引用本文
  • 严寒,彭国军,罗元,刘思德.智能家居攻击与防御方法综述[J].信息安全学报,2021,6(4):1-27    [点击复制]
  • YAN Han,PENG Guojun,LUO Yuan,LIU Side.Survey on Smart Home Attack and Defense Methods[J].Journal of Cyber Security,2021,6(4):1-27   [点击复制]
【打印本页】 【在线阅读全文】【下载PDF全文】 查看/发表评论下载PDF阅读器关闭

←前一篇|后一篇→

过刊浏览    高级检索

本文已被:浏览 2055次   下载 2728 本文二维码信息
码上扫一扫!
智能家居攻击与防御方法综述
严寒1,2, 彭国军1,2, 罗元1,2, 刘思德1,2
0
(1.武汉大学 空天信息安全与可信计算教育部重点实验室 武汉 中国 430072;2.武汉大学 国家网络安全学院 武汉 中国 430072)
摘要:
智能家居是物联网的一大发展方向,但其在安全方面表现得不如人意,近年来频频爆发网络安全事件。智能家居相较于传统的嵌入式设备,引入了移动应用程序和云平台服务,使得其暴露出了更多的攻击面。本文围绕智能家居终端设备、云平台、移动应用程序及通信等四个方面,综述针对智能家居的攻击方法和防御措施,并针对性的梳理了目前学术界及工业界关注的研究热点与难点。最后,本文针对现有智能家居设备自动化漏洞挖掘技术与防御监控能力的不足进行了讨论,并提出了基于Docker集群部署的端侧自动化威胁模型系统设计思路。
关键词:  物联网  智能家居  攻击  防御  漏洞
DOI:10.19363/J.cnki.cn10-1380/tn.2021.07.01
投稿时间:2020-10-20修订日期:2020-12-24
基金项目:本课题得到NSFC-通用技术基础研究联合基金(No.U1636107);国家自然科学基金(No.61972297)资助。
Survey on Smart Home Attack and Defense Methods
YAN Han1,2, PENG Guojun1,2, LUO Yuan1,2, LIU Side1,2
(1.Key Laboratory of Aerospace Information Security and Trust Computing, Ministry of Education, Wuhan University, Wuhan 430072, China;2.School of Cyber Science and Engineering, Wuhan University, Wuhan 430072, China)
Abstract:
The smart home is a major development direction of the Internet of Things, but its performance is not satisfying in terms of security. In recent years, network security events erupted repeatedly. Compared with traditional embedded devices, smart home introduces mobile applications and cloud platforms, thus exposing more attack surfaces. This paper focuses on four aspects:smart devices, cloud platforms, mobile applications, and communications. We summarize the attack and defense methods for smart home and summarize the current research hotspots and difficulties between academia and industries. Finally, this paper discusses the limitations of existing automation vulnerability mining and defensive monitoring capabilities of the smart home. Based on these efforts, we propose the design concept of end-side automated threat model system based on Docker cluster deployment.
Key words:  the Internet of Things  smart home  attack  defense  vulnerability