Smart City Gnosys

Smart city article details

Title Threat Extraction In Iot-Based Systems Focusing On Smart Cities
ID_Doc 57293
Authors Nejatifar A.; Hadavi M.A.
Year 2019
Published Proceedings of 16th International ISC Conference on Information Security and Cryptology, ISCISC 2019
DOI http://dx.doi.org/10.1109/ISCISC48546.2019.8985147
Abstract IoT-based services are widely increasing due to their advantages such as economy, automation, and comfort. Smart cities are among major applications of IoT-based systems. However, security and privacy threats are vital issues challenging the utilization of such services. Connectivity nature, variety of data technology, and volume of data maintained through these systems make their security analysis a difficult process. Threat modeling is one the best practices for security analysis, especially for complex systems. This paper proposes a threat extraction method for IoT-based systems. We elaborate on a smart city scenario with three services including lighting, car parking, and waste management. Investigating on these services, firstly, we identify thirty-two distinct threat types. Secondly, we distinguish threat root causes by associating a threat to constituent parts of the IoT-based system. In this way, threat instances can be extracted using the proposed derivation rules. Finally, we evaluate our method on a smart car parking scenario as well as on an E-Health system and identify more than 50 threat instances in each cases to show that the method can be easily generalized for other IoT-based systems whose constituent parts are known. © 2019 IEEE.
Author Keywords Internet of things; Security; Smart city; Threat extraction


Similar Articles


Id Similarity Authors Title Published
34134 View0.863Alhanahnah M.; Stevens C.; Chen B.; Yan Q.; Bagheri H.Iotcom: Dissecting Interaction Threats In Iot SystemsIEEE Transactions on Software Engineering, 49, 4 (2023)
47823 View0.856Alshamrani S.; Hasan R.Security Analysis Of A Smart City Traffic Control System Using A Threat Model-Based ApproachConference Proceedings - IEEE SOUTHEASTCON, 2023-April (2023)
44460 View0.854Hemalatha T.; Venkatakiran S.; Kaur M.; Manojkumar S.B.; Prasad V.V.; Ashreetha B.Real-Time Threat Detection And Countermeasures In Iot Environments7th International Conference on Electronics, Communication and Aerospace Technology, ICECA 2023 - Proceedings (2023)