Пожалуйста, используйте этот идентификатор, чтобы цитировать или ссылаться на этот ресурс: https://dspace.ncfu.ru/handle/123456789/32932
Название: Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques
Авторы: Tebueva, F. B.
Тебуева, Ф. Б.
Ключевые слова: Cybersecurity;Attack;Internet of things;Penetration testing;Vulnerability;WI - FI
Дата публикации: 2025
Издатель: Institute of Electrical and Electronics Engineers Inc.
Библиографическое описание: Satybaldina D., Aidynov T., Tebueva F., Tleuberdin S., Malakhov K., Abisheva G. Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques // Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer. - 2025. - pp. 133 - 138. - DOI: 10.1109/SNPD65828.2025.11252644
Источник: Proceedings - 29th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2025-Summer
Краткий осмотр (реферат): This article provides a comprehensive study of the vulnerabilities of Internet of Things (IoT) platforms and protocols using penetration testing methods. The work includes both analysis of publicly available vulnerability databases (in particular, the CVE database) and practical testing of IoT systems using the example of an air quality monitoring network using the LoRaWAN protocol and Wi-Fi (WPA2). An algorithm for the automatic collection and processing of vulnerability data has been implemented, and a web interface for interactive visualization and filtering of information has been developed. During the practical experiment, critical vulnerabilities were identified both in wireless networks (LoRaWAN, Wi-Fi WPA2) and in IoT devices themselves, such as using standard passwords, transmitting unencrypted data, and the possibility of Replay, Brute Force, and Deauthentication attacks. Based on the results of the analysis, recommendations have been formed to eliminate vulnerabilities and requirements for new device authentication schemes have been outlined. The obtained developments can be used by developers to improve the security of IoT systems.
URI (Унифицированный идентификатор ресурса): https://dspace.ncfu.ru/handle/123456789/32932
Располагается в коллекциях:Статьи, проиндексированные в SCOPUS, WOS

Файлы этого ресурса:
Файл РазмерФормат 
scopusresults 3945.pdf
  Доступ ограничен
128.97 kBAdobe PDFПросмотреть/Открыть


Все ресурсы в архиве электронных ресурсов защищены авторским правом, все права сохранены.