introduction The increasing use of the cyber space has posed major threats. It is therefore significant to come up with various ways of curbing the threat posed. The threats include, cyber terrorism, viruses, malware, attacks and several others.
The Internet of Things (IoT) The Internet of Things (IoT) has made the various physical objects become addressable, reachable and locatable within the virtual world. The IoT is therefore expected to contains billions of different objects that keeps on communicating with each other. The objects include laptops and computers as well as other physical devices.
Cont… The technologies and heterogeneity of the devices used to provide services have grave impact on management, and operations of IoT devices. Therefore, major attacks and threats are facing IoT that effects its functionality
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Cont… Therefore, major attacks and threats are facing IoT that effects its functionality. The paper sought to curb threats and attack provide adequate security to IoT. The paper incorporates graphical security model assess and model security of IoT.
Objectives The paper sought to; Come up with a framework for the assessment and modelling of the IoT. Develop graphical model aimed at computing the attack scenarios. Formally define the framework Evaluate the framework by using three different scenarios.
Related study The closely related study that had been carried out was done by Ge and Kim in the year 2015. study designed the framework used and incorporated a two-layer geographical security model referred to as the HARM assist in finding the potential attack scenarios.
Paper Review Cont’ established the extended HARM has the ability of capturing attack paths within the heterogeneous IoT networks. the framework has the ability to capture attack Under provision of; network reachability network information, and vulnerability information is provided,
Major challenge Major challenge with this paper is the fact that it lacks a mobility model. The movement of the devices influences the changing network and so the mobility model should have been designed to facilitate capturing of the node movement within the network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Phases of framework The paper has discussed framework for the graphically modelling and the assessment of IoT security Five phases; Security modelling generation Data processing security analysis Security visualization Model updates
Findings The study has come up with security evaluator and security model generator. The security model generator is meant to create IoT network Based on node vulnerability information and reachability information Further, it makes analysis of the networks by the use of different security metrics possible.
Three Different Networks The paper has introduced three different networks They exist in three different scenarios; Healthcare monitoring. Smart home. Environmental sensing and an evaluation carried out.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Results Paper analysis: the person makes decisions regarding internet security ability to establish most vulnerable part of the whole network assess the efficiency of the various defense mechanisms.
Conclusion The study allows the person to choose the most appropriate way of protecting the network. It is therefore, a major milestone in the mitigation of the impact of the potential attacks.
Reference Mengmeng G, Jin, B. H., Walter, G. & Dong, S. K. (2017). A framework for automating security analysis of the internet of things. Journal of Network and Computer Applications 83, 12–27.