BSAGIoT: A Bayesian Security Aspect Graph for Internet of Things (IoT)

سال انتشار: 1404
نوع سند: مقاله ژورنالی
زبان: انگلیسی
مشاهده: 122

فایل این مقاله در 24 صفحه با فرمت PDF قابل دریافت می باشد

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

JR_IJWR-8-2_004

تاریخ نمایه سازی: 16 خرداد 1404

چکیده مقاله:

IoT is a dynamic network of interconnected things that communicate and exchange data, where security is a significant issue. Previous studies have mainly focused on attack classifications and open issues rather than presenting a comprehensive overview on the existing threats and vulnerabilities. This knowledge helps analyzing the network in the early stages even before any attack takes place. In this paper, the researchers have proposed different security aspects and a novel Bayesian Security Aspects Dependency Graph for IoT (BSAGIoT) to illustrate their relations. The proposed BSAGIoT is a generic model applicable to any IoT network and contains aspects from five categories named data, access control, standard, network, and loss. This proposed Bayesian Security Aspect Graph (BSAG) presents an overview of the security aspects in any given IoT network. The purpose of BSAGIoT is to assist security experts in analyzing how a successful compromise and/or a failed breach could impact the overall security and privacy of the respective IoT network. In addition, root cause identification of security challenges, how they affect one another, their impact on IoT networks via topological sorting, and risk assessment could be achieved. Hence, to demonstrate the feasibility of the proposed method, experimental results with various scenarios has been presented, in which the security aspects have been quantified based on the network configurations. The results indicate the impact of the aspects on each other and how they could be utilized to mitigate and/or eliminate the security and privacy deficiencies in IoT networks.

نویسندگان

Zeinab Lashkaripour

Data Science Department, Montreal College of Information Technology, Montreal, Canada

Masoud Khosravi-Farmad

Data and Communication Security Lab., Computer Engineering Department, Ferdowsi University of Mashhad, Mashhad, Iran

AhmadReza Montazerolghaem

Faculty of Computer Engineering, University of Isfahan, Isfahan, Iran

Razieh Rezaee

Computer Engineering Department, Imam Reza University, Mashhad, Iran

مراجع و منابع این مقاله:

لیست زیر مراجع و منابع استفاده شده در این مقاله را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود مقاله لینک شده اند :
  • Sundmaeker, P. Guillemin, P. Friess, and S. Woelfflé, Vision and ...
  • Bandyopadhyay, and S. Jaydip, “Internet of Things: Applications and Challenges ...
  • Sha, W. Wei, T. A. Yang, Z. Wang, and W. ...
  • Borgia, “The Internet of Things Vision: Key Features, Applications and ...
  • Granjal, E. Monteiro, and J. S. Silva, “Security for the ...
  • Li, S. Xie, Z. Wan, H. Lv, H. Song, and ...
  • Borgohain, U. Kumar, and S. Sanyal, “Survey of Security and ...
  • Alwahedi, A. Aldhaheri, M. A. Ferrag, A. Battah, and N. ...
  • Dean, Big data, data mining, and machine learning: value creation ...
  • Chen, S. Mao, and Y. Liu, “Big Data: A Survey,” ...
  • Marrocco, C. Occhiuzzi, and F. Amato, “Sensor-Oriented Passive RFID,” In ...
  • Gerodimos, L. Maglaras, M. A.Ferrag, N. Ayres, and I. Kantzavelou, ...
  • Regan, B. Shorten, R. Gomes, and V. Hale. Compliance at ...
  • Horný, Bayesian Networks, Technical report, No. ۵, Department of Health ...
  • Muñoz-Gonzalez, D. Sgandurra, M. Barrère, and E. Lupu, “Exact Inference ...
  • CVSS, Common Vulnerability Scoring System Version ۳.۰ Calculator, Forum of Incident ...
  • NIST-NVD, National Vulnerability Database (NVD), https://nvd.nist.gov/, (Accessed Mar ۹, ۲۰۲۵) ...
  • Liu, and H. Man. “Network Vulnerability Assessment Using Bayesian Networks,” ...
  • ADS-B Rules, Federal Aviation Administration: ۲۰۲۵, https://www.faa.gov/air_traffic/technology/equipadsb/resources/faq, (Accessed Mar ۸, ...
  • A. Ferrag, O. Friha, D. Hamouda, L. Maglaras, and H. ...
  • CVSS, Common Vulnerability Scoring System v۳.۰: Specification Document, https://www.first.org/cvss/ v۳.۰/specification-document, ...
  • GeNIe Modeler, BayesFusion, LLC. https://www.bayesfusion.com/genie/, (Accessed May ۱۴, ۲۰۲۴) ...
  • Khosravi-Farmad, and A. Ghaemi-Bafghi, “Bayesian Decision Network-Based Security Risk Management ...
  • نمایش کامل مراجع