2022
DOI: 10.3390/electronics11071123
|View full text |Cite
|
Sign up to set email alerts
|

Can I Sleep Safely in My Smarthome? A Novel Framework on Automating Dynamic Risk Assessment in IoT Environments

Abstract: Fully automated homes, equipped with the latest iot devices, aiming to drastically improve the quality of lives of those inhabiting such homes, is it not a perfect setting for cyber threats? More than that, this is a fear of many regular citizens and a trending topic for researchers to apply cti for seamless cyber security. This paper focuses on the ra methodology for smarthome environments, targeting to include all types of iot devices. Unfortunately, existing approaches mostly focus on the manual or periodic… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 29 publications
0
6
0
Order By: Relevance
“…The most notable works providing the taxonomy of smart home-specific attacks and threats were provided by Bugeja et al [26] and Heartfield et al [36]. With cross-correlation performed in the scope of risk identification under the GHOST project [5], we further reduced the initial listing by applying criteria on the attack simulation feasibility. The sections hereafter outline each category of attacks included in our analysis along with the scenario definition, implemented demonstration and validation methodology.…”
Section: Threat Vector Landscapementioning
confidence: 99%
See 3 more Smart Citations
“…The most notable works providing the taxonomy of smart home-specific attacks and threats were provided by Bugeja et al [26] and Heartfield et al [36]. With cross-correlation performed in the scope of risk identification under the GHOST project [5], we further reduced the initial listing by applying criteria on the attack simulation feasibility. The sections hereafter outline each category of attacks included in our analysis along with the scenario definition, implemented demonstration and validation methodology.…”
Section: Threat Vector Landscapementioning
confidence: 99%
“…These advances are fused together within the implementation of DRA [5], which relies on probabilistic traffic profiling, the intelligence on the threat and vulnerability likelihood and the associated risk's severity, which permits identifying network anomalies and coordinating the selection of the appropriate mitigation action.…”
Section: Decision Automation In Risk Assessmentmentioning
confidence: 99%
See 2 more Smart Citations
“…This RA variant called dynamic risk assessment (DRA) targets continuous, near real-time, on-the-fly reassessments. Applying DRA in IoT is not new, as it has been addressed in many discussions [22,23] and case studies for threat-based RA in smart homes [24][25][26][27]. These studies highlight that DRA provides better observability (this term comes from control theory and distributed systems [28]; it is used nowadays as a means to understand a system's states by inspecting the data it generates in event logs, metrics, etc.…”
Section: Introductionmentioning
confidence: 99%