{"id":"https://openalex.org/W4416799525","doi":"https://doi.org/10.1109/snpd65828.2025.11252644","title":"Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques","display_name":"Vulnerability Analysis of IoT Protocols Based on CVE glossary and Penetration Testing Techniques","publication_year":2025,"publication_date":"2025-06-25","ids":{"openalex":"https://openalex.org/W4416799525","doi":"https://doi.org/10.1109/snpd65828.2025.11252644"},"language":null,"primary_location":{"id":"doi:10.1109/snpd65828.2025.11252644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11252644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5078593398","display_name":"\u0414\u0438\u043d\u0430 \u0421\u0430\u0442\u044b\u0431\u0430\u043b\u0434\u0438\u043d\u0430","orcid":"https://orcid.org/0000-0003-0291-4685"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":true,"raw_author_name":"Dina Satybaldina","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Research Institute of Information Security and Cryptology"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Research Institute of Information Security and Cryptology","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5094236317","display_name":"Tolegen Aidynov","orcid":"https://orcid.org/0009-0005-3327-9719"},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Tolegen Aidynov","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024487443","display_name":"\u0424\u0430\u0440\u0438\u0437\u0430 \u0422\u0435\u0431\u0443\u0435\u0432\u0430","orcid":"https://orcid.org/0000-0002-7373-4692"},"institutions":[{"id":"https://openalex.org/I210043505","display_name":"North-Caucasus Federal University","ror":"https://ror.org/05g1k4d79","country_code":"RU","type":"education","lineage":["https://openalex.org/I210043505"]}],"countries":["RU"],"is_corresponding":false,"raw_author_name":"Fariza Tebueva","raw_affiliation_strings":["North-Caucasus Federal University,Mathematics and Cybernetics Department,Stavropol,Russian Federation"],"affiliations":[{"raw_affiliation_string":"North-Caucasus Federal University,Mathematics and Cybernetics Department,Stavropol,Russian Federation","institution_ids":["https://openalex.org/I210043505"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058973358","display_name":"\u0421\u0430\u043a\u0435\u043d \u0422\u043b\u0435\u0443\u0431\u0435\u0440\u0434\u0438\u043d","orcid":null},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Saken Tleuberdin","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119380475","display_name":"Konstantin Malakhov","orcid":null},"institutions":[{"id":"https://openalex.org/I10232997","display_name":"L. N. Gumilyov Eurasian National University","ror":"https://ror.org/0242cby63","country_code":"KZ","type":"education","lineage":["https://openalex.org/I10232997"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Konstantin Malakhov","raw_affiliation_strings":["L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"L.N. Gumilyov Eurasian National University,Information Security Department,Astana,Kazakhstan","institution_ids":["https://openalex.org/I10232997"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5118596230","display_name":"Gulsipat Abisheva","orcid":"https://orcid.org/0009-0003-6692-197X"},"institutions":[{"id":"https://openalex.org/I4210141757","display_name":"Astana Medical University","ror":"https://ror.org/038mavt60","country_code":"KZ","type":"education","lineage":["https://openalex.org/I4210141757"]}],"countries":["KZ"],"is_corresponding":false,"raw_author_name":"Gulsipat Abisheva","raw_affiliation_strings":["Astana IT University,Department of Computer Engineering,Astana,Kazakhstan"],"affiliations":[{"raw_affiliation_string":"Astana IT University,Department of Computer Engineering,Astana,Kazakhstan","institution_ids":["https://openalex.org/I4210141757"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5078593398"],"corresponding_institution_ids":["https://openalex.org/I10232997"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.50603525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"133","last_page":"138"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.2361000031232834,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T13181","display_name":"Economic and Technological Systems Analysis","score":0.2361000031232834,"subfield":{"id":"https://openalex.org/subfields/1405","display_name":"Management of Technology and Innovation"},"field":{"id":"https://openalex.org/fields/14","display_name":"Business, Management and Accounting"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.052400000393390656,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13983","display_name":"Cybersecurity and Information Systems","score":0.04659999907016754,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.6531000137329102},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5583000183105469},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.49410000443458557},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.47519999742507935},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4740999937057495},{"id":"https://openalex.org/keywords/visualization","display_name":"Visualization","score":0.42329999804496765},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4187999963760376},{"id":"https://openalex.org/keywords/protocol-analysis","display_name":"Protocol