{"title":"HiRAM:分级风险评估模型及其在云中的工业物联网实施","authors":"Wen-Lin Sun, Ying-Han Tang, Yu-Lun Huang","doi":"10.1002/stvr.1847","DOIUrl":null,"url":null,"abstract":"The trend towards intelligent control processes has introduced the Internet of Things (IoT) and cloud computing technologies to factories. IoT devices can sense data and send it to a cloud for further analysis in a factory. Consequently, the quantity of such valuable data flowing in an industrial cyber‐physical system has gradually increased. Tailoring a risk assessment system for Industrial IoT (IIoT) is essential, particularly for a cloud platform that handles the IIoT data flow. In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform. The proposed model allows the platform to self‐evaluate its security status. Furthermore, a modular and responsive Risk Assessment System based on HiRAM, called HiRAM‐RAS, is realized and evaluated in a real‐world IIoT cloud platform. We deploy HiRAM‐RAS to a sample application and introduce the practical deployment procedures. We then estimate the practicality of the HiRAM‐RAS by injecting different degrees of errors and launching Distributed denial‐of‐service (DDoS) attacks. The results demonstrate the changes in integrity and availability scores evaluated by HiRAM.","PeriodicalId":49506,"journal":{"name":"Software Testing Verification & Reliability","volume":"170 1","pages":""},"PeriodicalIF":1.5000,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud\",\"authors\":\"Wen-Lin Sun, Ying-Han Tang, Yu-Lun Huang\",\"doi\":\"10.1002/stvr.1847\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The trend towards intelligent control processes has introduced the Internet of Things (IoT) and cloud computing technologies to factories. IoT devices can sense data and send it to a cloud for further analysis in a factory. Consequently, the quantity of such valuable data flowing in an industrial cyber‐physical system has gradually increased. Tailoring a risk assessment system for Industrial IoT (IIoT) is essential, particularly for a cloud platform that handles the IIoT data flow. In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform. The proposed model allows the platform to self‐evaluate its security status. Furthermore, a modular and responsive Risk Assessment System based on HiRAM, called HiRAM‐RAS, is realized and evaluated in a real‐world IIoT cloud platform. We deploy HiRAM‐RAS to a sample application and introduce the practical deployment procedures. We then estimate the practicality of the HiRAM‐RAS by injecting different degrees of errors and launching Distributed denial‐of‐service (DDoS) attacks. The results demonstrate the changes in integrity and availability scores evaluated by HiRAM.\",\"PeriodicalId\":49506,\"journal\":{\"name\":\"Software Testing Verification & Reliability\",\"volume\":\"170 1\",\"pages\":\"\"},\"PeriodicalIF\":1.5000,\"publicationDate\":\"2023-05-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Software Testing Verification & Reliability\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1002/stvr.1847\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, SOFTWARE ENGINEERING\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Software Testing Verification & Reliability","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1002/stvr.1847","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, SOFTWARE ENGINEERING","Score":null,"Total":0}
HiRAM: A hierarchical risk assessment model and its implementation for an industrial Internet of Things in the cloud
The trend towards intelligent control processes has introduced the Internet of Things (IoT) and cloud computing technologies to factories. IoT devices can sense data and send it to a cloud for further analysis in a factory. Consequently, the quantity of such valuable data flowing in an industrial cyber‐physical system has gradually increased. Tailoring a risk assessment system for Industrial IoT (IIoT) is essential, particularly for a cloud platform that handles the IIoT data flow. In this study, we leverage analytic hierarchy processes (AHPs) and propose Hierarchical Risk Assessment Model (HiRAM) for an IIoT cloud platform. The proposed model allows the platform to self‐evaluate its security status. Furthermore, a modular and responsive Risk Assessment System based on HiRAM, called HiRAM‐RAS, is realized and evaluated in a real‐world IIoT cloud platform. We deploy HiRAM‐RAS to a sample application and introduce the practical deployment procedures. We then estimate the practicality of the HiRAM‐RAS by injecting different degrees of errors and launching Distributed denial‐of‐service (DDoS) attacks. The results demonstrate the changes in integrity and availability scores evaluated by HiRAM.
期刊介绍:
The journal is the premier outlet for research results on the subjects of testing, verification and reliability. Readers will find useful research on issues pertaining to building better software and evaluating it.
The journal is unique in its emphasis on theoretical foundations and applications to real-world software development. The balance of theory, empirical work, and practical applications provide readers with better techniques for testing, verifying and improving the reliability of software.
The journal targets researchers, practitioners, educators and students that have a vested interest in results generated by high-quality testing, verification and reliability modeling and evaluation of software. Topics of special interest include, but are not limited to:
-New criteria for software testing and verification
-Application of existing software testing and verification techniques to new types of software, including web applications, web services, embedded software, aspect-oriented software, and software architectures
-Model based testing
-Formal verification techniques such as model-checking
-Comparison of testing and verification techniques
-Measurement of and metrics for testing, verification and reliability
-Industrial experience with cutting edge techniques
-Descriptions and evaluations of commercial and open-source software testing tools
-Reliability modeling, measurement and application
-Testing and verification of software security
-Automated test data generation
-Process issues and methods
-Non-functional testing