Open Access
ARTICLE
KNEMAG: Key Node Estimation Mechanism Based on Attack Graph for IoT Security
Bichen Che1, Long Liu2,*, Huali Zhang1
1 School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing, China
2 College of New Media, Beijing Institute of Graphic Communication, Beijing, China
* Corresponding Author: Long Liu. Email:
Journal on Internet of Things 2020, 2(4), 145-162. https://doi.org/10.32604/jiot.2020.010035
Received 20 May 2020; Accepted 15 August 2020; Issue published 22 September 2020
Abstract
With the rapid development and widespread application of the IoT,
the at-tacks against IoT vulnerabilities have become more complex and diverse.
Most of the previous research focused on node vulnerability and its risk analysis.
There is little information available about the importance of the location of the
node in the system. Therefore, an estimation mechanism is proposed to assess the
key node of the IoT system. The estimation of the key node includes two parts:
one is the utilization relationship between nodes, and the other is the impact on
the system after the node is conquered. We use the node importance value and
the node risk value to quantify these two parts. First, the node importance value
is calculated by considering the attack path that pass through the node and the
probability that the attacker will abandon the attack. Second, in addition to node
vulnerabilities and the consequences of being attacked, two quantitative
indicators are proposed to comprehensively assess the impact of nodes on the
system security, and the node risk value is calculated based on the grey
correlation analysis method. Third, the key node in the IoT system could be
obtained by integrating the node importance value and risk value. Finally, the
simulation experiment result shows that the presented method could find the key
node of the system quickly and accurately.
Keywords
Cite This Article
B. Che, L. Liu and H. Zhang, "Knemag: key node estimation mechanism based on attack graph for iot security,"
Journal on Internet of Things, vol. 2, no.4, pp. 145–162, 2020. https://doi.org/10.32604/jiot.2020.010035
Citations