Skip to main content

2019 | OriginalPaper | Buchkapitel

Security Risk Assessment for Miniature Internet of Thing Systems with 5G

verfasst von : Wei Chen, Lei Wang, Fangming Bi, Chaogang Tang, Senyu Li

Erschienen in: 5G for Future Wireless Networks

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In order to improve the traditional analytic hierarchy process method, information entropy and interval fuzzy number are introduced to AHP respectively on the weight of the hierarchy and the weight of the index. The effectiveness of the improved method is tested by a Simulation example which is based on risk assessment index system of miniature Internet of things system. Meanwhile, 5G as the fifth generation of mobile communication technology, will be widely used in entertainment, health care, education and autonomous driving. It will extend the capabilities of various applications on our personal devices and wearable devices will fill every corner of our lives by the application with miniature Internet of thing systems. At the same time, 5G also faces the threat of information security risk, which is our paper concerned.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Feng, J.Y., Liu, Z., Wu, C., Ji, Y.S.: Mobile edge computing for internet of vehicles: offloading framework and job scheduling. IEEE Veh. Technol. Mag. 14(1), 28–36 (2019)CrossRef Feng, J.Y., Liu, Z., Wu, C., Ji, Y.S.: Mobile edge computing for internet of vehicles: offloading framework and job scheduling. IEEE Veh. Technol. Mag. 14(1), 28–36 (2019)CrossRef
2.
Zurück zum Zitat Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecommun. Technol. 25(1), 81–93 (2014)CrossRef Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecommun. Technol. 25(1), 81–93 (2014)CrossRef
3.
Zurück zum Zitat Wang, X., Liu, Z., Gao, Y., Zheng, X., Chen, X., Wu, C.: Near-optimal data structure for approximate range emptiness problem in information-centric Internet of Things. IEEE Access 7, 21857–21869 (2019)CrossRef Wang, X., Liu, Z., Gao, Y., Zheng, X., Chen, X., Wu, C.: Near-optimal data structure for approximate range emptiness problem in information-centric Internet of Things. IEEE Access 7, 21857–21869 (2019)CrossRef
4.
Zurück zum Zitat Marett, K., Vedadi, A., Durcikova, A.: A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80, 25–35 (2019)CrossRef Marett, K., Vedadi, A., Durcikova, A.: A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80, 25–35 (2019)CrossRef
5.
Zurück zum Zitat Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)CrossRef Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)CrossRef
6.
Zurück zum Zitat Toch, E., et al.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 36:1–27 (2018)CrossRef Toch, E., et al.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 36:1–27 (2018)CrossRef
7.
Zurück zum Zitat Radanliev, P., et al.: Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102, 14–22 (2018)CrossRef Radanliev, P., et al.: Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102, 14–22 (2018)CrossRef
8.
Zurück zum Zitat Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., Ji, Y.S.: Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun. Mag. 56(10), 22–27 (2018)CrossRef Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., Ji, Y.S.: Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun. Mag. 56(10), 22–27 (2018)CrossRef
9.
Zurück zum Zitat Li, Y.Q., Dai, W.K., Bai, J., Gan, X.Y., Wang, J.C., Wang, X.B.: An intelligence-driven security-aware defense mechanism for advanced persistent threats. IEEE Trans. Inf. Forensics Secur. 14(3), 646–661 (2019)CrossRef Li, Y.Q., Dai, W.K., Bai, J., Gan, X.Y., Wang, J.C., Wang, X.B.: An intelligence-driven security-aware defense mechanism for advanced persistent threats. IEEE Trans. Inf. Forensics Secur. 14(3), 646–661 (2019)CrossRef
10.
Zurück zum Zitat Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)CrossRef Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)CrossRef
11.
Zurück zum Zitat Codetta-Raiteri, D., Portinale, L.: Decision networks for security risk assessment of critical infrastructures. ACM Trans. Internet Technol. 18(3), 29:1–22 (2018)CrossRef Codetta-Raiteri, D., Portinale, L.: Decision networks for security risk assessment of critical infrastructures. ACM Trans. Internet Technol. 18(3), 29:1–22 (2018)CrossRef
12.
Zurück zum Zitat Zou, Y.L., Wang, X.B., Shen, W.M., Hanzo, L.: Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63(6), 2653–2661 (2014)CrossRef Zou, Y.L., Wang, X.B., Shen, W.M., Hanzo, L.: Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63(6), 2653–2661 (2014)CrossRef
13.
Zurück zum Zitat Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)CrossRef Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)CrossRef
14.
Zurück zum Zitat Xu, D.Y., Ren, P.Y., Ritcey, J.A.: Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans. Inf. Forensics Secur. 14(2), 387–402 (2019)CrossRef Xu, D.Y., Ren, P.Y., Ritcey, J.A.: Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans. Inf. Forensics Secur. 14(2), 387–402 (2019)CrossRef
15.
Zurück zum Zitat Martens, B., Teuteberg, F.: Decision-making in cloud computing environments: a cost and risk based approach. Inf. Syst. Front. 14(4), 871–893 (2012)CrossRef Martens, B., Teuteberg, F.: Decision-making in cloud computing environments: a cost and risk based approach. Inf. Syst. Front. 14(4), 871–893 (2012)CrossRef
16.
Zurück zum Zitat Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Gener. Comput. Syst. Int. J. Escience 56, 719–733 (2016)CrossRef Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Gener. Comput. Syst. Int. J. Escience 56, 719–733 (2016)CrossRef
17.
Zurück zum Zitat Deypir, M., Horri, A.: Instance based security risk value estimation for Android applications. J. Inf. Secur. Appl. 40, 20–30 (2018) Deypir, M., Horri, A.: Instance based security risk value estimation for Android applications. J. Inf. Secur. Appl. 40, 20–30 (2018)
18.
Zurück zum Zitat Gritzalis, D., Iseppi, G., Mylonas, A., Stavrou, V.: Exiting the risk assessment maze: a meta-survey. ACM Comput. Surv. 51(1), 11:1–30 (2018)CrossRef Gritzalis, D., Iseppi, G., Mylonas, A., Stavrou, V.: Exiting the risk assessment maze: a meta-survey. ACM Comput. Surv. 51(1), 11:1–30 (2018)CrossRef
19.
Zurück zum Zitat Xu, N., Zhao, D.M.: the research of information security risk assessment method based on AHP. In: Wu, Y.W. (ed.) Sports Materials, Modelling and Simulation, vol. 187, pp. 575–580. Trans Tech Publications Ltd., Stafa-Zurich (2011) Xu, N., Zhao, D.M.: the research of information security risk assessment method based on AHP. In: Wu, Y.W. (ed.) Sports Materials, Modelling and Simulation, vol. 187, pp. 575–580. Trans Tech Publications Ltd., Stafa-Zurich (2011)
Metadaten
Titel
Security Risk Assessment for Miniature Internet of Thing Systems with 5G
verfasst von
Wei Chen
Lei Wang
Fangming Bi
Chaogang Tang
Senyu Li
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-17513-9_12

Premium Partner