Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things

被引:3
|
作者
Kerimkhulle, Seyit [1 ]
Dildebayeva, Zhulduz [2 ]
Tokhmetov, Akylbek [1 ]
Amirova, Akzhibek [1 ]
Tussupov, Jamalbek [1 ]
Makhazhanova, Ulzhan [1 ]
Adalbek, Alibek [1 ]
Taberkhan, Roman [1 ]
Zakirova, Alma [1 ]
Salykbayeva, Alua [3 ]
机构
[1] LN Gumilyov Eurasian Natl Univ, Dept Informat Syst, 2 Satpayev St, Astana 010008, Kazakhstan
[2] Int Engn Technol Univ, Dept Econ & Business, 89-21 Al Farabi Ave, Alma Ata 050060, Kazakhstan
[3] Tengizchevroil LLP, Dept Supply Chain Management, 3 Satpayev St, Atyrau 060001, Kazakhstan
来源
SYMMETRY-BASEL | 2023年 / 15卷 / 10期
关键词
IIoT; security; threat; risk; fuzzy logic application; linguistic variables; fuzzy decision making;
D O I
10.3390/sym15101958
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This article addresses the issue of information security in the Industrial Internet of Things (IIoT) environment. Information security risk assessment in the IIoT is complicated by several factors: the complexity and heterogeneity of the system, the dynamic nature of the system, the distributed network infrastructure, the lack of standards and guidelines, and the increased consequences of security breaches. Given these factors, information security risk assessment in the IIoT requires a comprehensive approach adapted to the peculiarities and requirements of a particular system and industry. It is necessary to use specialized risk assessment methods and to take into account the context and peculiarities of the system. The method of information security risk assessment in the IIoT, based on the mathematical apparatus of fuzzy set theory, is proposed. This paper analyzes information security threats for IIoT systems, from which the most significant criteria are selected. The rules, based on which decisions are made, are formulated in the form of logical formulas containing input parameters. Three fuzzy inference systems are used: one to estimate the probability of threat realization, another to estimate the probable damage, and a final one to estimate the information security risk for the IIoT system. Based on the proposed method, examples of calculating the information security risk assessment in the IIoT environment are provided. The proposed scientific approach can serve as a foundation for creating expert decision support systems for designing IIoT systems.
引用
收藏
页数:29
相关论文
共 50 条
  • [1] Application of Fuzzy Logic in the Process of Information Security Risk Assessment
    Kokles, Mojmir
    Filanova, Jana
    Korcek, Frantisek
    [J]. INNOVATION MANAGEMENT AND EDUCATION EXCELLENCE VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOLS I - VI, 2016, : 1078 - 1088
  • [2] A Fuzzy Logic based Information Security Risk Assessment Method
    Yang, Yaling
    Zhou, Yanhui
    [J]. MECHANICAL AND ELECTRONICS ENGINEERING III, PTS 1-5, 2012, 130-134 : 3726 - 3730
  • [3] Using fuzzy logic and entropy theory to risk assessment of the information security
    Zhao, DM
    Wang, JH
    Wu, J
    Ma, JF
    [J]. Proceedings of 2005 International Conference on Machine Learning and Cybernetics, Vols 1-9, 2005, : 2448 - 2453
  • [4] Security Risk Assessment in Internet of Things Systems
    Nurse, Jason R. C.
    Creese, Sadie
    De Roure, David
    [J]. IT PROFESSIONAL, 2017, 19 (05) : 20 - 26
  • [5] The application of fuzzy-based Internet of Things in household security
    Lu, Boyong
    [J]. SPORTS MATERIALS, MODELLING AND SIMULATION, 2011, 187 : 735 - 740
  • [6] Countermeasure security risks management in the Internet of Things based on fuzzy logic inference
    Kotenko, Igor
    Saenko, Igor
    Ageev, Sergey
    [J]. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1, 2015, : 654 - 659
  • [7] A lightweight hierarchical method for improving security in the internet of things using fuzzy logic
    Doostani, Shadi
    Barati, Hamid
    Barati, Ali
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (06):
  • [8] Protocol Security in the Industrial Internet of Things
    Dahlmanns, Markus
    Wehrle, Klaus
    [J]. PROCEEDINGS OF 2024 IEEE/IFIP NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM, NOMS 2024, 2024,
  • [9] HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud
    Sun, Wen-Lin
    Tang, Ying-Han
    Huang, Yu-Lun
    [J]. SOFTWARE TESTING VERIFICATION & RELIABILITY, 2023, 33 (05):
  • [10] Application of internet of things-based efficient security solution for industrial
    Ali, Mohammed Hasan
    Jaber, Mustafa Musa
    Khalil Abd, Sura
    Alkhayyat, Ahmed
    Qe, Malik R.
    Ali, Mohammad Hussain
    [J]. PRODUCTION PLANNING & CONTROL, 2023,