Risk analysis in Internet of Things using EBIOS

被引:0
|
作者
Fatima Zahra, Berrehili [1 ]
Abdelhamid, Belmekki [1 ]
机构
[1] Natl Inst Posts & Telecommun, STRS Lab, Rabat, Morocco
关键词
Internet of Things; Security; risk analysis; EBIOS;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In the Internet of Things (IoT) the number of Things acting in the system grows exponentially. Nowadays, IoT is integrated into many industries and personal life. But in the next few years, it will be an important component in our everyday life and a part of critical application dealing with important data. By the way, new risks arise and securing IoT is becoming a necessity to improve the development of this industry and to increase the level of confidence. This work is a contribution to the effort of securing IoT applications. It aims to identify the most relevant weaknesses and vulnerabilities related to IoT architecture by using risk analysis based on EBIOS methodology. We aim by this work to determine the most important security risk related to an IoT application to give developer and designer of such applications a clear and efficient view of parts to focus on to build more secure and safe application.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] User Privacy Risk Analysis For The Internet of Things
    Aggarwal, Akash
    Asif, Waqar
    Azam, Habibul
    Markovic, Milan
    Rajarajan, Muttukrishnan
    Edwards, Peter
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 259 - 264
  • [2] Using EBIOS for risk management in critical information infrastructure
    Abbass, Wissam
    Baina, Amine
    Bellafkih, Mostafa
    PROCEEDINGS OF THE 2015 5TH WORLD CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGIES (WICT), 2015, : 107 - 112
  • [3] Attack Risk Analysis in Data Anonymization in Internet of Things
    Yang, Tianli
    Cang, Li Shan
    Iqbal, Muddesar
    Almakhles, Dhafer
    IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2023, 11 (04) : 4986 - 4993
  • [4] Using Clustering for Forensics Analysis on Internet of Things
    Salhi, Dhai Eddine
    Tari, Abelkamel
    Kechadi, Mohand Tahar
    INTERNATIONAL JOURNAL OF SOFTWARE SCIENCE AND COMPUTATIONAL INTELLIGENCE-IJSSCI, 2021, 13 (01): : 56 - 71
  • [5] Bushfire Risk Detection Using Internet of Things: An Application Scenario
    Nosouhi, Mohammad Reza
    Sood, Keshav
    Kumar, Neeraj
    Wevill, Tricia
    Thapa, Chandra
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (07) : 5266 - 5274
  • [6] Security and Risk Analysis of Financial Industry Based on the Internet of Things
    Li, Yizhi
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [7] Bibliometric analysis of internet of things using knowledge mapping
    Shi J.
    Guo H.
    Zhang R.
    Jiang H.
    Zou Z.
    Qu T.
    Xu C.
    Chen M.
    He Z.
    Li C.
    Huang G.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2021, 27 (01): : 228 - 239
  • [8] Traffic Analysis Using Decentralized Social Internet Of Things
    Mostafi, Sifatul
    Khan, Farzana
    Antar, Kamrul Islam
    Chaki, Dipankar
    Chakrabarty, Amitabha
    2018 JOINT 7TH INTERNATIONAL CONFERENCE ON INFORMATICS, ELECTRONICS & VISION (ICIEV) AND 2018 2ND INTERNATIONAL CONFERENCE ON IMAGING, VISION & PATTERN RECOGNITION (ICIVPR), 2018, : 328 - 333
  • [9] Access Features Analysis of Things in the Internet of Things
    Wang, Shulong
    Hou, Yibin
    Gao, Fang
    Ji, Xinrong
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 143 - 147
  • [10] A risk assessment methodology for the Internet of Things
    Sicari, Sabrina
    Rizzardi, Alessandra
    Miorandi, Daniele
    Coen-Porisini, Alberto
    COMPUTER COMMUNICATIONS, 2018, 129 : 67 - 79