Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/32932
Title: Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques
Authors: Tebueva, F. B.
Тебуева, Ф. Б.
Keywords: Cybersecurity;Attack;Internet of things;Penetration testing;Vulnerability;WI - FI
Issue Date: 2025
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Satybaldina D., Aidynov T., Tebueva F., Tleuberdin S., Malakhov K., Abisheva G. Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques // Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer. - 2025. - pp. 133 - 138. - DOI: 10.1109/SNPD65828.2025.11252644
Series/Report no.: Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer
Abstract: This article provides a comprehensive study of the vulnerabilities of Internet of Things (IoT) platforms and protocols using penetration testing methods. The work includes both analysis of publicly available vulnerability databases (in particular, the CVE database) and practical testing of IoT systems using the example of an air quality monitoring network using the LoRaWAN protocol and Wi-Fi (WPA2). An algorithm for the automatic collection and processing of vulnerability data has been implemented, and a web interface for interactive visualization and filtering of information has been developed. During the practical experiment, critical vulnerabilities were identified both in wireless networks (LoRaWAN, Wi-Fi WPA2) and in IoT devices themselves, such as using standard passwords, transmitting unencrypted data, and the possibility of Replay, Brute Force, and Deauthentication attacks. Based on the results of the analysis, recommendations have been formed to eliminate vulnerabilities and requirements for new device authentication schemes have been outlined. The obtained developments can be used by developers to improve the security of IoT systems.
URI: https://dspace.ncfu.ru/handle/123456789/32932
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3945.pdf
  Restricted Access
128.97 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.