Cargando…

Hybrid IoT Cyber Range

The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that the...

Descripción completa

Detalles Bibliográficos
Autores principales: Balto, Karl Edvard, Yamin, Muhammad Mudassar, Shalaginov, Andrii, Katt, Basel
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059840/
https://www.ncbi.nlm.nih.gov/pubmed/36991781
http://dx.doi.org/10.3390/s23063071
_version_ 1785016971295719424
author Balto, Karl Edvard
Yamin, Muhammad Mudassar
Shalaginov, Andrii
Katt, Basel
author_facet Balto, Karl Edvard
Yamin, Muhammad Mudassar
Shalaginov, Andrii
Katt, Basel
author_sort Balto, Karl Edvard
collection PubMed
description The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements.
format Online
Article
Text
id pubmed-10059840
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-100598402023-03-30 Hybrid IoT Cyber Range Balto, Karl Edvard Yamin, Muhammad Mudassar Shalaginov, Andrii Katt, Basel Sensors (Basel) Article The use of IoT devices has increased rapidly in recent times. While the development of new devices is moving quickly, and as prices are being forced down, the costs of developing such devices also needs to be reduced. IoT devices are now trusted with more critical tasks, and it is important that they behave as intended and that the information they process is protected. It is not always the IoT device itself that is the target of a cyber attack, but rather, it can be a tool for another attack. Home consumers, in particular, expect these devices to be easy to use and set up. However, to reduce costs, complexity, and time, security measures are often cut down. To increase awareness and knowledge in IoT security, education, awareness, demonstrations, and training are necessary. Small changes may result in significant security benefits. With increased awareness and knowledge among developers, manufacturers, and users, they can make choices that can improve security. To increase knowledge and awareness in IoT security, a proposed solution is a training ground for IoT security, an IoT cyber range. Cyber ranges have received more attention lately, but not as much in the IoT field, at least not what is publicly available. As the diversity in IoT devices is large with different vendors, architectures, and components and peripherals, it is difficult to find one solution that fits all IoT devices. To some extent, IoT devices can be emulated, but it is not feasible to create emulators for all types of devices. To cover all needs, it is necessary to combine digital emulation with real hardware. A cyber range with this combination is called a hybrid cyber range. This work surveys the requirements for a hybrid IoT cyber range and proposes a design and implementation of a range that fulfills those requirements. MDPI 2023-03-13 /pmc/articles/PMC10059840/ /pubmed/36991781 http://dx.doi.org/10.3390/s23063071 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Balto, Karl Edvard
Yamin, Muhammad Mudassar
Shalaginov, Andrii
Katt, Basel
Hybrid IoT Cyber Range
title Hybrid IoT Cyber Range
title_full Hybrid IoT Cyber Range
title_fullStr Hybrid IoT Cyber Range
title_full_unstemmed Hybrid IoT Cyber Range
title_short Hybrid IoT Cyber Range
title_sort hybrid iot cyber range
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10059840/
https://www.ncbi.nlm.nih.gov/pubmed/36991781
http://dx.doi.org/10.3390/s23063071
work_keys_str_mv AT baltokarledvard hybridiotcyberrange
AT yaminmuhammadmudassar hybridiotcyberrange
AT shalaginovandrii hybridiotcyberrange
AT kattbasel hybridiotcyberrange