skip to main content
10.1145/3139937.3139938acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Systematically Evaluating Security and Privacy for Consumer IoT Devices

Published:03 November 2017Publication History

ABSTRACT

Internet-of-Things (IoT) devices such as smart bulbs, cameras, and health monitors are being enthusiastically adopted by consumers, with numbers projected to rise to the billions. However, such devices are also easily attacked, or used for launching attacks, at large scale and at increasing frequency. This paper is an attempt at developing a systematic method to identify the security and privacy shortcomings of various IoT devices, with a view towards alerting consumers, manufacturers, and regulators to the associated risks. We categorize the threats along four dimensions: confidentiality of private data sent to/from the IoT device; integrity of data from the IoT device to internal/external entities; access control of the IoT device; and reflective attacks that can be launched from an IoT device. We develop scripts to automate the security testing along each of these dimensions, subject twenty market-ready consumer IoT devices to our test suite, and reveal findings that give a fairly comprehensive picture of the security/privacy posture of these devices. Our methodology can be used as a basis for a star-based security ratings system for IoT devices being brought to market.

References

  1. D. Hall. 2015. Building a LIFX packet. https://community.lifx.com/t/building-a-lifx-packet/59. (2015).Google ScholarGoogle Scholar
  2. N. Dhanjani. 2015. Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts. O'Reilly Media.Google ScholarGoogle Scholar
  3. Fernandes et al. 2016. Security Analysis of Emerging Smart Home Applications Proc. IEEE Symposium on Security and Privacy (SP).Google ScholarGoogle Scholar
  4. M. Lyu et al. 2017. Quantifying the Reflective DDoS Attack Capability of Household IoT Devices Proc. ACM WiSec. Boston, Massachusetts.Google ScholarGoogle Scholar
  5. T. Yu et al. 2015. Handling a Trillion (Unfixable) Flaws on a Billion Devices: Rethinking Network Security for the Internet-of-Things. In Proc. ACM HotNets. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Herzberg et al. 2016. Breaking Down Mirai: An IoT DDoS Botnet Analysis. https://www.incapsula.com/blog/malware-analysis-mirai-ddos-botnet.html. (2016).Google ScholarGoogle Scholar
  7. J. Gamblin. 2016. Mirai Source Code. https://github.com/jgamblin/Mirai-Source-Code/tree/master/mirai/bot. (2016).Google ScholarGoogle Scholar
  8. M. Mimoso. 2017. Legislation Proposed to Secure Connected IoT Devices. https://goo.gl/fUQzaT. (2017).Google ScholarGoogle Scholar
  9. Ms. Smith . 2017. A Hacker just Pwned Over 150,000 Printers Left Exposed Online. https://goo.gl/1SZSUw. (2017).Google ScholarGoogle Scholar
  10. Ms. Smith. 2017. Hacker stackoverflowin pwning printers. https://goo.gl/4E4e71. (2017).Google ScholarGoogle Scholar
  11. N. Woolf. 2016. DDoS attack that disrupted internet was largest of its kind in history, experts say. https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet. (2016).Google ScholarGoogle Scholar
  12. R. Eyal et al. 2016. IoT goes nuclear: Creating a ZigBee chain reaction. Technical Report.Google ScholarGoogle Scholar
  13. S. Gibbs. 2015. Hackers can hijack Wi-Fi Hellow Barbie to spy on your children. https://goo.gl/p2Pfk9. (2015).Google ScholarGoogle Scholar
  14. S. Gibbs. 2017. Smart fridges and TVs should carry security rating, police chief says. https://goo.gl/P9MsA6. (2017).Google ScholarGoogle Scholar
  15. S. Notra et al. 2014. An Experimental Study of Security and Privacy Risks with Emerging Household Appliances Proc. First International Workshop on Security and Privacy in Machine-to-Machine Communications (M2MSec).Google ScholarGoogle Scholar

Index Terms

  1. Systematically Evaluating Security and Privacy for Consumer IoT Devices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            IoTS&P '17: Proceedings of the 2017 Workshop on Internet of Things Security and Privacy
            November 2017
            90 pages
            ISBN:9781450353960
            DOI:10.1145/3139937

            Copyright © 2017 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 3 November 2017

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            IoTS&P '17 Paper Acceptance Rate12of30submissions,40%Overall Acceptance Rate12of30submissions,40%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader