2012 8th International Conference on Natural Computation 2012
DOI: 10.1109/icnc.2012.6234533
|View full text |Cite
|
Sign up to set email alerts
|

Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Some of the research that refers to security analyzes single IoT devices but does not look at IoT devices as a deployment problem. Liu et al [20] tried to solve the problem of assessing the risk of a single IoT device, by proposing a dynamical risk assessment method inspired by an artificial immune system. Zhang et al [47] and Roman et al [32] reviewed security issues in the IoT in terms of the security of each device.…”
Section: Related Work 31 Iot Device Deploymentmentioning
confidence: 99%
See 1 more Smart Citation
“…Some of the research that refers to security analyzes single IoT devices but does not look at IoT devices as a deployment problem. Liu et al [20] tried to solve the problem of assessing the risk of a single IoT device, by proposing a dynamical risk assessment method inspired by an artificial immune system. Zhang et al [47] and Roman et al [32] reviewed security issues in the IoT in terms of the security of each device.…”
Section: Related Work 31 Iot Device Deploymentmentioning
confidence: 99%
“…With respect to hardening IoT security, most prior research focuses on the security of individual IoT devices [20,32,47], the security of an IoT protocol [24,33,41,43,49], or the the security of a network that consists solely of IoT devices [12,16,39,46] (see Section 3.1 for more details). To the best our knowledge, there is no previous related research aimed at identifying the optimal (security risk-wise) deployment of devices within the physical space.…”
Section: Introductionmentioning
confidence: 99%
“…The risk assessment produces effective security approaches and gives enhancement of [84] already existing architectures and planning of security.…”
Section: ) Risk Assessmentmentioning
confidence: 99%
“…These encryption algorithms can be easily applied because of their less consumption of power. 7) Risk Assessment: Dynamical Risk Assessment technique provides confidentiality of data and avoiding security breaches in an IoT network [63]. It is essential for security perspective of IoT by discovering different types of threats to the network.…”
Section: ) Data Privacymentioning
confidence: 99%
“…It could help preventing the security breaches and determining the best security strategies. An example of it is the Dynamical Risk Assessment method for IoT [28].…”
Section: Risk Assessmentmentioning
confidence: 99%