Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things

The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to...

Full description

Bibliographic Details
Main Authors: Marek Janiszewski, Anna Felkner, Piotr Lewandowski, Marcin Rytel, Hubert Romanowski
Format: Article
Language:English
Published: MDPI AG 2021-06-01
Series:Sensors
Subjects:
TRM
Online Access:https://www.mdpi.com/1424-8220/21/13/4359
id doaj-75525774357748448a08d8cf3b4a20a6
record_format Article
spelling doaj-75525774357748448a08d8cf3b4a20a62021-07-15T15:45:10ZengMDPI AGSensors1424-82202021-06-01214359435910.3390/s21134359Automatic Actionable Information Processing and Trust Management towards Safer Internet of ThingsMarek Janiszewski0Anna Felkner1Piotr Lewandowski2Marcin Rytel3Hubert Romanowski4Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandThe security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data.https://www.mdpi.com/1424-8220/21/13/4359Internet of Things (IoT)vulnerabilitiesvulnerability databaseexploitsTRMtrust
collection DOAJ
language English
format Article
sources DOAJ
author Marek Janiszewski
Anna Felkner
Piotr Lewandowski
Marcin Rytel
Hubert Romanowski
spellingShingle Marek Janiszewski
Anna Felkner
Piotr Lewandowski
Marcin Rytel
Hubert Romanowski
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
Sensors
Internet of Things (IoT)
vulnerabilities
vulnerability database
exploits
TRM
trust
author_facet Marek Janiszewski
Anna Felkner
Piotr Lewandowski
Marcin Rytel
Hubert Romanowski
author_sort Marek Janiszewski
title Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
title_short Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
title_full Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
title_fullStr Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
title_full_unstemmed Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
title_sort automatic actionable information processing and trust management towards safer internet of things
publisher MDPI AG
series Sensors
issn 1424-8220
publishDate 2021-06-01
description The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data.
topic Internet of Things (IoT)
vulnerabilities
vulnerability database
exploits
TRM
trust
url https://www.mdpi.com/1424-8220/21/13/4359
work_keys_str_mv AT marekjaniszewski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings
AT annafelkner automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings
AT piotrlewandowski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings
AT marcinrytel automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings
AT hubertromanowski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings
_version_ 1721298527404949504