Modified graph-based algorithm to analyze security threats in IoT
In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, s...
Saved in:
| Published in | PeerJ. Computer science Vol. 9; p. e1743 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
United States
PeerJ. Ltd
08.12.2023
PeerJ, Inc PeerJ Inc |
| Subjects | |
| Online Access | Get full text |
| ISSN | 2376-5992 2376-5992 |
| DOI | 10.7717/peerj-cs.1743 |
Cover
| Abstract | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions
via
the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. |
|---|---|
| AbstractList | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions
via
the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained.In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators' missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. |
| ArticleNumber | e1743 |
| Audience | Academic |
| Author | Akleylek, Sedat Arat, Ferhat |
| Author_xml | – sequence: 1 givenname: Ferhat orcidid: 0000-0002-4347-0016 surname: Arat fullname: Arat, Ferhat organization: Department of Software Engineering, Samsun University, Samsun, Turkey – sequence: 2 givenname: Sedat orcidid: 0000-0001-7005-6489 surname: Akleylek fullname: Akleylek, Sedat organization: Department of Computer Engineering, Ondokuz Mayis University Samsun, Samsun, Turkey, University of Tartu, Tartu, Estonia, Cyber Security and Information Technologies Research and Development Centre, Ondokuz Mayis University Samsun, Samsun, Turkey |
| BackLink | https://www.ncbi.nlm.nih.gov/pubmed/38192462$$D View this record in MEDLINE/PubMed |
| BookMark | eNqFkktv1DAUhSNUREvpki2KxAYWKX4kdrxCo4rHSEVIUNbWjXOd8SgTD3YCDL8eT6e0TSWEvbB1_Z1j-9hPs6PBD5hlzyk5l5LKN1vEsC5MPKey5I-yE8alKCql2NG9-XF2FuOaEEIrmpp6kh3zmipWCnaSLT751lmHbd4F2K6KBmKaQ9_54MbVJh99DgP0u9-YRzRTKu7ycRUQxpi7IV_6q2fZYwt9xLOb8TT79v7d1cXH4vLzh-XF4rIwFS_LojGkrgTnIHip2kbZRgrkFimXwC1v2opVYMracGGEaQiwmrSgahQtAQXIT7Plwbf1sNbb4DYQdtqD09cFHzoNYXSmR02FpVDVNJnZ0oi6rjhS0SKprQRJm-R1fvCahi3sfkLf3xpSovfR6utotYl6H20SvD0ItlOzwdbgMAboZ6eYrwxupTv_I9lJyRUTyeHVjUPw3yeMo964aLDvYUA_Rc0UZRVLe8mEvnyArv0U0iskqlaqooQLekd1kK7sBuvTxmZvqhc15apklJV3N51Rqbe4cSb9JutSfSZ4PRMkZsRfYwdTjHr59cucfXE_lds4_n6vBBQHwAQfY0D735j5A964EUbn96G6_h-qP1Gq8xg |
| CitedBy_id | crossref_primary_10_1016_j_comnet_2025_111122 |
| Cites_doi | 10.1109/TII.2018.2808190 10.2478/amcs-2014-0016 10.1109/TDSC.2011.34 10.1155/2022/1401683 10.1016/j.cose.2021.102316 10.2139/ssrn.3603739 10.1109/MCOM.2017.1600528 10.1109/TII.2022.3152814 10.1109/COMST.2022.3158270 10.1016/j.jmsy.2020.10.011 10.1016/j.neucom.2021.07.101 10.1109/TII.2018.2832853 10.1016/j.comnet.2023.110046 10.1016/j.compind.2018.04.015 10.4018/978-1-7998-2466-4.ch038 10.1109/TII.2014.2300753 10.1016/j.csi.2017.09.006 10.1016/j.sintl.2021.100121 10.1016/j.scs.2020.102343 10.1109/ACCESS.2018.2863244 10.1109/ACCESS.2018.2805690 10.1016/j.cose.2023.103174 10.1016/j.adhoc.2021.102558 |
| ContentType | Journal Article |
