A vulnerability detection framework for IoT devices: Smart lock.

التفاصيل البيبلوغرافية
العنوان: A vulnerability detection framework for IoT devices: Smart lock.
المؤلفون: Zainudin, Ahmad Fudhail Iyad Mohd, Awang, Nor Fatimah, Marzukhi, Syahaneim, Alsagoff, Syed Nasir, Tajuddin, Taniza, Jarno, Ahmad Dahari
المصدر: AIP Conference Proceedings; 2022, Vol. 2617 Issue 1, p1-9, 9p
مصطلحات موضوعية: SMART devices, SMART locks, INTERNET of things, SMART homes, HOME automation
مستخلص: With the current trend of Internet of Things (IoT), it normally related to the concept of the Smart Home system. Eventually, the Smart Home systems and devices are often operating together where the users' data are shared among the Smart Home ecosystem including the devices in order to automatically perform certain action based on the users' setting. For example, Home Automation system such as Smart Lock can help the users monitor their home remotely while avoiding the door left unlocked. However, as the Home Automation system devices are able to capture data via sensors and transmit data via the internet, this intrusive activity is possible to be attacked by the hackers. Hence, the hackers are granted a free access from any place and any time to attack the Home Automation system. Based on the analysis and observation from previous research on Penetration Testing and Security Assessment Framework, those study had offered a guideline for the proposed Vulnerability Detection Framework for IoT components and devices. The proposed framework can be implemented as a practice and exercise in performing security vulnerabilities assessment for the IoT devices particularly the Smart Lock system. The proposed framework is adapted from OWASP Firmware Security Testing Methodology and OCTAVE. [ABSTRACT FROM AUTHOR]
Copyright of AIP Conference Proceedings is the property of American Institute of Physics and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
قاعدة البيانات: Complementary Index
الوصف
تدمد:0094243X
DOI:10.1063/5.0119779