Next Article in Journal
A Methodology based on Computational Patterns for Offloading of Big Data Applications on Cloud-Edge Platforms
Next Article in Special Issue
A Survey on Troll Detection
Previous Article in Journal
A Novel Low-Complexity Fault Diagnosis Algorithm for Energy Internet in Smart Cities
Previous Article in Special Issue
Well-Being and Social Media: A Systematic Review of Bergen Addiction Scales
Open AccessArticle

A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices

1
Institute of Network Science and Cyberspace, Tsinghua University, Beijing 100091, China
2
Beijing National Research Center for Information Science and Technology, Beijing 100000, China
3
China Information Technology Security Evaluation Center, Beijing 100085, China
4
China Luoyang Electronic Equipment Test Center, Luoyang 471000, China
*
Author to whom correspondence should be addressed.
Future Internet 2020, 12(2), 27; https://doi.org/10.3390/fi12020027
Received: 24 December 2019 / Revised: 27 January 2020 / Accepted: 28 January 2020 / Published: 6 February 2020
(This article belongs to the Collection Featured Reviews of Future Internet Research)
With the prosperity of the Internet of Things (IoT) industry environment, the variety and quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart homes, smart wear, smart manufacturing, smart cars, smart medical care, and many other life-related fields. With it, security vulnerabilities of IoT devices are emerging endlessly. The proliferation of security vulnerabilities will bring severe risks to users’ privacy and property. This paper first describes the research background, including IoT architecture, device components, and attack surfaces. We review state-of-the-art research on IoT device vulnerability discovery, detection, mitigation, and other related works. Then, we point out the current challenges and opportunities by evaluation. Finally, we forecast and discuss the research directions on vulnerability analysis techniques of IoT devices.
Keywords: internet of things (IoT); vulnerability discovery; vulnerability detection; vulnerability mitigation internet of things (IoT); vulnerability discovery; vulnerability detection; vulnerability mitigation
MDPI and ACS Style

Yu, M.; Zhuge, J.; Cao, M.; Shi, Z.; Jiang, L. A Survey of Security Vulnerability Analysis, Discovery, Detection, and Mitigation on IoT Devices. Future Internet 2020, 12, 27.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop