Modified graph-based algorithm to analyze security threats in IoT
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...
Uloženo v:
| Vydáno v: | PeerJ. Computer science Ročník 9; s. e1743 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
United States
PeerJ. Ltd
08.12.2023
PeerJ, Inc PeerJ Inc |
| Témata: | |
| ISSN: | 2376-5992, 2376-5992 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Abstract | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions
via
the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. |
|---|---|
| AbstractList | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions
via
the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. |
| ArticleNumber | e1743 |
| Audience | Academic |
| Author | Akleylek, Sedat Arat, Ferhat |
| Author_xml | – sequence: 1 givenname: Ferhat orcidid: 0000-0002-4347-0016 surname: Arat fullname: Arat, Ferhat organization: Department of Software Engineering, Samsun University, Samsun, Turkey – sequence: 2 givenname: Sedat orcidid: 0000-0001-7005-6489 surname: Akleylek fullname: Akleylek, Sedat organization: Department of Computer Engineering, Ondokuz Mayis University Samsun, Samsun, Turkey, University of Tartu, Tartu, Estonia, Cyber Security and Information Technologies Research and Development Centre, Ondokuz Mayis University Samsun, Samsun, Turkey |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38192462$$D View this record in MEDLINE/PubMed |
| BookMark | eNp1kktv1DAUhSNUREvpki2KxAYWGfxI_FihUcVjpCIkKGvrxrnJeJSJBztBDL8eT6eUpgJ7Yev6u8fy8XmanQx-wCx7TslCSirf7BDDprBxQWXJH2VnjEtRVFqzk3v70-wixg0hhFY0Df0kO-WKalYKdpYtP_nGtQ6bvAuwWxc1xLSHvvPBjettPvocBuj3vzCPaKdU3OfjOiCMMXdDvvLXz7LHLfQRL27X8-zb-3fXlx-Lq88fVpfLq8JWvCyL2hJVCc5B8FI3tW5rKZC3SLkE3vK6qVgFtlSWCytsTYAp0oBWKBoCGpCfZ6ujbuNhY3bBbSHsjQdnbgo-dAbC6GyPhoqWQqVoEmtLK5SqOFLRIFGtBEnrpPX2qLWb6i02FocxQD8TnZ8Mbm06_8NQIiXXTCSFV7cKwX-fMI5m66LFvocB_RQN05RVLP2KTOjLB-jGTyGZmiildUUJF_Qv1UF6gRtany62B1GzVJTrklFWJmrxDyrNBrfOpnC0LtVnDa9nDYkZ8efYwRSjWX39Mmdf3Hflzo4_aUlAcQRs8DEGbO8QSswhkOYmkMZGcwhk4vkD3roRRucPprr-P12_Aeo14wg |
| CitedBy_id | crossref_primary_10_1016_j_comnet_2025_111122 crossref_primary_10_1109_ACCESS_2025_3558985 |
| Cites_doi | 10.1109/TII.2018.2808190 10.2478/amcs-2014-0016 10.1109/TDSC.2011.34 10.1155/2022/1401683 10.1016/j.cose.2021.102316 10.2139/ssrn.3603739 10.1109/MCOM.2017.1600528 10.1109/TII.2022.3152814 10.1109/COMST.2022.3158270 10.1016/j.jmsy.2020.10.011 10.1016/j.neucom.2021.07.101 10.1109/TII.2018.2832853 10.1016/j.comnet.2023.110046 10.1016/j.compind.2018.04.015 10.4018/978-1-7998-2466-4.ch038 10.1109/TII.2014.2300753 10.1016/j.csi.2017.09.006 10.1016/j.sintl.2021.100121 10.1016/j.scs.2020.102343 10.1109/ACCESS.2018.2863244 10.1109/ACCESS.2018.2805690 10.1016/j.cose.2023.103174 10.1016/j.adhoc.2021.102558 |
| ContentType | Journal Article |
| Copyright | 2023 Arat and Akleylek. COPYRIGHT 2023 PeerJ. Ltd. 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 Arat and Akleylek 2023 Arat and Akleylek |
| Copyright_xml | – notice: 2023 Arat and Akleylek. – notice: COPYRIGHT 2023 PeerJ. Ltd. – notice: 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 Arat and Akleylek 2023 Arat and Akleylek |
| DBID | AAYXX CITATION NPM ISR 3V. 7XB 8AL 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI Q9U 7X8 5PM DOA |
