{"title":"物联网移动应用渗透测试-研究方法和结果","authors":"Jan Adamski;Marek Janiszewski;Marcin Rytel","doi":"10.1109/JIOT.2025.3540305","DOIUrl":null,"url":null,"abstract":"This article describes the methodology of pentesting mobile applications used to control Internet of Things (IoT) devices, which is part of a comprehensive methodology for testing the security of IoT solutions. This article shows the importance of mobile applications in the context of IoT security and what elements constitute the essential pillars for the security of users and their devices. The authors describe the methods of the pentesting process step by step depending on the application being tested and the complications encountered. This article also includes the most popular security flaws of this type of application, along with a description of how they pose a threat to their users. It also shows the complexity of conducting pentests of IoT solutions due to the variety of procedures and test areas that must be intertwined in order to obtain reliable and complete results. This article concludes with a description of vulnerabilities discovered and reported to the relevant authorities thanks to research conducted in accordance with the described methodology.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 11","pages":"18209-18219"},"PeriodicalIF":8.9000,"publicationDate":"2025-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"IoT Mobile Applications Pentesting Methodology and Results of Research\",\"authors\":\"Jan Adamski;Marek Janiszewski;Marcin Rytel\",\"doi\":\"10.1109/JIOT.2025.3540305\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article describes the methodology of pentesting mobile applications used to control Internet of Things (IoT) devices, which is part of a comprehensive methodology for testing the security of IoT solutions. This article shows the importance of mobile applications in the context of IoT security and what elements constitute the essential pillars for the security of users and their devices. The authors describe the methods of the pentesting process step by step depending on the application being tested and the complications encountered. This article also includes the most popular security flaws of this type of application, along with a description of how they pose a threat to their users. It also shows the complexity of conducting pentests of IoT solutions due to the variety of procedures and test areas that must be intertwined in order to obtain reliable and complete results. This article concludes with a description of vulnerabilities discovered and reported to the relevant authorities thanks to research conducted in accordance with the described methodology.\",\"PeriodicalId\":54347,\"journal\":{\"name\":\"IEEE Internet of Things Journal\",\"volume\":\"12 11\",\"pages\":\"18209-18219\"},\"PeriodicalIF\":8.9000,\"publicationDate\":\"2025-02-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Internet of Things Journal\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10878964/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10878964/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
IoT Mobile Applications Pentesting Methodology and Results of Research
This article describes the methodology of pentesting mobile applications used to control Internet of Things (IoT) devices, which is part of a comprehensive methodology for testing the security of IoT solutions. This article shows the importance of mobile applications in the context of IoT security and what elements constitute the essential pillars for the security of users and their devices. The authors describe the methods of the pentesting process step by step depending on the application being tested and the complications encountered. This article also includes the most popular security flaws of this type of application, along with a description of how they pose a threat to their users. It also shows the complexity of conducting pentests of IoT solutions due to the variety of procedures and test areas that must be intertwined in order to obtain reliable and complete results. This article concludes with a description of vulnerabilities discovered and reported to the relevant authorities thanks to research conducted in accordance with the described methodology.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.