Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things

被引:21
|
作者
George, Gemini [1 ,2 ]
Thampi, Sabu M. [1 ]
机构
[1] Indian Inst Informat Technol & Management Kerala, Ctr Res & Innovat Cyber Threat Resilience Lab, Thiruvananthapuram, Kerala, India
[2] Cochin Univ Sci & Technol, Kochi, Kerala, India
关键词
SECURITY; MANAGEMENT; FRAMEWORK; PROTOCOL;
D O I
10.1016/j.pmcj.2019.101068
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Edge computing envisages a distributed decentralized processing of data through a set of edge devices in the proximity of the data origins to improve the network latency and bandwidth usage. However, as the edge devices process important parameters that can often control the performance of the system, they become attractive targets of attackers. In this work, we address the security issues pertaining to the edge devices in the IoT ecosystem because of the existence of vulnerabilities in the network devices. We propose a multi-attacker multi-target graphical model for risk assessment, representing the attackers, targets, and the vulnerability relations in the network. Further, we propose risk mitigation strategies for securing the edge devices. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页数:17
相关论文
共 50 条
  • [1] Vulnerability-Based Risk Assessment for Stream Instability at Bridges
    Johnson, P. A.
    Whittington, R. M.
    [J]. JOURNAL OF HYDRAULIC ENGINEERING-ASCE, 2011, 137 (10): : 1248 - 1256
  • [2] Edge Networks & Devices for the Internet of Things
    Kirstein, Peter T.
    [J]. DAEDALUS, 2016, 145 (01) : 33 - 42
  • [3] Security of Internet of Things edge devices
    Lv, Zhihan
    [J]. SOFTWARE-PRACTICE & EXPERIENCE, 2021, 51 (12): : 2446 - 2456
  • [4] Vulnerability-based risk analysis on emergency events
    Jia, Zeng-Ke
    Qiu, Wan-Hua
    Guo, Zhang-Lin
    [J]. Binggong Xuebao/Acta Armamentarii, 2009, 30 (SUPPL. 1): : 145 - 149
  • [5] Adaptive energy saving algorithms for Internet of Things devices integrating end and edge strategies
    Wang, Yang
    Yang, Kun
    Wan, Weixiang
    Mei, Haibo
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (08):
  • [6] Vulnerability assessment of services deployed in internet of things based smart cities
    Belghith, Aymen
    [J]. INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2022, 68 (02) : 164 - 174
  • [7] Recycling Edge Devices in Sustainable Internet of Things Networks
    Hou, Weigang
    Li, Wenxiao
    Guo, Lei
    Sun, Yiwei
    Cai, Xintong
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2017, 4 (05): : 1696 - 1706
  • [8] Exploring Safety Vulnerability in Prefabricated Construction and Mitigation Effects of Internet of Things
    Luo, Lizi
    Hu, Shiying
    Chen, Ke
    Liu, Yunlin
    Li, Clyde Zhengdao
    [J]. IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2024, 71 : 8531 - 8547
  • [9] Vulnerability Scanning System Used in the Internet of Things for Intelligent Devices
    Su, Yu-rui
    Li, Xiao-feng
    Wang, Song-fei
    Yi, Jing
    He, Hui-ru
    [J]. 2ND INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INFORMATION MANAGEMENT AND NETWORK SECURITY (CIMNS 2017), 2017, : 361 - 366
  • [10] Vulnerability and Threat Assessment Framework for Internet of Things Systems
    Beyrouti, Mohammad
    Lounis, Ahmed
    Lussier, Benjamin
    Bouadallah, Abdelmadjid
    Samhat, Abed Ellatif
    [J]. 2023 6TH CONFERENCE ON CLOUD AND INTERNET OF THINGS, CIOT, 2023, : 62 - 69