such as application-level security, authentication, au-
thorization, and encryption.
Our risk assessment framework takes into account
the key aspects of risk impact, likelihood impact, and
the number of devices as well, which are the key
contribution of the framework. The number of de-
vices has a direct impact on the overall risk evalua-
tion, as they are directly linked with the device thresh-
old. Moreover, the proposed framework shows that
the risk faced by an IoT device changes if the device
threshold is modified.
In the near future, we are planning to validate the
effectiveness and usability of the proposed framework
on a simulated IoT-enabled healthcare system. We
will then expand our testing to other scenarios, and
ultimately test it with IoT datasets captured from real-
world test beds.
REFERENCES
Bahizad, S. (2020). Risks of increase in the iot devices. In
2020 7th IEEE international conference on cyber se-
curity and cloud computing (CSCloud)/2020 6th IEEE
international conference on edge computing and scal-
able cloud (EdgeCom), pages 178–181. IEEE.
Chen, B., Yang, Z., Zhang, Y., Chen, Y., and Zhao, J.
(2020). Risk assessment of cyber attacks on power
grids considering the characteristics of attack behav-
iors. IEEE Access, 8:148331–148344.
Datta, S. K. (2020). Draft-a cybersecurity framework for iot
platforms. In 2020 Zooming Innovation in Consumer
Technologies Conference (ZINC), pages 77–81. IEEE.
Jasour, A., Huang, X., Wang, A., and Williams, B. C.
(2022). Fast nonlinear risk assessment for au-
tonomous vehicles using learned conditional proba-
bilistic models of agent futures. Autonomous Robots,
46(1):269–282.
Koohang, A., Sargent, C. S., Nord, J. H., and Paliszkiewicz,
J. (2022). Internet of things (iot): From awareness to
continued use. International Journal of Information
Management, 62:102442.
Matheu, S. N., Hernandez-Ramos, J. L., Skarmeta, A. F.,
and Baldini, G. (2020). A survey of cybersecurity cer-
tification for the internet of things. ACM Computing
Surveys (CSUR), 53(6):1–36.
Matsuda, W., Fujimoto, M., Hashimoto, Y., and Mitsunaga,
T. (2021). Cyber security risks of technical com-
ponents in industry 4.0. In 2021 IEEE Interna-
tional Conference on Omni-Layer Intelligent Systems
(COINS), pages 1–7. IEEE.
McIlwraith, A. (2021). Information security and employee
behaviour: how to reduce risk through employee edu-
cation, training and awareness. Routledge.
Nurse, J. R., Creese, S., and De Roure, D. (2017). Secu-
rity risk assessment in internet of things systems. IT
professional, 19(5):20–26.
Oser, P., Feger, S., Wo
´
zniak, P. W., Karolus, J., Spagnuelo,
D., Gupta, A., L
¨
uders, S., Schmidt, A., and Kargl, F.
(2020). Safer: Development and evaluation of an iot
device risk assessment framework in a multinational
organization. Proceedings of the ACM on Interac-
tive, Mobile, Wearable and Ubiquitous Technologies,
4(3):1–22.
Radanliev, P., De Roure, D., Page, K., Nurse, J. R., Man-
tilla Montalvo, R., Santos, O., Maddox, L., and Bur-
nap, P. (2020). Cyber risk at the edge: current and fu-
ture trends on cyber risk analytics and artificial intelli-
gence in the industrial internet of things and industry
4.0 supply chains. Cybersecurity, 3(1):1–21.
Radanliev, P., De Roure, D. C., Nicolescu, R., Huth, M.,
Montalvo, R. M., Cannady, S., and Burnap, P. (2018).
Future developments in cyber risk assessment for the
internet of things. Computers in industry, 102:14–22.
Raghuvanshi, A., Singh, U. K., and Joshi, C. (2022). A re-
view of various security and privacy innovations for
iot applications in healthcare. Advanced Healthcare
Systems: Empowering Physicians with IoT-Enabled
Technologies, pages 43–58.
Razdan, S. and Sharma, S. (2022). Internet of medical
things (iomt): overview, emerging technologies, and
case studies. IETE Technical Review, 39(4):775–788.
Roy, P. P. (2020). A high-level comparison between the
nist cyber security framework and the iso 27001 in-
formation security standard. In 2020 National Confer-
ence on Emerging Trends on Sustainable Technology
and Engineering Applications (NCETSTEA), pages 1–
3. IEEE.
Samad, J., Reed, K., and Loke, S. W. (2018). A risk aware
development and deployment methodology for cloud
enabled internet-of-things. In 2018 IEEE 4th World
Forum on Internet of Things (WF-IoT), pages 433–
438. IEEE.
Shahid, W. B., Aslam, B., Abbas, H., Khalid, S. B., and
Afzal, H. (2022). An enhanced deep learning based
framework for web attacks detection, mitigation and
attacker profiling. Journal of Network and Computer
Applications, 198:103270.
Wang, B., Li, M., Jin, X., and Guo, C. (2020). A reliable
iot edge computing trust management mechanism for
smart cities. IEEE Access, 8:46373–46399.
Zhao, Y., Cheng, G., Duan, Y., Gu, Z., Zhou, Y., and Tang,
L. (2021). Secure iot edge: Threat situation aware-
ness based on network traffic. Computer Networks,
201:108525.
SECRYPT 2023 - 20th International Conference on Security and Cryptography
672