Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

dc.contributor.authorYaacoub, Jean Paul A.
dc.contributor.authorNoura, Hassan N.
dc.contributor.authorSalman, Ola
dc.contributor.authorChehab, Ali
dc.contributor.departmentDepartment of Electrical and Computer Engineering
dc.contributor.facultyMaroun Semaan Faculty of Engineering and Architecture (MSFEA)
dc.contributor.institutionAmerican University of Beirut
dc.date.accessioned2025-01-24T11:31:09Z
dc.date.available2025-01-24T11:31:09Z
dc.date.issued2023
dc.description.abstractIn recent years, attacks against various Internet-of-Things systems, networks, servers, devices, and applications witnessed a sharp increase, especially with the presence of 35.82 billion IoT devices since 2021; a number that could reach up to 75.44 billion by 2025. As a result, security-related attacks against the IoT domain are expected to increase further and their impact risks to seriously affect the underlying IoT systems, networks, devices, and applications. The adoption of standard security (counter) measures is not always effective, especially with the presence of resource-constrained IoT devices. Hence, there is a need to conduct penetration testing at the level of IoT systems. However, the main issue is the fact that IoT consists of a large variety of IoT devices, firmware, hardware, software, application/web-servers, networks, and communication protocols. Therefore, to reduce the effect of these attacks on IoT systems, periodic penetration testing and ethical hacking simulations are highly recommended at different levels (end-devices, infrastructure, and users) for IoT, and can be considered as a suitable solution. Therefore, the focus of this paper is to explain, analyze and assess both technical and non-technical aspects of security vulnerabilities within IoT systems via ethical hacking methods and tools. This would offer practical security solutions that can be adopted based on the assessed risks. This process can be considered as a simulated attack(s) with the goal of identifying any exploitable vulnerability or/and a security gap in any IoT entity (end devices, gateway, or servers) or firmware. © 2023 The Authors
dc.identifier.doihttps://doi.org/10.1016/j.iotcps.2023.04.002
dc.identifier.eid2-s2.0-85160527805
dc.identifier.urihttp://hdl.handle.net/10938/27534
dc.language.isoen
dc.publisherKeAi Communications Co.
dc.relation.ispartofInternet of Things and Cyber-Physical Systems
dc.sourceScopus
dc.subjectInternet of ethical hacking things (ioeht)
dc.subjectInternet-of-things (iot)
dc.subjectIot cyber-security
dc.subjectIot ethical hacking
dc.subjectIot penetration testing
dc.titleEthical hacking for IoT: Security issues, challenges, solutions and recommendations
dc.typeArticle

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2023-5478.pdf
Size:
4.75 MB
Format:
Adobe Portable Document Format