You are viewing a javascript disabled version of the site. Please enable Javascript for this site to function properly.
Go to headerGo to navigationGo to searchGo to contentsGo to footer
In content section. Select this link to jump to navigation

An empirical analysis of evolutionary computing approaches for IoT security assessment

Abstract

The Internet of Things (IoT) strategy enables physical objects to easily produce, receive, and exchange data. IoT devices are getting more common in our daily lives, with diverse applications ranging from consumer sector to industrial and commercial systems. The rapid expansion and widespread use of IoT devices highlight the critical significance of solid and effective cybersecurity standards across the device development life cycle. Therefore, if vulnerability is exploited directly affects the IoT device and the applications. In this paper we investigated and assessed the various real-world critical IoT attacks/vulnerabilities that have affected IoT deployed in the commercial, industrial and consumer sectors since 2010. Subsequently, we evoke the vulnerabilities or type of attack, exploitation techniques, compromised security factors, intensity of vulnerability and impacts of the expounded real-world attacks/vulnerabilities. We first categorise how each attack affects information security parameters, and then we provide a taxonomy based on the security factors that are affected. Next, we perform a risk assessment of the security parameters that are encountered, using two well-known multi-criteria decision-making (MCDM) techniques namely Fuzzy-Analytic Hierarchy Process (F-AHP) and Fuzzy-Analytic Network Process (F-ANP) to determine the severity of severely impacted information security measures.

1Introduction

Millions of individuals now rely on the Internet for a variety of purposes. Because of the advantages associated with the Internet, a new industry called the IoT is emerging, which allows items and devices to communicate and interact with one another through the availability of the Internet. The idea behind such technological innovation is to automate work and interconnect the devices we being used in our daily lives via the Internet. The rate at which electronic objects around us are hooked up to The internet is rapidly increasing. As per the latest Gartner report approximately 8.4 billion smart devices or things on the planet by 2020 will be deployed. This figure is expected to increase to 20.4 billion by the end of 2022. Machine-to-machine (M2M) interactions are projected to increase from 5.6 billion in 2016 to 27 billion in 2024.

Furthermore, many of these digital solutions enable users to consciously disclose some personal data in exchange for more innovative and personalised services. It follows that privacy and security should be prioritised in the configuration of IoT services and technologies. Sadly, this isn’t the scenario for many industrial IoT products, which have insufficient, inadequate, or poorly designed security policy.

We identify a few of the most well-known and dangerous real-world IoT-related attacks, vulnerabilities, impacts, and exploitation practises carried out by various hackers in recent years. The depiction of evaluated real-world attacks is explained in section 3. Despite conducting such a thorough investigation, there are still numerous imprecise, uncertain, or partially missing pieces of information, making it difficult to determine which factor or attack is the most threatening.

In order to more effectively resolve the ambiguity that often arises in pertinent information and best reflect the inherent fuzziness of human judgment and recommendation, fuzzy set theory has been used in developing ill-defined MCDM concern. MCDM is a technique that enables you to choose the best option from a list of predestined alternatives by weighing various criteria against it. In order to deal with ambiguity in a decision-making procedures and obtain the much more consistent outcome, it is suggested to apply two different MCDM methods, namely Analytic Hierarchy Process (AHP) and Analytic Network Process (ANP), with fuzzy sets.

In both academic research and commercial practise, the AHP has now been extensively used to resolve multiple-criteria decision-making issues (such as concept assessment and equipment procurement). However, a precise pair-wise correlation with a traditional AHP might not be able to fully capture the decision-judgment maker’s due to ambiguity and uncertainty in their assessment. To make up for this shortcoming in the traditional AHP, fuzzy logic is added to the pair-wise correlation in the AHP. F-AHP is the name given to this [1]. In F-ANP, the language evaluation is transformed into TFNs (triangular fuzzy numbers). In order to construct a pairwise comparison for the ANP, the TFNs have been used, and by employing extent assessment (Chan et al. 2003 [2], Chan 1999 [3]), it is possible to determine the weights for every attribute at each level. Weights are simpler to calculate in F-ANP than in traditional ANP. To deem the best application to choose, such weights could be combined [4]. In this paper, we use the F-ANP method to derive priorities from various kinds of undefined ratio scale assessments, therefore expanding the ANP’s capability for making decisions in the face of ambiguity. The novelty of the work is that we deeply investigated the real world IoT attacks and the digged out the seven important affected information security factors. For more refinement we have done critical risk assessment of the seven affected security factors via two well refined MCMD techniques. Our work presents the quantitative risk assessment instead of qualitative that was not done by the researchers before in this field. This quantitative approach provides the better assessment of risk in terms of weightage of the security factors which gives the clear understanding of the severity. The result of our assessment gives the quantitative insight to the researchers for future research work in this area.

The following are the key contributions of this work:

  • 1. First, we look at the multifarious work done in terms of strengthening security towards IoT vulnerabilities.

  • 2. We then investigated real-world IoT attacks vulnerabilities

  • 3. Then after investigation we addresses the affected information security factors via IoT vulnerabilities in real life scenario.

  • 4. Conferred the critical risk assessment of affected security parameters via multiple MCDM techniques.

  • 5. Conduct an unbiased comparison of the outcomes generated by various MCDM approaches.

  • 6. Sets the path for future study.

