Internet of Things: Risk Management

IoT (Internet of Things) devices envisions a future where interoperable, reliable, secure and efficient digital devices communicate and linked by appropriate communication technologies. These digital devices help in generating big volumes of sensitive data with high processing speed. Such information is helpful in empowering users but imposes a great cost of data loss or data misuse. As data complexity, technology and pervasiveness grow, it becomes a strong argument to perform risk management. Our research contributes towards proposing a deep insight into IoT architectural components, factors shaping risks, attack vectors and their management strategies/counter measures. Furthermore, we have explored IoT capabilities, applications, challenges and opportunities in various fields. This state of art will make a case for developing new risk assessment methodologies and develop new ideas for exercising IoT opportunities by considering the heavy, big, dynamic, interoperable data processing.

[1]  Chunlai Zhou,et al.  Research on extracting risk control rules for Internet of Things business , 2018, 2018 IEEE 8th Annual Computing and Communication Workshop and Conference (CCWC).

[2]  Meng Xiaofeng,et al.  Privacy Preserving Towards Continuous Query in Location-Based Services , 2010 .

[3]  Jean-Noel Colin,et al.  Adaptive Risk-Aware Access Control Model for Internet of Things , 2017, 2017 International Workshop on Secure Internet of Things (SIoT).

[4]  Bogdan Ghilic-Micu,et al.  Using Cloud Computing to Address Challenges Raised by the Internet of Things , 2017 .

[5]  Stephen D. Wolthusen,et al.  Towards Composable Threat Assessment for Medical IoT (MIoT) , 2017, EUSPN/ICTH.

[6]  Engin Leloglu A Review of Security Concerns in Internet of Things , 2017 .

[7]  Jinquan Zeng,et al.  Research on Dynamical Security Risk Assessment for the Internet of Things inspired by immunology , 2012, 2012 8th International Conference on Natural Computation.

[8]  Dimitrios Tzovaras,et al.  Using Blockchains to Strengthen the Security of Internet of Things , 2018, Euro-CYBERSEC.

[9]  Remi Badonnel,et al.  Monitoring and Security for the Internet of Things , 2013, AIMS.

[10]  Da-Zhi Sun,et al.  A hash-based RFID security protocol for strong privacy protection , 2012, IEEE Transactions on Consumer Electronics.

[11]  Gang Zhao,et al.  A novel risk assessment model for privacy security in Internet of Things , 2014, Wuhan University Journal of Natural Sciences.

[12]  Hajar Mousannif,et al.  Access control in the Internet of Things: Big challenges and new opportunities , 2017, Comput. Networks.

[13]  Imrich Chlamtac,et al.  Internet of things: Vision, applications and research challenges , 2012, Ad Hoc Networks.

[14]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[15]  Berrehili Fatima Zahra,et al.  Risk analysis in Internet of Things using EBIOS , 2017, 2017 IEEE 7th Annual Computing and Communication Workshop and Conference (CCWC).