| Literature DB >> 35684588 |
Sonia Solera-Cotanilla1, Mario Vega-Barbas1, Jaime Pérez2, Gregorio López2, Javier Matanza2, Manuel Álvarez-Campana1.
Abstract
Under the Internet of Things paradigm, the emergence and use of a wide variety of connected devices and personalized telematics services have proliferated recently. As a result, along with the penetration of these devices in our daily lives, the users' security and privacy have been compromised due to some weaknesses in connected devices and underlying applications. This article focuses on analyzing the security and privacy of such devices to promote safe Internet use, especially by young people. First, the connected devices most used by the target group are classified, and an exhaustive analysis of the vulnerabilities that concern the user is performed. As a result, a set of differentiated security and privacy issues existing in the devices is identified. The study reveals that many of these vulnerabilities are related to the fact that device manufacturers often prioritize functionalities and services, leaving security aspects in the background. These companies even exploit the data linked to the use of these devices for various purposes, ignoring users' privacy rights. This research aims to raise awareness of severe vulnerabilities in devices and to encourage users to use them correctly. Our results help other researchers address these issues with a more global perspective.Entities:
Keywords: Internet of Things; connected devices; privacy; security; vulnerability
Mesh:
Year: 2022 PMID: 35684588 PMCID: PMC9185464 DOI: 10.3390/s22113967
Source DB: PubMed Journal: Sensors (Basel) ISSN: 1424-8220 Impact factor: 3.847
Figure 1The selection process for the literature review. Those sources marked with * were extracted from conferences and workshops, news, and technical reports.
Figure 2Example of interaction with a smart toy.
Figure 3Wearable communication overview.
Figure 4Smart home IoT devices communication scheme.
Figure 5Smart Personal Assistants environment.
Figure 6Smart speaker communication overview.
Figure 7Distribution of security and privacy reports analyzed.
Glossary of the security and privacy issues defined.
| Issue | ID | Term | Description |
|---|---|---|---|
| Security | (1) | Spoofing | Impersonation of the identity of the user or the device. |
| (2) | Lack of or weak encryption | Exposure of data during the transfer of information between peers since these are exchanged in plain text or protected by unreliable or obsolete encryption methods. | |
| (3) | Lack of or weak authentication | Obsolete or null authentication mechanisms that allow access to the device with a specific role. | |
| (4) | Uncontrolled voice interaction | Possibility of execution of voice commands by strangers or unauthorized users, as well as side-channel attacks. | |
| (5) | Code injection | Execution of malicious commands prepared to modify the common operation of the system or facilitate unauthorized access to protected data. | |
| (6) | Data interception | Active or passive (sniffing) listening of communications between interconnected devices that goes unnoticed by common users. | |
| (7) | Takeover | Taking full control of the device to access data or carry out attacks that require cooperation between connected devices. | |
| Privacy | (8) | User data being compromised | Operation of the connected device, the underlying server, or third-party applications involving the loss, misuse, or unauthorized user data. |
| (9) | Violation of privacy laws | Improper use of sensitive and/or personal data that implies a total or partial violation of specific privacy laws such as the COPPA, etc. | |
| (10) | Lack of control and understanding | Loss of control over the management of user data and/or ignorance of the use made by the underlying devices and applications or services. This issue considers the user perception of what happens with the personal data managed by the device or underlying application. |
Traceability matrix about kind of the devices and privacy and security issues.
| Security Issues | Privacy Issues | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Smartphones and Tablets | Yes | Yes | Yes | [ | |||||||
| Smart TVs and Game Consoles | Yes | Yes | Yes | Yes | Yes | [ | |||||
| Smart Toys | Yes | Yes | Yes | Yes | Yes | [ | |||||
| Wearables | Yes | Yes | Yes | Yes | Yes | Yes | Yes | [ | |||
| Smart Home IoT Devices | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes | [ | ||
| Smart Personal Assistants | Yes | Yes | Yes | Yes | Yes | [ | |||||
| Smart Speakers | Yes | Yes | Yes | Yes | Yes | Yes | Yes | [ | |||
| Others | Yes | Yes | Yes | Yes | Yes | Yes | [ | ||||
Note: (1) Spoofing, (2) lack of or weak encryption, (3) lack of or weak authentication, (4) uncontrolled voice interaction, (5) code injection, (6) data interception, (7) takeover; (8) user data being compromised, (9) violation of privacy laws, (10) lack of control and understanding.
Figure 8Security issues per connected device category.
Figure 9Privacy issues per connected device category.
Figure 10Relationship between all security and privacy issues defined. The identifier numbers in the figure refer to security and privacy issues: (1) spoofing, (2) lack of or weak encryption, (3) lack of or weak authentication, (4) uncontrolled voice interaction, (5) code injection, (6) data interception, (7) takeover, (8) user data being compromised, (9) violation of privacy laws, and (10) lack of control and understanding.