The rest of this article is organized as follows: Section 2 provides some information regarding Fuzzy-MCDM techniques as well as an exploration of related work. Section 3 investigates the real-world IoT attacks/vulnerabilities. Section 4 presents the critical risk assessment of affected security parameters via multiple MCDM techniques. Section 5 represents the impartial comparison of results obtained by the multiple MCDM techniques. Section 6 portrays the discussion and suggested the future direction. Finally, author concludes the work with cogent explanation in Section 7.

Fig. 1

Information security parameters.

Information security parameters.

2Related works

Various IoT-empowered attacks discovered across all application domains since 2010 were surveyed by the author. The author focuses on the most recent, verifiable IoT-enabled assaults for each industry, based on reported proof-of-concept attacks and documented real-world instances [5]. The authors investigated nine real-world security events that attacked IoT devices deployed in the consumer, industrial, and commercial sectors. And presents a taxonomy that offers a systematic approach for classifying attacks based on the compromised layer and associated impact [6]. The “value-focused thinking” strategy is adopted by the researcher to systematically determine IoT security goals and values from 58 IT specialists. They provide four core goals and thirteen means goals [7]. The author provides an Organizational Information Security Framework Regarding Human Aspects contributing to the IoT, which contains remedies that can assist avoid or mitigate data breach occurrences caused by human factors [8].

The multitude of IoT devices is increasing rapidly. The legal regime for ensuring data controller as well as processor adherence must be enhanced in order to provide a safer environment for emerging creative IoT products and services without jeopardising data subjects’ freedoms and rights. It is also critical to raise homeowners’ awareness of potential security risks while using smart and IoT services and devices [9].

The researcher focused on a comprehensive investigation of the most common methods of attacking commercial applications, as well as the commensurate literature studies, with the goal of providing a more efficacious, cyber-security-oriented strategy that would ultimately lead to a more adaptable industrial environment. The author’s major contribution is to dealing with commercial IoT technologies in general, with a major analysis on issues concerning cyber-attacks on industrial equipment, as well as the most recent mitigation strategies for the safety of the infrastructure in question, via a crucial and benchmarking schema [10].

The author demonstrates a short illustration of possible attacks on Bluetooth Low Energy (BLE) devices using several current tools to conduct spoofing, firmware assaults, and man in the middle (MITM) attacks. They also emphasised the necessity of privacy and security in BLE devices [25]. Author discusses numerous IoT security challenges such as IoT security framework, attack types, encryption challenges, authentication, and IoT hardware-based support [26].

In the research during 2004 and 2018, researchers analysed the types of threats that impact the firmware update process in IoT devices and the current secure firmware update techniques for IoT devices. A number of well-known firmware evaluation and vulnerability assessment tools are also included. They are certain that their study will enable researchers to create new defences for embedded devices by enabling firmware inspection, attacks, and security [27].

The idea of malware and botnets operating behind “Distributed” DoS in IoT is discussed by the author. The diverse DDoS defence strategies are thoroughly discussed and contrasted in order to pinpoint any security flaws. Additionally, researchers identify the unresolved problems and difficulties that must be overcome to improve DDoS prevention [28]. Researchers are working to address this discrepancy by thoroughly examining the issues and challenges related to IoT security. An in-depth review of IoT attack surfaces, security concerns, threat models, forensics, needs, and obstacles is provided by the researcher [29].

The author mentions their efforts to comprehend file less exploits on Linux-based Iot systems in the wild. They deployed four hardware IoT honeypots and 108 specifically developed software IoT honeypots over the course of a year, effectively attracting a wide range of real-world IoT threats. They discuss their measuring analysis on these attacks, focusing on file less attacks, including the prevalence, environments, exploits, and impacts. The research also yields multiple insights into effective defensive techniques that IoT providers and end users can implement [30].

The author provides a high-level overview of the security threats in the IoT sector and discusses some potential countermeasures. Then, describes and analyses some of the attacks against real IoT devices documented in the literature, highlighting the present security flaws of commercial IoT solutions and emphasising the significance of addressing security as an important component of IoT system design [31]. The author discovers that the Analytic Hierarchy Process (AHP) and approach for Order of Preference by Similarity to Ideal Solution (TOPSIS) hesitant fuzzy-based symmetry approach is an efficient methodology for analysing the endurance of online applications. The authors analysed the outputs of six distinct University projects to determine the level of accuracy of the results and their sensitivity [32].

Researchers deductively and inductively identify attack traits and measurements based on the most recent research and a collection of roughly 50 attacks. The author uses a real-world situation involving a German steel factory to illustrate the utility and practical significance of their taxonomy. [33]. K. Sahu et al. proposed a unique technique for selecting the optimal model of dependability prediction. The methodology is an amalgam of the AHP, hesitant fuzzy sets (HF), and the the technique for order of reference by similarity to ideal solution (TOPSIS) [34].

Ling Z. et al. provides an overview of IoT privacy and security as well as a case analysis. Their contribution is dual in nature. First, they show their end-to-end perspective of an IoT system. Second, they give a vulnerability assessment of the Edimax IP camera system using an end-to-end view of IoT privacy and security. Their real-world trials confirm the efficacy of the revealed attacks and increase the stakes for IoT makers once more [35]. The researcher was trying to figure out and rank different ways of handling security problems. They wanted to do this by going through two known approaches that people use when trying to analyze big data security. The author is currently using the Fuzzy AHP approach to see how much levels of priority matter in the realm of data security [36].

