Next Article in Journal
Real-Time Vehicle Motion Detection and Motion Altering for Connected Vehicle: Algorithm Design and Practical Applications
Next Article in Special Issue
IoT Security Configurability with Security-by-Contract
Previous Article in Journal
Critical Location Spatial-Temporal Coverage Optimization in Visual Sensor Network
Previous Article in Special Issue
An Edge-Fog Secure Self-Authenticable Data Transfer Protocol
Open AccessTechnical Note

Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk

1
CMS Experiment, European Organization for Nuclear Research (CERN), 1211 Geneva, Switzerland
2
Department of Physics, University of Wisconsin Madison, Madison, WI 53706, USA
3
CERN Computer Security Team, European Organization for Nuclear Research (CERN), 1211 Geneva, Switzerland
4
Institute of Distributed Systems, Ulm University, Helmholtzstraße 16, 89081 Ulm, Germany
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(19), 4107; https://doi.org/10.3390/s19194107
Received: 14 August 2019 / Revised: 12 September 2019 / Accepted: 19 September 2019 / Published: 23 September 2019
The introduction of the Internet of Things (IoT), i.e., the interconnection of embedded devices over the Internet, has changed the world we live in from the way we measure, make calls, print information and even the way we get energy in our offices or homes. The convenience of IoT products, like closed circuit television (CCTV) cameras, internet protocol (IP) phones, and oscilloscopes, is overwhelming for end users. In parallel, however, security issues have emerged and it is essential for infrastructure providers to assess the associated security risks. In this paper, we propose a novel method to detect IoT devices and identify the manufacturer, device model, and the firmware version currently running on the device using the page source from the web user interface. We performed automatic scans of the large-scale network at the European Organization for Nuclear Research (CERN) to evaluate our approach. Our tools identified 233 IoT devices that fell into eleven distinct device categories and included 49 device models manufactured by 26 vendors from across the world. View Full-Text
Keywords: Internet of Things; security; vulnerabilities and protective measures; control network security; operation in multi-user environments; risk assessment Internet of Things; security; vulnerabilities and protective measures; control network security; operation in multi-user environments; risk assessment
Show Figures

Figure 1

MDPI and ACS Style

Agarwal, S.; Oser, P.; Lueders, S. Detecting IoT Devices and How They Put Large Heterogeneous Networks at Security Risk. Sensors 2019, 19, 4107.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Search more from Scilit
 
Search
Back to TopTop