A knowledge-based IoT security checker

Marco Anisetti, Rasool Asal, Claudio Agostino Ardagna, Lorenzo Comi, Ernesto Damiani, Filippo Gaudenzi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations


The widespread diffusion of ubiquitous and smart devices is radically changing the environment surrounding the users and brought to the definition of a new ecosystem called Internet of Things (IoT). Users are connected anywhere anytime, and can continuously monitor and interact with the external environment. While devices are becoming more and more powerful and efficient (e.g., using protocols like zigbee, LTE, 5G), their security is still in its infancy. Such devices, as well as the edge network providing connectivity, become the target of security attacks without their owners being aware of the risks they are exposed to. In this paper we present IoT Security Checker, a solution for IoT security assessment coping with the most relevant IoT security issues. We also provide some preliminary analysis showing how the IoT Security Checker can be used for verifying the security of an IoT system.

Original languageBritish English
Title of host publicationEuro-Par 2018
Subtitle of host publicationParallel Processing Workshops - Euro-Par 2018 International Workshops, Revised Selected Papers
EditorsGabriele Mencagli, Dora B. Heras
PublisherSpringer Verlag
Number of pages13
ISBN (Print)9783030105488
StatePublished - 2019
Event24th International Conference on Parallel and Distributed Computing, Euro-Par 2018 - Turin, Italy
Duration: 27 Aug 201828 Aug 2018

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11339 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference24th International Conference on Parallel and Distributed Computing, Euro-Par 2018


Dive into the research topics of 'A knowledge-based IoT security checker'. Together they form a unique fingerprint.

Cite this