As per the outcomes of this study, sit may be possible to use F-ANP to obtain a distinct set of attributes that are more pertinent for assessing the importance of security attributes with respect to test plan parameters. This article reviews the information that was gathered from a range of experts who work in academia as well as industry. To assess the significance of particular security qualities, the efforts of such experts are subjected to a weighing and ranking procedure using a risk assessment plan formulation. As a result, F-ANP uses the evaluative contributions from a group of decision-makers to develop a network of security parameters including test plan criteria based on their level of significance or priority. Additionally, F-ANP has established a more precise relationship that enables the decision-makers to finish the priority evaluation.

3Expounding real world IoT attacks

We have considered some famous and critical real world IoT attacks of last few years. The illustration of considered real world attacks are tabulated in Table 1. These are just a couple of drops in an ocean of unprotected devices and gizmos in which we are all drowning.

Table 1

Real world IoT attacks

S. No.IoT AttacksYearReported byType of Vulnerability(s)Compromised Security Factors
Stuxnet2010Sergey UlasenWorm attack and Affects the supervisory control and data acquisition (SCADA) systemsAccess Control and Data Theft
[12]The TRENDnet Webcam Hack2012Report by TechNewsWorldNetwork data transfer without encryptionprivacy, confidentiality or integrity
[13]The Jeep Hack2015Black Hat security researchers Charlie Miller &Chris ValasekAccess ControlAccess Control
[14]The Owlet WiFi Baby Heart Monitor Vulnerabilities2016security researcher Jonathan ZdziarskiUnencrypted data transfer over networkAuthentication and Access Control
[15]VPNFilter2018security researchers from Cisco TalosMalware attack: that has the ability to steal data, a kill switch that can be used to instantly deactivate the compromised router, and the ability to survive router reboots.Integrity, Access control
[16]Nortek Security &Control –Access Control System Breach2019Applied RiskMalware and DoS attackAccess Control
[17]The Big One: The Apache Log4j Vulnerability2021Chen Zhaojun of Alibaba Cloud Security TeamRemote code execution (RCE)Confidentiality, Integrity, Availability, Access Control
[18]BotenaGo2021AT&T Alien LabsMalware, RCE and Botnet attackConfidentiality, Integrity, Availability, Access Control
[19]GOautodial vulnerabilities2021Scott Tolley of the?Synopsys?Cybersecurity Research CenterInformation disclosure and RCEConfidentiality, Integrity, Availability, Access Control
[20]COMELEC (The Commission on Elections) hack2022Manila Bulletin (MB) Technews teamBreach the serversAccess Control
[21]Critical PTC Axeda bugs jeopardise healthcare, IoT devices2022Vedere Labs and CyberMDXInformation Disclosure, DoS, RCEIntegrity, Confidentiality, Availability, Access Control
[22]Jacuzzi SmartTub web bugs (Jacuzzi Hot Tubs)2022Eaton ZveareView and potentially manipulate the personal dataAccess Control
[23]Grand hack auto2023security researcher Sam Curryaccount takeover, remote code execution (RCE), and even hijacking physical commandsIntegrity, Confidentiality, Access Control
[24]BlackCat’s Sphynx Ransomware2023Microsoftcredential dumping, remote command-execution (RCE)Confidentiality, Integrity, Availability, Access Control

4Risk assessment of encountered security parameters using MCDM techniques

The cases that are uncovered in section 3 bring to the fore the inherent security issues with IoT systems and show how such interconnected ecosystems might be vulnerable to attack. We investigate IoT-enabled cyber assaults found across all application areas. We focus on the most recent, certified IoT-enabled assaults in each industry, based on documented real-world instances and written proof-of-concept assaults. After extensive investigation, we found that several information security factors were affected, which are as follows: Confidentiality, Integrity, Availability, Privacy, Access Control, Authorization and Non-Repudiation. We accord a complete attack assessment on IoT devices, as well as their extant threat scenario.

To enhance the accuracy and acceptability of the evaluation, the risk assessment of encountered security factors was performed using two distinct MCDM techniques, namely F-AHP and F-ANP. Now the MCDM methodologies are employed and all the encountered security factors are mapped to respective variables to make the calculation easier and effective. The mapping of the security factors is illustrated as follows: Availability as S1, Access control as S2, Confidentiality as S3, Integrity as S4, Privacy as S5, Authorization as S6 and Non-Repudiation as S7.

4.1Fuzzy analytic hierarchy process

The AHP has now been extensively utilized in both scientific research and industry practise to handle multiple-criteria decision-making challenges (e.g., concept appraisal, equipment selection). A precise pair-wise comparison for a conventional AHP, however, would not be able to fully reflect the decision-maker’s opinion due to uncertainty and vagueness in their assessment. As a result, to compensate for this shortcoming in the standard AHP, fuzzy logic is included into the pair-wise comparison in the AHP. This envisaged as F-AHP [37].

