EconPapers    
Economics at your fingertips  
 

On the Design of IoT Security: Analysis of Software Vulnerabilities for Smart Grids

Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis, Charilaos C. Zarakovitis and Michail-Alexandros Kourtis
Additional contact information
Christos-Minas Mathas: Department of Informatics and Telecommunications, University of the Peloponnese, 22100 Tripolis, Greece
Costas Vassilakis: Department of Informatics and Telecommunications, University of the Peloponnese, 22100 Tripolis, Greece
Nicholas Kolokotronis: Department of Informatics and Telecommunications, University of the Peloponnese, 22100 Tripolis, Greece
Charilaos C. Zarakovitis: Institute of Informatics and Telecommunications, National Centre for Scientific Research Demokritos, 15341 Athens, Greece
Michail-Alexandros Kourtis: Institute of Informatics and Telecommunications, National Centre for Scientific Research Demokritos, 15341 Athens, Greece

Energies, 2021, vol. 14, issue 10, 1-27

Abstract: The 5G communication network will underpin a vast number of new and emerging services, paving the way for unprecedented performance and capabilities in mobile networks. In this setting, the Internet of Things (IoT) will proliferate, and IoT devices will be included in many 5G application contexts, including the Smart Grid. Even though 5G technology has been designed by taking security into account, design provisions may be undermined by software-rooted vulnerabilities in IoT devices that allow threat actors to compromise the devices, demote confidentiality, integrity and availability, and even pose risks for the operation of the power grid critical infrastructures. In this paper, we assess the current state of the vulnerabilities in IoT software utilized in smart grid applications from a source code point of view. To that end, we identified and analyzed open-source software that is used in the power grid and the IoT domain that varies in characteristics and functionality, ranging from operating systems to communication protocols, allowing us to obtain a more complete view of the vulnerability landscape. The results of this study can be used in the domain of software development, to enhance the security of produced software, as well as in the domain of automated software testing, targeting improvements to vulnerability detection mechanisms, especially with a focus on the reduction of false positives.

Keywords: Internet of Things; software vulnerabilities; security; robustness (search for similar items in EconPapers)
JEL-codes: Q Q0 Q4 Q40 Q41 Q42 Q43 Q47 Q48 Q49 (search for similar items in EconPapers)
Date: 2021
References: View references in EconPapers View complete reference list from CitEc
Citations: View citations in EconPapers (2)

Downloads: (external link)
https://www.mdpi.com/1996-1073/14/10/2818/pdf (application/pdf)
https://www.mdpi.com/1996-1073/14/10/2818/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jeners:v:14:y:2021:i:10:p:2818-:d:554501

Access Statistics for this article

Energies is currently edited by Ms. Agatha Cao

More articles in Energies from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jeners:v:14:y:2021:i:10:p:2818-:d:554501