Abstract | ||
---|---|---|
The Internet of Things (IoT) is enabling innovative applications in various domains. Due to its heterogeneous and wide-scale structure, it introduces many new security issues. To address this problem, we propose a framework for modeling and assessing the security of the IoT and provide a formal definition of the framework. Generally, the framework consists of five phases: (1) data processing, (2) security model generation, (3) security visualization, (4) security analysis, and (5) model updates. Using the framework, we can find potential attack scenarios in the IoT, analyze the security of the IoT through well-defined security metrics, and assess the effectiveness of different defense strategies. The framework is evaluated via three scenarios, which are the smart home, wearable healthcare monitoring and environment monitoring scenarios. We use the analysis results to show the capabilities of the proposed framework for finding potential attack paths and mitigating the impact of attacks. |
Year | DOI | Venue |
---|---|---|
2017 | 10.1016/j.jnca.2017.01.033 | J. Network and Computer Applications |
Keywords | Field | DocType |
Attack graphs,Internet of things,Security analysis,Security modeling | Internet security,Security through obscurity,Asset (computer security),Computer science,Computer security,Sherwood Applied Business Security Architecture,Computer network,Security service,Cloud computing security,Security information and event management,Computer security model | Journal |
Volume | Issue | ISSN |
83 | C | 1084-8045 |
Citations | PageRank | References |
25 | 0.85 | 60 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mengmeng Ge | 1 | 48 | 6.41 |
Jin B. Hong | 2 | 120 | 17.50 |
Walter Guttmann | 3 | 196 | 16.53 |
Dong Seong Kim | 4 | 866 | 93.34 |