| DOI | 10.7717/peerj-cs.1743 |
| DatabaseName | CrossRef PubMed Gale In Context: Science ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic (New) Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic (retired) ProQuest One Academic UKI Edition ProQuest Central Basic MEDLINE - Academic PubMed Central (Full Participant titles) DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | CrossRef Publicly Available Content Database MEDLINE - Academic PubMed |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: PIMPY name: Publicly Available Content Database url: http://search.proquest.com/publiccontent sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2376-5992 |
| ExternalDocumentID | oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b PMC10773926 A813942124 38192462 10_7717_peerj_cs_1743 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: ASELSAN A.Ş |
| GroupedDBID | 53G 5VS 8FE 8FG AAFWJ AAYXX ABUWG ADBBV AFFHD AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO FRP GNUQQ GROUPED_DOAJ HCIFZ IAO ICD IEA ISR ITC K6V K7- M~E OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC RPM 3V. H13 M0N NPM 7XB 8AL 8FK JQ2 PKEHL PQEST PQUKI Q9U 7X8 5PM |
| ID | FETCH-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3 |
| IEDL.DBID | P5Z |
| ISSN | 2376-5992 |
| IngestDate | Fri Oct 03 12:52:31 EDT 2025 Tue Nov 04 02:06:19 EST 2025 Sun Nov 09 09:37:34 EST 2025 Sat Jul 26 00:09:16 EDT 2025 Tue Nov 11 10:54:16 EST 2025 Tue Nov 04 18:14:24 EST 2025 Thu Nov 13 16:10:45 EST 2025 Thu Jan 02 22:29:51 EST 2025 Tue Nov 18 21:26:01 EST 2025 Sat Nov 29 05:31:07 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Threats Graph theory Security Industrial IoT Risk assessment Threat graph |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-7005-6489 0000-0002-4347-0016 |
| OpenAccessLink | https://www.proquest.com/docview/2899510361?pq-origsite=%requestingapplication% |
| PMID | 38192462 |
| PQID | 2899510361 |
| PQPubID | 2045934 |
| PageCount | e1743 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b pubmedcentral_primary_oai_pubmedcentral_nih_gov_10773926 proquest_miscellaneous_2912527437 proquest_journals_2899510361 gale_infotracmisc_A813942124 gale_infotracacademiconefile_A813942124 gale_incontextgauss_ISR_A813942124 pubmed_primary_38192462 crossref_primary_10_7717_peerj_cs_1743 crossref_citationtrail_10_7717_peerj_cs_1743 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-12-08 |
| PublicationDateYYYYMMDD | 2023-12-08 |
| PublicationDate_xml | – month: 12 year: 2023 text: 2023-12-08 day: 08 |
| PublicationDecade | 2020 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: San Diego – name: San Diego, USA |
| PublicationTitle | PeerJ. Computer science |
| PublicationTitleAlternate | PeerJ Comput Sci |
| PublicationYear | 2023 |
| Publisher | PeerJ. Ltd PeerJ, Inc PeerJ Inc |
| Publisher_xml | – name: PeerJ. Ltd – name: PeerJ, Inc – name: PeerJ Inc |
