{"title":"An attack tree based risk evaluation approach for the internet of things","authors":"Waqar Asif, I. G. Ray, M. Rajarajan","doi":"10.1145/3277593.3277596","DOIUrl":null,"url":null,"abstract":"Internet of Things (IoTs) are being widely used for a large number of use case scenarios, where a wide range of devices, with different computational resources, are marshalled for the purpose of a certain mission goal. The unique combination of these devices and the nature of sensitive information that they hold poses a large number of risks where the risks are highly dependant upon the type of devices and the type of attacks that an adversary can launch. In this work, we propose an attack tree model to evaluate the user's privacy risks associated with an IoT eco system. We evaluate the potential risks based on varying attack attributes, the probable considerations/preferences of an adversary and the varying computational resources available on a device. The proposed model identifies the probability of risk associated with each attack scenario and thus benefits an analyst in identifying which attack is more likely of the use case scenario.","PeriodicalId":129822,"journal":{"name":"Proceedings of the 8th International Conference on the Internet of Things","volume":"317 3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 8th International Conference on the Internet of Things","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3277593.3277596","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8
Abstract
Internet of Things (IoTs) are being widely used for a large number of use case scenarios, where a wide range of devices, with different computational resources, are marshalled for the purpose of a certain mission goal. The unique combination of these devices and the nature of sensitive information that they hold poses a large number of risks where the risks are highly dependant upon the type of devices and the type of attacks that an adversary can launch. In this work, we propose an attack tree model to evaluate the user's privacy risks associated with an IoT eco system. We evaluate the potential risks based on varying attack attributes, the probable considerations/preferences of an adversary and the varying computational resources available on a device. The proposed model identifies the probability of risk associated with each attack scenario and thus benefits an analyst in identifying which attack is more likely of the use case scenario.