Vis enkel innførsel

dc.contributor.authorKavallieratos, Georgios
dc.contributor.authorChowdhury, Nabin
dc.contributor.authorKatsikas, Sokratis
dc.contributor.authorGkioulos, Vasileios
dc.contributor.authorWolthusen, Stephen
dc.date.accessioned2020-02-11T08:12:07Z
dc.date.available2020-02-11T08:12:07Z
dc.date.created2019-10-04T11:45:22Z
dc.date.issued2019
dc.identifier.citationFuture Internet. 2019, 11 (10), .nb_NO
dc.identifier.issn1999-5903
dc.identifier.urihttp://hdl.handle.net/11250/2640913
dc.description.abstractThe development and deployment of highly dynamic, cyber+connected operational environments, such as smart homes, smart cities, and smart transportation systems, is increasing. The security analysis of such dynamic environments necessitates the use of dynamic risk assessment methodologies and the modeling of dynamically changing states. In this paper, we focus on the smart home environment, where the deployment of IoT devices increase the attack surface. We examine existing dynamic risk assessment methodologies, and by leveraging a smart home reference architecture we identify the security risks of a smart home’s physical and communication viewpoints, taking into consideration also dynamic operational aspects. Further, we develop a smart home network topology generator and a graph-based attack model to study dependencies among dynamically changing states and the propagation of a malware infection.nb_NO
dc.language.isoengnb_NO
dc.publisherMDPInb_NO
dc.rightsNavngivelse 4.0 Internasjonal*
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/deed.no*
dc.titleThreat Analysis for Smart Homesnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionpublishedVersionnb_NO
dc.source.pagenumber19nb_NO
dc.source.volume11nb_NO
dc.source.journalFuture Internetnb_NO
dc.source.issue10nb_NO
dc.identifier.doi10.3390/fi11100207
dc.identifier.cristin1733893
dc.description.localcodeThis is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly citednb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextoriginal
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel

Navngivelse 4.0 Internasjonal
Med mindre annet er angitt, så er denne innførselen lisensiert som Navngivelse 4.0 Internasjonal