【24h】

Security Analysis of Device Binding for IP-based IoT Devices

机译:基于IP的IoT设备的设备绑定安全性分析

获取原文
获取原文并翻译 | 示例

摘要

As one of the fastest growing technologies today, the Internet of Things has profoundly changed the ways people interact with the physical world. With a mobile application on a smartphone, a user can conveniently control an IoT device and acquire the sensor data of the external environment. To enable such convenience, a critical step is to bind the user's smartphone with the IoT device and then establish a secure communication channel between them. Although various techniques have already been adopted, however, little has been done so far to systematically evaluate the security implications of those binding mechanisms in IoT. In this paper, we report the first systematic study on device binding mechanisms of IoT, in an attempt to understand the security implications. For this purpose, we defined a practical adversary model and systematically investigated 24 popular IoT products on the consumer market. Our investigation reveals the fact that IoT developers often mistrust the environment and do not follow best practices in device binding. As a result, we were able to launch several types of real-world attacks against the device binding process. Our research brings the insecure designs of device binding to the spotlight and shows that the threat to IoT device binding is realistic and serious.
机译:物联网作为当今发展最快的技术之一,已经深刻地改变了人们与物理世界互动的方式。通过智能手机上的移动应用程序,用户可以方便地控制IoT设备并获取外部环境的传感器数据。为了实现这种便利,关键步骤是将用户的智能手机与IoT设备绑定,然后在它们之间建立安全的通信通道。尽管已经采用了各种技术,但是到目前为止,几乎没有做过系统地评估那些绑定机制在物联网中的安全隐患的工作。在本文中,我们报告了有关物联网设备绑定机制的首次系统研究,以期了解安全隐患。为此,我们定义了一个实用的对手模型,并系统研究了消费市场上的24种流行的IoT产品。我们的调查揭示了一个事实,即物联网开发人员经常对环境不信任,并且在设备绑定方面未遵循最佳实践。结果,我们能够针对设备绑定过程发起多种类型的实际攻击。我们的研究使设备绑定的不安全设计成为人们关注的焦点,并表明对物联网设备绑定的威胁是现实且严重的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号