ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware

The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. Confidential data and information are involved as IoT device u...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ACM transactions on sensor networks 2023-01
Hauptverfasser: Bhardwaj, Akashdeep, Kaushik, Keshav, Alshehri, Mohammed, Mohamed, Ahmed Abo-Bakr, Keshta, Ismail
Format: Artikel
Sprache:eng
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title ACM transactions on sensor networks
container_volume
creator Bhardwaj, Akashdeep
Kaushik, Keshav
Alshehri, Mohammed
Mohamed, Ahmed Abo-Bakr
Keshta, Ismail
description The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. Confidential data and information are involved as IoT device use rises. IoT device security has emerged as a major issue and is becoming more and more significant. Appropriate security measures are needed to prevent dangers and hazards associated with the adoption of smart technology in smart cities and houses that run IoT devices, according to security evaluations. In order to safeguard the smart home environment, our research focuses on IoT device firmware. The security methodology presented in this research may be used to analyze and investigate IoT firmware, revealing sensitive data and hardcoded user IDs and passwords that can be used in future attacks and breach of IoT devices. The authors put out an idea for how real-time datasets produced by IoT search engines may be analyzed using keywords according to different device kinds, locations, and manufacturers. The results showed that it took device owners 11–13 months to upgrade the firmware. Only HP and Cisco routinely provided firmware updates to protect IoT devices among IoT device makers.
doi_str_mv 10.1145/3578363
format Article
fullrecord <record><control><sourceid>acm_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1145_3578363</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3578363</sourcerecordid><originalsourceid>FETCH-LOGICAL-a1223-6a8e86daabd8e6ab651110e436fd6f6085471be00d641e7967a78864418110ca3</originalsourceid><addsrcrecordid>eNo9j81Lw0AUxBdRsFbx7mlvnqL7up_1FoqxgYKH1HN4yb5ApElkNyL574209jQD82OYYewexBOA0s9SWyeNvGAL0Fokyhl7efZ6fc1uYvwUQkolxYJleZG98ILq79COE097PEyxjRx7z9MYKcaO-pEPDS86DCPfDh3xfNgnFUbyPGtD94OBbtlVg4dIdyddso_sdb_ZJrv3t3yT7hKE1UomBh054xEr78hgZTQACFLSNN40RjitLFQkhDcKyK6NReucUQrczNUol-zx2FuHIcZATfkV2nnYVIIo_-6Xp_sz-XAkse7O0H_4C_tNUo4</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware</title><source>ACM Digital Library Complete</source><creator>Bhardwaj, Akashdeep ; Kaushik, Keshav ; Alshehri, Mohammed ; Mohamed, Ahmed Abo-Bakr ; Keshta, Ismail</creator><creatorcontrib>Bhardwaj, Akashdeep ; Kaushik, Keshav ; Alshehri, Mohammed ; Mohamed, Ahmed Abo-Bakr ; Keshta, Ismail</creatorcontrib><description>The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. Confidential data and information are involved as IoT device use rises. IoT device security has emerged as a major issue and is becoming more and more significant. Appropriate security measures are needed to prevent dangers and hazards associated with the adoption of smart technology in smart cities and houses that run IoT devices, according to security evaluations. In order to safeguard the smart home environment, our research focuses on IoT device firmware. The security methodology presented in this research may be used to analyze and investigate IoT firmware, revealing sensitive data and hardcoded user IDs and passwords that can be used in future attacks and breach of IoT devices. The authors put out an idea for how real-time datasets produced by IoT search engines may be analyzed using keywords according to different device kinds, locations, and manufacturers. The results showed that it took device owners 11–13 months to upgrade the firmware. Only HP and Cisco routinely provided firmware updates to protect IoT devices among IoT device makers.</description><identifier>ISSN: 1550-4859</identifier><identifier>EISSN: 1550-4867</identifier><identifier>DOI: 10.1145/3578363</identifier><language>eng</language><publisher>New York, NY: ACM</publisher><ispartof>ACM transactions on sensor networks, 2023-01</ispartof><rights>Association for Computing Machinery.</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-a1223-6a8e86daabd8e6ab651110e436fd6f6085471be00d641e7967a78864418110ca3</citedby><cites>FETCH-LOGICAL-a1223-6a8e86daabd8e6ab651110e436fd6f6085471be00d641e7967a78864418110ca3</cites><orcidid>0000-0001-7361-0465 ; 0000-0002-0414-5448 ; 0000-0003-3777-765X ; 0000-0001-9803-5882 ; 0000-0003-1035-311X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925</link.rule.ids></links><search><creatorcontrib>Bhardwaj, Akashdeep</creatorcontrib><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Alshehri, Mohammed</creatorcontrib><creatorcontrib>Mohamed, Ahmed Abo-Bakr</creatorcontrib><creatorcontrib>Keshta, Ismail</creatorcontrib><title>ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware</title><title>ACM transactions on sensor networks</title><addtitle>ACM TOSN</addtitle><description>The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. Confidential data and information are involved as IoT device use rises. IoT device security has emerged as a major issue and is becoming more and more significant. Appropriate security measures are needed to prevent dangers and hazards associated with the adoption of smart technology in smart cities and houses that run IoT devices, according to security evaluations. In order to safeguard the smart home environment, our research focuses on IoT device firmware. The security methodology presented in this research may be used to analyze and investigate IoT firmware, revealing sensitive data and hardcoded user IDs and passwords that can be used in future attacks and breach of IoT devices. The authors put out an idea for how real-time datasets produced by IoT search engines may be analyzed using keywords according to different device kinds, locations, and manufacturers. The results showed that it took device owners 11–13 months to upgrade the firmware. Only HP and Cisco routinely provided firmware updates to protect IoT devices among IoT device makers.