analysis","score":0.3736000061035156},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.3522999882698059},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.35120001435279846}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7958999872207642},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.6531000137329102},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5583000183105469},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5564000010490417},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.49410000443458557},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.47519999742507935},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4740999937057495},{"id":"https://openalex.org/C36464697","wikidata":"https://www.wikidata.org/wiki/Q451553","display_name":"Visualization","level":2,"score":0.42329999804496765},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4187999963760376},{"id":"https://openalex.org/C133112747","wikidata":"https://www.wikidata.org/wiki/Q7251931","display_name":"Protocol analysis","level":2,"score":0.3736000061035156},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.3522999882698059},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.35120001435279846},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.34630000591278076},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.33820000290870667},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.3206000030040741},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3025999963283539},{"id":"https://openalex.org/C172776598","wikidata":"https://www.wikidata.org/wiki/Q7943570","display_name":"Vulnerability management","level":4,"score":0.2985000014305115},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2973000109195709},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.29179999232292175},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C89505385","wikidata":"https://www.wikidata.org/wiki/Q47146","display_name":"User interface","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C92446256","wikidata":"https://www.wikidata.org/wiki/Q3306762","display_name":"Data validation","level":2,"score":0.2825999855995178},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27639999985694885},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.2662999927997589},{"id":"https://openalex.org/C172367668","wikidata":"https://www.wikidata.org/wiki/Q6504956","display_name":"Data visualization","level":3,"score":0.2542000114917755},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.2524000108242035},{"id":"https://openalex.org/C118643609","wikidata":"https://www.wikidata.org/wiki/Q189210","display_name":"Web application","level":2,"score":0.2502000033855438}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/snpd65828.2025.11252644","is_oa":false,"landing_page_url":"https://doi.org/10.1109/snpd65828.2025.11252644","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE/ACIS 29th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W2765739766","https://openalex.org/W2807066473","https://openalex.org/W4366977512","https://openalex.org/W4375945058","https://openalex.org/W4400351179","https://openalex.org/W4401535240","https://openalex.org/W4404900608","https://openalex.org/W4405602425","https://openalex.org/W4406729486","https://openalex.org/W4407691202","https://openalex.org/W4410359252"],"related_works":[],"abstract_inverted_index":{"This":[0],"article":[1],"provides":[2],"a":[3,73],"comprehensive":[4],"study":[5],"of":[6,9,11,26,39,45,66,81,117,128,160],"the":[7,33,43,52,61,87,115,126,129,158],"vulnerabilities":[8,91,137],"Internet":[10],"Things":[12],"(IoT)":[13],"platforms":[14],"and":[15,36,55,64,72,79,101,114,121,138],"protocols":[16],"using":[17,42,51,108],"penetration":[18],"testing":[19,38],"methods.":[20],"The":[21,148],"work":[22],"includes":[23],"both":[24,94],"analysis":[25],"publicly":[27],"available":[28],"vulnerability":[29,67],"databases":[30],"(in":[31],"particular,":[32],"CVE":[34],"database)":[35],"practical":[37,88],"IoT":[40,103,161],"systems":[41],"example":[44],"an":[46],"air":[47],"quality":[48],"monitoring":[49],"network":[50],"LoRaWAN":[53],"protocol":[54],"Wi-Fi":[56,99],"(WPA2).":[57],"An":[58],"algorithm":[59],"for":[60,76,140],"automatic":[62],"collection":[63],"processing":[65],"data":[68],"has":[69,83],"been":[70,84,133,146],"implemented,":[71],"web":[74],"interface":[75],"interactive":[77],"visualization":[78],"filtering":[80],"information":[82],"developed.":[85],"During":[86],"experiment,":[89],"critical":[90],"were":[92],"identified":[93],"in":[95,102],"wireless":[96],"networks":[97],"(LoRaWAN,":[98],"WPA2)":[100],"devices":[104],"themselves,":[105],"such":[106],"as":[107],"standard":[109],"passwords,":[110],"transmitting":[111],"unencrypted":[112],"data,":[113],"possibility":[116],"Replay,":[118],"Brute":[119],"Force,":[120],"Deauthentication":[122],"attacks.":[123],"Based":[124],"on":[125],"results":[127],"analysis,":[130],"recommendations":[131],"have":[132,145],"formed":[134],"to":[135,156],"eliminate":[136],"requirements":[139],"new":[141],"device":[142],"authentication":[143],"schemes":[144],"outlined.":[147],"obtained":[149],"developments":[150],"can":[151],"be":[152],"used":[153],"by":[154],"developers":[155],"improve":[157],"security":[159],"systems.":[162]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-28T00:00:00"}
