IOT SECURITY AND SOFTWARE TESTING
Yıl 2024,
, 26 - 32, 25.03.2024
Osman Can Çetlenbik
,
Ahmet Ali Süzen
,
Burhan Duman
Öz
The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.
Kaynakça
- [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
- [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
- [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
- [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
- [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
- [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
- [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
- [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
- [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
- [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
- [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
- [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254.
https://doi.org/10.1109/jiot.2020.3002255
- [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and
Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
- [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
- [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
- [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
- [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
- [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.
IOT SECURITY AND SOFTWARE TESTING
Yıl 2024,
, 26 - 32, 25.03.2024
Osman Can Çetlenbik
,
Ahmet Ali Süzen
,
Burhan Duman
Öz
The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.
Kaynakça
- [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
- [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
- [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
- [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
- [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
- [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
- [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
- [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
- [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
- [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
- [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
- [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254.
https://doi.org/10.1109/jiot.2020.3002255
- [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and
Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
- [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
- [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
- [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
- [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
- [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.