Quantifying IoT Security Parameters: An Assessment Framework

被引:5
作者
Ebad, Shouki A. [1 ]
机构
[1] Northern Border Univ, Fac Sci, Dept Comp Sci, Ar Ar 91431, Saudi Arabia
关键词
IoT; metrics; security; measurement; blockchain; framework; DATA-COLLECTION SCHEME; INTERNET; CLOUD;
D O I
10.1109/ACCESS.2023.3313975
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Several attempts have been made to propose metrics that quantify the parameters of existing solutions to improve the security of IoT systems. This paper presents a framework to classify and compare these metrics based on a set of attributes that can be used to answer the research questions. Forty-six metrics from the literature were analyzed, classified, and compared according to the developed framework. They were divided into two main categories according to the metric's source, i.e., internal and external sources. Then, they were further divided into seven sub-categories: size, time, numbering/scoring, checklist, blockchain, device integration effort, and legislation. There are eight widely used metrics among the existing IoT solutions: throughput, packet loss rate, jitter, password, security transmission rate, resilience, average energy consumption, and blockchain-related metrics (i.e., technical metrics). The simulation technique is the most common validation method among the current IoT solutions. Furthermore, the results revealed a gap in four aspects of proposing metrics for measuring security parameters. These aspects include the network/transport IoT layer, blockchain, legislation, and the use of data science in simulation research methodologies.
引用
收藏
页码:101087 / 101097
页数:11
相关论文
共 50 条
[41]   Software Defined Network Security Framework for IoT based Smart Home and City Applications [J].
Wang, Song ;
Gomez, Karina Mabell ;
Sithamparanathan, Kandeepan ;
Zanna, Paul .
2019 13TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATION SYSTEMS (ICSPCS), 2019,
[42]   Face Occlusion Recognition With Deep Learning in Security Framework for the IoT [J].
Mao, Li ;
Sheng, Fusheng ;
Zhang, Tao .
IEEE ACCESS, 2019, 7 :174531-174540
[43]   Proposed IoT Framework using Third Party with Enhanced Security [J].
Naru, Effy Raja ;
Saini, Hemraj ;
Rathee, Geetanjali .
PROCEEDINGS OF 4TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMPUTING AND CONTROL (ISPCC 2K17), 2017, :621-626
[44]   Security risk assessment in IoT environments: A taxonomy and survey [J].
Waqdan, Mofareh ;
Louafi, Habib ;
Mouhoub, Malek .
COMPUTERS & SECURITY, 2025, 154
[45]   Security and Privacy for Mobile IoT Applications Using Blockchain [J].
Carvalho, Kevin ;
Granjal, Jorge .
SENSORS, 2021, 21 (17)
[46]   Content Caching in Industrial IoT: Security and Energy Considerations [J].
Zahed, M. Ishtiaque Aziz ;
Ahmad, Iftekhar ;
Habibi, Daryoush ;
Quoc Viet Phung .
IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (01) :491-504
[47]   Towards the Open Ontology for IoT Ecosystem's Security [J].
Tomicic, Igor ;
Grd, Petra .
2020 43RD INTERNATIONAL CONVENTION ON INFORMATION, COMMUNICATION AND ELECTRONIC TECHNOLOGY (MIPRO 2020), 2020, :1064-1069
[48]   Security Using Blockchain in IoT-Based System [J].
Suman .
THIRD CONGRESS ON INTELLIGENT SYSTEMS, CIS 2022, VOL 1, 2023, 608 :311-326
[49]   Opinion: Security Lifetime Labels - Overcoming Information Asymmetry in Security of IoT Consumer Products [J].
Morgner, Philipp ;
Freiling, Felix ;
Benenson, Zinaida .
WISEC'18: PROCEEDINGS OF THE 11TH ACM CONFERENCE ON SECURITY & PRIVACY IN WIRELESS AND MOBILE NETWORKS, 2018, :208-211
[50]   A Lightweight Blockchain Based Framework for Underwater IoT [J].
Uddin, Md Ashraf ;
Stranieri, Andrew ;
Gondal, Iqbal ;
Balasurbramanian, Venki .
ELECTRONICS, 2019, 8 (12)