Cargando…
Hybrid IoT Cyber Range
The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that the...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059840/ https://www.ncbi.nlm.nih.gov/pubmed/36991781 http://dx.doi.org/10.3390/s23063071 |
_version_ | 1785016971295719424 |
---|---|
author | Balto, Karl Edvard Yamin, Muhammad Mudassar Shalaginov, Andrii Katt, Basel |
author_facet | Balto, Karl Edvard Yamin, Muhammad Mudassar Shalaginov, Andrii Katt, Basel |
author_sort | Balto, Karl Edvard |
collection | PubMed |
description | The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements. |
format | Online Article Text |
id | pubmed-10059840 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-100598402023-03-30 Hybrid IoT Cyber Range Balto, Karl Edvard Yamin, Muhammad Mudassar Shalaginov, Andrii Katt, Basel Sensors (Basel) Article The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements. MDPI 2023-03-13 /pmc/articles/PMC10059840/ /pubmed/36991781 http://dx.doi.org/10.3390/s23063071 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Balto, Karl Edvard Yamin, Muhammad Mudassar Shalaginov, Andrii Katt, Basel Hybrid IoT Cyber Range |
title | Hybrid IoT Cyber Range |
title_full | Hybrid IoT Cyber Range |
title_fullStr | Hybrid IoT Cyber Range |
title_full_unstemmed | Hybrid IoT Cyber Range |
title_short | Hybrid IoT Cyber Range |
title_sort | hybrid iot cyber range |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059840/ https://www.ncbi.nlm.nih.gov/pubmed/36991781 http://dx.doi.org/10.3390/s23063071 |
work_keys_str_mv | AT baltokarledvard hybridiotcyberrange AT yaminmuhammadmudassar hybridiotcyberrange AT shalaginovandrii hybridiotcyberrange AT kattbasel hybridiotcyberrange |