Lpwan Cyber Security Risk Analysis: Building a Secure Iqrf Solution

dc.authorid Dalveren, Yaser/0000-0002-9459-0042
dc.authorid Amro, Ahmed/0000-0002-3390-0772
dc.authorid Alaya Cheikh, Faouzi/0000-0002-4823-5250
dc.authorscopusid 57216251825
dc.authorscopusid 57215663164
dc.authorscopusid 51763497600
dc.authorscopusid 42461035200
dc.authorscopusid 35408917600
dc.contributor.author Bouzidi, Mohammed
dc.contributor.author Amro, Ahmed
dc.contributor.author Dalveren, Yaser
dc.contributor.author Cheikh, Faouzi Alaya
dc.contributor.author Derawi, Mohammad
dc.contributor.other Department of Electrical & Electronics Engineering
dc.date.accessioned 2024-07-05T15:26:41Z
dc.date.available 2024-07-05T15:26:41Z
dc.date.issued 2023
dc.department Atılım University en_US
dc.department-temp [Bouzidi, Mohammed; Derawi, Mohammad] Norwegian Univ Sci & Technol, Dept Elect Syst, N-2821 Gjovik, Norway; [Amro, Ahmed] Norwegian Univ Sci & Technol, Dept Informat Secur & Commun Technol, N-2821 Gjovik, Norway; [Dalveren, Yaser] Atilim Univ, Dept Elect & Elect Engn, TR-06830 Ankara, Turkiye; [Cheikh, Faouzi Alaya] Norwegian Univ Sci & Technol, Dept Comp Sci, N-2821 Gjovik, Norway en_US
dc.description Dalveren, Yaser/0000-0002-9459-0042; Amro, Ahmed/0000-0002-3390-0772; Alaya Cheikh, Faouzi/0000-0002-4823-5250 en_US
dc.description.abstract Low-power wide area network (LPWAN) technologies such as IQRF are becoming increasingly popular for a variety of Internet of Things (IoT) applications, including smart cities, industrial control, and home automation. However, LPWANs are vulnerable to cyber attacks that can disrupt the normal operation of the network or compromise sensitive information. Therefore, analyzing cybersecurity risks before deploying an LPWAN is essential, as it helps identify potential vulnerabilities and threats as well as allowing for proactive measures to be taken to secure the network and protect against potential attacks. In this paper, a security risk analysis of IQRF technology is conducted utilizing the failure mode effects analysis (FMEA) method. The results of this study indicate that the highest risk corresponds to four failure modes, namely compromised end nodes, a compromised coordinator, a compromised gateway and a compromised communication between nodes. Moreover, through this methodology, a qualitative risk evaluation is performed to identify potential security threats in the IQRF network and propose countermeasures to mitigate the risk of cyber attacks on IQRF networks. en_US
dc.identifier.citationcount 1
dc.identifier.doi 10.3390/s23042078
dc.identifier.issn 1424-8220
dc.identifier.issue 4 en_US
dc.identifier.pmid 36850676
dc.identifier.scopus 2-s2.0-85148969251
dc.identifier.uri https://doi.org/10.3390/s23042078
dc.identifier.uri https://hdl.handle.net/20.500.14411/2585
dc.identifier.volume 23 en_US
dc.identifier.wos WOS:000941794700001
dc.identifier.wosquality Q2
dc.institutionauthor Dalveren, Yaser
dc.language.iso en en_US
dc.publisher Mdpi en_US
dc.relation.publicationcategory Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı en_US
dc.rights info:eu-repo/semantics/openAccess en_US
dc.scopus.citedbyCount 7
dc.subject LPWAN en_US
dc.subject Internet of Things (IoT) en_US
dc.subject IQRF en_US
dc.subject FMEA en_US
dc.subject security en_US
dc.title Lpwan Cyber Security Risk Analysis: Building a Secure Iqrf Solution en_US
dc.type Article en_US
dc.wos.citedbyCount 5
dspace.entity.type Publication
relation.isAuthorOfPublication 55e082ac-14c0-46a6-b8fa-50c5e40b59c8
relation.isAuthorOfPublication.latestForDiscovery 55e082ac-14c0-46a6-b8fa-50c5e40b59c8
relation.isOrgUnitOfPublication c3c9b34a-b165-4cd6-8959-dc25e91e206b
relation.isOrgUnitOfPublication.latestForDiscovery c3c9b34a-b165-4cd6-8959-dc25e91e206b

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
LPWANCyberSecurity Risk Analysis sensors-LPWAN Cyber Security Risk23-02078-v2.pdf
Size:
1.03 MB
Format:
Adobe Portable Document Format

Collections