2023
DOI: 10.1109/access.2023.3313975
|View full text |Cite
|
Sign up to set email alerts
|

Quantifying IoT Security Parameters: An Assessment Framework

Shouki A. Ebad

Abstract: Several attempts have been made to propose metrics that quantify the parameters of existing solutions to improve the security of IoT systems. This paper presents a framework to classify and compare these metrics based on a set of attributes that can be used to answer the research questions. Forty-six metrics from the literature were analyzed, classified, and compared according to the developed framework. They were divided into two main categories according to the metric's source, i.e., internal and external so… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 51 publications
0
0
0
Order By: Relevance
“…Although such transformation contains subcategories (as shown in Table 1), it still focuses on a single mythology, i.e., removing lines or words from the source code. This can be insufficient for securing new applications working under the IoT paradigm because the source code of these applications-at least in the current simple IoT architecture-is vulnerable to tampering due to various factors, including the heterogeneous nature of the IoT devices and their limited resources, which are rapidly increasing [19]. Some tools use the 'other transformations' category (number 4 in Table 1), which includes splitting, merging, and encryption.…”
Section: The Most Widely Used Obfuscation Transformations In Obfuscat...mentioning
confidence: 99%
“…Although such transformation contains subcategories (as shown in Table 1), it still focuses on a single mythology, i.e., removing lines or words from the source code. This can be insufficient for securing new applications working under the IoT paradigm because the source code of these applications-at least in the current simple IoT architecture-is vulnerable to tampering due to various factors, including the heterogeneous nature of the IoT devices and their limited resources, which are rapidly increasing [19]. Some tools use the 'other transformations' category (number 4 in Table 1), which includes splitting, merging, and encryption.…”
Section: The Most Widely Used Obfuscation Transformations In Obfuscat...mentioning
confidence: 99%