Using Graph Databases to Assess the Security of Thingernets Based on the Thingabilities and Thingertivity of Things
Title | Using Graph Databases to Assess the Security of Thingernets Based on the Thingabilities and Thingertivity of Things |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Lewis, Matt |
Conference Name | Living in the Internet of Things: Cybersecurity of the IoT - 2018 |
Date Published | March 2018 |
Publisher | IEEE |
ISBN Number | 978-1-78561-843-7 |
Keywords | cyber, default IoT device configurations, graph, graph databases, Internet of Things, IoT, IoT device vendors, IoT network complexity, IoT security standards, NoSQL databases, pubcrawl, resilience, Resiliency, risk, Scalability, secure update mechanisms, security, Security by Default, security flaws, security of data |
Abstract | Security within the IoT is currently below par. Common security issues include IoT device vendors not following security best practices and/or omitting crucial security controls and features within their devices, lack of defined and mandated IoT security standards, default IoT device configurations, missing secure update mechanisms to rectify security flaws discovered in IoT devices and the overall unintended consequence of complexity - the attack surface of networks comprising IoT devices can increase exponentially with the addition of each new device. In this paper we set out an approach using graphs and graph databases to understand IoT network complexity and the impact that different devices and their profiles have on the overall security of the underlying network and its associated data. |
URL | https://ieeexplore.ieee.org/abstract/document/8379695 |
DOI | 10.1049/cp.2018.0008 |
Citation Key | lewis_using_2018 |