Since the core AHP doesn’t really allow for subjective judgments, the fuzzy logic method has contributed to improving it. In F-AHP, pairwise comparisons among both alternatives and criteria are accomplished using linguistic terms encoded by triangular numbers [38]. Van Laarhoven and Pedrycz developed one of the earliest F-AHP implementations [39]. For pair - wise comparisons, they devised the triangle membership functions. Following that, Buckley [40] made a contribution to the discussion by identifying the fuzziness of comparison ratios with triangle membership functions. The use of triangular figures in pair-wise comparisons is another novel technique that Chang [41] introduced. Even though F-AHP contains different methods, in the context of this research Buckley’s methods [40] are used to calculate the relative relevance weights for the alternatives and the criteria.

The following are the process steps:

Step 1: The criteria and alternatives are compared by the Decision Maker using the linguistic terminology indicated in Table 2.

Table 2

Linguistic terms and the corresponding TFN

Saaty scaleDefinitionFuzzy Triangular scale
1Equally important (Eq. Imp.)(1, 1, 1)
3Weakly important (W. Imp.)(2, 3, 4)
5Fairly important (F. Imp.)(4, 5, 6)
7Strongly important (S. Imp.)(6, 7, 8)
9Absolutely important (A. Imp.)(9, 9, 9)
2(1, 2, 3)
4The intermittent values between(3, 4, 5)
6two adjacent scales(5, 6, 7)
8(7, 8, 9)
Table 3

Pair wise comparison matrix of affected security factors (AHP)

Security FactorsS1S2S3S4S5S6S7
S111.064, 1.529, 1.9900.511, 0.598, 0.8591.729, 2.311, 2.9011.692, 2.414, 3.1471.576, 2.093, 2.6130.552, 0.639, 0.905
S211.182, 1.474, 1.8720.791, 0.960, 1.1351.459, 1.859, 2.2151.333, 1.523, 1.7971.553, 2.200, 2.850
S311.085, 1.343, 1.8721.605, 2.336, 3.1470.335, 0.427, 0.5741.399, 1.816, 2.446
S411.496, 1.928, 2.3540.945, 1.081, 1.6371.250, 1.639, 2.028
S511.187, 1.535, 2.0281.192, 1.489, 1.898
S610.398, 0.511, 0.662
S71
Table 4

Defuzzyfication of local priorities (using alpha cut method)

Security FactorsS1S2S3S4S5S6S7Weightage
S111.7780.8922.5632.6672.3440.9340.218993
S20.56211.7511.2121.8531.7942.4150.17967
S31.1210.57110.9892.6060.6912.1200.155693
S40.3900.8251.01112.1770.7711.8900.133659
S50.3750.5400.3840.45911.8211.7670.102951
S60.4270.5571.4471.2970.54911.4360.118589
S71.0710.4140.4720.5290.5660.69610.0904455
CI= 0.0943425

As per the corresponding TFNs of these linguistic notions, for instance, the fuzzy triangular scale is used if the decision maker says that “Criterion 1 (C1) is Weakly Important than Criterion 2 (C2)” (2, 3, 4). In contrast, the assessment of C2 to C1 will use the fuzzy triangular scale of (1/4, 1/3, 1/2) in the pair wise contribution matrices pertaining to the criteria.

The pair wise contribution matrice is illustrated in Equation 1, where P˜mnq represents the q th decision makers’ preference of m th criterion over n th criterion, via TFN. In this scenario, “tilde” stands for the triangular number demonstration, and “p” stands for the primary decision maker’s precedence of the first over the second criterion, and equals to P˜121=(2,3,4) .

X˜=[P˜11qP˜12q...P˜1jqP˜21q......P˜2jq............P˜j1qP˜j2q...P˜jjq]...........(1) Step 2: If there are many decision-makers, the preferences of each one are averaged (P˜mnq) , and the (P˜mn) is determined according to Equation 2.

P˜mn=q=1qP˜mnqq.........(2)

Step 3: Pair-wise contribution matrices are updated in accordance with averaged preferences, as indicated in Equation 3. X˜=[P˜11...P˜1jP˜j1...P˜jj].....(3)

Step 4: As per Buckley [40], the geometric mean of each criterion’s fuzzy comparison values is determined as given in Equation 4. Here, k˜m still indicates triangular values.

k˜m=(n=1jP˜mn)1/j,m=1,2,....,j...(4)

Step 5: To calculate the fuzzy weights of each criterion, Equation 5 is used by incorporating the following three sub-steps.

Step 5a: Determine the vector sum of each k˜m .

Step 5b: Find the (–1) power of the summation vector. To make it in order of increasing, replace the TFN.

Step 5c: To determine the fuzzy weight of the criterion m(g˜m) , multiply each k˜m with this reverse vector

gm=k˜m(k˜1k˜2...k˜j)-1 = (hg m , ig m , lg m ) . . . (5)

Step 6: As g˜m are still TFN, they must be defuzzified using the Centre of area approach given by Chou and Chang [42], using Equation 6. Wm=hgm,igm,lgm3...(6)

Step 7: W m is a non-fuzzy number. However, it must be normalized using Equation 7. Vm=Wmm=1jWm...(7)

These seven steps are followed to determine the normalised weights of both criteria and alternatives. The scores for each alternative are then determined by multiplying each alternative weight by the corresponding criteria. According to these findings, the option with the highest score is recommended to the decision makers. In this investigation, the findings are compiled by first obtaining the viewpoints of a variety of recognized authorities in the subject and then computing an average of those individuals’ points of view. These data have been produced with the assistance of professionals working in the relevant field as well as academicians, and as a result, we are able to obtain the priority of security factors.