</description><issn>1550-4859</issn><issn>1550-4867</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><recordid>eNo9j81Lw0AUxBdRsFbx7mlvnqL7up_1FoqxgYKH1HN4yb5ApElkNyL574209jQD82OYYewexBOA0s9SWyeNvGAL0Fokyhl7efZ6fc1uYvwUQkolxYJleZG98ILq79COE097PEyxjRx7z9MYKcaO-pEPDS86DCPfDh3xfNgnFUbyPGtD94OBbtlVg4dIdyddso_sdb_ZJrv3t3yT7hKE1UomBh054xEr78hgZTQACFLSNN40RjitLFQkhDcKyK6NReucUQrczNUol-zx2FuHIcZATfkV2nnYVIIo_-6Xp_sz-XAkse7O0H_4C_tNUo4</recordid><startdate>20230104</startdate><enddate>20230104</enddate><creator>Bhardwaj, Akashdeep</creator><creator>Kaushik, Keshav</creator><creator>Alshehri, Mohammed</creator><creator>Mohamed, Ahmed Abo-Bakr</creator><creator>Keshta, Ismail</creator><general>ACM</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-7361-0465</orcidid><orcidid>https://orcid.org/0000-0002-0414-5448</orcidid><orcidid>https://orcid.org/0000-0003-3777-765X</orcidid><orcidid>https://orcid.org/0000-0001-9803-5882</orcidid><orcidid>https://orcid.org/0000-0003-1035-311X</orcidid></search><sort><creationdate>20230104</creationdate><title>ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware</title><author>Bhardwaj, Akashdeep ; Kaushik, Keshav ; Alshehri, Mohammed ; Mohamed, Ahmed Abo-Bakr ; Keshta, Ismail</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-a1223-6a8e86daabd8e6ab651110e436fd6f6085471be00d641e7967a78864418110ca3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bhardwaj, Akashdeep</creatorcontrib><creatorcontrib>Kaushik, Keshav</creatorcontrib><creatorcontrib>Alshehri, Mohammed</creatorcontrib><creatorcontrib>Mohamed, Ahmed Abo-Bakr</creatorcontrib><creatorcontrib>Keshta, Ismail</creatorcontrib><collection>CrossRef</collection><jtitle>ACM transactions on sensor networks</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bhardwaj, Akashdeep</au><au>Kaushik, Keshav</au><au>Alshehri, Mohammed</au><au>Mohamed, Ahmed Abo-Bakr</au><au>Keshta, Ismail</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware</atitle><jtitle>ACM transactions on sensor networks</jtitle><stitle>ACM TOSN</stitle><date>2023-01-04</date><risdate>2023</risdate><issn>1550-4859</issn><eissn>1550-4867</eissn><abstract>The applications and services offered by the Internet of Things (IoT) have grown significantly during the past few years. Device makers and corporate suppliers have taken notice of this, which has led to a sudden inflow of new-age firms. Confidential data and information are involved as IoT device use rises. IoT device security has emerged as a major issue and is becoming more and more significant. Appropriate security measures are needed to prevent dangers and hazards associated with the adoption of smart technology in smart cities and houses that run IoT devices, according to security evaluations. In order to safeguard the smart home environment, our research focuses on IoT device firmware. The security methodology presented in this research may be used to analyze and investigate IoT firmware, revealing sensitive data and hardcoded user IDs and passwords that can be used in future attacks and breach of IoT devices. The authors put out an idea for how real-time datasets produced by IoT search engines may be analyzed using keywords according to different device kinds, locations, and manufacturers. The results showed that it took device owners 11–13 months to upgrade the firmware. Only HP and Cisco routinely provided firmware updates to protect IoT devices among IoT device makers.</abstract><cop>New York, NY</cop><pub>ACM</pub><doi>10.1145/3578363</doi><orcidid>https://orcid.org/0000-0001-7361-0465</orcidid><orcidid>https://orcid.org/0000-0002-0414-5448</orcidid><orcidid>https://orcid.org/0000-0003-3777-765X</orcidid><orcidid>https://orcid.org/0000-0001-9803-5882</orcidid><orcidid>https://orcid.org/0000-0003-1035-311X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1550-4859
ispartof ACM transactions on sensor networks, 2023-01
issn 1550-4859
1550-4867
language eng
recordid cdi_crossref_primary_10_1145_3578363
source ACM Digital Library Complete
title ISF: Security Analysis and Assessment of Smart Home IoT-based Firmware
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T02%3A21%3A36IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-acm_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=ISF:%20Security%20Analysis%20and%20Assessment%20of%20Smart%20Home%20IoT-based%20Firmware&rft.jtitle=ACM%20transactions%20on%20sensor%20networks&rft.au=Bhardwaj,%20Akashdeep&rft.date=2023-01-04&rft.issn=1550-4859&rft.eissn=1550-4867&rft_id=info:doi/10.1145/3578363&rft_dat=%3Cacm_cross%3E3578363%3C/acm_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true