Please use this identifier to cite or link to this item:
https://dspace.ncfu.ru/handle/123456789/32932| Title: | Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques |
| Authors: | Tebueva, F. B. Тебуева, Ф. Б. |
| Keywords: | Cybersecurity;Attack;Internet of things;Penetration testing;Vulnerability;WI - FI |
| Issue Date: | 2025 |
| Publisher: | Institute of Electrical and Electronics Engineers Inc. |
| Citation: | Satybaldina D., Aidynov T., Tebueva F., Tleuberdin S., Malakhov K., Abisheva G. Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques // Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer. - 2025. - pp. 133 - 138. - DOI: 10.1109/SNPD65828.2025.11252644 |
| Series/Report no.: | Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer |
| Abstract: | This article provides a comprehensive study of the vulnerabilities of Internet of Things (IoT) platforms and protocols using penetration testing methods. The work includes both analysis of publicly available vulnerability databases (in particular, the CVE database) and practical testing of IoT systems using the example of an air quality monitoring network using the LoRaWAN protocol and Wi-Fi (WPA2). An algorithm for the automatic collection and processing of vulnerability data has been implemented, and a web interface for interactive visualization and filtering of information has been developed. During the practical experiment, critical vulnerabilities were identified both in wireless networks (LoRaWAN, Wi-Fi WPA2) and in IoT devices themselves, such as using standard passwords, transmitting unencrypted data, and the possibility of Replay, Brute Force, and Deauthentication attacks. Based on the results of the analysis, recommendations have been formed to eliminate vulnerabilities and requirements for new device authentication schemes have been outlined. The obtained developments can be used by developers to improve the security of IoT systems. |
| URI: | https://dspace.ncfu.ru/handle/123456789/32932 |
| Appears in Collections: | Статьи, проиндексированные в SCOPUS, WOS |
Files in This Item:
| File | Size | Format | |
|---|---|---|---|
| scopusresults 3945.pdf Restricted Access | 128.97 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.