2018
DOI: 10.1109/access.2018.2805690
|View full text |Cite
|
Sign up to set email alerts
|

A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
40
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 101 publications
(59 citation statements)
references
References 23 publications
0
40
0
Order By: Relevance
“…(i) For the ideal attack scenario, the common metrics involve the most likely attack path [17][18][19], success probability of intention [10,16,18,19], and the number of attack paths [16][17][18][19], which are investigated in the acyclic graph. Furthermore, [18,19] further analyzed the mean, median, and mode of path lengths.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…(i) For the ideal attack scenario, the common metrics involve the most likely attack path [17][18][19], success probability of intention [10,16,18,19], and the number of attack paths [16][17][18][19], which are investigated in the acyclic graph. Furthermore, [18,19] further analyzed the mean, median, and mode of path lengths.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
“…A modified version of Floyd-Warshall and Dijkstra algorithm is proposed by Sarraute et al [16] to compute the shortest attack path. To explore the fast and accurate solution of finding a potential vulnerable path in the network, Wang et al [17] used the augmented road algorithm to find optimal attack path within the global paths. To integrate the above security metrics, Idika et al [18] presented a suite of AG-based security metrics.…”
Section: Mathematical Problems In Engineeringmentioning
confidence: 99%
“…Due to the advancement in information and communication technologies (ICT), the internet of things (IoT) has emerged as a new area of research. The well-known applications of the GT in the IoT area are: (1) graph-based clustering for two-tier architecture [77], (2) risk assessment in internet of things environment [78], (3) data functional networks and a domain functional networks [79], (4) information diffusion in narrowband internet of things [80], (5) smart transportation using internet-of-things-generated big data [81], (6) vulnerability assessment method in an industrial internet of things (IIoTs) based on the attack graph and maximum flow [82], and information fusion of multiple sources to defend intentional attacks [83].…”
Section: Applications Of Graph Theory In Scheduling-related Problemsmentioning
confidence: 99%
“…Light fidelity (LiFi) has been the interesting technology for the modern network in the coming years because it can offer the large demands of applications . The high capacity of information such as big data can be performed and implemented by the internet of things (IoT) . Moreover, the use of materials such as GaAsInP‐P, silicon, graphene, and chalcogenide for waveguides and devices can provide wider applications .…”
Section: Introductionmentioning
confidence: 99%
“…[1][2][3][4] The high capacity of information such as big data [5][6][7] can be performed and implemented by the internet of things (IoT). [8][9][10][11][12] Moreover, the use of materials such as GaAsInP-P, silicon, graphene, and chalcogenide for waveguides and devices can provide wider applications. [13][14][15][16][17][18] Recently, the use of the stacked layers of silicon-graphene-gold has shown the very interesting results, 19,20 where the conversion between electrical and optical signals can be made as following details.…”
Section: Introductionmentioning
confidence: 99%