{"id":"https://openalex.org/W2887949427","doi":"https://doi.org/10.1109/access.2018.2863244","title":"A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations","display_name":"A Graph-Based Security Framework for Securing Industrial IoT Networks From Vulnerability Exploitations","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2887949427","doi":"https://doi.org/10.1109/access.2018.2863244","mag":"2887949427"},"language":"en","primary_location":{"id":"doi:10.1109/access.2018.2863244","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2863244","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2018.2863244","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020528398","display_name":"Gemini George","orcid":"https://orcid.org/0000-0001-5367-9588"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Gemini George","raw_affiliation_strings":["Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016838632","display_name":"Sabu M. Thampi","orcid":"https://orcid.org/0000-0001-6453-5520"},"institutions":[{"id":"https://openalex.org/I68695296","display_name":"Indian Institute of Information Technology and Management, Kerala","ror":"https://ror.org/02w9cdh50","country_code":"IN","type":"education","lineage":["https://openalex.org/I68695296"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sabu M. Thampi","raw_affiliation_strings":["ORCiD","Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India"],"affiliations":[{"raw_affiliation_string":"ORCiD","institution_ids":[]},{"raw_affiliation_string":"Indian Institute of Information Technology and Management-Kerala, Thiruvananthapuram, India","institution_ids":["https://openalex.org/I68695296"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020528398"],"corresponding_institution_ids":["https://openalex.org/I68695296"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":17.6839,"has_fulltext":false,"cited_by_count":103,"citation_normalized_percentile":{"value":0.99150393,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"6","issue":null,"first_page":"43586","last_page":"43601"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8368664979934692},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5780686140060425},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.560245156288147},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5095105767250061},{"id":"https://openalex.org/keywords/vulnerability-assessment","display_name":"Vulnerability assessment","score":0.4952031672000885},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4262021780014038},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.35776010155677795},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.33134791254997253}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8368664979934692},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5780686140060425},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.560245156288147},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5095105767250061},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.4952031672000885},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4262021780014038},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.35776010155677795},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.33134791254997253},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2018.2863244","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2863244","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3af64ee430554da3be6451fbfed0500b","is_oa":true,"landing_page_url":"https://doaj.org/article/3af64ee430554da3be6451fbfed0500b","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 43586-43601 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2018.2863244","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2018.2863244","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":40,"referenced_works":["https://openalex.org/W136325890","https://openalex.org/W1508191694","https://openalex.org/W1964567066","https://openalex.org/W1971673042","https://openalex.org/W2030014066","https://openalex.org/W2038194220","https://openalex.org/W2041938856","https://openalex.org/W2049234922","https://openalex.org/W2053944475","https://openalex.org/W2059837870","https://openalex.org/W2063591563","https://openalex.org/W2074993018","https://openalex.org/W2104473821","https://openalex.org/W2107648568","https://openalex.org/W2116998925","https://openalex.org/W2130006997","https://openalex.org/W2131060714","https://openalex.org/W2131875370","https://openalex.org/W2152048468","https://openalex.org/W2162126029","https://openalex.org/W2164824840","https://openalex.org/W2293605433","https://openalex.org/W2383813018","https://openalex.org/W2539955859","https://openalex.org/W2549564909","https://openalex.org/W2580334929","https://openalex.org/W2606537796","https://openalex.org/W2611145822","https://openalex.org/W2611665029","https://openalex.org/W2733765803","https://openalex.org/W2748868501","https://openalex.org/W2766827306","https://openalex.org/W2786245267","https://openalex.org/W2792715678","https://openalex.org/W2963654300","https://openalex.org/W4249173680","https://openalex.org/W4298500072","https://openalex.org/W6630334281","https://openalex.org/W6663044212","https://openalex.org/W6743493502"],"related_works":["https://openalex.org/W1883246888","https://openalex.org/W2370114625","https://openalex.org/W1756374135","https://openalex.org/W2947584067","https://openalex.org/W3118510577","https://openalex.org/W2280562859","https://openalex.org/W230721595","https://openalex.org/W3157230915","https://openalex.org/W1496728123","https://openalex.org/W2062873522"],"abstract_inverted_index":{"Industrial":[0],"IoT":[1,8,30,48],"(IIoT)":[2],"refers":[3],"to":[4,12,36,73,120,155,184],"the":[5,14,22,40,47,56,59,68,71,77,82,90,111,115,122,126,140,144,157,161,170,186,216,220,224,228],"application":[6],"of":[7,29,46,61,89,143,151,160,169,208,219,227],"in":[9,58,85,93,100,114,125],"industrial":[10,23],"management":[11],"improve":[13,156],"overall":[15,158],"operational":[16],"efficiency.":[17],"With":[18],"IIoT":[19,62,86,116,229],"that":[20],"accelerates":[21],"automation":[24],"process":[25],"by":[26],"enrolling":[27],"thousands":[28],"devices,":[31],"strong":[32],"security":[33,83,123,137,159,199],"foundations":[34],"are":[35,98,201,213],"be":[37],"deployed":[38],"befitting":[39],"distributed":[41],"connectivity":[42],"and":[43,167,176,197,211],"constrained":[44],"functionalities":[45],"devices.":[49,95],"Recent":[50],"years":[51],"witnessed":[52],"severe":[53],"attacks":[54],"exploiting":[55],"vulnerabilities":[57,72,91,189],"devices":[60],"networks.":[63,230],"Moreover,":[64],"attackers":[65],"can":[66],"use":[67],"relations":[69,102,113],"among":[70,103],"penetrate":[74],"deep":[75],"into":[76],"network.":[78,117,145,162],"This":[79,118],"paper":[80],"addresses":[81],"issues":[84,124],"network":[87,127],"because":[88],"existing":[92],"its":[94],"As":[96],"graphs":[97,207],"efficient":[99],"representing":[101,110],"entities,":[104],"we":[105,147],"propose":[106,148],"a":[107,136,149,182],"graphical":[108],"model":[109,133],"vulnerability":[112],"helps":[119],"formulate":[121],"as":[128,135,191],"graph-theoretic":[129],"problems.":[130],"The":[131,163,203],"proposed":[132,221],"acts":[134],"framework":[138],"for":[139,215],"risk":[141,152,175],"assessment":[142],"Furthermore,":[146],"set":[150],"mitigation":[153],"strategies":[154,164],"include":[165],"detection":[166],"removal":[168],"attack":[171],"paths":[172],"with":[173,206],"high":[174],"low":[177],"hop-length.":[178],"We":[179],"also":[180],"discuss":[181],"method":[183],"identify":[185],"strongly":[187],"connected":[188],"referred":[190],"hot-spots.":[192],"A":[193],"use-case":[194],"is":[195],"discussed":[196],"various":[198],"parameters":[200],"evaluated.":[202],"simulation":[204],"results":[205],"different":[209],"sizes":[210],"structures":[212],"presented":[214],"performance":[217],"evaluation":[218],"techniques":[222],"against":[223],"changing":[225],"dynamics":[226]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":8},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":22},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":13}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
