Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3512576.3512644acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicitConference Proceedingsconference-collections
research-article

After Everything is Connected: A Client Certificate-Oriented Perspective of IoT Device Security Analysis

Published: 11 April 2022 Publication History

Abstract

In the IoT era, more and more devices of different types and functions are connected to the network. However, smart devices are bringing about increasingly serious security problems. Although some giants or well-known equipment manufacturers have introduced the transport layer security protocol as a secure transmission mechanism, they are still missing tens of thousands in specific practices. In this paper, we provide a client certificates-oriented perspective on the security analysis of IoT devices, which proves that although the TLS protocol is used, it is still not enough to ensure security. We utilized our self-developed passive traffic-based client certificate collection tool to conduct extensive TLS certificate collection on the ISP-level network CSTNET. We use the keywords already collected to filter out certificates related to IoT smart devices from these certificates, and analyze the security issues that exist. We designed an active crawling subsystem, put the keywords that identify the manufacturer in the certificate into the Internet to crawl its homepage, and use the characteristics of page elements to dig out unknown IoT smart devices, and conduct research on the issue of its certificate. It turns out that more needs to be done to meet the advanced security requirements in practice and deployment.

References

[1]
S. Sinha, “State of iot 2021: Number of connected iot devices growing 9% to 12.3 billion globally, cellular iot now surpassing 2 billion,” https: //iot-analytics.com/number-connected-iot-devices/, 2021
[2]
M. Cui, Z. Cao, and G. Xiong, “How is the forged certificates in the wild: Practice on large-scale ssl usage measurement and analysis,” in International Conference on Computational Science. Springer, 2018, pp. 654–667.
[3]
P. Fu, Z. Li, and e. a. Xiong, Gang, “Ssl/tls security exploration through x. 509 certificate's life cycle measurement,” in 2018 IEEE Symposium on Computers and Communications (ISCC). IEEE, 2018, pp. 00 652–00 655.
[4]
M. Wachs, Q. Scheitle, and G. Carle, “Push away your privacy: Precise user tracking based on tls client certificate authentication,” in 2017 Network Traffic Measurement and Analysis Conference (TMA). IEEE, 2017, pp. 1–9.
[5]
T. Chung, Y. Liu, and e. a. Choffnes, David, “Measuring and applying invalid ssl certificates: The silent majority,” in Proceedings of the 2016 Internet Measurement Conference, 2016, pp. 527–541.
[6]
E. Rescorla, “The Transport Layer Security (TLS) Protocol Version 1.3 (RFC8446),” https://tools.ietf.org/html/rfc8446, 2018.
[7]
Craig Partridge, M.A.: Ethical considerations in network measurement papers. https://dl.acm.org/doi/fullHtml/10.1145/2896816 (2016)

Cited By

View all
  • (2024)Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy IssuesProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3688415(214-229)Online publication date: 4-Nov-2024
  • (2023)How Far is User Privacy Leakage: A Revisit of Client Certificate Usage2023 8th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA)10.1109/ICCCBDA56900.2023.10154744(279-284)Online publication date: 26-Apr-2023

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIT '21: Proceedings of the 2021 9th International Conference on Information Technology: IoT and Smart City
December 2021
584 pages
ISBN:9781450384971
DOI:10.1145/3512576
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Active discovery
  2. Client certificate
  3. Security issues
  4. Validity period

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

Conference

ICIT 2021
ICIT 2021: IoT and Smart City
December 22 - 25, 2021
Guangzhou, China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)2
Reflects downloads up to 16 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Mutual TLS in Practice: A Deep Dive into Certificate Configurations and Privacy IssuesProceedings of the 2024 ACM on Internet Measurement Conference10.1145/3646547.3688415(214-229)Online publication date: 4-Nov-2024
  • (2023)How Far is User Privacy Leakage: A Revisit of Client Certificate Usage2023 8th International Conference on Cloud Computing and Big Data Analytics (ICCCBDA)10.1109/ICCCBDA56900.2023.10154744(279-284)Online publication date: 26-Apr-2023

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media