Professional Documents
Culture Documents
net/publication/330881119
CITATIONS READS
7 2,796
2 authors:
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Ge Chu on 12 February 2019.
Abstract—The Internet of Things (IoT) is an emerging to PTES (penetration testing execution standard) [9], the
technology, an extension of the traditional Internet which process of penetration testing comprises of Pre-Engagement
make everything is connected each other based on Radio Interaction, Information Gathering, Threat Modeling, Vul-
Frequency Identification (RFID), Sensor, GPS or Machine to
Machine technologies, etc. The security issues surrounding IoT nerability Analysis, Exploitation, Post Exploitation and re-
have been of detrimental impact to its development and has porting. The main difference between attacker and Pene-
consequently attracted research interest. However, there are tration testing relies on legal reasons. Penetration testing
very few approaches which assess the security of IoT from the aims to improve the security of the system rather than to
perspective of an attacker. Penetration testing is widely used destroy or access information illegally and does not affect
to evaluate traditional internet or systems security to date and
it normally spends numerous cost and time. In this paper, we the availability of target systems. During the 1970s, the
analyze the security problems of IoT and propose a penetration U.S. military used penetration testing to discover potential
testing approach and its automation based on belief-desire- unknown vulnerabilities and hired hackers to probe and
intention (BDI) model to evaluate the security of the IoT. attack mirror targets, which enabled software engineers to
Keywords-Internet of Things; IoT security; penetration test- build a more robust computer network system. Arguably,
ing; belief-desire-intention (BDI) model penetration testing is one of the most effective methods for
improving the security level of a target system. An increas-
I. I NTRODUCTION ing number of companies and organizations have begun to
The Internet of things(IoT) was proposed by MIT in take advantage of this method to identify and address any
1999; this particular period of time heralded an important potential vulnerabilities in their system to prevent future
part of the new generation of information technology [1]. harm.
The Internet of Things is considered an extension of tra- The majority of IoT security research focuses on analysis,
ditional Internet, whereby a connection can be achieved defense or attack on a specific device. There is not, as of
between things in the physical world to the internet allow- yet, an approach to evaluate the overall security of IoT
ing for ease of information communication transfer along from the perspective of an attacker. Although penetration
with recognition, location, tracking information, monitoring testing is a heavily favored method, the process requires
and management based on Radio Frequency Identification extensive financial cost and takes a significant amount of
(RFID), Sensor, GPS or Machine to Machine technologies, time. The Automation can significantly improve the effi-
etc. According to existing literature, IoT structure consists ciency of penetration testing. In this paper, we analyze
of three layers: application, network and perception [2]. the security problems of IoT and propose a penetration
The application layer provides various services to users in testing methodology and its automation based on belief-
different scenarios. The network layer is responsible for desire-intention (BDI) model which is one of the classical
the information transmission and processing. Finally, the cognitive architecture of agent [10] to evaluate IoT security.
perception layer collects information and identifies objects The rest of this paper is organized as follows: Section II
in the physical world including various hardware terminals analyzes the security problems of IoT. Section III proposes
such as RFID, sensor, GPS, etc. Currently, the use of IoT the penetration testing methodology for IoT. Section IV, we
technology has been applied in various fields such as smart discuss the automation by BDI model. Section V, we validate
grid, intelligent traffic, smart city, smart home, intelligent the automation penetration testing for IoT by a simulation
healthcare [3], physical activity [4]–[7] and smart building. experiment and we give the conclusion in Section VI.
However, due to a growing number of attacks, it has received
significant attention with a specific focus on security. II. S ECURITY ISSUES IN I NTERNET OF THINGS
Penetration testing is a widely used methodological ap- Compared to the traditional internet, the security of the
proach which evaluates the traditional Internet or systems IoT has specialised characteristics because the three-layered
security through simulation of a real attack [8]. According structure causes more vulnerabilities and attack surfaces.
