Applied Sciences (Mar 2022)

Security Risk Analysis in IoT Systems through Factor Identification over IoT Devices

  • Roberto Omar Andrade,
  • Sang Guun Yoo,
  • Iván Ortiz-Garces,
  • Jhonattan Barriga

DOI
https://doi.org/10.3390/app12062976
Journal volume & issue
Vol. 12, no. 6
p. 2976

Abstract

Read online

IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be considered within risk assessment methodologies? We have addressed our study with a 4-phase design-research methodology (DRM) that allows us, based on systematic literature review, to experiment and draw upon expert judgment; as a final product, we obtain a risk assessment methodology based on the characteristics of IoT devices. At the end of this study, we establish seven main constructs—Organization, Risk Behaviors, Dependency, Attack Surface, Susceptibility, Severity and Uncertainty—over which security risk in IoT systems can be evaluated.

Keywords