Table 5

Supermatrix formed by local priorities vectors

Security FactorsS1S2S3S4S5S6S7
S110.26880.13000.27160.24000.30400.2228
S20.292010.30590.25510.28890.23490.2319
S30.25670.250510.21920.15500.22000.2200
S40.22990.22770.231910.13080.06020.1182
S50.15270.15930.08860.165610.07050.0265
S60.06870.09370.02320.08870.075410. 1805
S7000.220300.14000.11051
Table 6

Weighted supermatrix

Security FactorsS1S2S3S4S5S6S7
S10.50.13440.0650.13580.11820.1520.1114
S20.1460.50.1530.12750.14230.11740.116
S30.12380.12530.50.1060.07640.110.11
S40.1150.11390.1160.50.06440.03010.0591
S50.07640.07960.04430.08280.049260.03520.0133
S60.03430.04960.01160.04430.03710.50.0903
S7000.110200.0690.05520.5
Table 7

Limit supermatrix

Security FactorsS1S2S3S4S5S6S7
S10.18880.18880.18880.18880.18880.18880.1888
S20.21660.21660.21660.21660.21660.21660.2166
S30.18520.18520.18520.18520.18520.18520.1852
S40.16190.16190.16190.16190.16190.16190.1619
S50.11170.11170.11170.11170.11170.11160.1116
S60.07180.07180.07180.07180.07180.07180.0718
S70.06410.06410.06420.06410.06410.06420.0641
Table 8

Affected security factors using F-AHP

Security factorsGlobal priorities
Availability (S1) 18.88%
Access control (S2) 21.66%
Confidentiality (S3) 18.52%
Integrity (S4) 16.19%
Privacy (S5) 11.17%
Authorization (S6) 7.18%
Non-Repudiation (S7) 6.41%

4.2Fuzzy Analytic Network Process (F-ANP)

The ANP provides the most exhaustive framework for analysing social, corporate and governmental decisions available to decision-makers today. It is an approach that enables one to consider all of the tangible and intangible variables and factors that have an impact on making the optimal option. The ANP permits feedback and interaction both within and across clusters of elements (both inner dependence and outer dependence). Such feedback best depicts the complex consequences of human society’s interplay, primarily when both risk and uncertainty are present [43].

The first component of an ANP model is a control sequence or network of key targets and criterion that control the communications in the system under investigation; the second component is a number of sub-networks of interactions among the problem’s elements and clusters, one for every control criterion. The Global priorities of affected security factors is given below in Table 9 and the data used in the matrix has been collected from the experts of industries as well as academicians.

Table 9

Global priorities of affected security factors

Security FactorsS1S2S3S4S5S6S7Weightage
S111.5290.5982.3112.4142.0930.6390.183922
S20.65402211.4740.961.8591.5232.20.168352
S31.672240.67842611.3432.3360.4271.8160.164648
S40.4327131.041670.74460211.9281.0811.6390.134153
S50.414250.5379240.4280820.51867211.5351.4890.100619
S60.4777830.6565992.341920.9250690.65146610.5110.12351
S71.564950.4545450.5506610.6101280.6715921.9569510.124795
Table 10

Supermatrix formed by local priorities vectors

Security FactorsS1S2S3S4S5S6S7
S110.25770.12570.19840.22560.29980.2099
S20.302010.29590.24510.27890.24490.2119
S30.26670.200510.22910.16610.23230.2323
S40.24990.22660.222910.14080.07010.1272
S50.16170.15800.09910.205610.06050.0555
S60.08770.07370.03220.08770.067410. 1913
S7000.230400.15140.11171
Table 11

Weighted supermatrix

Security FactorsS1S2S3S4S5S6S7
S10.50000.14330.05600.14580.11920.16300.1214
S20.14710.50000.16410.12670.14140.11120.1122
S30.15480.12430.50000.11700.07590.22110.1100
S40.11420.11410.12100.50000.06470.03150.0557
S50.05870.07860.04540.08280.04930.03540.0547
S60.03390.05010.01150.04510.03690.50000.0912
S7000.121200.06880.05490.5000
Table 12

Limit supermatrix

Security FactorsS1S2S3S4S5S6S7
S10.17590.17590.17590.17590.17590.17590.1759
S20.22720.22720.22710.22720.22710.22720.2272
S30.17990.17980.17990.17990.17990.17980.1799
S40.17260.17260.17260.17250.17260.17260.1726
S50.10060.10060.10060.10050.10060.10060.1006
S60.07860.07860.07850.07860.07860.07850.0786
S70.06520.06520.06520.06520.06520.06520.0652

4.2.1Supermatrix

The initial step in ANP is to evaluate the criteria throughout the entire system in order to construct the supermatrix. It is accomplished by pair - wise comparisons by asking, “How important is a criterion in contrast towards another criterion in terms of our preferences or desires?” The relative relevance value can be calculated using a level of 1–9, with 1 representing equal importance and 9 representing great importance. We envisage that network model is made up of Hierarchy P h  (k = 1, 2, . . . . . i). For every hierarchy, P assumes that elements d h1, d2, . . . . . . , d hi exists, so the impact of P h  = (k = 1, 2, . . . . . i) can be represented as follows:

P1P2PiM=P1P2Pi[M11M12...M1iM21M22...M2iMi1Mi2...Mii]

Table 13

Comparision of results

Security factorsGlobal priorities by F-AHPGlobal priorities by F-ANP
Availability (S1) 18.88%17.59%
Access control (S2) 21.66%22.72%
Confidentiality (S3) 18.52%17.99%
Integrity (S4) 16.19%17.26%
Privacy (S5) 11.17%10.06%
Authorization (S6) 7.18%7.86%
Non-Repudiation (S7) 6.41%6.52%

Which is the basic form of the supermatrix. represents the impact of every element of the m hierarchy on the n hierarchy, which is known as a block of a supermatrix, and has the following form: Mmn=[Mm1n1Mm1n2...Mm1njnMm2n1Mm2n2...Mm2njnMmj1n1Mmj2n2...Mmjmnjn]

4.2.2Weighted supermatrix

A supermatrix can be used to express the priorities of components in one hierarchy based on a specific criterion, which means that each and every column of each hierarchy with in supermatrix is column stochastic. The effect of other hierarchies, however, is unaffected by this criterion. As a possible consequence, the supermatrix’s columns are not stochastic. It is crucial to take into account the influence of each hierarchy on the other. The process involves treating each hierarchy like an element, doing pairwise comparisons with respect to each hierarchy, and determining the relevant priorities. Assuming that b mn represents the weighted influence of the m hierarchy over the n hierarchy, let M¯=bmnMmn......(8) M¯ is denoted as a weighted supermatrix. The sum of the elements within every column of a weighted supermatrix is 1. This characteristic of a matrix is known as column stochastic [49]. To make sure that the total probability of all states implies 1, this step is quite identical to the Markov’s chain idea.

4.2.3Limited supermatrix

We wish to get the priority along each potential path in a supermatrix, or the final impact an element has on the top aim. This type of result can be obtained by solving M¯ , M¯=limhM¯h...(9)

The weighted supermatrix is created to limiting powers, as shown in (9) to provide the global priority vector, often known as weights.

Fig. 2

Comparison of global priorities of the affected security factors.

Comparison of global priorities of the affected security factors.

5Comparison of results obtained by MCDM techniques

MCDM techniques are used to evaluate and select alternatives based on multiple criteria. There are several MCDM techniques available, each with its strengths and weaknesses. Here are some general comparisons of the results obtained by some commonly used MCDM techniques. When it comes to global priorities, F-AHP and F-ANP are commonly used MCDM techniques to evaluate alternatives based on multiple criteria. Overall, the choice of MCDM technique depends on the problem, the available data, and the preferences of decision-makers. In Table 14, the results obtained by the F-ANP and F-AHP in terms of Global Priorities of security factors are compared. Further the comparison of proposed work is also done with the various existing approaches where the proposed work endorse the transcendent over the existing approaches in terms of number of targeted security factors for severity evaluation.

Table 14

Global priorities of affected security factors using F-ANP

Security factorsGlobal priorities
Availability (S1) 17.59 %
Access control (S2) 22.72%
Confidentiality (S3) 17.99%
Integrity (S4) 17.26%
Privacy (S5) 10.06%
Authorization (S6) 7.86%
Non-Repudiation (S7) 6.52%
Table 15

Comparison of proposed model with state of the art models

Breach factorCountRef
confidentiality, integrity, availablility,
tracebility, authenticity06[44]
confidentiality, integrity, availability,
authentication04[45]
CNN + stackedauto-encoders (SAEs)05[1]
SVM + transient energy function (TEF)03[2]
Proposed Work072023

6Discussion and future research direction

The proliferation of smart, linked, and inherently insecure gadgets is altering the security landscape. Alternative strategies must be developed in addition to the clear legal structure that will be needed to accommodate the IoT technological shift.

The reason for the rising number of IoT gadgets appears to be that they offer convenience to humans and execute activities more efficiently than humans. Existing as well as forthcoming IoT solutions are highly promising in terms of increasing user comfort, efficiency, and automation. To be capable of implementing such a realm in an ever-increasing fashion, high security, privacy, authentication, and attack recovery are required. In this reference, it is critical to make the necessary modifications in the architectural style of IoT systems in order to achieve end-to-end impregnable IoT habitat.

Attacks against resource-constrained IoT systems have increased in recent years. Security breaches in IoT technologies employed in both industrial (e.g., actuators and sensors) and residential environments are constantly being revealed (e.g. implantable medical devices, home appliances, etc). Faults and malfunction in faulty hardware chips, software applications, and easily tampered devices are exacerbating the current situation.

Moreover, we have classified IoT-related security flaws, exploitation practices, attacks, and their implications via real-world cyber incidents that address IoT gadgets installed in the industrial, consumer, and commercial sectors. These (and several other) mishaps emphasize the underpinning security issues of IoT systems and illustrate the potential attack effects of such integrated ecosystems, whereas the calculated priorities of affected security factors obtained after the assessment procedure using two different MCDM methodologies, which delivers a more appropriate way to classify attacks based on the affected security factors and their corresponding impacts.

