Araştırma Makalesi
BibTex RIS Kaynak Göster

IOT SECURITY AND SOFTWARE TESTING

Yıl 2024, Cilt: 9 Sayı: 1, 26 - 32, 25.03.2024
https://doi.org/10.57120/yalvac.1437571

Öz

The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.

Kaynakça

  • [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
  • [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
  • [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
  • [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
  • [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
  • [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
  • [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
  • [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
  • [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
  • [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
  • [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
  • [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254. https://doi.org/10.1109/jiot.2020.3002255
  • [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
  • [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
  • [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
  • [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
  • [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
  • [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.

IOT SECURITY AND SOFTWARE TESTING

Yıl 2024, Cilt: 9 Sayı: 1, 26 - 32, 25.03.2024
https://doi.org/10.57120/yalvac.1437571

Öz

The Internet of Things (IoT) symbolizes the era of increased information exchange and interaction between devices through Internet of Things technology. However, this fascinating technology brings with it a number of security challenges. Some of the security issues stem from the nature of IoT devices. IoT devices are often designed to be cheap and uncomplicated. As a result, security tests may be neglected and security vulnerabilities may arise. There are other factors that compromise the security of IoT devices. For example, most IoT devices have standard passwords that have not been changed. Attackers can easily seize devices by manipulating them. There are data leaks from compromised devices.

Kaynakça

  • [1] Gürfidan, R., & Ersoy, M. (2022). A new approach with blockchain based for safe communication in IoT ecosystem. Journal of Data, Information and Management, 4(1), 49-56.
  • [2] Kamsin, I. and Zainal, N. (2021). A comprehensive review on smart iot applications.. https://doi.org/10.2991/ahis.k.210913.069
  • [3] Fedullo, T., Morato, A., Peserico, G., Trevisan, L., Tramarin, F., Vitturi, S., & Rovati, L. (2022). An iot measurement system based on lorawan for additive manufacturing. Sensors, 22(15), 5466. https://doi.org/10.3390/s22155466
  • [4] Wang, F. (2023). Mitigating iot privacy-revealing features by time series data transformation. Journal of Cybersecurity and Privacy, 3(2), 209-226. https://doi.org/10.3390/jcp3020012
  • [5] Abomhara, M. and Køien, G. (2014). Security and privacy in the internet of things: current status and open issues.. https://doi.org/10.1109/prisms.2014.6970594
  • [6] HaddadPajouh, H., Dehghantanha, A., Parizi, R., & Aledhari, M. (2021). A survey on internet of things security: requirements, challenges, and solutions. Internet of Things, 14, 100129. https://doi.org/10.1016/j.iot.2019.100129
  • [7] Yadav, G., Paul, K., Allakany, A., & Okamura, K. (2020). Iot-pen: an e2e penetration testing framework for iot. Journal of Information Processing, 28(0), 633-642. https://doi.org/10.2197/ipsjjip.28.633
  • [8] Akhilesh, R., Bills, O., Chilamkurti, N., & Chowdhury, M. (2022). Automated penetration testing framework for smart-home-based iot devices. Future Internet, 14(10), 276. https://doi.org/10.3390/fi14100276
  • [9] Süren, E., Heiding, F., Olegård, J., & Lagerström, R. (2022). Patriot: practical and agile threat research for iot. International Journal of Information Security, 22(1), 213-233. https://doi.org/10.1007/s10207-022-00633-3
  • [10] Torres, N., Pinto, P., & Lopes, S. (2021). Security vulnerabilities in lpwans—an attack vector analysis for the iot ecosystem. Applied Sciences, 11(7), 3176. https://doi.org/10.3390/app11073176
  • [11] Zhang, S., Bai, G., Li, H., Liu, P., Zhang, M., & Li, S. (2021). Multi-source knowledge reasoning for data-driven iot security. Sensors, 21(22), 7579. https://doi.org/10.3390/s21227579
  • [12] Shafiq, M., Tian, Z., Bashir, A., Du, X., & Guizani, M. (2021). Corrauc: a malicious bot-iot traffic detection method in iot network using machine-learning techniques. Ieee Internet of Things Journal, 8(5), 3242-3254. https://doi.org/10.1109/jiot.2020.3002255
  • [13] Malik, B., Khalid, M., Maryam, M., Nauman, M., Yousaf, S., Mehmood, M.,& Saleem, H. (2019). Iot testing-as-a-service: a new dimension of automation. International Journal of Advanced Computer Science and Applications, 10(5). https://doi.org/10.14569/ijacsa.2019.0100545
  • [14] Echeverria, A., Cevallos, C., Ortiz-Garcés, I., & Andrade, R. (2021). Cybersecurity model based on hardening for secure internet of things implementation. Applied Sciences, 11(7), 3260. https://doi.org/10.3390/app11073260
  • [15] Lowry, P., Dinev, T., & Willison, R. (2017). Why security and privacy research lies at the centre of the information systems (is) artefact: proposing a bold research agenda. European Journal of Information Systems, 26(6), 546-563. https://doi.org/10.1057/s41303-017-0066-x
  • [16] Celik, Z., Fernandes, E., Pauley, E., Tan, G., & McDaniel, P. (2019). Program analysis of commodity iot applications for security and privacy. Acm Computing Surveys, 52(4), 1-30. https://doi.org/10.1145/3333501
  • [17] Abdulmalek, S., Nasir, A., Jabbar, W., Almuhaya, M., Bairagi, A., Khan, M., & Kee, S. (2022). Iot-based healthcare-monitoring system towards improving quality of life: a review. Healthcare, 10(10), 1993. https://doi.org/10.3390/healthcare10101993
  • [18] Gürfidan, R., Ersoy, M., & Kilim, O. (2022, May). AI-Powered Cyber Attacks Threats and Measures. In The International Conference on Artificial Intelligence and Applied Mathematics in Engineering (pp. 434-444). Cham: Springer International Publishing.
Toplam 18 adet kaynakça vardır.

Ayrıntılar

Birincil Dil İngilizce
Konular Bilgi Güvenliği Yönetimi
Bölüm Makaleler
Yazarlar

Osman Can Çetlenbik 0009-0000-6561-1943

Ahmet Ali Süzen 0000-0002-5871-1652

Burhan Duman 0000-0001-5614-1556

Erken Görünüm Tarihi 18 Mart 2024
Yayımlanma Tarihi 25 Mart 2024
Gönderilme Tarihi 15 Şubat 2024
Kabul Tarihi 29 Şubat 2024
Yayımlandığı Sayı Yıl 2024 Cilt: 9 Sayı: 1

Kaynak Göster

APA Çetlenbik, O. C., Süzen, A. A., & Duman, B. (2024). IOT SECURITY AND SOFTWARE TESTING. Yalvaç Akademi Dergisi, 9(1), 26-32. https://doi.org/10.57120/yalvac.1437571

http://www.yalvacakademi.org/