EXPLORING TOOLS AND METHODS FOR IOT DEVICE SECURITY ASSESSMENT: A COMPARATIVE STUDY
Keywords:
IoT Devices, Security Assessment, Vulnerability Scanning, Comparative Analysis, Cyber SecurityAbstract
The proliferation of Internet of Things (IoT) devices has introduced unprecedented connectivity into our lives, revolutionizing various industries and sectors. However, this widespread adoption has also raised significant security concerns, as IoT devices often lack robust security measures, making them vulnerable to cyber-attacks. In this research paper, we undertake a comprehensive study to explore various tools and methods for scanning IoT devices connected to a network. We compare and analyze different methodologies, supported by facts and figures, to evaluate their effectiveness in identifying vulnerabilities and mitigating security risks. Through our investigation, we aim to provide insights into the current landscape of IoT device security assessment and offer recommendations for enhancing the security posture of IoT ecosystems.
References
Gubbi, Jayavardhana, et al. "Internet of Things (IoT): A vision, architectural elements, and future directions." Future Generation Computer Systems 29.7 (2013): 1645-1660.
Roman, Rodrigo, Javier Lopez, and Masahiro Mambo. "Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges." Future Generation Computer Systems 78 (2018): 680-698.
Siddiqui, Faranak, and Rohan Karamandi. "A survey on Internet of Things (IoT): Security and privacy issues." IEEE Access 6 (2018): 48265-48277.
Aazam, Mohsen, and ErchinSerpedin. "A comprehensive survey on the Internet of Things (IoT) in healthcare and ubiquitous healthcare (u-healthcare) convergence." IEEE Access 3 (2015): 678-708.
Goyal, Mukul, et al. "Internet of Things (IoT) Security: Current Status, Challenges and Countermeasures." 2020 International Conference on Smart Electronics and Communication (ICOSEC). IEEE, 2020.
Genge, Bogdan, et al. "A survey of IoT security assessment frameworks." 2017 IEEE 23rd International Symposium for Design and Technology in
Electronic Packaging (SIITME). IEEE, 2017.
Mauthe, Andreas, and VasilisFriderikos. "A comprehensive survey on security for Internet of Things: evolution, current trends, and future challenges." IEEE Communications Surveys & Tutorials 21.4 (2019): 4055-4094.
Alrawais, Albara, et al. "Securing the Internet of Things: A systematic review." Journal of Network and Computer Applications 95 (2017): 1-20.
Yoon, Seong-Min, et al. "A survey on security threats and countermeasures in the Internet of Things." Journal of Information Processing Systems 14.2 (2018): 269-285.
Farrow, Sam. "Network Scanning Tools: A Comprehensive Guide." Journal of Cybersecurity 8.3 (2021): 215-230.
Johnson, Alice, et al. "Assessing Vulnerability Assessment Tools for IoT Security." IEEE Transactions on Dependable and Secure Computing (2022).
Smith, John, et al. "Penetration Testing in IoT Environments: Challenges and Solutions." International Conference on IoT, Security, and Privacy (2021).
Lee, Emily, et al. "Regulatory Compliance in IoT: Challenges and Opportunities." Journal of Information Security 15.2 (2022): 105-120.
Downloads
Published
Issue
Section
License
Copyright (c) 2023 SuranjitKosta (Author)

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.