Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology

Author(s):  
Caiming Liu ◽  
Yan Zhang ◽  
Jinquan Zeng ◽  
Lingxi Peng ◽  
Run Chen
Author(s):  
Wissam Abbass ◽  
Amine Baina ◽  
Mostafa Bellafkih

The rapid growth of the world's population is placing a huge strain on the existing infrastructures. As a quest for accommodating this growth, interest is turned to the internet of things (IoT). In fact, the IoT is significantly improving today's quality of life by innovating the provided services and enhancing communication and interaction. Furthermore, it has also empowered real-time decision making by introducing dynamic services for innovative traffic handling, energy-efficient infrastructure saving, and public safety ensuring. However, IoT applications for smart cities is still a major issue as it lacks assuring privacy and security within provided services. In this chapter, the authors pinpoint IoT's security risk assessment challenges and examine its critical influence on smart cities. Additionally, they highlight the key aspects characterizing a smart city which also represent the critical assets requiring security risk assessment. Moreover, they discuss the resulting issues and their related countermeasures.


Author(s):  
Petar Radanliev ◽  
David De Roure ◽  
Pete Burnap ◽  
Omar Santos

AbstractThe Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk assessment. To enable quantitative risk assessment of uncontrollable risk states in complex and coupled IoT systems, a new epistemological equation is designed and tested though comparative and empirical analysis. The comparative analysis is conducted on national digital strategies, followed by an empirical analysis of cyber risk assessment approaches. The results from the analysis present the current and a target state for IoT systems, followed by a transformation roadmap, describing how IoT systems can achieve the target state with a new epistemological analysis model. The new epistemological analysis approach enables the assessment of uncontrollable risk states in complex IoT systems—which begin to resemble artificial intelligence—and can be used for a quantitative self-assessment of IoT cyber risk posture.


Author(s):  
Сергей Александрович Ермаков ◽  
Андрей Сергеевич Тулинов ◽  
Андрей Александрович Болгов ◽  
Валерий Константинович Власов

В данной статье предлагается методика повышения защищенности сетей и конечных устройств интернета вещей от атак, направленных на нарушение конфиденциальности информации и процедуры аутентификации, за счет внедрения новых несертифицированных протоколов обеспечения безопасности и создания методического обеспечения для оценки рисков успешной реализации атак. В работе были смоделированы и проанализированы протоколы безопасности технологии интернета вещей с помощью специализированного инструмента моделирования. При использовании результатов моделирования для всех протоколов, представленных в данной работе, был посчитан риск успешной реализации атак, направленных на нарушение конфиденциальности информации и процедуры аутентификации. На основе полученных значений было выполнено сравнение протоколов безопасности. Результаты проделанной работы позволят упростить разработку и внедрение новых протоколов безопасности для технологии интернета вещей. This article proposes a method for improving the security of the networks and end devices of the Internet of Things from attacks aimed at violating the confidentiality of information and authentication procedures by introducing new uncertified security protocols and creating methodological support for assessing the risks of successful implementation of attacks. The security protocols of the Internet of Things technology were modeled and analyzed using a specialized modeling tool. When using the simulation results for all the protocols presented in this work, the risk of successful implementation of attacks aimed at violating the confidentiality of information and the authentication procedure was calculated. Based on the obtained values, a comparison of security protocols was performed. The results of this work will simplify the development and implementation of new security protocols for the Internet of Things technology.


Sign in / Sign up

Export Citation Format

Share Document