万物互联后:面向客户端证书的物联网设备安全分析视角

Wei Xia, Qiyu Zhang, Xin He, Wei Wang, Zhen Li, G. Xiong
{"title":"万物互联后:面向客户端证书的物联网设备安全分析视角","authors":"Wei Xia, Qiyu Zhang, Xin He, Wei Wang, Zhen Li, G. Xiong","doi":"10.1145/3512576.3512644","DOIUrl":null,"url":null,"abstract":"In the IoT era, more and more devices of different types and functions are connected to the network. However, smart devices are bringing about increasingly serious security problems. Although some giants or well-known equipment manufacturers have introduced the transport layer security protocol as a secure transmission mechanism, they are still missing tens of thousands in specific practices. In this paper, we provide a client certificates-oriented perspective on the security analysis of IoT devices, which proves that although the TLS protocol is used, it is still not enough to ensure security. We utilized our self-developed passive traffic-based client certificate collection tool to conduct extensive TLS certificate collection on the ISP-level network CSTNET. We use the keywords already collected to filter out certificates related to IoT smart devices from these certificates, and analyze the security issues that exist. We designed an active crawling subsystem, put the keywords that identify the manufacturer in the certificate into the Internet to crawl its homepage, and use the characteristics of page elements to dig out unknown IoT smart devices, and conduct research on the issue of its certificate. It turns out that more needs to be done to meet the advanced security requirements in practice and deployment.","PeriodicalId":278114,"journal":{"name":"Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"After Everything is Connected: A Client Certificate-Oriented Perspective of IoT Device Security Analysis\",\"authors\":\"Wei Xia, Qiyu Zhang, Xin He, Wei Wang, Zhen Li, G. Xiong\",\"doi\":\"10.1145/3512576.3512644\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the IoT era, more and more devices of different types and functions are connected to the network. However, smart devices are bringing about increasingly serious security problems. Although some giants or well-known equipment manufacturers have introduced the transport layer security protocol as a secure transmission mechanism, they are still missing tens of thousands in specific practices. In this paper, we provide a client certificates-oriented perspective on the security analysis of IoT devices, which proves that although the TLS protocol is used, it is still not enough to ensure security. We utilized our self-developed passive traffic-based client certificate collection tool to conduct extensive TLS certificate collection on the ISP-level network CSTNET. We use the keywords already collected to filter out certificates related to IoT smart devices from these certificates, and analyze the security issues that exist. We designed an active crawling subsystem, put the keywords that identify the manufacturer in the certificate into the Internet to crawl its homepage, and use the characteristics of page elements to dig out unknown IoT smart devices, and conduct research on the issue of its certificate. It turns out that more needs to be done to meet the advanced security requirements in practice and deployment.\",\"PeriodicalId\":278114,\"journal\":{\"name\":\"Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3512576.3512644\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3512576.3512644","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在物联网时代,越来越多不同类型和功能的设备连接到网络中。然而,智能设备带来了越来越严重的安全问题。虽然一些巨头或知名设备制造商已经引入了传输层安全协议作为安全传输机制,但在具体的实践中还差数万个。本文从面向客户端证书的角度对物联网设备进行安全分析,证明了虽然使用了TLS协议,但仍不足以保证安全。我们利用自主开发的基于流量的被动客户端证书收集工具,在isp级网络CSTNET上进行了广泛的TLS证书收集。我们使用已经收集到的关键字从这些证书中过滤出与物联网智能设备相关的证书,并分析存在的安全问题。我们设计了主动抓取子系统,将证书中识别该厂商的关键字放到互联网上抓取其首页,并利用页面元素的特征挖掘出未知的物联网智能设备,对其证书的颁发进行研究。事实证明,要满足实践和部署中的高级安全需求,还需要做更多的工作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
After Everything is Connected: A Client Certificate-Oriented Perspective of IoT Device Security Analysis
In the IoT era, more and more devices of different types and functions are connected to the network. However, smart devices are bringing about increasingly serious security problems. Although some giants or well-known equipment manufacturers have introduced the transport layer security protocol as a secure transmission mechanism, they are still missing tens of thousands in specific practices. In this paper, we provide a client certificates-oriented perspective on the security analysis of IoT devices, which proves that although the TLS protocol is used, it is still not enough to ensure security. We utilized our self-developed passive traffic-based client certificate collection tool to conduct extensive TLS certificate collection on the ISP-level network CSTNET. We use the keywords already collected to filter out certificates related to IoT smart devices from these certificates, and analyze the security issues that exist. We designed an active crawling subsystem, put the keywords that identify the manufacturer in the certificate into the Internet to crawl its homepage, and use the characteristics of page elements to dig out unknown IoT smart devices, and conduct research on the issue of its certificate. It turns out that more needs to be done to meet the advanced security requirements in practice and deployment.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信