| References | Polatidis (10.7717/peerj-cs.1743/ref-17) 2018; 56 Mouratidis (10.7717/peerj-cs.1743/ref-14) 2018b; 14 Mosteiro-Sanchez (10.7717/peerj-cs.1743/ref-12) 2020; 57 Stellios (10.7717/peerj-cs.1743/ref-22) 2021; 107 Jaidka (10.7717/peerj-cs.1743/ref-9) 2020 Qureshi (10.7717/peerj-cs.1743/ref-21) 2020; 61 Nguyen (10.7717/peerj-cs.1743/ref-16) 2022; 18 CVE (10.7717/peerj-cs.1743/ref-6) 2023 Javaid (10.7717/peerj-cs.1743/ref-10) 2021; 2 Mouratidis (10.7717/peerj-cs.1743/ref-13) 2018a; 14 Wang (10.7717/peerj-cs.1743/ref-26) 2018; 6 Sukiasyan (10.7717/peerj-cs.1743/ref-23) 2022; 484 Pretorius (10.7717/peerj-cs.1743/ref-19) 2020 Szwed (10.7717/peerj-cs.1743/ref-25) 2014; 24 Al-Turjman (10.7717/peerj-cs.1743/ref-1) 2018; 14 Jing (10.7717/peerj-cs.1743/ref-11) 2022; 2022 Da Xu (10.7717/peerj-cs.1743/ref-7) 2014; 10 Nandhini (10.7717/peerj-cs.1743/ref-15) 2019 Wu (10.7717/peerj-cs.1743/ref-27) 2022; 24 Arat (10.7717/peerj-cs.1743/ref-3) 2023b; 237 Boyes (10.7717/peerj-cs.1743/ref-4) 2018; 101 Arat (10.7717/peerj-cs.1743/ref-2) 2023a; 128 Prostov (10.7717/peerj-cs.1743/ref-20) 2021 Brewster (10.7717/peerj-cs.1743/ref-5) 2017; 55 Sun (10.7717/peerj-cs.1743/ref-24) 2021; 120 George (10.7717/peerj-cs.1743/ref-8) 2018; 6 Poolsappasit (10.7717/peerj-cs.1743/ref-18) 2012; 9 |
| References_xml | – start-page: 242 year: 2019 ident: 10.7717/peerj-cs.1743/ref-15 article-title: Directed acyclic graph inherited attacks and mitigation methods in RPL: a review – volume: 14 start-page: 2736 issue: 6 year: 2018 ident: 10.7717/peerj-cs.1743/ref-1 article-title: Context-sensitive access in industrial internet of things (IIoT) healthcare applications publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2808190 – volume: 24 start-page: 213 issue: 1 year: 2014 ident: 10.7717/peerj-cs.1743/ref-25 article-title: A new lightweight method for security risk assessment based on fuzzy cognitive maps publication-title: International Journal of Applied Mathematics and Computer Science doi: 10.2478/amcs-2014-0016 – volume: 9 start-page: 61 issue: 1 year: 2012 ident: 10.7717/peerj-cs.1743/ref-18 article-title: Dynamic security risk management using Bayesian attack graphs publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2011.34 – volume: 2022 start-page: 1 issue: 1–2 year: 2022 ident: 10.7717/peerj-cs.1743/ref-11 article-title: Detection of DDoS attack within industrial IoT devices based on clustering and graph structure features publication-title: Security and Communication Networks doi: 10.1155/2022/1401683 – volume: 107 start-page: 102316 issue: 2 year: 2021 ident: 10.7717/peerj-cs.1743/ref-22 article-title: Assessing IoT enabled cyber-physical attack paths against critical systems publication-title: Computers & Security doi: 10.1016/j.cose.2021.102316 – year: 2020 ident: 10.7717/peerj-cs.1743/ref-9 article-title: Evolution of IoT to IIoT: applications & challenges doi: 10.2139/ssrn.3603739 – volume: 55 start-page: 26 issue: 9 year: 2017 ident: 10.7717/peerj-cs.1743/ref-5 article-title: IoT in agriculture: designing a Europe-wide large-scale pilot publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1600528 – volume: 18 start-page: 1 issue: 11 year: 2022 ident: 10.7717/peerj-cs.1743/ref-16 article-title: An advanced computing approach for IoT-botnet detection in industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2022.3152814 – volume: 24 start-page: 1175 issue: 2 year: 2022 ident: 10.7717/peerj-cs.1743/ref-27 article-title: A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory