2020 5th International Conference on Computing, Communication and Security (ICCCS) 2020
DOI: 10.1109/icccs49678.2020.9276853
|View full text |Cite
|
Sign up to set email alerts
|

Penetration Testing in IoT Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…There initial results were useful; however, they required experimental validation in real IoT environment. In 2020, researchers [ 25 ] performed a study in which they performed penetration testing on real IoT devices. They proposed a general methodology to develop test cases for penetration testing IoT devices and planned to automate the test cases in future studies.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…There initial results were useful; however, they required experimental validation in real IoT environment. In 2020, researchers [ 25 ] performed a study in which they performed penetration testing on real IoT devices. They proposed a general methodology to develop test cases for penetration testing IoT devices and planned to automate the test cases in future studies.…”
Section: Discussionmentioning
confidence: 99%
“…The threat actors described in Section 2.1.2 are an important part of the threat modeling step, while the IoT architecture and security issues from Section 2.1.3 are essential when evaluating step 2, 3, and 5 of the PTES model. Other models and methodologies designed specifically for penetration testing within the domain of IoT have recently been proposed [ 16 , 24 , 25 , 26 ].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Penetration testing, alternatively referred to as ethical hacking, encompasses the practice of emulating authentic attacks on a system with the aim of detecting vulnerabilities and evaluating the efficacy of security measures [124][125][126][127][128][129]. Proficient security practition-ers endeavor to exploit flaws within the system's defensive measures, such as software susceptibilities or misconfigurations, with the intention of attaining unauthorized entry or executing illegal activities.…”
Section: Penetration Testingmentioning
confidence: 99%