Author:
Najat Rafalia,Haitam Ettazi,Jaafar Abouchabaka
Abstract
The Internet of Things (IoT) is a rapidly evolving environment that allows users to use and control a wide variety of connected objects. The 20 billion IoT devices that will be employed by 2020 are only the top of the iceberg. According to IDC, the overall amount of connected devices will rise to 41.6 billion over the next five years, producing over 80 Zettabytes of data by 2025 which will impact environment severely. These connected environments increase the attack surface of a system since; the risks are multiplied by the number of connected devices. These devices are responsible for more or less critical tasks, and can therefore be the target of users malicious, in this paper we present a methodology to evaluate the security of IoT systems. We propose a way to represent IoT systems, coupled with attack trees in order to assess the chances of success of an attack on a given system.
Reference12 articles.
1. Atzoria L, Ieraauthor vitae, g. morabito “the internet of things: A survey, (2010)
2. Burch J.R., Clarke E.M., McMillan K.L., Dill D.L.: Sequential circuit verification using symbolic model checking. In: 27th ACM/IEEE Design Automation Conference. pp. 46–51. IEEE (1990)
3. Cacciagrano D.R., Culmone R.: Formal semantics of an iot-specific language. In 2018 32nd International Conference on Advanced Information Networking and Applications Workshops (WAINA). pp. 579–584. IEEE (2018)
4. Caltagirone S., Pendergast A., Betz C.: The diamond model of intrusion analysis. Tech. rep., Center For Cyber Intelligence Analysis and Threat Research Hanover Md (2013)
5. Jacobs K.: Session details: Book review of Jacobs K. (ed.), Information technology standards and standardization: A global perspective, European Journal of Information Systems (2001)