publication-title: IEEE Communications Surveys & Tutorials doi: 10.1109/COMST.2022.3158270 – volume: 57 start-page: 367 issue: 5 year: 2020 ident: 10.7717/peerj-cs.1743/ref-12 article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0 publication-title: Journal of Manufacturing Systems doi: 10.1016/j.jmsy.2020.10.011 – volume: 484 start-page: 183 issue: 4 year: 2022 ident: 10.7717/peerj-cs.1743/ref-23 article-title: Secure data exchange in industrial internet of things publication-title: Neurocomputing doi: 10.1016/j.neucom.2021.07.101 – volume: 14 start-page: 4093 issue: 9 year: 2018b ident: 10.7717/peerj-cs.1743/ref-14 article-title: A security analysis method for industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2832853 – volume: 237 start-page: 110046 year: 2023b ident: 10.7717/peerj-cs.1743/ref-3 article-title: A new method for vulnerability and risk assessment of IoT publication-title: Computer Networks doi: 10.1016/j.comnet.2023.110046 – volume: 101 start-page: 1 issue: 8 year: 2018 ident: 10.7717/peerj-cs.1743/ref-4 article-title: The industrial internet of things (IIoT): an analysis framework publication-title: Computers in Industry doi: 10.1016/j.compind.2018.04.015 – start-page: 613 volume-title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications year: 2020 ident: 10.7717/peerj-cs.1743/ref-19 article-title: Cyber-security for ICS/SCADA: a South African perspective doi: 10.4018/978-1-7998-2466-4.ch038 – start-page: 2394 year: 2021 ident: 10.7717/peerj-cs.1743/ref-20 article-title: Construction and security analysis of private directed acyclic graph based systems for internet of things – volume: 10 start-page: 2233 issue: 4 year: 2014 ident: 10.7717/peerj-cs.1743/ref-7 article-title: Internet of things in industries: a survey publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2014.2300753 – volume: 14 start-page: 4093 issue: 9 year: 2018a ident: 10.7717/peerj-cs.1743/ref-13 article-title: A security analysis method for industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2832853 – volume: 56 start-page: 74 year: 2018 ident: 10.7717/peerj-cs.1743/ref-17 article-title: Cyber-attack path discovery in a dynamic supply chain maritime risk management system publication-title: Computer Standards & Interfaces doi: 10.1016/j.csi.2017.09.006 – volume: 2 start-page: 100121 issue: 12 year: 2021 ident: 10.7717/peerj-cs.1743/ref-10 article-title: Sensors for daily life: a review publication-title: Sensors International doi: 10.1016/j.sintl.2021.100121 – volume: 61 start-page: 102343 issue: 1 year: 2020 ident: 10.7717/peerj-cs.1743/ref-21 article-title: A novel and secure attacks detection framework for smart cities industrial internet of things publication-title: Sustainable Cities and Society doi: 10.1016/j.scs.2020.102343 – volume: 6 start-page: 43586 year: 2018 ident: 10.7717/peerj-cs.1743/ref-8 article-title: A graph-based security framework for securing industrial IoT networks from vulnerability exploitations publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2863244 – volume: 6 start-page: 8599 year: 2018 ident: 10.7717/peerj-cs.1743/ref-26 article-title: A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2805690 – volume: 128 start-page: 103174 issue: 5 