An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities

Rana Alharbi, David Aspinall

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

The significant increase in the number of applications that depend on Internet of Things concept is becoming more evident. It has been deployed in many areas in smart homes, smart cities and health monitoring applications. The means to
secure these applications are slower than our growing dependence on them. The aim of this paper is to demonstrate the kinds of vulnerabilities that exist in home monitoring smart cameras and to demonstrate their effects on users’ security and privacy, by proposing a threat model and a security and privacy analysis framework. The framework covers five major components of the smart camera system with a set of designed test cases. The framework is applied to five commodity smart cameras. Range of vulnerabilities are discovered with respect to the framework. The vulnerabilities discovered indicate that IoT devices continue to be shipped by vendors without putting enough effort on their security and with insufficient regard for the implications that they have on users’ privacy. The work reported here has been part of the first author’s MSc thesis [1]
Original languageEnglish
Title of host publicationLiving in the Internet of Things: Cybersecurity of the IoT - 2018
Place of PublicationLondon, UK
PublisherIET
Number of pages10
ISBN (Electronic)978-1-78561-843-7
DOIs
Publication statusE-pub ahead of print - 14 Jun 2018
EventLiving in the Internet of Things: Cybersecurity of the IoT - 2018: IET Events - Savoy Place, London, United Kingdom
Duration: 28 Mar 201829 Mar 2018
https://events.theiet.org/petras/index.cfm

Conference

ConferenceLiving in the Internet of Things: Cybersecurity of the IoT - 2018
Abbreviated titleIoTUK
CountryUnited Kingdom
CityLondon
Period28/03/1829/03/18
Internet address

Fingerprint Dive into the research topics of 'An IoT analysis framework: An investigation of IoT smart cameras' vulnerabilities'. Together they form a unique fingerprint.

Cite this