| Copyright | 2023 Arat and Akleylek. COPYRIGHT 2023 PeerJ. Ltd. 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. 2023 Arat and Akleylek 2023 Arat and Akleylek |
| Copyright_xml | – notice: 2023 Arat and Akleylek. – notice: COPYRIGHT 2023 PeerJ. Ltd. – notice: 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License: https://creativecommons.org/licenses/by/4.0/ (the “License”), which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. – notice: 2023 Arat and Akleylek 2023 Arat and Akleylek |
| DBID | AAYXX CITATION NPM ISR 3V. 7XB 8AL 8FE 8FG 8FK ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- M0N P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI Q9U 7X8 5PM ADTOC UNPAY DOA |
| DOI | 10.7717/peerj-cs.1743 |
| DatabaseName | CrossRef PubMed Gale In Context: Science ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Computing Database (Alumni Edition) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Computing Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central Basic MEDLINE - Academic PubMed Central (Full Participant titles) Unpaywall for CDI: Periodical Content Unpaywall DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef PubMed Publicly Available Content Database Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Computing ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) MEDLINE - Academic |
| DatabaseTitleList | CrossRef Publicly Available Content Database PubMed MEDLINE - Academic |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ : Directory of Open Access Journals [open access] url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: NPM name: PubMed url: https://proxy.k.utb.cz/login?url=http://www.ncbi.nlm.nih.gov/entrez/query.fcgi?db=PubMed sourceTypes: Index Database – sequence: 3 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 4 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2376-5992 |
| ExternalDocumentID | oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b 10.7717/peerj-cs.1743 PMC10773926 A813942124 38192462 10_7717_peerj_cs_1743 |
| Genre | Journal Article |
| GrantInformation_xml | – fundername: ASELSAN A.Ş |
| GroupedDBID | 53G 5VS 8FE 8FG AAFWJ AAYXX ABUWG ADBBV AFKRA AFPKN ALMA_UNASSIGNED_HOLDINGS ARAPS ARCSS AZQEC BCNDV BENPR BGLVJ BPHCQ CCPQU CITATION DWQXO FRP GNUQQ GROUPED_DOAJ HCIFZ IAO ICD IEA ISR ITC K6V K7- M~E OK1 P62 PHGZM PHGZT PIMPY PQGLB PQQKQ PROAC PUEGO RPM 3V. H13 M0N NPM 7XB 8AL 8FK JQ2 PKEHL PQEST PQUKI Q9U 7X8 5PM ADTOC UNPAY |
| ID | FETCH-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3 |
| IEDL.DBID | UNPAY |
| ISSN | 2376-5992 |
| IngestDate | Fri Oct 03 12:52:31 EDT 2025 Sun Oct 26 03:44:30 EDT 2025 Tue Sep 30 17:10:46 EDT 2025 Thu Sep 04 16:01:34 EDT 2025 Sat Jul 26 00:09:16 EDT 2025 Mon Oct 20 22:47:43 EDT 2025 Mon Oct 20 16:54:20 EDT 2025 Thu Oct 16 15:50:43 EDT 2025 Thu Jan 02 22:29:51 EST 2025 Thu Apr 24 23:11:06 EDT 2025 Wed Oct 01 04:07:42 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Keywords | Threats Graph theory Security Industrial IoT Risk assessment Threat graph |
| Language | English |
| License | https://creativecommons.org/licenses/by/4.0 2023 Arat and Akleylek. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, reproduction and adaptation in any medium and for any purpose provided that it is properly attributed. For attribution, the original author(s), title, publication source (PeerJ Computer Science) and either DOI or URL of the article must be cited. cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c5344-bc085633a6349db9fb76e3fe137a3f3bd525ac48c36c6cb0a280da98e6d0a9ae3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ORCID | 0000-0001-7005-6489 0000-0002-4347-0016 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://doi.org/10.7717/peerj-cs.1743 |
| PMID | 38192462 |
| PQID | 2899510361 |
| PQPubID | 2045934 |
| PageCount | e1743 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_16f1a5818c3f4c68853e16de08f7a71b unpaywall_primary_10_7717_peerj_cs_1743 pubmedcentral_primary_oai_pubmedcentral_nih_gov_10773926 proquest_miscellaneous_2912527437 proquest_journals_2899510361 gale_infotracmisc_A813942124 gale_infotracacademiconefile_A813942124 gale_incontextgauss_ISR_A813942124 pubmed_primary_38192462 crossref_primary_10_7717_peerj_cs_1743 crossref_citationtrail_10_7717_peerj_cs_1743 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2023-12-08 |
| PublicationDateYYYYMMDD | 2023-12-08 |
| PublicationDate_xml | – month: 12 year: 2023 text: 2023-12-08 day: 08 |
| PublicationDecade | 2020 |
| PublicationPlace | United States |
| PublicationPlace_xml | – name: United States – name: San Diego – name: San Diego, USA |
| PublicationTitle | PeerJ. Computer science |
| PublicationTitleAlternate | PeerJ Comput Sci |
| PublicationYear | 2023 |
| Publisher | PeerJ. Ltd PeerJ, Inc PeerJ Inc |
| Publisher_xml | – name: PeerJ. Ltd – name: PeerJ, Inc – name: PeerJ Inc |
| References | Polatidis (10.7717/peerj-cs.1743/ref-17) 2018; 56 Mouratidis (10.7717/peerj-cs.1743/ref-14) 2018b; 14 Mosteiro-Sanchez (10.7717/peerj-cs.1743/ref-12) 2020; 57 Stellios (10.7717/peerj-cs.1743/ref-22) 2021; 107 Jaidka (10.7717/peerj-cs.1743/ref-9) 2020 Qureshi (10.7717/peerj-cs.1743/ref-21) 2020; 61 Nguyen (10.7717/peerj-cs.1743/ref-16) 2022; 18 CVE (10.7717/peerj-cs.1743/ref-6) 2023 Javaid (10.7717/peerj-cs.1743/ref-10) 2021; 2 Mouratidis (10.7717/peerj-cs.1743/ref-13) 2018a; 14 Wang (10.7717/peerj-cs.1743/ref-26) 2018; 6 Sukiasyan (10.7717/peerj-cs.1743/ref-23) 2022; 484 Pretorius (10.7717/peerj-cs.1743/ref-19) 2020 Szwed (10.7717/peerj-cs.1743/ref-25) 2014; 24 Al-Turjman (10.7717/peerj-cs.1743/ref-1) 2018; 14 Jing (10.7717/peerj-cs.1743/ref-11) 2022; 2022 Da Xu (10.7717/peerj-cs.1743/ref-7) 2014; 10 Nandhini (10.7717/peerj-cs.1743/ref-15) 2019 Wu (10.7717/peerj-cs.1743/ref-27) 2022; 24 Arat (10.7717/peerj-cs.1743/ref-3) 2023b; 237 Boyes (10.7717/peerj-cs.1743/ref-4) 2018; 101 Arat (10.7717/peerj-cs.1743/ref-2) 2023a; 128 Prostov (10.7717/peerj-cs.1743/ref-20) 2021 Brewster (10.7717/peerj-cs.1743/ref-5) 2017; 55 Sun (10.7717/peerj-cs.1743/ref-24) 2021; 120 George (10.7717/peerj-cs.1743/ref-8) 2018; 6 Poolsappasit (10.7717/peerj-cs.1743/ref-18) 2012; 9 |