7Conclusion

In the era of intelligent devices, IoT has expanded rapidly. A wide range of industries, including hospitals, enterprises, and farming, are heavily utilising the rapidly evolving smart gadgets, such as grids and sensors. Consumers are exposed to a wide range of security vulnerabilities because there are so many Devices connected to the internet in use. It is critical to recognize the risks that endanger the distinctive infrastructures as well as endow confidentiality of the data due to the number of threats that are escalating in the constantly evolving IoT environment and the concurrent inability of conventional security systems to recognize serious threats of intensifying depth and duration. In this paper, we demonstrate attacks/vulnerabilities of real-world IoT attack and also tabulated the impacted information security factors associated with varied vulnerabilities to concerned event in Table 1. Furthermore, the risk assessment of encountered security factors was performed by using two distinct MCDM methodologies i.e. F-AHP and F-ANP, to make assessment more accurate and appropriate. After analyzing the Global Priorities, we identify that the information security factor positioned at S2 i.e. Access Control is the most affected factor having global priority of 21.66% and 22.72% by F-AHP and F-ANP respectively among the existing factors affected in the encountered attacks/vulnerabilities and the information security factor positioned at S7 i.e. Non-Repudiation is the least affected factor having global priority of 6.41% and 6.52% by F-AHP and F-ANP respectively.

Author contributions

All authors contributed equally.

Data availability

Authors confirm that the data supporting the findings of this study are available within the article.

Declarations

Conflict of interest

The authors have no conflict of interest.

Ethical standard

This work does not require ethics approval.

Consent to participate

This work does not require consent to participate, because it does not involve human subjects.

References

[1] 

Ayağ, Z. , A fuzzy ahp-based simulation approach to concept evaluation in a NPD environment, IIE Transactions 37: (9) ((2005) ), 827–842.

[2] 

Chan F. , Chan H. , Chan M. , An integrated fuzzy decision support system for multicriterion decision-making problems,, Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture 217: (1) ((2003) ), 11–27.

[3] 

Zhu K.-J. , Jing Y. , Chang D.-Y. , A discussion on extent analysis method and applications of fuzzy AHP,, European Journal of Operational Research 116: (2) ((1999) ), 450–456.

[4] 

Mohanty R. , Agarwal R. , Choudhury A. , Tiwari M. , A fuzzy anp-based approach to R&D project selection: a case study,, International Journal of Production Research 43: (24) ((2005) ), 5199–5216.

[5] 

Stellios I. , Kotzanikolaou P. , Psarakis M. , Alcaraz C. , Lopez J. , A survey of IoT-enabled cyberattacks: Assessing attack paths to critical infrastructures and services, IEEE Communications Surveys & Tutorials 20: (4) ((2018) ), 3453–3495.

[6] 

Xenofontos C. , Zografopoulos I. , Konstantinou C. , Jolfaei A. , Khan M.K. , Choo K.-K.R. , Consumer, commercial, and industrial IoT (in) security: Attack taxonomy and case studies,, IEEE Internet of Things Journal 9: (1) ((2021) ), 199–221.

[7] 

Dhillon G. , Carter L. , Abed J. , Sandhu R. , Defining objectives for securing the internet of things: A value-focused thinking approach,, WISP Proc 3: ((2016) ).

[8] 

Hughes-Lartey K. , Li M. , Botchey F.E. , Qin Z. , Human factor, a critical weak point in the information security of an organization’s Internet of Things, Heliyon 7: (3) ((2021) ), e06522,.

[9] 

Vojković G. , Milenković M. , Katulić T. , IoT and smart home data breach risks from the perspective of data protection and information security law,, Business Systems Research: International journal of the Society for Advancing Innovation and Research in Economy 11: (3) ((2020) ), 167–185.

[10] 

Tsiknas K. , Taketzis D. , Demertzis K. , Skianis C. , Cyber threats to industrial IoT: a survey on attacks and countermeasures,, IoT 2: (1) ((2021) ), 163–186.

[11] 

https://www.matisoftlabs.com/case-studies/stuxnet, accessed: 2023-07-26.

[12] 

https://www.iotforall.com/5-worst-iot-hackingvulnerabilities, accessed: 2023-07-26.

[13] 

https://www.kaspersky.com/blog/blackhat-jeep-cherokeehack-explained/9493/,accessed: 2023-07-26.

[14] 

https://www.theregister.com/2016/10/13/possibly_worst_iot_security_failure_yet/?mt=1476453928163.accessed: 2023-07-26.

[15] 

https://arstechnica.com/information-technology/2018/06/vpnfilter-malware-infecting-50000-devices-is-worse-than-//we-thought/, accessed: 2023-07-26.

[16] 

https://applied-risk.com/assets/uploads/whitepapers/Nortek-Linear-E3-Advisory-2019.pdf, accessed: 2023-07-26.

[17] 

https://www.cisa.gov/news-events/news/apache-log4jvulnerability-guidance,accessed: 2023-07-26.

[18] 

https://www.bleepingcomputer.com/news/security/botenago-botnet-targets-millions-of-iot-devices-with-33//exploits/,accessed: 2023-07-26.

[19] 

https://portswigger.net/daily-swig/goautodialvulnerabilities-put-call-center-network-security-on//theline, accessed: 2023-07-26.

[20] 

https://portswigger.net/daily-swig/was-comelec-hackedphilippines-commission//on-elections-casts-doubt-ondata-breach-claims, accessed: 2023-07-26.

