Please use this identifier to cite or link to this item: https://dspace.ncfu.ru/handle/123456789/32932
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTebueva, F. B.-
dc.contributor.authorТебуева, Ф. Б.-
dc.date.accessioned2026-03-13T13:07:02Z-
dc.date.available2026-03-13T13:07:02Z-
dc.date.issued2025-
dc.identifier.citationSatybaldina D., Aidynov T., Tebueva F., Tleuberdin S., Malakhov K., Abisheva G. Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques // Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer. - 2025. - pp. 133 - 138. - DOI: 10.1109/SNPD65828.2025.11252644ru
dc.identifier.urihttps://dspace.ncfu.ru/handle/123456789/32932-
dc.description.abstractThis article provides a comprehensive study of the vulnerabilities of Internet of Things (IoT) platforms and protocols using penetration testing methods. The work includes both analysis of publicly available vulnerability databases (in particular, the CVE database) and practical testing of IoT systems using the example of an air quality monitoring network using the LoRaWAN protocol and Wi-Fi (WPA2). An algorithm for the automatic collection and processing of vulnerability data has been implemented, and a web interface for interactive visualization and filtering of information has been developed. During the practical experiment, critical vulnerabilities were identified both in wireless networks (LoRaWAN, Wi-Fi WPA2) and in IoT devices themselves, such as using standard passwords, transmitting unencrypted data, and the possibility of Replay, Brute Force, and Deauthentication attacks. Based on the results of the analysis, recommendations have been formed to eliminate vulnerabilities and requirements for new device authentication schemes have been outlined. The obtained developments can be used by developers to improve the security of IoT systems.ru
dc.language.isoenru
dc.publisherInstitute of Electrical and Electronics Engineers Inc.ru
dc.relation.ispartofseriesProceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer-
dc.subjectCybersecurityru
dc.subjectAttackru
dc.subjectInternet of thingsru
dc.subjectPenetration testingru
dc.subjectVulnerabilityru
dc.subjectWI - FIru
dc.titleVulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniquesru
dc.typeСтатьяru
vkr.instФакультет математики и компьютерных наук имени профессора Н.И. Червяковаru
Appears in Collections:Статьи, проиндексированные в SCOPUS, WOS

Files in This Item:
File SizeFormat 
scopusresults 3945.pdf
  Restricted Access
128.97 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.