Method and System for security assessment of IoT devices

Pending Publication Date: 2021-10-21
NSR SRL
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0012]Therefore, it would be desirable to have a method and a system suitable for assessing such vulnerability and/or such penetra

Problems solved by technology

IoT devices, like any electronic device able to communicate electronically with the outside environment, are vulnerable to cyber-attacks.
In the past, computer systems and ICS/SCDA systems worked separately and cyber risk was low because they were not connected.
At the moment, the situation has changed as the trend is to connect all systems through computer network connection, in particular through the Internet that is a public network which can pose higher risk.
In such new situation, cyber risk is much increased.
Furthermore,

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and System for security assessment of IoT devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020]The following detailed description deals primarily with the vulnerability assessment; but this is not to be construed in a limitative manner as, for the purpose of the disclosure, vulnerability and “penetration tests” are similar as they may be carried out in a similar way (see afterwards). “Penetration test” is dealt with at the end of the following detailed description as an extension of what has been described before.

[0021]FIG. 1 illustrates a block diagram of an example of a system 100 according to the disclosure.

[0022]In this FIGURE, there is shown a set of IoT devices 200 that for exemplary purposes are four devices labelled 210, 220, 230 and 240; for example, device 210 is adapted for wired communication only (through e.g. a RS 485 cable), device 220 is adapted both for wired communication (through e.g. an Ethernet cable) and wireless communication, devices 230 and 240 are adapted both for wireless communication only. These devices are vulnerable due to their ability of wi

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A system (100) for security assessment of a plurality of IoT devices (210, 220, 230, 240) includes a programmed processing unit (110) adapted to carry out a vulnerability and/or “penetration test” method; according to this method, at least wireless communication medium and at least one communication protocol are determined to be used for the assessment, then at least one scan tool is selected based on the communication medium and communication protocol, then the scan tool is executed on the IoT devices (210, 220, 230, 240), and then data from the scan tool are collected, the data being obtained from reaction of the IoT devices to the scan tool; the computerized system performs a scan of a predetermined frequency bandwidth in order to identify the IoT devices to be assessed and the communication protocol to be used for the assessment.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner NSR SRL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products