[21] 

https://www.forescout.com/resources/access-7-supply-chain-vulnerabilities-can-allow//unwelcomed-access-to-your-medical-and-iot-devices/, accessed: 2023-07-26.

[22] 

https://portswigger.net/daily-swig/jacuzzi-customerdetails//could-be-exposed-by-smarttub-web-bugs-claimsresearcher, accessed: 2023-07-26.

[23] 

https://portswigger.net/daily-swig/car-companiesmassively-exposed-to-web-vulnerabilities, accessed: 2023-10-11

[24] 

https://www.bleepingcomputer.com/news/microsoft/microsoft-blackcats-sphynx-ransomware-embeds-impacketremcom/, accessed: 2023-10-11.

[25] 

Pallavi S. , Narayanan V.A. An overview of practical attacks on BLE based IoT devices and their security, in 2019 5th international conference on advanced computing & communication systems (ICACCS). IEEE, 2019, pp. 694–698.

[26] 

Hameed A. , Alomary A. Security issues in IoT: a survey, in 2019 International conference on innovation and intelligence for informatics, computing, and technologies (3ICT). IEEE, 2019, pp. 1–5.

[27] 

Bettayeb M. , Nasir Q. , Talib M.A. Firmware update attacks and security for IoT devices: Survey, in Proceedings of the ArabWIC 6th Annual International Conference Research Track, 2019, pp. 1–6.

[28] 

Vishwakarma R. , Jain A.K. , A survey of ddos attacking techniques and defence mechanisms in the IoT network,, Telecommunication Systems 73: (1) ((2020) ), 3–25.

[29] 

Hossain M.M. , Fotouhi M. , Hasan R. , Towards an analysis of security issues, challenges, and open problems in the internet of things, in, 2015 IEEE world congress on services. IEEE, ((2015) ), pp.21–28.

[30] 

Dang F. , Li Z. , Liu Y. , Zhai E. , Chen, Q.A. , Xu, T. , Chen Y. , Yang, J. , Understanding fileless attacks on linux-based IoT devices with honeycloud, in, Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services ((2019) ), pp.482–493.

[31] 

Meneghello F. , Calore M. , Zucchetto D. , Polese M. , Zanella A. , IoT: Internet of threats? a survey of practical security vulnerabilities in real IoT devices,, IEEE Internet of Things Journal 6: (5) ((2019) ), 8182–8201.

[32] 

Sahu K. , Alzahrani F.A. , Srivastava R. , Kumar R. , Hesitant fuzzy sets based symmetrical model of decision-making for estimating the durability of web application,, Symmetry 12: (11) ((2020) ), 1770.

[33] 

Berger S. , Burger O. , Roglinger M. , Attacks on the industrial Internet of Things-development of a multi-layer taxonomy, Computers & Security 93: ((2020) ), 101790.

[34] 

Sahu K. , Alzahrani F.A. , Srivastava R. , Kumar R. , Evaluating the impact of prediction techniques: Software reliability perspective, Computers, Materials & Continua 67: (2) ((2021) ).

[35] 

Ling Z. , Liu K. , Xu Y. , Jin Y. , Fu X. , An end-to-end view of IoT security and privacy, in. IEEE, GLOBECOM 2017–2017 IEEE Global Communications Conference ((2017) ), pp.1–7.

[36] 

Attaallah A. , Alsuhabi H. , Shukla S. , Kumar R. , Gupta B.K. , Khan R.A. , Analyzing the big data security through a unified decision-making approach, Intelligent Automation & Soft Computing 32: (2) ((2022) ).

[37] 

Ayhan M.B. AHP approach for supplier selection problem: A case study in a gear motor company, arXiv preprint arXiv:1311.2886, 2013.

[38] 

Kilincci O. , Onal S.A. , Fuzzy ahp approach for supplier selection in a washing machine company,, Expert systems with Applications 38: (8) ((2011) ), 9656–9664.

[39] 

Van Laarhoven P.J. , Pedrycz, W. , A fuzzy extension of saaty’s priority theory,, Fuzzy Sets and Systems 11: (1-3) ((1983) ), 229–241.

[40] 

Buckley J.J. , Fuzzy hierarchical analysis,, Fuzzy Sets and Systems 17: (3) ((1985) ), 233–247.

[41] 

Chang D.-Y. , Applications of the extent analysis method on fuzzy ahp,, European Journal of Operational Research 95: (3) ((1996) ), 649–655.

[42] 

Chou S.-W. , Chang Y.-C. , The implementation factors that influence the ERP (enterprise resource planning) benefits,, Decision Support Systems 46: (1) ((2008) ), 149–157.

[43] 

Wei J.-Y. , Wang C.-H. A novel approach—fuzzy ANP for distribution center location, in 2009 International Conference on Machine Learning and Cybernetics, vol. 1. IEEE, 2009, pp. 537–542.

[44] 

Andrade R.O. , Yoo S.G. , Ortiz-Garces I. , Barriga J. , Security risk analysis in IoT systems through factor identification over IoT devices,, Applied Sciences 12: (6) ((2022) ), 2976.

[45] 

Katrakazas P. , Kallinolitou T. , Markopoulou S. , Chronopoulou A. A toolchain and interoperability framework to enhance privacy and individual control at the edge, in 2022 IEEE International Smart Cities Conference (ISC2), IEEE, 2022, pp. 1–7.