Therefore, the traditional network security solutions are not
sufficient to provide protection for the IoT. In the three-
layered structure of IoT, each layer has specific security
issues, some of which are similar to the traditional network.
This section analyzes the security issues in each individual
layer.
A. Perception layer security
The perception layer, also known as recognition layer or
physical layer, collects information from the real world and
integrates this information into the digital world by RFID,
sensors, GPS and other hardware devices. Normally, the
nodes in the perception layer are light with low power,
limited computing ability, low storage space and remain Figure 1. The process of IoT penetration testing
unattended. Therefore, the traditional information security
solutions are not adopted at the perception layer. From per-
ception network to nodes, specific security issues cause more A. Information gathering
vulnerabilities and attack surfaces. For example, nodes are The information gathering in the initial stage is a critical
vulnerable to attack by skimming, eavesdropping, spoofing, step that determines the success of penetration testing by
cloning, killing, jamming and shielding attacks, etc. probing information from all three IoT structural layers
(perception, network and application).
B. Network layer security 1) Perception layer: In the perception layer, it is essential
The network layer is responsible for the transmission of to collect information regarding the physical environment,
information between the application layer and the perception location of the node, type of node, range of the node, type
layer. The network layer is a combination of a variety of connection, type of communication protocol, topology of
of networks including the internet, mobile communication the node, type of node operation system, power of the node,
network, satellite, GSM network, GPRS, 3G, 4G, WIFI the security mechanism, node vulnerability and transmission
network and so on. The security issues of these networks protocol vulnerability. Examples of tools include:
are similar to traditional ones and are vulnerable to DDOS • Hardware Bridge API: an IoT penetration testing ex-
attack, sniffing attack, data tampering attack, data replay tension in Metasploit.
attack and signal interference attack, etc. In addition, the mix • Nmap: a free and open source utility for network
of different network architectures also causes new security discovery and security auditing.
issues. • Openvas: an advanced Open Source vulnerability scan-
• Network traffic sniffer: sniffer information between possible candidate plans of penetration testing for the
networks. agent;
• I is an Intention set, which represents the agent goals
• Signal replay: replaying the legal information to attack
target. or which plan the agent decides to carry out.
• P is a plan set, which consists of available plans, each
• Signal fake: generating legal information to attack
target. giving the information about how to achieve the goals.
• A is an action set, which including the actions the agent
• Signal hijacking: jamming the target network and forc-
ing the target node to connect to a controllable fake can perform.
• S is a perception set, which stored the information from
network.
the environment.
3) Application layer: The attack on the application layer
The reasoning cycle of BDI agent is shown in Figure 2
is very similar to traditional penetration testing, which
as below:
consists of web application attack, software buffer overflow
attack, password attack and so on by using the below tools: V. E XPERIMENT
• Metasploit: the most critically acclaimed penetration Our model runs on a PC with an Intel I5 CPU at 2.3 GHz
testing framework includes thousands of exploitations and 8GB of RAM. As we can see in figure 3, The simulation
load. experiment represents the BDI agent and the three layers
• W3af: A web application attack framework. IoT. We use the internal communication actions in Jason
• John the Ripper: A password cracker. to simulate the interaction between the BDI model and the
IoT Structure Service Vulnerability
CVE-remote
Linux, App, Ng-
CVE-local,
Application layer inx, MySQL, port,
weak pass-
SSH
word:SSH:456
Network layer WiFi, No encryption
light, lightness
No encryption,
Perception layer sensor Perception
Replay attack
network: ZigBee
Table I
I OT INFORMATION
Figure 9. The belief set of Node 2 [11] “IoT Attack Surface Areas - OWASP.” [Online]. Available:
https://www.owasp.org/index.php/IoT Attack Surface Areas
R EFERENCES
[1] L. D. Xu, W. He, and S. Li, “Internet of things in industries:
A survey,” IEEE Trans. Industrial Informatics, vol. 10, no. 4,
pp. 2233–2243, 2014.