2017
DOI: 10.1109/tsc.2016.2544307
|View full text |Cite
|
Sign up to set email alerts
|

Risk Assessment in a Sensor Cloud Framework Using Attack Graphs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 44 publications
(16 citation statements)
references
References 20 publications
0
14
0
2
Order By: Relevance
“…For example, the only difference between the attack graph proposed by Li et al (2006) and the threat tree (a form of attack tree) by Marback et al (2013) is that the event flows top-down in the former and bottom-up in the latter. The same applies to the attack graphs by Bhattacharya et al (2008) and Sen and Madria (2017), and the attack trees by Tentilucci et al (2015), Buoni et al (2010) and Espedalen (2007). There are numerous further examples, and consequently, this paper focuses on attack graphs in general having recognised that the visual syntax problem described herein apply to both.…”
Section: Attack Graphsmentioning
confidence: 92%
“…For example, the only difference between the attack graph proposed by Li et al (2006) and the threat tree (a form of attack tree) by Marback et al (2013) is that the event flows top-down in the former and bottom-up in the latter. The same applies to the attack graphs by Bhattacharya et al (2008) and Sen and Madria (2017), and the attack trees by Tentilucci et al (2015), Buoni et al (2010) and Espedalen (2007). There are numerous further examples, and consequently, this paper focuses on attack graphs in general having recognised that the visual syntax problem described herein apply to both.…”
Section: Attack Graphsmentioning
confidence: 92%
“…Pu and Lim [29] have presented solution against selective forwarding attack using an analytical model that uses simulation-based approach. Sen and Madria [30] has used Bayesian network in order to investigate the intensity of attack on the basis of the attack graph analysis. Hence, there are various forms of research-based approaches that emphasizes on securing wireless network using different methodologies and identifying different problems.…”
Section: Related Workmentioning
confidence: 99%
“…A request aggregator is designed to aggregate latency requests from applications to minimize the workloads for energy saving, and a feedback-based control theory is designed to handle the sensing packet delivery latency. Sen et al [45] propose a risk assessment framework for a WSN-integrated sensor-cloud using attack graphs to measure the potential threats. The Bayesian-network-based approach analyzes attacks on WSNs and predicts the time frames of security degradation on the grounds of integrity, availability, and confidentiality.…”
Section: Related Workmentioning
confidence: 99%