Abstract
In order to improve the traditional analytic hierarchy process method, information entropy and interval fuzzy number are introduced to AHP respectively on the weight of the hierarchy and the weight of the index. The effectiveness of the improved method is tested by a Simulation example which is based on risk assessment index system of miniature Internet of things system. Meanwhile, 5G as the fifth generation of mobile communication technology, will be widely used in entertainment, health care, education and autonomous driving. It will extend the capabilities of various applications on our personal devices and wearable devices will fill every corner of our lives by the application with miniature Internet of thing systems. At the same time, 5G also faces the threat of information security risk, which is our paper concerned.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Feng, J.Y., Liu, Z., Wu, C., Ji, Y.S.: Mobile edge computing for internet of vehicles: offloading framework and job scheduling. IEEE Veh. Technol. Mag. 14(1), 28–36 (2019)
Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecommun. Technol. 25(1), 81–93 (2014)
Wang, X., Liu, Z., Gao, Y., Zheng, X., Chen, X., Wu, C.: Near-optimal data structure for approximate range emptiness problem in information-centric Internet of Things. IEEE Access 7, 21857–21869 (2019)
Marett, K., Vedadi, A., Durcikova, A.: A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80, 25–35 (2019)
Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)
Toch, E., et al.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 36:1–27 (2018)
Radanliev, P., et al.: Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102, 14–22 (2018)
Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., Ji, Y.S.: Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun. Mag. 56(10), 22–27 (2018)
Li, Y.Q., Dai, W.K., Bai, J., Gan, X.Y., Wang, J.C., Wang, X.B.: An intelligence-driven security-aware defense mechanism for advanced persistent threats. IEEE Trans. Inf. Forensics Secur. 14(3), 646–661 (2019)
Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)
Codetta-Raiteri, D., Portinale, L.: Decision networks for security risk assessment of critical infrastructures. ACM Trans. Internet Technol. 18(3), 29:1–22 (2018)
Zou, Y.L., Wang, X.B., Shen, W.M., Hanzo, L.: Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63(6), 2653–2661 (2014)
Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)
Xu, D.Y., Ren, P.Y., Ritcey, J.A.: Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans. Inf. Forensics Secur. 14(2), 387–402 (2019)
Martens, B., Teuteberg, F.: Decision-making in cloud computing environments: a cost and risk based approach. Inf. Syst. Front. 14(4), 871–893 (2012)
Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Gener. Comput. Syst. Int. J. Escience 56, 719–733 (2016)
Deypir, M., Horri, A.: Instance based security risk value estimation for Android applications. J. Inf. Secur. Appl. 40, 20–30 (2018)
Gritzalis, D., Iseppi, G., Mylonas, A., Stavrou, V.: Exiting the risk assessment maze: a meta-survey. ACM Comput. Surv. 51(1), 11:1–30 (2018)
Xu, N., Zhao, D.M.: the research of information security risk assessment method based on AHP. In: Wu, Y.W. (ed.) Sports Materials, Modelling and Simulation, vol. 187, pp. 575–580. Trans Tech Publications Ltd., Stafa-Zurich (2011)
Acknowledgement
The research is supported by National Natural Science Foundation of China(Grant No. 51874300), the National Natural Science Foundation of China and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115), National Natural Science Foundation of China (Grant Nos. 51874299, 51104157), the Qing Lan Project, the China Postdoctoral Science Foundation (Grant No. 2013T60574), the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20110095120008) and the China Postdoctoral Science Foundation (Grant No. 20100481181).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Chen, W., Wang, L., Bi, F., Tang, C., Li, S. (2019). Security Risk Assessment for Miniature Internet of Thing Systems with 5G. In: Leung, V., Zhang, H., Hu, X., Liu, Q., Liu, Z. (eds) 5G for Future Wireless Networks. 5GWN 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 278. Springer, Cham. https://doi.org/10.1007/978-3-030-17513-9_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-17513-9_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-17512-2
Online ISBN: 978-3-030-17513-9
eBook Packages: Computer ScienceComputer Science (R0)