Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices

  • SU Y
  • LI X
  • WANG S
  • et al.
N/ACitations
Citations of this article
10Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents and implements an integrated set of the system and method called vulnerability scanning for the Internet of things, including the scanning scheme of the background application service and the front desk vulnerability. The scheme not only has the advantages of passive scanning and active scanning, but can scan the security holes in the internet-connected intelligent devices commonly used in Wi-Fi, Bluetooth LE, ZigBee and RFID communications. By the vulnerability scanning system to the network layer and application layer traffic analysis, it can accurately scan some specific vulnerabilities existing in smart devices, as well as be a real-time online vulnerability analysis system given suggestion.

Cite

CITATION STYLE

APA

SU, Y.-R., LI, X.-F., WANG, S.-F., YI, J., & HE, H.-R. (2018). Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices. DEStech Transactions on Computer Science and Engineering, (cimns). https://doi.org/10.12783/dtcse/cimns2017/17446

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free