2021
DOI: 10.1007/s12626-021-00086-5
|View full text |Cite
|
Sign up to set email alerts
|

Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things

Abstract: The Internet-of-Things (IoT) triggers data protection questions and new types of cyber risks. Cyber risk regulations for the IoT, however, are still in their infancy. This is concerning, because companies integrating IoT devices and services need to perform a self-assessment of its IoT cyber security posture. At present, there are no self-assessment methods for quantifying IoT cyber risk posture. It is considered that IoT represent a complex system with too many uncontrollable risk states for quantitative risk… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
22
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(22 citation statements)
references
References 26 publications
(25 reference statements)
0
22
0
Order By: Relevance
“…TA-BLE 1 depicts the various application areas of IoT. Apart from this, security in IoT devices is of major concern and increasing on a daily basis, as discussed in [82]. In [82], a new epistemological equation is presented that contains a set of new epistemological formulas that will help the cyber risk researchers to conduct epistemological analysis of various cyber risk assessment approaches.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
See 1 more Smart Citation
“…TA-BLE 1 depicts the various application areas of IoT. Apart from this, security in IoT devices is of major concern and increasing on a daily basis, as discussed in [82]. In [82], a new epistemological equation is presented that contains a set of new epistemological formulas that will help the cyber risk researchers to conduct epistemological analysis of various cyber risk assessment approaches.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…Apart from this, security in IoT devices is of major concern and increasing on a daily basis, as discussed in [82]. In [82], a new epistemological equation is presented that contains a set of new epistemological formulas that will help the cyber risk researchers to conduct epistemological analysis of various cyber risk assessment approaches. In our work, security and privacy of the IoT devices are not taken into consideration and can be considered in our future works.…”
Section: Internet Of Things (Iot)mentioning
confidence: 99%
“…A specific vendor provides proprietary services for developing applications, making them dependent upon the provider [13,14]. Moreover, one platform could supply some assistance that is not offered by another platform [10,[43][44][45][46][47][48][49]. So, application portability among different clouds or from legacy enterprises to the cloud becomes essential to preclude users from vendor lock-in [50][51][52][53][54][55].…”
Section: Background and Related Workmentioning
confidence: 99%
“…We defined the structure of our configuration file so that the middleware layer handles and implements the cloud services even with the different designs of the configuration variables. The configuration is not hardcoded in the middleware code [48][49][50][51]. Instead, it is provided in a JSON file that can be changed to alter the design even if the application runs.…”
mentioning
confidence: 99%
“…The process of failure detection is reactive for sensors, alarms, gateways, and drones. In addition, the formal modeling and validation of cyber risk to prevent someone from hacking these devices and sending many fake alarms just to mess up the system is also considered in the proposed algorithm [46,47]. The Algorithm 1 is explained further in detail below.…”
Section: Failure Detection and Recoverymentioning
confidence: 99%