Publication:
Modified Graph-Based Algorithm to Analyze Security Threats in IoT

dc.authorscopusid57212209490
dc.authorscopusid15833929800
dc.contributor.authorArat, F.
dc.contributor.authorAkleylek, S.
dc.date.accessioned2025-12-11T00:32:23Z
dc.date.issued2023
dc.departmentOndokuz Mayıs Üniversitesien_US
dc.department-temp[Arat] Ferhat, Department of Software Engineering, Samsun University, Samsun, Samsun, Turkey; [Akleylek] Sedat, Department of Software Engineering, Samsun University, Samsun, Samsun, Turkey, Department of Computer Engineering, Ondokuz Mayis Üniversitesi, Samsun, Turkey, Tartu Ülikool, Tartu, Tartumaa, Estonia, Cyber Security and Information Technologies Research and Development Center, Ondokuz Mayis Üniversitesi, Samsun, Turkeyen_US
dc.description.abstractIn recent years, the growing and widespread usage of Internet of Things (IoT) systems has led to the emergence of customized structures dependent on these systems. Industrial IoT (IIoT) is a subset of IoT in terms of applications and usage areas. IIoT presents many participants in various domains, such as healthcare, transportation, agriculture, and manufacturing. Besides the daily life benefits, IIoT technology provides major contributions via the Industrial Control System (ICS) and intelligent systems. The convergence of IoT and IIoT systems brings some integration and interoperability problems. In IIoT systems, devices interact with each other using information technologies (IT) and network space. However, these common usages and interoperability led to some security risks. To avoid security risks and vulnerabilities, different systems and protocols have been designed and published. Various public databases and programs identify and provide some of the security threats to make it easier for system administrators’ missions. However, effective and long-term security detection mechanisms are needed. In the literature, there are numerous approaches to detecting security threats in IoT-based systems. This article presents two major contributions: First, a graph-based threat detection approach for IoT-based network systems is proposed. Threat path detection is one of the most critical steps in the security of IoT-based systems. To represent vulnerabilities, a directed acyclic graph (DAG) structure is constructed using threat weights. General threats are identified using Common Vulnerabilities and Exposures (CVE). The proposed threat pathfinding algorithm uses the depth first search (DFS) idea and discovers threat paths from the root to all leaf nodes. Therefore, all possible threat paths are detected in the threat graph. Second, threat path-reducing algorithms are proposed considering the total threat weight, hop length, and hot spot thresholds. In terms of available threat pathfinding and hot spot detecting procedures, the proposed reducing algorithms provide better running times. Therefore, all possible threat paths are founded and reduced by the constructed IoT-based DAG structure. Finally, simulation results are compared, and remarkable complexity performances are obtained. © 2023, Arat and Akleylek. All rights reserved.en_US
dc.identifier.doi10.7717/PEERJ-CS.1743
dc.identifier.issn2376-5992
dc.identifier.scopus2-s2.0-85182389219
dc.identifier.scopusqualityQ1
dc.identifier.urihttps://doi.org/10.7717/PEERJ-CS.1743
dc.identifier.urihttps://hdl.handle.net/20.500.12712/37160
dc.identifier.volume9en_US
dc.identifier.wosqualityQ2
dc.language.isoenen_US
dc.publisherPeerJ Inc.en_US
dc.relation.ispartofPeerj Computer Scienceen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/openAccessen_US
dc.subjectGraph Theoryen_US
dc.subjectIndustrial IoTen_US
dc.subjectRisk Assessmenten_US
dc.subjectSecurityen_US
dc.subjectThreat Graphen_US
dc.subjectThreatsen_US
dc.titleModified Graph-Based Algorithm to Analyze Security Threats in IoTen_US
dc.typeArticleen_US
dspace.entity.typePublication

Files