Research Article
BibTex RIS Cite

IOT SECURITY AND SOFTWARE TESTING

Year 2024, , 26 - 32, 25.03.2024
https://doi.org/10.57120/yalvac.1437571

Abstract

The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.

References

  • [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
  • [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
  • [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
  • [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
  • [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
  • [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
  • [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
  • [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
  • [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
  • [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
  • [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
  • [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254. https://doi.org/10.1109/jiot.2020.3002255
  • [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
  • [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
  • [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
  • [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
  • [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
  • [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.

IOT SECURITY AND SOFTWARE TESTING

Year 2024, , 26 - 32, 25.03.2024
https://doi.org/10.57120/yalvac.1437571

Abstract

The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.

References

  • [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
  • [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
  • [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
  • [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
  • [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
  • [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
  • [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
  • [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
  • [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
  • [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
  • [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
  • [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254. https://doi.org/10.1109/jiot.2020.3002255
  • [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
  • [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
  • [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
  • [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
  • [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
  • [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.
There are 18 citations in total.

Details

Primary Language English
Subjects Information Security Management
Journal Section Articels
Authors

Osman Can Çetlenbik 0009-0000-6561-1943

Ahmet Ali Süzen 0000-0002-5871-1652

Burhan Duman 0000-0001-5614-1556

Early Pub Date March 18, 2024
Publication Date March 25, 2024
Submission Date February 15, 2024
Acceptance Date February 29, 2024
Published in Issue Year 2024

Cite

APA Çetlenbik, O. C., Süzen, A. A., & Duman, B. (2024). IOT SECURITY AND SOFTWARE TESTING. Yalvaç Akademi Dergisi, 9(1), 26-32. https://doi.org/10.57120/yalvac.1437571

http://www.yalvacakademi.org/