| References_xml | – start-page: 242 year: 2019 ident: 10.7717/peerj-cs.1743/ref-15 article-title: Directed acyclic graph inherited attacks and mitigation methods in RPL: a review – volume: 14 start-page: 2736 issue: 6 year: 2018 ident: 10.7717/peerj-cs.1743/ref-1 article-title: Context-sensitive access in industrial internet of things (IIoT) healthcare applications publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2808190 – volume: 24 start-page: 213 issue: 1 year: 2014 ident: 10.7717/peerj-cs.1743/ref-25 article-title: A new lightweight method for security risk assessment based on fuzzy cognitive maps publication-title: International Journal of Applied Mathematics and Computer Science doi: 10.2478/amcs-2014-0016 – volume: 9 start-page: 61 issue: 1 year: 2012 ident: 10.7717/peerj-cs.1743/ref-18 article-title: Dynamic security risk management using Bayesian attack graphs publication-title: IEEE Transactions on Dependable and Secure Computing doi: 10.1109/TDSC.2011.34 – volume: 2022 start-page: 1 issue: 1–2 year: 2022 ident: 10.7717/peerj-cs.1743/ref-11 article-title: Detection of DDoS attack within industrial IoT devices based on clustering and graph structure features publication-title: Security and Communication Networks doi: 10.1155/2022/1401683 – volume: 107 start-page: 102316 issue: 2 year: 2021 ident: 10.7717/peerj-cs.1743/ref-22 article-title: Assessing IoT enabled cyber-physical attack paths against critical systems publication-title: Computers & Security doi: 10.1016/j.cose.2021.102316 – year: 2020 ident: 10.7717/peerj-cs.1743/ref-9 article-title: Evolution of IoT to IIoT: applications & challenges doi: 10.2139/ssrn.3603739 – volume: 55 start-page: 26 issue: 9 year: 2017 ident: 10.7717/peerj-cs.1743/ref-5 article-title: IoT in agriculture: designing a Europe-wide large-scale pilot publication-title: IEEE Communications Magazine doi: 10.1109/MCOM.2017.1600528 – volume: 18 start-page: 1 issue: 11 year: 2022 ident: 10.7717/peerj-cs.1743/ref-16 article-title: An advanced computing approach for IoT-botnet detection in industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2022.3152814 – volume: 24 start-page: 1175 issue: 2 year: 2022 ident: 10.7717/peerj-cs.1743/ref-27 article-title: A survey of intelligent network slicing management for industrial IoT: integrated approaches for smart transportation, smart energy, and smart factory publication-title: IEEE Communications Surveys & Tutorials doi: 10.1109/COMST.2022.3158270 – volume: 57 start-page: 367 issue: 5 year: 2020 ident: 10.7717/peerj-cs.1743/ref-12 article-title: Securing IIoT using defence-in-depth: towards an end-to-end secure industry 4.0 publication-title: Journal of Manufacturing Systems doi: 10.1016/j.jmsy.2020.10.011 – volume: 484 start-page: 183 issue: 4 year: 2022 ident: 10.7717/peerj-cs.1743/ref-23 article-title: Secure data exchange in industrial internet of things publication-title: Neurocomputing doi: 10.1016/j.neucom.2021.07.101 – volume: 14 start-page: 4093 issue: 9 year: 2018b ident: 10.7717/peerj-cs.1743/ref-14 article-title: A security analysis method for industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2832853 – volume: 237 start-page: 110046 year: 2023b ident: 10.7717/peerj-cs.1743/ref-3 article-title: A new method for vulnerability and risk assessment of IoT publication-title: Computer Networks doi: 10.1016/j.comnet.2023.110046 – volume: 101 start-page: 1 issue: 8 year: 2018 ident: 10.7717/peerj-cs.1743/ref-4 article-title: The industrial internet of things (IIoT): an analysis framework publication-title: Computers in Industry doi: 10.1016/j.compind.2018.04.015 – start-page: 613 volume-title: Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications year: 2020 ident: 10.7717/peerj-cs.1743/ref-19 article-title: Cyber-security for ICS/SCADA: a South African perspective doi: 10.4018/978-1-7998-2466-4.ch038 – start-page: 2394 year: 2021 ident: 10.7717/peerj-cs.1743/ref-20 article-title: Construction and security analysis of private directed acyclic graph based systems for internet of things – volume: 10 start-page: 2233 issue: 4 year: 2014 ident: 10.7717/peerj-cs.1743/ref-7 article-title: Internet of things in industries: a survey publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2014.2300753 – volume: 14 start-page: 4093 issue: 9 year: 2018a ident: 10.7717/peerj-cs.1743/ref-13 article-title: A security analysis method for industrial internet of things publication-title: IEEE Transactions on Industrial Informatics doi: 10.1109/TII.2018.2832853 – volume: 56 start-page: 74 year: 2018 ident: 10.7717/peerj-cs.1743/ref-17 article-title: Cyber-attack path discovery in a dynamic supply chain maritime risk management system publication-title: Computer Standards & Interfaces doi: 10.1016/j.csi.2017.09.006 – volume: 2 start-page: 100121 issue: 12 year: 2021 ident: 10.7717/peerj-cs.1743/ref-10 article-title: Sensors for daily life: a review publication-title: Sensors International doi: 10.1016/j.sintl.2021.100121 – volume: 61 start-page: 102343 issue: 1 year: 2020 ident: 10.7717/peerj-cs.1743/ref-21 article-title: A novel and secure attacks detection framework for smart cities industrial internet of things publication-title: Sustainable Cities and Society doi: 10.1016/j.scs.2020.102343 – volume: 6 start-page: 43586 year: 2018 ident: 10.7717/peerj-cs.1743/ref-8 article-title: A graph-based security framework for securing industrial IoT networks from vulnerability exploitations publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2863244 – volume: 6 start-page: 8599 year: 2018 ident: 10.7717/peerj-cs.1743/ref-26 article-title: A vulnerability assessment method in industrial internet of things based on attack graph and maximum flow publication-title: IEEE Access doi: 10.1109/ACCESS.2018.2805690 – volume: 128 start-page: 103174 issue: 5 year: 2023a ident: 10.7717/peerj-cs.1743/ref-2 article-title: Attack path detection for IIoT enabled cyber physical systems: revisited publication-title: Computers & Security doi: 10.1016/j.cose.2023.103174 – volume: 120 start-page: 102558 issue: 8 year: 2021 ident: 10.7717/peerj-cs.1743/ref-24 article-title: Effective malware detection scheme based on classified behavior graph in IIoT publication-title: Ad Hoc Networks doi: 10.1016/j.adhoc.2021.102558 – year: 2023 ident: 10.7717/peerj-cs.1743/ref-6 article-title: Common Vulnerabilities and Exposures |
| SSID | ssj0001511119 |
| Score | 2.3243597 |
| Snippet | In recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these... |
| SourceID | doaj unpaywall pubmedcentral proquest gale pubmed crossref |
| SourceType | Open Website Open Access Repository Aggregation Database Index Database Enrichment Source |
| StartPage | e1743 |
| SubjectTerms | Algorithms Algorithms and Analysis of Algorithms Analysis Control systems Controllers Cybersecurity Embedded systems Graph theory Industrial applications Industrial electronics Industrial IoT Information technology Internet of Things Interoperability Manufacturing Physical instruments Risk assessment Safety and security measures Security Security and Privacy Security systems Sensors Technology application Threat evaluation Threat graph Threats |
| SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1Lb9QwELZQL3Dh_QgUZBCCC1Gd2HGc44KoWiQ4QCv1ZvnZ3WpJVpusEPx6ZpLsagMCLlzjsWR_GXu-USbfEPKSscAsr2wqvQopMOI8NSrAubKlKjwkLNb2Vb6f5Mm5-HBRXOy1-sKasEEeeADuKJMxMwWEFcejcFJBeAmZ9IGpWJoys3j7MlXtJVPD_8F4FVSDqGYJKcvRKoT1VeparODhkyDUa_X_fiPvhaRfyyWvb-qV-f7NLJd7sej4Nrk5kkg6GxZ_h1wL9V1ya9uggY7n9R6ZfWz8IgLJpL0udYohy1OzvGzWi27-lXYNNShK8iPQduxjR7s50siWLmp62pzdJ-fH78_enaRjz4TUFVyI1DrgUJJzI7movK2iLWXgMWS8NDxy64u8ME4AmtJJZ5nJFfOmUkF6hkLd_AE5qJs6PCLU-OiZzyFBExDHGbiciDBZRNSoD2WWkDdbELUbBcWxr8VSQ2KBmOsec-1ajZgn5NXOfDUoafzJ8C2-kZ0RCmD3D8At9OgW-l9ukZAX-D41SlzUWENzaTZtq0-_fNYzBawXP4SLhLwejWIDK3dm_CUB9o-qWBPLw4klnEE3Hd66jR7vgFZjKot6hRKQer4bxplY11aHZgM2FRDMHDZdJuTh4GW7ffdadULmCVET_5sAMx2pF_NeIRxy-hKIr4QN7lz176A__h-gPyE3cuCAfbWPOiQH3XoTngJn6-yz_nj-BHz6QI0 priority: 102 providerName: Directory of Open Access Journals – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1Lb9NAEF6V9AAX3g9DQQYhuGDV9q7X6wNCKWrVIhGh0kq9rfblJCjYIXaE4Ncz46zTGkSv2bGUGc_jG3v8DSGv49jFmhY64la4CBBxGinhIK50LjILDYvW3ZTvhB-fs08X2cUOmfTfwuBYZZ8Tu0Rta4PPyPexMUD2N558WP6IcGsUvl3tV2gov1rBvu8oxm6Q3RSZsUZk9-Bw8uX08qlLhimi2JBt5tDK7C-dW32LTIOTPXRQnDoO_38z9ZVS9fcY5c11tVS_fqrF4kqNOrpLbntwGY433nCP7LjqPrnTL24IfRw_IOPPtZ2XAD7Djq86wlJmQ7WYgsLt7HvY1qFCspLfLmz8fruwnSG8bMJ5FZ7UZw_J-dHh2cfjyO9SiExGGYu0AWzFKVWcssLqotQ5d7R0Cc0VLam2WZopw4Sh3HCjY5WK2KpCOG5jJPCmj8ioqiv3hITKlja2KTRuDOp7DK7ISriYlchd7_IkIO96I0rjicZx38VCQsOBNpedzaVpJNo8IG-24ssNw8b_BA_wjmyFkBi7-6FeTaWPM5nwMlEZoBBDS2a4ADTiEm5dLMpc5YkOyCu8nxKpLyqcrZmqddPIk6-nciwADeMLchaQt16orOGfG-U_VQD9kS1rILk3kITYNMPj3m2kzw2NvPTkgLzcHuOVOO9WuXoNMgUAzxSUzgPyeONlW707DjvG04CIgf8NDDM8qeazjjkcev0cADEHBbeuer3Rn16vwTNyKwXU1833iD0yaldr9xxQWqtf-ND7AxCdPsg priority: 102 providerName: ProQuest |
| Title | Modified graph-based algorithm to analyze security threats in IoT |
| URI | https://www.ncbi.nlm.nih.gov/pubmed/38192462 https://www.proquest.com/docview/2899510361 https://www.proquest.com/docview/2912527437 https://pubmed.ncbi.nlm.nih.gov/PMC10773926 https://doi.org/10.7717/peerj-cs.1743 https://doaj.org/article/16f1a5818c3f4c68853e16de08f7a71b |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ : Directory of Open Access Journals [open access] customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: DOA dateStart: 20150101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: M~E dateStart: 20150101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre – providerCode: PRVAQN databaseName: PubMed Central customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: RPM dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.ncbi.nlm.nih.gov/pmc/ providerName: National Library of Medicine – providerCode: PRVPQU databaseName: Proquest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2376-5992 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: BENPR dateStart: 20150527 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 2376-5992 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001511119 issn: 2376-5992 databaseCode: 8FG dateStart: 20150527 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9NAEF7R5AAXyhtDiQxCcMHF9tq762OKGlokoqq0Ujmt9tkEgh3FjhD99cw6myhuxePqnZU84xnPN97xNwi9jmMTS1zIiGhmIkDEaSSYgbiSlOUaChYp2y7fMTk6zz5d5Be-icb9C7N1fk-h0ng_N2bxLVK1a7zBO6hPcoDcPdQ_H58Mv7aD4yiJ8qJIV_yZN_d08k1Ly3_z5buVfa53Rt5elnPx66eYzbbSzmgXjdY3vOo2-b6_bOS-urrG5fhPje6hux54hsOVp9xHt0z5AO2uhzqEPsYfouHnSk8tANOw5bKOXJrToZhdVotpM_kRNlUoHJHJlQlrP_subCYOetbhtAyPq7NH6Hx0ePbhKPJzFiKV4yyLpALcRTAWBGeFloWVlBhsTYKpwBZLnae5UBlTmCiiZCxSFmtRMEN07Mi98WPUK6vSPEWh0FbHOoWiLoPcH4ObZhY2Z9bx2huaBOjd-mlw5UnI3SyMGYdixJmHt-bhqubOPAF6sxGfr9g3_iR44B7tRsiRZrcXwPLcxyBPiE1EDghFYZspwgCpmIRoEzNLBU1kgF45x-COFqN0fTeXYlnX_PjLKR8yQMru8DwL0FsvZCu4cyX8bwygv2PS6kjudSQhblV3ee1_3L83au7KX8dxSMBSLzfLbqfrhStNtQSZAkBpCkrTAD1ZuetG75bfLiNpgFjHkTuG6a6U00nLKp7ElAJYJqDgxuf_bvRn_y35HN1JARy2bUBsD_WaxdK8ADDXyAHaYaOPA9Q_OByfnA7aTyIDH96_AUhnTS0 |
