• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网系统中的人工智能安全与网络风险。

AI security and cyber risk in IoT systems.

作者信息

Radanliev Petar, De Roure David, Maple Carsten, Nurse Jason R C, Nicolescu Razvan, Ani Uchenna

机构信息

Department of Computer Science, University of Oxford, Oxford, United Kingdom.

Department of Computer Science, School of Computing and Engineering, Huddersfield University, Huddersfield, United Kingdom.

出版信息

Front Big Data. 2024 Oct 10;7:1402745. doi: 10.3389/fdata.2024.1402745. eCollection 2024.

DOI:10.3389/fdata.2024.1402745
PMID:39449740
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11499169/
Abstract

Internet-of-Things (IoT) refers to low-memory connected devices used in various new technologies, including drones, autonomous machines, and robotics. The article aims to understand better cyber risks in low-memory devices and the challenges in IoT risk management. The article includes a critical reflection on current risk methods and their level of appropriateness for IoT. We present a dependency model tailored in context toward current challenges in data strategies and make recommendations for the cybersecurity community. The model can be used for cyber risk estimation and assessment and generic risk impact assessment. The model is developed for cyber risk insurance for new technologies (e.g., drones, robots). Still, practitioners can apply it to estimate and assess cyber risks in organizations and enterprises. Furthermore, this paper critically discusses why risk assessment and management are crucial in this domain and what open questions on IoT risk assessment and risk management remain areas for further research. The paper then presents a more holistic understanding of cyber risks in the IoT. We explain how the industry can use new risk assessment, and management approaches to deal with the challenges posed by emerging IoT cyber risks. We explain how these approaches influence policy on cyber risk and data strategy. We also present a new approach for cyber risk assessment that incorporates IoT risks through dependency modeling. The paper describes why this approach is well suited to estimate IoT risks.

摘要

物联网(IoT)指的是用于各种新技术的低内存连接设备,包括无人机、自主机器和机器人技术。本文旨在更好地理解低内存设备中的网络风险以及物联网风险管理中的挑战。文章对当前的风险方法及其对物联网的适用性水平进行了批判性反思。我们提出了一种针对数据策略当前挑战量身定制的依赖模型,并为网络安全社区提出建议。该模型可用于网络风险估计与评估以及一般风险影响评估。该模型是为新技术(如无人机、机器人)的网络风险保险而开发的,但从业者也可将其应用于估计和评估组织和企业中的网络风险。此外,本文批判性地讨论了为何风险评估和管理在该领域至关重要,以及物联网风险评估和风险管理方面仍有哪些开放性问题有待进一步研究。然后,本文对物联网中的网络风险提出了更全面的理解。我们解释了该行业如何利用新的风险评估和管理方法来应对新兴物联网网络风险带来的挑战。我们解释了这些方法如何影响网络风险政策和数据策略。我们还提出了一种通过依赖建模纳入物联网风险的网络风险评估新方法。本文描述了为何这种方法非常适合估计物联网风险。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/913fc48f07b2/fdata-07-1402745-g0006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/33a582dab54d/fdata-07-1402745-g0001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/fb65d8621aef/fdata-07-1402745-g0002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/e65bf43a44e6/fdata-07-1402745-g0003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/fa81b83e59e5/fdata-07-1402745-g0004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/225e7ae59d27/fdata-07-1402745-g0005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/913fc48f07b2/fdata-07-1402745-g0006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/33a582dab54d/fdata-07-1402745-g0001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/fb65d8621aef/fdata-07-1402745-g0002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/e65bf43a44e6/fdata-07-1402745-g0003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/fa81b83e59e5/fdata-07-1402745-g0004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/225e7ae59d27/fdata-07-1402745-g0005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/127f/11499169/913fc48f07b2/fdata-07-1402745-g0006.jpg

相似文献

1
AI security and cyber risk in IoT systems.物联网系统中的人工智能安全与网络风险。
Front Big Data. 2024 Oct 10;7:1402745. doi: 10.3389/fdata.2024.1402745. eCollection 2024.
2
Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems: cyber risk at the edge.复杂物联网系统中不可控状态的动态实时风险分析:边缘网络风险
Environ Syst Decis. 2021;41(2):236-247. doi: 10.1007/s10669-020-09792-x. Epub 2020 Nov 22.
3
Epistemological Equation for Analysing Uncontrollable States in Complex Systems: Quantifying Cyber Risks from the Internet of Things.用于分析复杂系统中不可控状态的认识论方程:量化物联网带来的网络风险。
Rev Socionetwork Strateg. 2021;15(2):381-411. doi: 10.1007/s12626-021-00086-5. Epub 2021 Jul 22.
4
Artificial intelligence in cyber physical systems.信息物理系统中的人工智能。
AI Soc. 2021;36(3):783-796. doi: 10.1007/s00146-020-01049-0. Epub 2020 Aug 27.
5
Cybersecurity and Cyber Forensics for Smart Cities: A Comprehensive Literature Review and Survey.智慧城市的网络安全和网络取证:全面文献回顾与调查。
Sensors (Basel). 2023 Apr 2;23(7):3681. doi: 10.3390/s23073681.
6
An Intelligent Framework for Cyber-Physical Satellite System and IoT-Aided Aerial Vehicle Security Threat Detection.用于信息物理卫星系统和物联网辅助飞行器安全威胁检测的智能框架。
Sensors (Basel). 2023 Aug 14;23(16):7154. doi: 10.3390/s23167154.
7
Secure Smart Wearable Computing through Artificial Intelligence-Enabled Internet of Things and Cyber-Physical Systems for Health Monitoring.通过人工智能赋能的物联网和信息物理系统实现健康监测的安全智能可穿戴计算。
Sensors (Basel). 2022 Jan 29;22(3):1076. doi: 10.3390/s22031076.
8
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes.基于物联网的智能家居的网络与物理安全漏洞评估
Sensors (Basel). 2018 Mar 8;18(3):817. doi: 10.3390/s18030817.
9
A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities.工业物联网安全综述:需求、攻击、基于人工智能的解决方案及边缘计算机遇
Sensors (Basel). 2023 Aug 28;23(17):7470. doi: 10.3390/s23177470.
10
The Big Picture on the "AI Turn" for Digital Health: The Internet of Things and Cyber-Physical Systems.数字健康领域的“人工智能革命”全景图:物联网和信息物理系统。
OMICS. 2019 Jun;23(6):308-311. doi: 10.1089/omi.2019.0069. Epub 2019 May 8.

本文引用的文献

1
Reliability model of the security subsystem countering to the impact of typed cyber-physical attacks.应对特定类型网络物理攻击影响的安全子系统可靠性模型。
Sci Rep. 2022 Jul 27;12(1):12849. doi: 10.1038/s41598-022-17254-4.
2
Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks.利用深度学习检测生物网络攻击中的木马恶意软件的数字编码 DNA 触发器。
Sci Rep. 2022 Jun 10;12(1):9631. doi: 10.1038/s41598-022-13700-5.
3
Security Events and Vulnerability Data for Cybersecurity Risk Estimation.用于网络安全风险评估的安全事件和漏洞数据。
Risk Anal. 2017 Aug;37(8):1606-1627. doi: 10.1111/risa.12864.
4
The FAIR Guiding Principles for scientific data management and stewardship.科学数据管理和保存的 FAIR 指导原则。
Sci Data. 2016 Mar 15;3:160018. doi: 10.1038/sdata.2016.18.