@inproceedings{95eaf75d785642bea1ceea8bac480ead,
title = "Identifying vulnerabilities of consumer Internet of Things (IoT) devices: A scalable approach",
abstract = "The Internet of Things becomes more defined year after year. Companies are looking for novel ways to implement various smart capabilities into their products that increase interaction between users and other network devices. While many smart devices offer greater convenience and value, they also present new security vulnerabilities that can have a detrimental effect on consumer privacy. Given the societal impact of IoT device vulnerabilities, this study aims to perform a large-scale vulnerability assessment of consumer IoT devices exposed on the Internet. Specifically, Shodan is used to collect a large testbed of consumer IoT devices which are then passed through Nessus to determine whether potential vulnerabilities exist. Results of this study indicate that a significant number of consumer IoT devices are vulnerable to exploits that can compromise user information and privacy.",
keywords = "Internet of Things, IoT, IoT security, Nessus, vulnerability assessment",
author = "Ryan Williams and Emma McMahon and Sagar Samtani and Mark Patton and Hsinchun Chen",
note = "Publisher Copyright: {\textcopyright} 2017 IEEE.; 15th IEEE International Conference on Intelligence and Security Informatics, ISI 2017 ; Conference date: 22-07-2017 Through 24-07-2017",
year = "2017",
month = aug,
day = "8",
doi = "10.1109/ISI.2017.8004904",
language = "English (US)",
series = "2017 IEEE International Conference on Intelligence and Security Informatics: Security and Big Data, ISI 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
pages = "179--181",
editor = "Lina Zhou and Wang, {G. Alan} and Chunxiao Xing and Bo Luo and Xiaolong Zheng and Hui Zhang",
booktitle = "2017 IEEE International Conference on Intelligence and Security Informatics",
}