Title
Demystifying IoT Security: An Exhaustive Survey on IoT Vulnerabilities and a First Empirical Look on Internet-Scale IoT Exploitations
Abstract
The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. To this end, several surveys were put forward addressing various IoT-centric topics, including intrusion detection systems, threat modeling, and emerging technologies. In contrast, in this paper, we exclusively focus on the ever-evolving IoT vulnerabilities. In this context, we initially provide a comprehensive classification of state-of-the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by amalgamating, comparing, and contrasting dispersed research contributions. Subsequently, we provide a unique taxonomy, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses. This aims at providing the reader with a multidimensional research perspective related to IoT vulnerabilities, including their technical details and consequences, which is postulated to be leveraged for remediation objectives. Additionally, motivated by the lack of empirical (and malicious) data related to the IoT paradigm, this paper also presents a first look on Internet-scale IoT exploitations by drawing upon more than 1.2 GB of macroscopic, passive measurements’ data. This aims at practically highlighting the severity of the IoT problem, while providing operational situational awareness capabilities, which undoubtedly would aid in the mitigation task, at large. Insightful findings, inferences and outcomes in addition to open challenges and research problems are also disclosed in this paper, which we hope would pave the way for future research endeavors addressing theoretical and empirical aspects related to the imperative topic of IoT security.
Year
DOI
Venue
2019
10.1109/COMST.2019.2910750
IEEE Communications Surveys & Tutorials
Keywords
Field
DocType
Internet of Things,IoT vulnerabilities,IoT data,IoT security,network security
Data science,Situation awareness,Threat model,Computer science,Network security,Exploit,Emerging technologies,Intrusion detection system,Vulnerability,Distributed computing,The Internet
Journal
Volume
Issue
Citations 
21
3
22
PageRank 
References 
Authors
0.78
0
5
Name
Order
Citations
PageRank
Nataliia Neshenko1262.23
Elias Bou-Harb220726.40
Jorge Crichigno316814.41
Georges Kaddoum487494.42
N. Ghani564566.92