifier

2006110133

Esploro creation date

2021-10-01

Usage metrics

    Scholarly Works

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC