Security Analysis of IoT Networks: Framework and Evaluation

Verified

Added on  2021/05/30

|16
|620
|41
Report
AI Summary
This report provides an in-depth analysis of IoT security, focusing on the development and evaluation of a security framework. The study aims to address the increasing threats in the cyber space, including cyber terrorism and malware, by creating a graphical model to assess and model IoT security. The report details the framework's five phases: security modeling generation, data processing, security analysis, security visualization, and model updates. The framework is evaluated through three scenarios: healthcare monitoring, smart home, and environmental sensing. The research builds upon previous studies and includes a security evaluator and security model generator. The report highlights the framework's ability to identify vulnerable points in the network and assess defense mechanisms, ultimately providing insights into the most appropriate ways to protect IoT networks. A major challenge identified is the lack of a mobility model to account for device movements within the network. The report also references a related study by Ge and Kim (2017), which designed a two-layer geographical security model, HARM, to identify potential attack scenarios.
Document Page
Paper Review
Student’s Name:
Professor’s Name:
Course:
Date:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
introduction
The increasing use of the cyber space has
posed major threats.
It is therefore significant to come up with
various ways of curbing the threat posed.
The threats include, cyber terrorism,
viruses, malware, attacks and several
others.
Document Page
The Internet of Things (IoT)
The Internet of Things (IoT) has made the various
physical objects become addressable, reachable and
locatable within the virtual world.
The IoT is therefore expected to contains billions of
different objects that keeps on communicating with
each other.
The objects include laptops and computers as well as
other physical devices.
Document Page
Cont…
The technologies and heterogeneity of the devices
used to provide services have grave impact on
management, and
operations of IoT devices.
Therefore, major attacks and threats are facing IoT
that effects its functionality
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Cont…
Therefore, major attacks and threats are
facing IoT that effects its functionality.
The paper sought to curb threats and attack
provide adequate security to IoT.
The paper incorporates graphical security
model
assess and model security of IoT.
Document Page
Objectives
The paper sought to;
Come up with a framework for the assessment and
modelling of the IoT.
Develop graphical model aimed at computing the attack
scenarios.
Formally define the framework
Evaluate the framework by using three different scenarios.
Document Page
Cont…
The scenarios include:
wearable healthcare monitoring
A smart home
Environment monitoring.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Related study
The closely related study that had been carried out
was done by Ge and Kim in the year 2015.
study designed the framework
used and incorporated a two-layer geographical
security model
referred to as the HARM
assist in finding the potential attack scenarios.
Document Page
Paper Review Cont’
established the extended HARM
has the ability of capturing attack paths within
the heterogeneous IoT networks.
the framework has the ability to capture attack
Under provision of;
network reachability
network information, and
vulnerability information is provided,
Document Page
Major challenge
Major challenge with this paper is the fact
that it lacks a mobility model.
The movement of the devices influences the
changing network and so the mobility
model should have been designed to
facilitate capturing of the node movement
within the network.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Phases of framework
The paper has discussed framework for the graphically
modelling and the assessment of IoT security
Five phases;
Security modelling generation
Data processing
security analysis
Security visualization
Model updates
Document Page
Findings
The study has come up with security evaluator and
security model generator.
The security model generator is meant to create IoT
network
Based on node vulnerability information and
reachability information
Further, it makes analysis of the networks by the use
of different security metrics possible.
chevron_up_icon
1 out of 16
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]