Internet of Things Security: Firmware Approach

Authors

Corressponding author's email:

doandc@hcmute.edu.vn

DOI:

https://doi.org/10.54644/jte.2024.1546

Keywords:

Internet of Things (IoT), Embedded Systems, Firmware, Hardware, Security

Abstract

Internet of Things (IoT) is increasingly widely used, creating many opportunities to bring people smart applications (smart city, smart home, smart health, etc.), making our life more convenient, higher production efficiency (smart industry, smart agriculture). Besides the advantages, many security challenges also arise such as privacy issues, authentication, management issues, information storage, etc. The different factors make the issue of security in the IoT environments more challenging than that of the regular information technology (IT) devices. The IoT environment gives rise to problems and vulnerabilities, the IoT applications create various cyber threats. There have been various security and privacy attacks on devices that have been deployed: the Mirai attack in 2016 was estimated to have infected about 2.5 million Internet-connected devices and launched the Distributed denial of service (DDOS) attack. The IoT devices are also implanted into the human body to monitor the vital status of various organs. These devices are targets for attacks to falsify data. Such attacks, if any, will very dangerous. This article focuses on presenting the challenges of securing the IoT systems, then diving into a security aspect of the IoT systems coming from inside the hardware device - the  firmware of the device.

Downloads: 0

Download data is not yet available.

Author Biography

Cong Doan Dinh, Ho Chi Minh City University of Technology and Education, Vietnam.

Dinh Cong Doan graduated from university in Electronics and Telecommunication in 1999 at the HCM City University of Technology, received a master's degree in computer science in 2002 at Ho Chi Minh City University of Technology. He is currently working at the Faculty of Information Technology, HCMC University of Technology and Education. His research interests include Network security, Data communications, Logic Design, IoT, Embedded Systems related technologies.

Email: doandc@hcmute.edu.vn. ORCID:  https://orcid.org/0009-0004-2138-5939

References

V. Hassija, V. Chamola, V. Saxena, D. Jain, P. Goyal, and B. Sikdar, "A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures," Department of CSE and IT, Jaypee Institute of Information Technology, Noida, 201309 India, IEEE, 2019. DOI: https://doi.org/10.1109/ACCESS.2019.2924045

M. Toback. "An Introduction to IoT Security: Protecting Your Devices." https://smallbizepp.com/introduction-to-iot-security (accessed Sep. 16, 2023).

Ministry of Information and Communications, Vietnam. "IoT Devices - Information Security Risks and Remediation Solutions," (in Vietnamese). https://mic.gov.vn/atantt/Pages/TinTuc/143262/Thiet-bi-IoT---Cac-rui-ro-an-toan-thong-tin-va-giai-phap-khac-phuc.html (accessed Sep. 24, 2020).

Ministry of Information and Communications, Vietnam. "Information Security in IoT Worldwide and in Vietnam," (in Vietnamese). https://mic.gov.vn/atantt/Pages/TinTuc/143264/An-toan-thong-tin-trong-IoT-tren-the-gioi-va-Viet-Nam.html (accessed Sep. 24, 2020).

K. Yasar. "IoT security (internet of things security)." https://www.techtarget.com/iotagenda/definition (accessed Aug. 2023)

P. Ramesh and M. S. V. R. Reddy, "Architecture, Protocols, Layers and Elements of IoT," IJCRT, ISSN: 2320-2882, vol. 9, no. 9, Sep. 2021.

A. El bekkali and M. Essaaidi. "Systematic Literature Review of Internet of Things (IoT) Security." https://www.ripublication.com/adsa.htm (accessed Nov., 2022).

M. R. Ahmed and A. Al Shihimi, Internet of things network architecture and security challenges, AIRCC Publishing Corporation, 2023. DOI: https://doi.org/10.5121/csit.2023.131313

S. U. Haq and Y. Singh, A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks, Springer, October 2023. DOI: https://doi.org/10.1007/s43926-023-00045-2

A. Szász. "Firmware and Firmware Security." https://bugprove.com/knowledge-hub/7-questions-and-answers-about-firmware-and-firmware-security (accessed Apr. 4, 2023).

M. Toback. "OWASP Top 10 IoT Vulnerabilities: How to Avoid Them." https://smallbizepp.com/owasp-iot-top-10-vulnerabilities (accessed Sep. 2023).

S. Chougule. "IoT Device Penetration Testing." https://owasp.org/www-chapter-pune/meetups/2019/August (accessed Aug. 2019).

Intuz. "A Guide On IoT Firmware Development And Integration." https://www.intuz.com/guide-iot-firmware-development-and-integration (accessed Feb. 2023).

F. Bolandi, “Automated Security Analysis of Firmware,” KTH Royal Institute of Technology, 2022.

M. K. Kagita, "A framework for intelligent IoT firmware compliance testing," KeAi, September 2021. DOI: https://doi.org/10.1016/j.iotcps.2021.07.001

K. P. Siri. "The Various Facets of IoT Firmware Analysis." https://www.cigniti.com/blog/iot-firmware-analysis (accessed Jul. 11, 2023).

W. Wang, T. Zhao, and X. Li, "Research on Known Vulnerability Detection Method Based on Firmware Analysis." https://www.techscience.com/JCS/v4n1/47669/html (accessed Apr. 2022). DOI: https://doi.org/10.32604/jcs.2022.026816

P. Bourmeau, "A brief introduction to firmware extraction," 2020.

S. Vasile, D. Oswald, and T. Chothia, "Breaking all the things - a systematic survey of firmware extraction techniques for iot devices," University of Birmingham, 2018. DOI: https://doi.org/10.1007/978-3-030-15462-2_12

J. M. Smith, "Case Analysis of Firmware Vulnerabilities and Exploitation," 2016.

R. Sharma. "Unveiling Vulnerabilities: A Deep Dive into Firmware Penetration Testing- Part1." https://ravi73079.medium.com/unveiling-vulnerabilities-a-deep-dive-into-firmware-penetration-testing-part-1-904599cd79be (accessed Sep. 19, 2023).

D. D. Ruck, V. Goeman, and J. Lapon, "Hands-on workshop: Hacking and Protecting Embedded Devices," June 2022.

I. Nadir, H. Mahmood, and G. Asadullah, "A Taxonomy of IoT Firmware Security and Principal Analysis Techniques," March 2023. DOI: https://doi.org/10.1016/j.ijcip.2022.100552

Published

28-04-2024

How to Cite

[1]
Đinh Công Đoan, “Internet of Things Security: Firmware Approach”, JTE, vol. 19, no. 02, pp. 78–88, Apr. 2024.

Issue

Section

Research Article

Categories