Weaknesses of IoT Devices in the Access Networks Used by People in Their Homes.

Autor: Hummelholm, Aarne
Zdroj: Proceedings of the European Conference on Cyber Warfare & Security; 2021, p159-168, 10p
Abstrakt: Today, the rapid development of information technology, components, systems, and applications poses major challenges for designers of networks, new services, and new types of smart devices to make devices and systems secure and usable in this digital world. Different types of smart devices are used everywhere, and people are being provided with more effective services to meet their everyday needs. Those smart devices are increasingly connected to many different types of sensors and IoT devices, whose security solutions are weak or non-existent due to the urgency of manufacturers to bring devices to market as quickly as possible. As a result, they have no time to create good security solutions for those devices. Those sensors, actuators and IoT devices are used in industrial environments, different types of municipal systems, different types of homes devices and systems, buildings’ systems, free-time environments, healthcare systems, cars, ships, and so on. Access network devices are connected to smart devices or access nodes and through those access networks devices information is sent to data centers, where they use different types of services and store information they are collecting. People use their smart devices for different services and in different environments, and they often buy apps from app stores that may not be secure enough. Normal store-bought smart devices do not include hardened functionality and are therefore easy to hack or malware can easily be installed on them. Those vulnerabilities give hackers and cyber attackers possibilities to attack systems via those sensors, actuators and IoT devices and install malware in those systems and on devices. Due to the rapid development of sensors, actuators, and IoT devices, hackers and network attackers are aware of this and are developing new types of malware that are optimized for use in such environments. One example of the latest Malware is Mirai, which has been used in attacks against smart devices and processor controllers, IoT devices, actuators, and sensors. It is also used against routers, gateways and switches. There are also new variants that may be even more harmful when they are used against systems. Even if we make the communication connection from smart devices to data center secure enough, it is still not enough because the sensors, actuators and IoT devices are full of vulnerabilities. [ABSTRACT FROM AUTHOR]
Databáze: Complementary Index