year: 2023a ident: 10.7717/peerj-cs.1743/ref-2 article-title: Attack path detection for IIoT enabled cyber physical systems: revisited publication-title: Computers & Security doi: 10.1016/j.cose.2023.103174 – volume: 120 start-page: 102558 issue: 8 year: 2021 ident: 10.7717/peerj-cs.1743/ref-24 article-title: Effective malware detection scheme based on classified behavior graph in IIoT publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2021.102558 – year: 2023 ident: 10.7717/peerj-cs.1743/ref-6 article-title: Common Vulnerabilities and Exposures |
| SSID | ssj0001511119 |
| Score | 2.3221989 |
| Snippet | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these... |
| SourceID | doaj pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | e1743 |
| SubjectTerms | Algorithms Algorithms and Analysis of Algorithms Analysis Control systems Controllers Cybersecurity Embedded systems Graph theory Industrial applications Industrial electronics Industrial IoT Information technology Internet of Things Interoperability Manufacturing Physical instruments Risk assessment Safety and security measures Security Security and Privacy Security systems Sensors Technology application Threat evaluation Threat graph Threats |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQxYELlPJKKcggBBeiJnHix3FBragEFYIi9Wb52Q0qSbXJcuDXM5NkVxshxIVrPJHiz2PPN8r4G0JecSsD0AaZQvQJKKrNU5t7nlbcV6ywmRJx0Jn9KM7P5eWl-rzT6gtrwkZ54BG445zH3FQQVhyLpeMSwkvIuQ-ZjMKI3OLpmwm1k0yN94PxKFCjqKaAlOX4JoTV99R1WMHDZkFo0Or_80TeCUnzcsmd-HO6T-5OxJEuxg--T26F5oDc2zRloNMefUAWn1pfRyCWdNCiTjFMeWqur9pV3S9_0L6lBoVIfgXaTb3raL9E6tjRuqFn7cVD8u305OL9h3Tqk5C6ipVlah3wJs6Y4axU3qpoBQ8shpwJwyKzvioq40pAkDvubGYKmXmjZOA-Q3Fu9ojsNW0TnhAKCQljzPLSY57oosq9UBXiaaVyJUvI2w1w2k0i4tjL4lpDMoE46wFn7TqNOCfk9db8ZlTP-JvhO1yFrRGKXg8PwBX05Ar6X66QkJe4hhplLRqsm7ky667TZ1-_6IUEpos_v8uEvJmMYgtf7sx0DQHmj0pYM8ujmSXsOzcf3riKnvZ9pzF9RY1CnifkxXYY38Ratia0a7BRQCoLmLRIyOPRs7bzHvTpSl4kRM58bgbMfKSpl4MqOOTxAsguP_wfUD4ldwpgc0Pdjjwie_1qHZ6R2-5nX3er58Ne-w1IoS5F priority: 102 providerName: Directory of Open Access Journals |
| Title | Modified graph-based algorithm to analyze security threats in IoT |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38192462 https://www.proquest.com/docview/2899510361 https://www.proquest.com/docview/2912527437 https://pubmed.ncbi.nlm.nih.gov/PMC10773926 https://doaj.org/article/16f1a5818c3f4c68853e16de08f7a71b |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: DOA dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: M~E dateStart: 20150101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVPQU databaseName: Advanced Technologies & Aerospace Database customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: P5Z dateStart: 20150527 isFulltext: true titleUrlDefault: https://search.proquest.com/hightechjournals providerName: ProQuest – providerCode: PRVPQU databaseName: Computer Science Database customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: K7- dateStart: 20150527 isFulltext: true titleUrlDefault: http://search.proquest.com/compscijour providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: BENPR dateStart: 20150527 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: Publicly Available Content Database customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: