Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things
The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-06-01
|
Series: | Sensors |
Subjects: | |
Online Access: | https://www.mdpi.com/1424-8220/21/13/4359 |
id |
doaj-75525774357748448a08d8cf3b4a20a6 |
---|---|
record_format |
Article |
spelling |
doaj-75525774357748448a08d8cf3b4a20a62021-07-15T15:45:10ZengMDPI AGSensors1424-82202021-06-01214359435910.3390/s21134359Automatic Actionable Information Processing and Trust Management towards Safer Internet of ThingsMarek Janiszewski0Anna Felkner1Piotr Lewandowski2Marcin Rytel3Hubert Romanowski4Research and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandResearch and Academic Computer Network (NASK), Kolska 12, 01-045 Warsaw, PolandThe security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data.https://www.mdpi.com/1424-8220/21/13/4359Internet of Things (IoT)vulnerabilitiesvulnerability databaseexploitsTRMtrust |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Marek Janiszewski Anna Felkner Piotr Lewandowski Marcin Rytel Hubert Romanowski |
spellingShingle |
Marek Janiszewski Anna Felkner Piotr Lewandowski Marcin Rytel Hubert Romanowski Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things Sensors Internet of Things (IoT) vulnerabilities vulnerability database exploits TRM trust |
author_facet |
Marek Janiszewski Anna Felkner Piotr Lewandowski Marcin Rytel Hubert Romanowski |
author_sort |
Marek Janiszewski |
title |
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things |
title_short |
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things |
title_full |
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things |
title_fullStr |
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things |
title_full_unstemmed |
Automatic Actionable Information Processing and Trust Management towards Safer Internet of Things |
title_sort |
automatic actionable information processing and trust management towards safer internet of things |
publisher |
MDPI AG |
series |
Sensors |
issn |
1424-8220 |
publishDate |
2021-06-01 |
description |
The security of the Internet of Things (IoT) is a very important aspect of everyday life for people and industries, as well as hospitals, military, households and cities. Unfortunately, this topic is still too little researched and developed, which results in exposing users of Internet of Things to possible threats. One of the areas which should be addressed is the creation of a database of information about vulnerabilities and exploits in the Internet of Things; therefore, the goal of our activities under the VARIoT (Vulnerability and Attack Repository for IoT) project is to develop such a database and make it publicly available. The article presents the results of our research aimed at building this database, i.e., how the information about vulnerabilities is obtained, standardized, aggregated and correlated as well as the way of enhancing and selecting IoT related data. We have obtained and proved that existing databases provide various scopes of information and because of that a single and most comprehensive source of information does not exist. In addition, various sources present information about a vulnerability at different times—some of them are faster than others, and the differences in publication dates are significant. The results of our research show that aggregation of information from various sources can be very beneficial and has potential to enhance actionable value of information. We have also shown that introducing more sophisticated concepts, such as trust management and metainformation extraction based on artificial intelligence, could ensure a higher level of completeness of information as well as evaluate the usefulness and reliability of data. |
topic |
Internet of Things (IoT) vulnerabilities vulnerability database exploits TRM trust |
url |
https://www.mdpi.com/1424-8220/21/13/4359 |
work_keys_str_mv |
AT marekjaniszewski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings AT annafelkner automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings AT piotrlewandowski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings AT marcinrytel automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings AT hubertromanowski automaticactionableinformationprocessingandtrustmanagementtowardssaferinternetofthings |
_version_ |
1721298527404949504 |