HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud

被引:1
|
作者
Sun, Wen-Lin [1 ]
Tang, Ying-Han [1 ]
Huang, Yu-Lun [1 ,2 ]
机构
[1] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, Hsinchu, Taiwan
[2] Natl Yang Ming Chiao Tung Univ, Dept Elect & Elect Engn, 1001 Univ Rd, Hsinchu 300, Taiwan
来源
关键词
analytic hierarchy process; cloud risk assessment; industrial internet-of-things;
D O I
10.1002/stvr.1847
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The trend towards intelligent control processes has introduced the Internet of Things (IoT) and cloud computing technologies to factories. IoT devices can sense data and send it to a cloud for further analysis in a factory. Consequently, the quantity of such valuable data flowing in an industrial cyber-physical system has gradually increased. Tailoring a risk assessment system for Industrial IoT (IIoT) is essential, particularly for a cloud platform that handles the IIoT data flow. In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform. The proposed model allows the platform to self-evaluate its security status. Furthermore, a modular and responsive Risk Assessment System based on HiRAM, called HiRAM-RAS, is realized and evaluated in a real-world IIoT cloud platform. We deploy HiRAM-RAS to a sample application and introduce the practical deployment procedures. We then estimate the practicality of the HiRAM-RAS by injecting different degrees of errors and launching Distributed denial-of-service (DDoS) attacks. The results demonstrate the changes in integrity and availability scores evaluated by HiRAM.
引用
收藏
页数:27
相关论文
共 50 条
  • [1] A hierarchical hybrid intrusion detection model for industrial internet of things
    Wang, Zhendong
    Yang, Xin
    Zeng, Zhiyuan
    He, Daojing
    Chan, Sammy
    [J]. PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, : 3385 - 3407
  • [2] INTERNET OF THINGS CLOUD: ARCHITECTURE AND IMPLEMENTATION
    Hou, Lu
    Zhao, Shaohang
    Xiong, Xiong
    Zheng, Kan
    Chatzimisios, Periklis
    Hossain, M. Shamim
    Xiang, Wei
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2016, 54 (12) : 32 - 39
  • [3] Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things
    Kerimkhulle, Seyit
    Dildebayeva, Zhulduz
    Tokhmetov, Akylbek
    Amirova, Akzhibek
    Tussupov, Jamalbek
    Makhazhanova, Ulzhan
    Adalbek, Alibek
    Taberkhan, Roman
    Zakirova, Alma
    Salykbayeva, Alua
    [J]. SYMMETRY-BASEL, 2023, 15 (10):
  • [4] Design and Implementation of Internet of Things and Cloud Technology in Flood Risk Mitigation
    Siek, Michael
    Larry, Laurensius
    [J]. 3RD INTERNATIONAL CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS (ICORIS 2021), 2021, : 516 - 521
  • [5] Electric Internet of Things Security Risk Assessment Based on Combined Weighting-cloud Model
    He Y.
    Liu J.
    [J]. Liu, Jiang (jiangliu@ncepu.edu.cn), 1600, Power System Technology Press (44): : 4302 - 4309
  • [6] Industrial edge cloud deployment algorithm for industrial internet of things
    Yan X.
    Zhang G.
    Qiu X.
    Chen Q.
    [J]. Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2022, 28 (02): : 574 - 583
  • [7] Hierarchical and Multi-Group Data Sharing for Cloud-Assisted Industrial Internet of Things
    Li, Teng
    Zhang, Jiawei
    Shen, Yulong
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3425 - 3438
  • [8] Industrial Cloud Monitoring System based on Internet of Things
    Al-Saedi, Ibtesam R. K.
    Al-Kadhim, Saif Aldeen Saad Obayes
    [J]. PROCEEDINGS OF THE 2018 SECOND WORLD CONFERENCE ON SMART TRENDS IN SYSTEMS, SECURITY AND SUSTAINABILITY (WORLDS4), 2018, : 158 - 162
  • [9] Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
    Krundyshev, V. M.
    Markov, G. A.
    Kalinin, M. O.
    Semyanov, P. V.
    Busygin, A. G.
    [J]. AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2023, 57 (08) : 1040 - 1046
  • [10] Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
    V. M. Krundyshev
    G. A. Markov
    M. O. Kalinin
    P. V. Semyanov
    A. G. Busygin
    [J]. Automatic Control and Computer Sciences, 2023, 57 : 1040 - 1046