Hybrid IoT Cyber Range

Author:

Balto Karl Edvard1,Yamin Muhammad Mudassar1ORCID,Shalaginov Andrii2,Katt Basel1ORCID

Affiliation:

1. Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2815 Gjøvik, Norway

2. School of Economics, Innovation and Technology, Kristiania University College, Kirkegata 24-26, 0153 Oslo, Norway

Abstract

The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements.

Funder

ASCERT

Publisher

MDPI AG

Subject

Electrical and Electronic Engineering,Biochemistry,Instrumentation,Atomic and Molecular Physics, and Optics,Analytical Chemistry

Reference46 articles.

1. NIST National Initiative for Cybersecurity Education (NICE) (2017). NICE One Pager for Cyber Ranges, NIST.

2. Cyber ranges and security testbeds: Scenarios, functions, tools and architecture;Yamin;Comput. Secur.,2020

3. Seljeseth, M., Yamin, M.M., and Katt, B. (2020). UIOT-FMT: A Universal format for collection and aggregation of data from smart devices. Sensors, 20.

4. (2022, May 04). 49 Stunning Internet of Things Statistics 2022 [The Rise Of IoT]. Available online: https://techjury.net/blog/internet-of-things-statistics/.

5. The Mirai Botnet and the Importance of IoT Device Security;Latifi;16th International Conference on Information Technology-New Generations (ITNG 2019),2019

Cited by 2 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3