An empirical analysis of evolutionary computing approaches for IoT security assessment

Vinay Kumar Sahu, Dhirendra Pandey, Priyanka Singh, Md Shamsul Haque Ansari, Asif Khan, Naushad Varish, Mohd Waris Khan
{"title":"An empirical analysis of evolutionary computing approaches for IoT security assessment","authors":"Vinay Kumar Sahu, Dhirendra Pandey, Priyanka Singh, Md Shamsul Haque Ansari, Asif Khan, Naushad Varish, Mohd Waris Khan","doi":"10.3233/jifs-233759","DOIUrl":null,"url":null,"abstract":"The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sector to industrial and commercial systems. The rapid expansion and widespread use of IoT devices highlight the critical significance of solid and effective cybersecurity standards across the device development life cycle. Therefore, if vulnerability is exploited directly affects the IoT device and the applications. In this paper we investigated and assessed the various real-world critical IoT attacks/vulnerabilities that have affected IoT deployed in the commercial, industrial and consumer sectors since 2010. Subsequently, we evoke the vulnerabilities or type of attack, exploitation techniques, compromised security factors, intensity of vulnerability and impacts of the expounded real-world attacks/vulnerabilities. We first categorise how each attack affects information security parameters, and then we provide a taxonomy based on the security factors that are affected. Next, we perform a risk assessment of the security parameters that are encountered, using two well-known multi-criteria decision-making (MCDM) techniques namely Fuzzy-Analytic Hierarchy Process (F-AHP) and Fuzzy-Analytic Network Process (F-ANP) to determine the severity of severely impacted information security measures.","PeriodicalId":509313,"journal":{"name":"Journal of Intelligent & Fuzzy Systems","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Intelligent & Fuzzy Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3233/jifs-233759","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sector to industrial and commercial systems. The rapid expansion and widespread use of IoT devices highlight the critical significance of solid and effective cybersecurity standards across the device development life cycle. Therefore, if vulnerability is exploited directly affects the IoT device and the applications. In this paper we investigated and assessed the various real-world critical IoT attacks/vulnerabilities that have affected IoT deployed in the commercial, industrial and consumer sectors since 2010. Subsequently, we evoke the vulnerabilities or type of attack, exploitation techniques, compromised security factors, intensity of vulnerability and impacts of the expounded real-world attacks/vulnerabilities. We first categorise how each attack affects information security parameters, and then we provide a taxonomy based on the security factors that are affected. Next, we perform a risk assessment of the security parameters that are encountered, using two well-known multi-criteria decision-making (MCDM) techniques namely Fuzzy-Analytic Hierarchy Process (F-AHP) and Fuzzy-Analytic Network Process (F-ANP) to determine the severity of severely impacted information security measures.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
对用于物联网安全评估的进化计算方法的实证分析
物联网(IoT)战略使物理对象能够轻松地生产、接收和交换数据。物联网设备在我们的日常生活中越来越常见,应用范围从消费领域到工业和商业系统。物联网设备的快速扩展和广泛应用凸显了在设备开发生命周期中制定可靠有效的网络安全标准的重要意义。因此,如果漏洞被利用,将直接影响物联网设备和应用程序。在本文中,我们调查并评估了自 2010 年以来影响商业、工业和消费领域部署的物联网的各种真实世界关键物联网攻击/漏洞。随后,我们唤起了所阐述的真实世界攻击/漏洞的漏洞或攻击类型、利用技术、受损安全因素、漏洞强度和影响。我们首先对每种攻击如何影响信息安全参数进行分类,然后根据受影响的安全因素进行分类。接下来,我们使用两种著名的多标准决策(MCDM)技术,即模糊分析层次过程(F-AHP)和模糊分析网络过程(F-ANP),对所遇到的安全参数进行风险评估,以确定受到严重影响的信息安全措施的严重程度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Data-driven control of a five-bar parallel robot with compliant joints CycleGAN generated pneumonia chest x-ray images: Evaluation with vision transformer Robust image registration for analysis of multisource eye fundus images An efficient two-heuristic algorithm for the student-project allocation with preferences over projects Dynamic task scheduling in edge cloud systems using deep recurrent neural networks and environment learning approaches
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1