Trust and Risk Assessment in IoT Networks

Authors

  • Jeffrey Hemmes Department of Computer and Cyber Sciences, Anderson College of Business and Computing, Regis University, Denver, CO, USA https://orcid.org/0009-0007-1734-3850
  • Steven Fulton Department of Computer and Cyber Sciences, United States Air Force Academy, Colorado Springs, CO, USA https://orcid.org/0000-0001-6962-8558
  • Judson Dressler Department of Computer and Cyber Sciences, United States Air Force Academy, Colorado Springs, CO, USA
  • Stephen Kirkman Department of Computer and Cyber Sciences, Anderson College of Business and Computing, Regis University, Denver, CO, USA https://orcid.org/0000-0002-9725-786X

DOI:

https://doi.org/10.37256/cnc.1120232667

Keywords:

Internet of Things, IoT security, risk, trust, trust models, device characterization, device fingerprinting, device profiling, access control

Abstract

The Internet of Things (IoT) is a large-scale, heterogeneous ecosystem of connected devices encompassing a range of purposes and computing capabilities. As IoT systems grow ubiquitous, new approaches to security are needed. This work proposes a method of risk assessment for devices that combines the use of trust models based on dynamic behaviors with static capability profiles drawn from immutable device characteristics to determine the level of risk each device poses to network security. A risk-based approach allows security mechanisms and monitoring activities to be more efficiently allocated across IoT networks. Simultaneously, devices can be allowed a greater degree of functionality while ensuring system availability and security. This paper presents a methodology and architecture to integrate risk assessment into IoT networks. This allows additional tailoring of security control application and provides higher-level, more human-readable information for security analysts.

Downloads

Published

2023-05-30

How to Cite

Hemmes, J., Fulton, S., Dressler, J., & Kirkman, S. (2023). Trust and Risk Assessment in IoT Networks. Computer Networks and Communications, 1(1), 181–194. https://doi.org/10.37256/cnc.1120232667