Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices

IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the followin...

Full description

Bibliographic Details
Main Authors: Roberto Omar Andrade, Sang Guun Yoo, Iván Ortiz-Garces, Jhonattan Barriga
Format: Article
Language:English
Published: MDPI AG 2022-03-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/12/6/2976
_version_ 1797447168893648896
author Roberto Omar Andrade
Sang Guun Yoo
Iván Ortiz-Garces
Jhonattan Barriga
author_facet Roberto Omar Andrade
Sang Guun Yoo
Iván Ortiz-Garces
Jhonattan Barriga
author_sort Roberto Omar Andrade
collection DOAJ
description IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be considered within risk assessment methodologies? We have addressed our study with a 4-phase design-research methodology (DRM) that allows us, based on systematic literature review, to experiment and draw upon expert judgment; as a final product, we obtain a risk assessment methodology based on the characteristics of IoT devices. At the end of this study, we establish seven main constructs—Organization, Risk Behaviors, Dependency, Attack Surface, Susceptibility, Severity and Uncertainty—over which security risk in IoT systems can be evaluated.
first_indexed 2024-03-09T13:51:00Z
format Article
id doaj.art-4d128bbab64048cbaf84a425d88c15b2
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-09T13:51:00Z
publishDate 2022-03-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-4d128bbab64048cbaf84a425d88c15b22023-11-30T20:49:35ZengMDPI AGApplied Sciences2076-34172022-03-01126297610.3390/app12062976Security Risk Analysis in IoT Systems through Factor Identification over IoT DevicesRoberto Omar Andrade0Sang Guun Yoo1Iván Ortiz-Garces2Jhonattan Barriga3Escuela Politécnica Nacional, Facultad de Ingeniería de Sistemas, Quito 170525, EcuadorEscuela Politécnica Nacional, Facultad de Ingeniería de Sistemas, Quito 170525, EcuadorEscuela de Ingeniería en Tecnologías de la Información, FICA (Facultad de Ingenierías y Ciencias Aplicadas), Universidad de Las Américas, Quito 170125, EcuadorEscuela Politécnica Nacional, Facultad de Ingeniería de Sistemas, Quito 170525, EcuadorIoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be considered within risk assessment methodologies? We have addressed our study with a 4-phase design-research methodology (DRM) that allows us, based on systematic literature review, to experiment and draw upon expert judgment; as a final product, we obtain a risk assessment methodology based on the characteristics of IoT devices. At the end of this study, we establish seven main constructs—Organization, Risk Behaviors, Dependency, Attack Surface, Susceptibility, Severity and Uncertainty—over which security risk in IoT systems can be evaluated.https://www.mdpi.com/2076-3417/12/6/2976IoT securityrisk analysisattack graphssecurity modeling
spellingShingle Roberto Omar Andrade
Sang Guun Yoo
Iván Ortiz-Garces
Jhonattan Barriga
Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
Applied Sciences
IoT security
risk analysis
attack graphs
security modeling
title Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
title_full Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
title_fullStr Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
title_full_unstemmed Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
title_short Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices
title_sort security risk analysis in iot systems through factor identification over iot devices
topic IoT security
risk analysis
attack graphs
security modeling
url https://www.mdpi.com/2076-3417/12/6/2976
work_keys_str_mv AT robertoomarandrade securityriskanalysisiniotsystemsthroughfactoridentificationoveriotdevices
AT sangguunyoo securityriskanalysisiniotsystemsthroughfactoridentificationoveriotdevices
AT ivanortizgarces securityriskanalysisiniotsystemsthroughfactoridentificationoveriotdevices
AT jhonattanbarriga securityriskanalysisiniotsystemsthroughfactoridentificationoveriotdevices