
aspects of the penetration testing process that demand
minimal expertise and involve substantial manual ef-
fort. As a result, IoTective can be seen as a valu-
able supplement to these other tools, which excel in
more specialized and aggressive security testing. By
automating repetitive and time-consuming tasks, Io-
Tective streamlines the initial stages of IoT device as-
sessment, enabling users to focus on more advanced
security analysis and exploitation techniques. The
use case demonstration illustrates IoTective’s ability
to automate the discovery of network interfaces and
devices, enhancing usability through flexible scan op-
tions and user-friendly reports.
In our future work, we would like to further en-
hance and extend IoTective by investigating more ef-
ficient solutions for capturing Bluetooth and Zigbee
network information, providing exploitation capabil-
ity, and incorporating support for additional commu-
nication protocols commonly used in smart home en-
vironments, such as Z-wave or other proprietary pro-
tocols. Additionally, we plan to establish a process
for regular updates and maintenance to ensure that
IoTective stays current with the latest security vul-
nerabilities, attack techniques, and changes in device
firmware and communication protocols.
ACKNOWLEDGEMENT
The authors want to thank the anonymous reviewers
for their reviews and valuable suggestions to this pa-
per. This work was partially conducted within the
SFI-NORCICS (https://www.ntnu.edu/norcics). This
project has received funding from the Research Coun-
cil of Norway under grant no. 310105 “Norwegian
Centre for Cybersecurity in Critical Sectors.”
REFERENCES
Ablondi, W. and Narcotta, J. (2020). 2020 Global Smart
Home Forecast - June 2020.
Alrawais, A., Alhothaily, A., Hu, C., and Cheng, X. (2017).
Fog computing for the internet of things: Security and
privacy issues. IEEE Internet Computing, 21(2):34–
42.
Barua, A., Al Alamin, M. A., Hossain, M. S., and Hossain,
E. (2022). Security and privacy threats for bluetooth
low energy in iot and wearable devices: A compre-
hensive survey. IEEE Open Journal of the Communi-
cations Society, 3:251–281.
C
¨
asar, M., Pawelke, T., Steffan, J., and Terhorst, G. (2022).
A survey on Bluetooth Low Energy security and pri-
vacy. Computer Networks, 205:108712.
Davis, B. D., Mason, J. C., and Anwar, M. (2020). Vulner-
ability studies and security postures of IoT devices: A
smart home case study. IEEE Internet of Things Jour-
nal, 7(10):10102–10110.
Heydon, R. and Hunn, N. (2012). Bluetooth low energy.
CSR Presentation, Bluetooth SIG https://www. blue-
tooth. org/DocMan/handlers/DownloadDoc. ashx.
Hussein, N. and Nhlabatsi, A. (2022). Living in the Dark:
MQTT-Based Exploitation of IoT Security Vulnera-
bilities in ZigBee Networks for Smart Lighting Con-
trol. IoT, 3(4):450–472.
Khanna, A. and Kaur, S. (2019). Evolution of Internet of
Things (IoT) and its significant impact in the field of
Precision Agriculture. Computers and electronics in
agriculture, 157:218–231.
Lee, M.-C., Lin, J.-C., and Owe, O. (2019). PDS: Deduce
elder privacy from smart homes. Internet of Things,
7:100072.
Li, W., Yigitcanlar, T., Erol, I., and Liu, A. (2021). Motiva-
tions, barriers and risks of smart home adoption: From
systematic literature review to conceptual framework.
Energy Research & Social Science, 80:102211.
Morgner, P., Mattejat, S., Benenson, Z., M
¨
uller, C., and
Armknecht, F. (2017). Insecure to the touch: attack-
ing ZigBee 3.0 via touchlink commissioning. In Pro-
ceedings of the 10th ACM Conference on Security and
Privacy in Wireless and Mobile Networks, pages 230–
240.
Okada, S., Miyamoto, D., Sekiya, Y., and Nakamura, H.
(2021). New LDoS attack in zigbee network and
its possible countermeasures. In 2021 IEEE Inter-
national Conference on Smart Computing (SMART-
COMP), pages 246–251. IEEE.
Pan, T. (2021). ZigBee Wireless Network Attack and De-
tection. In Advances in Artificial Intelligence and
Security: 7th International Conference, ICAIS 2021,
Dublin, Ireland, July 19-23, 2021, Proceedings, Part
III 7, pages 391–403. Springer.
Shah, S. and Mehtre, B. M. (2015). An overview of
vulnerability assessment and penetration testing tech-
niques. Journal of Computer Virology and Hacking
Techniques, 11:27–49.
Tekeste Habte, T., Saleh, H., Mohammad, B., Ismail, M.,
Tekeste Habte, T., Saleh, H., Mohammad, B., and Is-
mail, M. (2019). IoT for healthcare. Ultra Low Power
ECG Processing System for IoT Devices, pages 7–12.
Touqeer, H., Zaman, S., Amin, R., Hussain, M., Al-
Turjman, F., and Bilal, M. (2021). Smart home
security: challenges, issues and solutions at differ-
ent IoT layers. The Journal of Supercomputing,
77(12):14053–14089.
Wara, M. S. and Yu, Q. (2020). New replay attacks on zig-
bee devices for internet-of-things (iot) applications.
In 2020 IEEE International Conference on Embedded
Software and Systems (ICESS), pages 1–6. IEEE.
Zantalis, F., Koulouras, G., Karabetsos, S., and Kandris, D.
(2019). A review of machine learning and IoT in smart
transportation. Future Internet, 11(4):94.
IoTective: Automated Penetration Testing for Smart Home Environments
39