About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I

Research Article

Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-64948-6_11,
        author={Minglei Guo and Zhenghang Xiao and Xin Liu and Jianwei Zhuge},
        title={Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home},
        proceedings={Security and Privacy in Communication Networks. 19th EAI International Conference, SecureComm 2023, Hong Kong, China, October 19-21, 2023, Proceedings, Part I},
        proceedings_a={SECURECOMM},
        year={2024},
        month={10},
        keywords={IoT cloud Authentication Authorization Vulnerability},
        doi={10.1007/978-3-031-64948-6_11}
    }
    
  • Minglei Guo
    Zhenghang Xiao
    Xin Liu
    Jianwei Zhuge
    Year: 2024
    Discovering and Understanding the Security Flaws of Authentication and Authorization in IoT Cloud APIs for Smart Home
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-031-64948-6_11
Minglei Guo, Zhenghang Xiao, Xin Liu1, Jianwei Zhuge,*
  • 1: School of Information Science and Engineering
*Contact email: zhugejw@tsinghua.edu.cn

Abstract

The IoT cloud is a vital component of smart homes, responsible for entities’ authentication and authorization (A&A). Additionally, the IoT cloud provides many APIs to address complex functional requirements. This paper reports a systematic analysis of A&A security issues in IoT cloud APIs for smart home. To investigate the problem, we first analyze authenticated entities (i.e., devices, users, and families) and identify two categories of flaws based on the existing policies. Next, we introduce a semi-automated tool calledIoTAuthCheckto discover security flaws in A&A of IoT cloud APIs.IoTAuthCheckautomatically identifies and replaces credentials in the request, and checks security flaws of the target API by comparing responses before and after the replacement. We conducted experiments usingIoTAuthCheckon seven popular smart home vendors and found 26 APIs with vulnerabilities that can be classified into six specific types of security flaws. Based on proof-of-concept attacks, we demonstrate that these flaws can cause severe security risks, including sensitive information leakage, malicious data injection, and even unauthorized device control.

Keywords
IoT cloud Authentication Authorization Vulnerability
Published
2024-10-13
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-64948-6_11
Copyright © 2023–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL