Paper
22 May 2023 Security risk assessment for distribution Internet of Things
Jiaxuan Fei, Qigui Yao, Shuai Li, Shenjian Qiu
Author Affiliations +
Proceedings Volume 12640, International Conference on Internet of Things and Machine Learning (IoTML 2022); 126400N (2023) https://doi.org/10.1117/12.2673509
Event: International Conference on Internet of Things and Machine Learning (IoTML 2022), 2022, Harbin, China
Abstract
Aiming at the characteristics of complex business scenarios and sensitive data of distribution IoT, this project proposes a security risk assessment method for distribution IoT based on the analysis hierarchy process, which assesses the security of distribution IoT in terms of hardware, system, application and data. First, according to the characteristics and business scenarios of distribution IoT, the security status is divided into two parts: self-security and security control to ensure the integrity of the analysis. Based on the analysis results, typical security threats of different types of devices are extracted; secondly, based on the security threat analysis results, a security index system is designed and proposed from the perspective of defense and response of distribution IoT, and the index system is classified and quantified to form numerical information that can support the security assessment; thirdly, based on the analysis hierarchy process and fuzzy comprehensive analysis technology, the security risk assessment method of distribution IoT is formed Finally, the effectiveness of the proposed security assessment method is demonstrated by selecting the actual application scenarios of the distribution IoT.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Jiaxuan Fei, Qigui Yao, Shuai Li, and Shenjian Qiu "Security risk assessment for distribution Internet of Things", Proc. SPIE 12640, International Conference on Internet of Things and Machine Learning (IoTML 2022), 126400N (22 May 2023); https://doi.org/10.1117/12.2673509
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Risk assessment

Internet of things

Information security

Network security

Computer security

Control systems

Telecommunications

Back to Top