Abstract
In today’s world, the Internet of Things (IoT) technology has made significant progress, and IoT devices have become an important part of people’s daily lives. However, the security issues surrounding IoT devices cannot be underestimated, as network attacks targeting these devices are frequent and ongoing. This article will describe the current attitudes and measures taken by the academic and industrial sectors towards IoT security from three different perspectives: challenges, opportunities, and practices, reflecting the current state of development in the field of IoT security.
1
Introduction
-
IoT devices have limited computing resources, and complete operating systems are usually not deployed on them, so IoT devices rarely use binary security hardening measures commonly found on PCs and smartphones, such as Address Space Layout Randomization (ASLR), non-overlapping writable and executable memory, and Stack Smashing Protection (SSP). This makes software vulnerabilities on these devices more easily exploitable by attackers to gain control over the devices. -
Similarly, IoT devices typically do not have complex security mechanisms such as firewalls, and their security heavily relies on the safety of the surrounding network environment.
-
Some (especially low-end) IoT devices have overly simplistic security mechanism designs, and the code on these devices has not undergone thorough security audits, making them more susceptible to security weaknesses, increasing the risk of security attacks.
-
Due to the omnipresence of IoT devices and their long online durations, they are more easily scanned and attacked. Especially for devices that are long exposed to the public network, such as routers and Raspberry Pis, these devices are prime targets for hackers to research, scan, and attack. Once an IoT device is compromised and enters a botnet, it can cause long-term and persistent damage to other devices on the same network, and it may be difficult for the device owner to detect.
The characteristics of IoT devices make them more sensitive to physical layer side-channel attacks. For example, the power consumption of IoT devices is strongly correlated with the CPU’s execution state, making it easy for attackers to infer the CPU’s execution state by measuring changes in the device’s power consumption, potentially leaking confidential information such as user passwords. Additionally, IoT devices are also more susceptible to Denial of Service (DoS) attacks; for instance, an attacker can repeatedly wake an IoT device to reduce its lifespan.

Figure 1: Types of attacks on IoT devices
2
Security Threats to IoT Devices

Figure 2: IoT System Model
Security at the perception layer. The main threats faced by the perception layer include the following types:
-
Physical Attacks. Once an attacker has physical access to a device, they can directly extract sensitive data from the device or modify the device’s program to insert malicious code. Such attacks require physical contact with the device, making them relatively easy to prevent; however, device manufacturers also need to consider the physical security of the device itself, such as avoiding leaving debugging interfaces on the device’s circuit board.
-
Identity Spoofing. In IoT networks lacking effective authentication measures, identity impersonation is likely to occur, where malicious devices can steal sensitive data through this method. Additionally, insecure device initialization and pairing processes are also significant sources of security threats; for example, an attacker can inject malicious programs or configurations into the router during its first boot, when no password is set. To prevent such attacks, device manufacturers should carefully consider potential security issues in the authentication process and implement effective authentication mechanisms.
-
Denial of Service (DoS) Attacks. Attackers can exhaust a device’s computing power by keeping it in a high-power state for an extended period. Completely preventing such attacks is very difficult, but device manufacturers can minimize the damage caused by such attacks through reasonable security design. For example, for operations that consume a lot of computing power, effective client authentication mechanisms should be implemented, or the frequency of client operations should be limited, etc.
-
Data Transmission Attacks. For instance, attackers can intercept the data transmitted by devices or conduct Man-in-the-Middle (MitM) attacks. General preventive measures against such attacks include increasing encryption and security verification mechanisms during data transmission, such as WPA (Wi-Fi Protected Access) in Wi-Fi, and EEA (EPS Encryption Algorithm) in LTE (Long Term Evolution).
-
Data Leakage: Design flaws in programs may lead to the leakage of users’ private data to third parties. To avoid such vulnerabilities as much as possible, thorough security audits and evaluations of the program code on the devices are necessary.
-
Denial of Service Attacks: Similar to the denial of service attacks in perception layer security, and will not be repeated.
-
Remote Code Execution: By exploiting security vulnerabilities in device programs, attackers can control devices to perform unexpected actions or even execute arbitrary code uploaded by the attacker. Preventive measures against such security threats are similar to those for traditional vulnerabilities, mainly including: strengthening code security audits, conducting fuzz testing, and adopting binary security hardening measures such as ASLR. However, when preventing such vulnerabilities, the resource limitations of the devices themselves must also be considered.
3
Unique Security Mechanisms for IoT Devices
4
Current Security Practices for IoT Devices
5
Conclusion
References
[1] Unit 42. 2020 Unit 42 IoT threat report, 2020.
[2] Amazon Web Services. Securing Internet of Things (IoT) with AWS, 2021.
[3] Soma Bandyopadhyay, Munmun Sengupta, Souvik Maiti, and Subhajit Dutta. A survey of middleware for internet of things. In Abdulkadir Özcan, Jan Zizka, and Dhinaharan Nagamalai, editors, Recent Trends in Wireless and Mobile Networks, pages 288–296, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg.
[4] Mario Frustaci, Pasquale Pace, Gianluca Aloi, and Giancarlo Fortino. Evaluating critical security issues of the iot world: Present and future challenges. IEEE Internet of Things Journal, 5(4):2483–2495, 2018.
[5] Octavio Gianatiempo and Octavio Galland. Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’ s SDK for eCos OS. DEFCON, 30, 2022.
[6] Roel Maes. Physically Unclonable Functions: Constructions, Properties and Applications. Springer Publishing Company, Incorporated, 2013.
[7] Kalikinkar Mandal, Xinxin Fan, and Guang Gong. Design and implementation of warbler family of lightweight pseudorandom number generators for smart devices. ACM Trans.Embed. Comput. Syst., 15(1), feb 2016.
[8] Francesca Meneghello, Matteo Calore, Daniel Zucchetto, Michele Polese, and Andrea Zanella. Iot: Internet of threats? a survey of practical security vulnerabilities in real iot devices. IEEE Internet of Things Journal, 6(5):8182–8201, 2019.
[9] Rolf Weber. Internet of things –new security and privacy challenges. Computer Law & Security Review, 26:23–30, 01 2010.
Chinese Society of Confidentiality
Science and Technology Branch
Long press the QR code to follow us

Author: Chen Yu, Institute of Software, Chinese Academy of Sciences
Editor: Cai Beiping
Top 5 Highlights of 2022
Inter-network attacks: A brief introduction to techniques for overcoming physical isolation network attacks
Introduction to LaserShark non-contact attack implantation technology
Recent Highlights Review
Attack methods and defenses at the wireless link layer of 4G LTE
ChatGPT Special (III) The capabilities and future of large language models
ChatGPT Special (II) Introduction to related principles and concepts
ChatGPT Special (I) Evolution history of the GPT family
An overview of searchable encryption technology