| linkProvider | Unpaywall |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3db9MwELfG9jBe-P4IDDCIjxeiJbHjJA8T6mBTy7YKjU7am3Fspy0qSWlaTeOP42_jLk26BcTe9lqfo_p8d_5dcv4dIa89z3opS1JXmNi6gIgDV8UW_CqN4tBAwpKmVZVvX3RP-OfT8HSN_G7uwmBZZRMTq0BtCo3vyLcxMUD2N-F_mP50sWsUfl1tWmiourWC2akoxuqLHQf2_AxSuHKn9wn2-00Q7O8NPnbdusuAq0PGuZtqQB2CMSUYT0yaZGkkLMuszyLFMpaaMAiV5rFmQgudeiqIPaOS2ArjIbU1g-feIBscZkPyt7G71_9yfPGWJ8SQlCzJPSNInban1s6-u7rESiLWOgyrngH_ngyXjsa_yzY3F_lUnZ-pyeTSmbh_h9yqwSztLK3vLlmz-T1yu2kUQeu4cZ90jgozzgDs0oof28Wj01A1GYKC56MfdF5QheQovywt6356dD5COFvScU57xeABObkWrT4k63mR28eEKpMZzwSQKHLAEx6YPs9gMs-QK99GvkPeN0qUuiY2x_4aEwkJDupcVjqXupSoc4e8XYlPl4we_xPcxR1ZCSERd_VDMRvK2q-lLzJfhYB6NMu4FjGgH-sLY704i1Tkpw55hfspkWojx1qeoVqUpex9PZadGNA3fpDnDnlXC2UF_HOt6qsRsH5k52pJbrUkIRbo9nBjNrKORaW88ByHvFwN40ysr8ttsQCZBIBuAIuOHPJoaWWrdVeceVwEDolb9tdSTHskH48qpnLfiyIA4AIWuDLVq5X-5OoVvCCb3cHRoTzs9Q-ekpsBIM6qtijeIuvz2cI-A4Q4T5_XbkjJt-v2_D_XeHx8 |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9NAEF6VIgEX3g9DgQXxuGDF9tpr-4BQoYSGQoVoK_W27DMJCnaIE1Xlp_HrmHHstAbRW6_eseWdnZn9xp79hpBnQWADxXLlc5NZHxBx5MvMgl-pNEsMJCxK1VW-u3z7IP54mByukd_tWRgsq2xjYh2oTanxG3kPEwNkf-NhzzVlEV-2-m-mP33sIIV_Wtt2GksT2bHHR5C-Va8HW7DWz6Oo_37_3bbfdBjwdcLi2FcaEAdnTHIW50blTqXcMmdDlkrmmDJJlEgdZ5pxzbUKZJQFRuaZ5SZAWmsGz71ALqbI4o6n1PsfTr7vJBiM8iWtZwpJU29q7ey7ryusIWKdbbDuFvDvnnBqU_y7YPPyopjK4yM5mZzaDfvXydUGxtLNpd3dIGu2uEmutS0iaBMxbpHNz6UZO4C5tGbG9nHTNFROhqDO-egHnZdUIi3KL0urppMenY8QyFZ0XNBBuX-bHJyLTu-Q9aIs7D1CpXEmMBGkiDEgiQCMPnZwc-yQJd-moUdetUoUuqE0x84aEwGpDepc1DoXuhKoc4-8WIlPl1we_xN8iyuyEkIK7vpCORuKxqNFyF0oE8A7mrlY8wxwjw25sUHmUpmGyiNPcT0FkmwUaK5DuagqMdj7KjYzwN34Kz72yMtGyJXw5lo2hyJg_sjL1ZHc6EhCFNDd4dZsRBOFKnHiMx55shrGO7GyrrDlAmRygLgRTDr1yN2lla3mXbPlxTzySNaxv45iuiPFeFRzlIdBmgL05jDBlamerfT7Z8_gMbkE_i4-DXZ3HpArEUDNuqgo2yDr89nCPgRoOFePah-k5Nt5O_0fgF16Fg |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3db9MwELege4AXxjeBgQxC8EK2JHYc57Egqg2JCcEqjSfLn2tZl1RNKsT-es6pWzWb-HiNz5Lvcuf7nXL5HUKvk8QmipQqZobbGBBxFktuIa5UwXMDBYtSXZfvMTsc00-n-WloovH_wmx9vy-g0jiYW7v4EevGN96Qm2iH5QC5B2hnfPxl-L0bHFewOC_LbMWfeX1PL990tPzXL9-t7HO1M_LWsprLXz_lbLaVdka7aLQ-8Krb5Hx_2ap9fXmFy_GfGt1FdwLwxMOVp9xDN2x1H-2uhzrgEOMP0PBzbaYOgCnuuKxjn-YMlrOzejFtJxe4rbH0RCaXFjdh9h1uJx56Nnha4aP65CEajz6efDiMw5yFWOeE0lhpwF2MEMkILY0qnSqYJc6mpJDEEWXyLJeack2YZlolMuOJkSW3zCSe3Js8QoOqruwThKVxJjEZFHUUcn8CbkodbKbO89rbIo3Qu_XbEDqQkPtZGDMBxYg3j-jMI3QjvHki9GYjPl-xb_xJ8L1_tRshT5rdPQDLixCDImUulTkgFE0c1YwDUrEpMzbhrpBFqiL0yjuG8LQYle-7OZPLphFH376KIQek7D-e0wi9DUKuhpNrGX5jAP09k1ZPcq8nCXGr-8tr_xPh3miEL389xyEDS73cLPudvheusvUSZEoApRkoXUTo8cpdN3p3_HaUZRHiPUfuGaa_Uk0nHat4mhQFgGUGCm58_u9Gf_rfks_Q7QzAYdcGxPfQoF0s7XMAc616EUL5N2unSbg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Modified+graph-based+algorithm+to+analyze+security+threats+in+IoT&rft.jtitle=PeerJ.+Computer+science&rft.au=Arat%2C+Ferhat&rft.au=Akleylek%2C+Sedat&rft.date=2023-12-08&rft.issn=2376-5992&rft.eissn=2376-5992&rft.volume=9&rft.spage=e1743&rft_id=info:doi/10.7717%2Fpeerj-cs.1743&rft.externalDBID=n%2Fa&rft.externalDocID=10_7717_peerj_cs_1743 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2376-5992&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2376-5992&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2376-5992&client=summon |