PIMPY dateStart: 20150527 isFulltext: true titleUrlDefault: http://search.proquest.com/publiccontent providerName: ProQuest |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV1Lj9MwELbYXQ5cWJ5LYKkMQnAh2iRObOeEuqgrKmhVLYtUuFh-pS1aktKkHDjw2_GkbncjBBcuOcTTyM6MZ75xpt8g9IIqbh1s4KGLPhZItWmoYkPDjJqMJCrKWdHyzH5g4zGfTvOJP3CrfVnl1ie2jtpUGs7ITyAxAPY3Gr9Zfg-haxR8XfUtNPbQAbAkQOuGSfbl6owlA4eQb6g1mUtcTpbWrr6GuoY6HtIJRS1j_59--Vpg6hZNXotCZ4f_O_876LbHn7i_MZi76IYt76HDbW8H7Lf6fdQfVWZROHyKW0rrEKKdwfJy5p7ZzL_hpsIS-Ex-Wlz7Fni4mQMCrfGixMPq4gH6dDa4ePsu9O0WQp2RNA2VdvCLEiIpSXOj8kIxaklhY8IkKYgyWZJJnXJNqKZaRTLhkZE5t9REwPFNHqL9sirtI4RdXkMIUTQ1kG7qIo8NyzNQiOK5TkmAXm_fvNCeixxaYlwKl5OAokSrKKFrAYoK0Mud-HJDwvE3wVNQ404IuLPbG9VqJvxWFDEtYpk5oKJJkWrKHWCxMTU24gWTLFYBeg5GIIAdo4Tym5lc17UYfjwXfe4AM3xDTwP0ygsVlZu5lv7fDG79QKjVkTzuSLrtq7vDW3sR3n3U4spYAvRsNwy_hJK40lZrJ5M7bJq4RbMAHW1Mc7fuluYupUmAeMdoOy-mO1Iu5i25eBwx5jAzffzveT1BtxIH99rCHn6M9pvV2j5FN_WPZlGvemiPTXkPHZwOxpPzXnvO4a7vWeiuo1-DXrtN3fhkOJp8_g0pP0PP |
| linkProvider | ProQuest |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lj9MwEB4tCxJcWN4EFjCIx4VokzixnQNC5bHaqt0KQZH2ZhzbaYuWpDQtCH4UvxFPmnQ3QnDbA9d4EmWSb17O5BuAxywT1qUNwnfRxyKpNvOz0DA_YSahURakPK95Zod8NBJHR-m7LfjV_guDbZWtT6wdtSk17pHvYWGA7G8sfDn_6uPUKPy62o7QWMNiYH98dyVb9aL_xr3fJ1G0_3b8-sBvpgr4OqFx7GfaZRmMUsVonJoszTPOLM1tSLmiOc1MEiVKx0JTppnOAhWJwKhUWGYCpLKm7rrn4HxMBUe7GnD_ZE8nQQeUrqk8uSuU9ubWLj77usK-IdoJffWEgD_jwKlA2G3SPBX19nf-t-d1BS43-TXprQ3iKmzZ4hrstLMrSOPKrkPvsDSz3OXfpKbs9jGaG6KOJ06H5fQLWZZEIV_LT0uqZsQfWU4xw67IrCD9cnwDPp6JIjdhuygLexuIq9sopRmLDZbTOk9Dw9MEAZCJVMfUg-ftm5a64VrHkR_H0tVcCAxZA0PqSiIwPHi6EZ-vSUb-JvgKYbMRQm7w-kC5mMjG1ciQ5aFKXCKmaR5rJlxCZkNmbCByrniYefAIQSeR_aPA9qKJWlWV7H94L3vCFQTYIxB78KwRykt351o1f2s4_ZEwrCO525F07kl3l1t8ysY9VvIEnB483CzjmdjyV9hy5WRSl3tHTmnuwa21KWz0rmn8YhZ5IDpG0nkw3ZViNq3J08OAc1cTsDv_vq8HcPFgfDiUw_5ocBcuRS61rZuYxC5sLxcrew8u6G_LWbW4X7sAAp_O2oZ-A5Zvml8 |
| linkToPdf | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1Lb9NAEF6VghAXyhtDgQXxuGDF9tq76wNCgVIRtUQRtFLFZbH3kQQVO8QJCH4av44Zx05rIbj1wNU7tjz2N6_1-BtCHvNcWkgbpA_RxyKpNvfz0HA_4SZhUR6kwtU8s_tiOJRHR-log_xq_4XBtsrWJ9aO2pQa98h7WBgg-xsPe65pixjt7L6cffVxghR-aW3Haawgsmd_fIfyrXox2IF3_SSKdt8cvH7rNxMGfJ2wOPZzDRkHZyzjLE5NnrpccMucDZnImGO5SaIk07HUjGuu8yCLZGCyVFpuAqS1ZnDdc-S8gBoT2wlHyceT_Z0EnVG6ovUUUDT1ZtbOP_u6wh4i1gmD9bSAP2PCqaDYbdg8FQF3t_7nZ3eFXG7ybtpfGcpVsmGLa2SrnWlBGxd3nfTflWbqIC-nNZW3j1He0Ox4DDosJl_ooqQZ8rj8tLRqRv_RxQQz74pOCzooD26QwzNR5CbZLMrC3iYU6jnGWM5jg2W2dmloRJogGHKZ6ph55Hn71pVuONhxFMixgloMQaJqkChdKQSJR56uxWcr8pG_Cb5CCK2FkDO8PlDOx6pxQSrkLswSSNA0c7HmEhI1G3JjA-lEJsLcI48QgApZQQrEyDhbVpUafHiv-hIKBewdiD3yrBFyJdy5zpq_OEB_JBLrSG53JMFt6e5yi1XVuM1KnQDVIw_Xy3gmtgIWtlyCTAo5eQRKC4_cWpnFWu-a3i_mkUdkx2A6D6a7UkwnNal6GAgBtQK_8-_7ekAugumo_cFw7y65FEHGW_c2yW2yuZgv7T1yQX9bTKv5_dobUPLprE3oN7Qdo4M |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Modified+graph-based+algorithm+to+analyze+security+threats+in+IoT&rft.jtitle=PeerJ.+Computer+science&rft.au=Arat%2C+Ferhat&rft.au=Akleylek%2C+Sedat&rft.date=2023-12-08&rft.pub=PeerJ.+Ltd&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=9&rft.spage=e1743&rft_id=info:doi/10.7717%2Fpeerj-cs.1743&rft.externalDBID=ISR&rft.externalDocID=A813942124 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon |