
and assess these risks, using techniques that combine
information security risk management strategies with
Fuzzy Logic strategies, Markov Chains, Games The-
ory, logic and probabilistic programming. This article
presents the RTRMM architecture, and the Threat An-
alyzer and Risk Management modules (risk analysis
and assessment features).
2 IoT SECURITY - ISSUES AND
CHALLENGES
Implementing security in an IoT system is also an
arduous and ongoing process. IoT is one of the
more rapidly and dynamically growing technology
that handles protected information. The process is ar-
duous because it consists of a wide range of steps,
and continuous because its management (monitoring
and control) must be carried out periodically due to
the possible changes that the system may undergo,
in addition to the constant and new threats that are
presented in the cyber universe. To facilitate the se-
curity deployment task, understanding the organiza-
tion’s business processes is essential, as this under-
standing facilitates decision-making about which se-
curity controls will be applied, as well as the most ap-
propriate way to implement them, in order to reduce
the risks that an IoT device can suffer (Lento, 2018).
The challenges and problems in IoT systems are
in part similar to most existing computational prob-
lems, differing in their specificities, such as mem-
ory limitation, processing, amongst others. IoT sys-
tems represent a diversity of interconnected technolo-
gies communicating and sharing data continuously.
Therefore, security risks are created around this uni-
verse, which can cause serious problems for its users,
such as those who use devices that store or inform
data to patients. What can be said about IoT systems
is that the confidentiality, integrity and authenticity of
data exchanged, processed or even stored by devices
in IoT systems is fundamental. Issues such as avail-
ability and response time are also crucial aspects for
certain IoT systems, which must also be addressed. It
is also worth mentioning that an IoT environment has
a diversity of devices and communication technolo-
gies in its domain, which can bring discomfort to its
designers and users, as it can make the search for an
IoT security solution even more difficult (He et al.,
2016). In (Rizvi et al., 2018), it is mentioned that the
open architecture of IoT systems further increases the
challenge of protecting devices, as it increases the di-
versity of functionalities and architectures.
Apart from the challenges already mentioned,
(Malik and Singh, 2019) draws attention to yet more,
such as user privacy, in which data protection is fun-
damental when exchanged over the Internet, ensuring
confidentiality and integrity, in addition to the pri-
vacy of the user and/or devices that are handling this
data. The challenge of identifying and authenticat-
ing devices and/or users can be solved by implement-
ing cryptographic protocols and identity management
strategies, as described in (Osmanoglu, 2014). How-
ever, it is worth emphasizing that the level of security
of this data, for example, depends on the algorithm
and the size of the key used.
3 RTRMM ARCHITECTURE
RTRMM is a new security risk management model for
IoT environments, which aims to address the security
challenges that IoT systems pose in real time. The
logical structure of this model is based on ISO 27005
(ISO/IEC, 2022), as it is a robust approach, consid-
ering all stages of the risk management process in a
clear and objective way, in addition to being an open
architecture, enabling the inclusion of new functional-
ities. It is composed of a set of 4 (four) modules (fig-
ure 1): Threat Analyzer; Risk Management, Threat
Category and Controls DB. All of these modules are
integrated with each other, aiming to detect possible
threats, analyse/evaluate risks and provide security
measures in order to reduce the probability of inci-
dents that may affect the functionality of IoT systems.
Figure 1: RTRMM Logic Model.
3.1 Threat Analyser Module
The Threat Analyzer is a module that aims to analyze
an IoT data stream in order to verify if a threat exists.
The detection technique applied by Threat Analyzer
is based on the premise of uncertainty and probabil-
ity theories, and fuzzy logic. This architecture was
based on the fuzzy logic technique, as it works with
a degree of uncertainty, but at the same time offers
support for deciding whether a threat occurred or not
(Sanjaa, 2007). The architecture of the Threat Ana-
lyzer module, shown in figure 2, was based on fuzzy
logic control (FLC) (Iancu, 2012).
ICAART 2024 - 16th International Conference on Agents and Artificial Intelligence
1198