[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Security Risk Assessment for Miniature Internet of Thing Systems with 5G

  • Conference paper
  • First Online:
5G for Future Wireless Networks (5GWN 2019)

Abstract

In order to improve the traditional analytic hierarchy process method, information entropy and interval fuzzy number are introduced to AHP respectively on the weight of the hierarchy and the weight of the index. The effectiveness of the improved method is tested by a Simulation example which is based on risk assessment index system of miniature Internet of things system. Meanwhile, 5G as the fifth generation of mobile communication technology, will be widely used in entertainment, health care, education and autonomous driving. It will extend the capabilities of various applications on our personal devices and wearable devices will fill every corner of our lives by the application with miniature Internet of thing systems. At the same time, 5G also faces the threat of information security risk, which is our paper concerned.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 29.99
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 37.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Feng, J.Y., Liu, Z., Wu, C., Ji, Y.S.: Mobile edge computing for internet of vehicles: offloading framework and job scheduling. IEEE Veh. Technol. Mag. 14(1), 28–36 (2019)

    Article  Google Scholar 

  2. Perera, C., Zaslavsky, A., Christen, P., Georgakopoulos, D.: Sensing as a service model for smart cities supported by Internet of Things. Trans. Emerg. Telecommun. Technol. 25(1), 81–93 (2014)

    Article  Google Scholar 

  3. Wang, X., Liu, Z., Gao, Y., Zheng, X., Chen, X., Wu, C.: Near-optimal data structure for approximate range emptiness problem in information-centric Internet of Things. IEEE Access 7, 21857–21869 (2019)

    Article  Google Scholar 

  4. Marett, K., Vedadi, A., Durcikova, A.: A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80, 25–35 (2019)

    Article  Google Scholar 

  5. Mohsin, M., Sardar, M.U., Hasan, O., Anwar, Z.: IoTRiskAnalyzer: a probabilistic model checking based framework for formal risk analytics of the Internet of Things. IEEE Access 5, 5494–5505 (2017)

    Article  Google Scholar 

  6. Toch, E., et al.: The privacy implications of cyber security systems: a technological survey. ACM Comput. Surv. 51(2), 36:1–27 (2018)

    Article  Google Scholar 

  7. Radanliev, P., et al.: Future developments in cyber risk assessment for the internet of things. Comput. Ind. 102, 14–22 (2018)

    Article  Google Scholar 

  8. Wu, C., Liu, Z., Zhang, D., Yoshinaga, T., Ji, Y.S.: Spatial intelligence toward trustworthy vehicular IoT. IEEE Commun. Mag. 56(10), 22–27 (2018)

    Article  Google Scholar 

  9. Li, Y.Q., Dai, W.K., Bai, J., Gan, X.Y., Wang, J.C., Wang, X.B.: An intelligence-driven security-aware defense mechanism for advanced persistent threats. IEEE Trans. Inf. Forensics Secur. 14(3), 646–661 (2019)

    Article  Google Scholar 

  10. Cheminod, M., Durante, L., Valenzano, A.: Review of security issues in industrial networks. IEEE Trans. Industr. Inf. 9(1), 277–293 (2013)

    Article  Google Scholar 

  11. Codetta-Raiteri, D., Portinale, L.: Decision networks for security risk assessment of critical infrastructures. ACM Trans. Internet Technol. 18(3), 29:1–22 (2018)

    Article  Google Scholar 

  12. Zou, Y.L., Wang, X.B., Shen, W.M., Hanzo, L.: Security versus reliability analysis of opportunistic relaying. IEEE Trans. Veh. Technol. 63(6), 2653–2661 (2014)

    Article  Google Scholar 

  13. Bandyopadhyay, D., Sen, J.: Internet of Things: applications and challenges in technology and standardization. Wirel. Pers. Commun. 58(1), 49–69 (2011)

    Article  Google Scholar 

  14. Xu, D.Y., Ren, P.Y., Ritcey, J.A.: Independence-checking coding for OFDM channel training authentication: protocol design, security, stability, and tradeoff analysis. IEEE Trans. Inf. Forensics Secur. 14(2), 387–402 (2019)

    Article  Google Scholar 

  15. Martens, B., Teuteberg, F.: Decision-making in cloud computing environments: a cost and risk based approach. Inf. Syst. Front. 14(4), 871–893 (2012)

    Article  Google Scholar 

  16. Jacobsson, A., Boldt, M., Carlsson, B.: A risk analysis of a smart home automation system. Future Gener. Comput. Syst. Int. J. Escience 56, 719–733 (2016)

    Article  Google Scholar 

  17. Deypir, M., Horri, A.: Instance based security risk value estimation for Android applications. J. Inf. Secur. Appl. 40, 20–30 (2018)

    Google Scholar 

  18. Gritzalis, D., Iseppi, G., Mylonas, A., Stavrou, V.: Exiting the risk assessment maze: a meta-survey. ACM Comput. Surv. 51(1), 11:1–30 (2018)

    Article  Google Scholar 

  19. Xu, N., Zhao, D.M.: the research of information security risk assessment method based on AHP. In: Wu, Y.W. (ed.) Sports Materials, Modelling and Simulation, vol. 187, pp. 575–580. Trans Tech Publications Ltd., Stafa-Zurich (2011)

    Google Scholar 

Download references

Acknowledgement

The research is supported by National Natural Science Foundation of China(Grant No. 51874300), the National Natural Science Foundation of China and Shanxi Provincial People’s Government Jointly Funded Project of China for Coal Base and Low Carbon (Grant No. U1510115), National Natural Science Foundation of China (Grant Nos. 51874299, 51104157), the Qing Lan Project, the China Postdoctoral Science Foundation (Grant No. 2013T60574), the Ph.D. Programs Foundation of Ministry of Education of China (Grant No. 20110095120008) and the China Postdoctoral Science Foundation (Grant No. 20100481181).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Fangming Bi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chen, W., Wang, L., Bi, F., Tang, C., Li, S. (2019). Security Risk Assessment for Miniature Internet of Thing Systems with 5G. In: Leung, V., Zhang, H., Hu, X., Liu, Q., Liu, Z. (eds) 5G for Future Wireless Networks. 5GWN 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 278. Springer, Cham. https://doi.org/10.1007/978-3-030-17513-9_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-17513-9_12

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-17512-2

  • Online ISBN: 978-3-030-17513-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics