The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a huge number of devices collecting sensitive information. Although this provides a highly dynamic network with extensive capabilities, its widespread adoption and sensitive nature of the collected data open a large number of challenges from a cybersecurity perspective. In this paper, we offer a fresh perspective on the IoT security landscape by providing a full list of reported vulnerabilites. By organizing protocols and vulnerabilities according to the TCP/IP stack, we guide both novice and expert users and developers in gaining a clear overview of the state-of-the-art IoT and its security issues. Furthermore, by discussing open problems and future directions, we think our paper will be helpful to the research community in designing the next generation of secure IoT.

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions / A.O. Bang, U.P. Rao, A. Visconti, A. Brighente, M. Conti. - In: COMPUTERS & SECURITY. - ISSN 0167-4048. - 123:(2022). [10.1016/j.cose.2022.102914]

An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions

A. Visconti;
2022

Abstract

The Internet of Things (IoT) is a pervasive phenomenon in our everyday life, binding and enabling communication between heterogeneous physical devices and the internet. The applications of this technology range from industrial control to medical devices, hence interconnecting a huge number of devices collecting sensitive information. Although this provides a highly dynamic network with extensive capabilities, its widespread adoption and sensitive nature of the collected data open a large number of challenges from a cybersecurity perspective. In this paper, we offer a fresh perspective on the IoT security landscape by providing a full list of reported vulnerabilites. By organizing protocols and vulnerabilities according to the TCP/IP stack, we guide both novice and expert users and developers in gaining a clear overview of the state-of-the-art IoT and its security issues. Furthermore, by discussing open problems and future directions, we think our paper will be helpful to the research community in designing the next generation of secure IoT.
Attacks; Internet of Things; Privacy; Protocols; Security; Vulnerabilities
Settore INF/01 - Informatica
2022
Article (author)
File in questo prodotto:
File Dimensione Formato  
COSE_Journal Pre-proof.pdf

accesso riservato

Tipologia: Post-print, accepted manuscript ecc. (versione accettata dall'editore)
Dimensione 2.38 MB
Formato Adobe PDF
2.38 MB Adobe PDF   Visualizza/Apri   Richiedi una copia
Pubblicazioni consigliate

I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/2434/937977
Citazioni
  • ???jsp.display-item.citation.pmc??? ND
  • Scopus 25
  • ???jsp.display-item.citation.isi??? 15
social impact