Next Article in Journal
Adaptive Transient Damping Control Strategy of VSG System Based on Dissipative Hamiltonian Neural Network
Previous Article in Journal
Design of Ultra-Wideband Low RCS Antenna Based on Polarization Conversion Metasurface
Previous Article in Special Issue
A Comprehensive Analysis of Privacy-Preserving Solutions Developed for IoT-Based Systems and Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks

by
Dilli Prasad Sharma
The Edward S. Rogers Sr. Department of Electrical & Computer Engineering, University of Toronto 10 King’s College Road, Toronto, ON M5S 3G4, Canada
Electronics 2025, 14(11), 2205; https://doi.org/10.3390/electronics14112205
Submission received: 23 April 2025 / Revised: 26 May 2025 / Accepted: 27 May 2025 / Published: 29 May 2025

Abstract

:
The Internet of Things (IoT) networks face an increasing number of cyber threats due to their heterogeneous, distributed, and resource-constrained nature. Conventional static defense mechanisms are often inadequate against sophisticated and advanced persistent threats. Moving Target Defense (MTD) is a dynamic proactive security method that increases system resilience by continuously changing the attack surface, thereby increasing uncertainty and complexity for attackers. In this paper, we evaluate the effectiveness of shuffling or diversity-based MTD methods using time-to-compromise and security risk metrics. We develop attack path-based mean time-to-compromise and security risk reduction metrics for assessing the effectiveness of MTD. These metrics provide a quantitative basis for evaluating how well MTD techniques delay successful compromises and lower overall security risk exposure. The performance of the deployed MTD mechanism is evaluated and discussed for different attacker skill levels and shuffling frequencies.

1. Introduction

The rapid growth of Internet of Things (IoT) technologies has enabled the creation of innovative applications across diverse domains [1,2]. However, the large-scale deployment of IoT devices and their inherent constraints on resources such as bandwidth and power pose challenges for the effective application of traditional security and defense mechanisms. As a result, IoT systems remain vulnerable to various security threats and attacks which can disrupt the seamless delivery and normal operation of IoT-based services [3]. Moving Target Defense (MTD) methods have emerged as proactive and adaptive security strategies for safeguarding IoT systems despite resource limitations and evolving dynamic threats [4]. MTD mechanisms aim to dynamically change the attack surface to increase uncertainty and confuse attackers by invalidating information collected during reconnaissance or other procedures carried out by attackers prior to launching an attack [5,6]. Shuffling or diversity-based MTD techniques such as virtual IP shuffling [7,8], random host mutation [9], IP randomization [10], multiple operating systems rotation [11], IP address rotation or hopping [12], cryptosystem or firmware mutation [13], code partitioning [14], and cyberdeception [15] are common MTD mechanisms that can be employed to enhance system security in resource-constrained IoT environments [14]. Several assessment methods for evaluating MTD methods have been proposed [16,17,18,19,20,21,22]. However, their application is limited to particular attack scenarios, threat models, or specific network environments, and they generally lack consideration of IoT network environments. In this paper, we propose a new suite of attack path-based time-to-compromise (TTC) and security risk (SR) metrics to evaluate the effectiveness of shuffling and diversity-based MTD methods in IoT networks. The key contributions of this work are summarized as follows:
  • We propose a set of attack-path-based TTC metrics to estimate the mean time to compromise a smart device in an IoT network deploying the MTD defense mechanism. TTC-related metrics include mean TTC, minimum TTC, and maximum TTC and consider different skill levels on the part of attackers.
  • We devise a set of risk-based security metrics taking TTC and attack cost into account. These risk-based metrics compute the risk reduction with MTD mechanisms in terms of shuffling rate and strategies.
  • We conduct extensive simulation experiments to measure the effectiveness of the MTD methods deployed in IoT networks and identify key factors that significantly influence the performance of MTD methods.
The rest of this paper is organized as follows: Section 2 discusses the state-of-the-art of related work; Section 3 describes the network, threat, and defense models considered in this work; Section 4 presents the proposed metrics used to evaluate the MTD methods; Section 5 describes the numerical computation of the metrics; Section 6 discusses the experimental results and analysis; lastly, Section 7 concludes the paper and suggests potential future research directions.

2. Related Work

The rapid use of IoT smart devices introduces significant security and privacy risks due to their constrained resources and limited built-in protections [23,24]. IoT devices are extensively used in every part of our lives, including homes (smart homes), vehicles, education, healthcare, etc. The lack of proper security protection of IoT-connected systems (e.g., smart homes) can lead to severe cyberattacks, resulting in substantial financial and reputational losses. To address these security challenges, the IoT security research community has been motivated to develop advanced defense mechanisms to protect IoT systems against emerging security and privacy threats. Li et al. [25] proposed sequential XGBoost and hierarchical bag-of-words models for privacy risk protection of mobile apps against app fingerprinting attacks. This approach recognizes user activities from encrypted wireless traffic and addresses the challenges of app fingerprinting, including hidden destination, invisible boundary, app multiplexing, and open-world recognition. Similarly, Li et al. [26] introduced a fine-grained open-world Android app fingerprinting (FOAP) method for user action identification in Android apps under an open-world setting, addressing the limitations of traditional app fingerprinting attacks. Ni et al. [27] proposed an automated attack framework (AppListener) that recognizes fine-grained mobile app activities from harvested radio-frequency energy signals and uses them against side-channel attacks. AppListener automatically recognizes fine-grained app behaviors, revealing new privacy risks through RF energy harvesting. Sun et al. [28] presented a firmware updates over-the-air (FUOTA) system for LoRa networks that addresses energy efficiency, transmission reliability, and fairness using delta scripting, channel coding, and beamforming. This work was further enhanced in LoRa+ [29] through a joint differencing and compression algorithm, a concatenated coding scheme, and a beamforming strategy to address previous limitations in energy efficiency, reliability, fairness, and security. The security methods discussed above all address evolving threats in IoT networks; however, they neither incorporate MTD strategies nor provide security risk assessments for deploying MTD methods in IoT environments.
Various security assessment models and metrics have been proposed for evaluating the effectiveness of MTD methods. Picek et al. [30] proposed optimization-based metrics to assess the effectiveness of MTD techniques by using a network neighborhood partitioning algorithm to improve the precision of MTD influence measurement. Osei et al. [31] developed a game-theoretic approach to produce an optimal defense strategy. Zaffarano et al. [18] introduced a quantitative framework measuring productivity, success, confidentiality, and integrity for given missions and attack models. Carroll et al. [32] proposed a probabilistic model and analyzed the performance of the network address shuffling MTD technique. Similarly, Hong and Kim [17] developed a set of risk-based metrics to assess the effectiveness of shuffling, diversity, and redundancy in MTD. In addition, Hong et al. [33] proposed attack and defense effort-based dynamic security metrics for assessing the effectiveness of MTD techniques. Several entropy-based methods have also been introduced to quantitatively assess the security of MTD methods [34,35,36]. However, these approaches rely on probability distributions to estimate the likelihood of events, which can limit their precision in capturing real-time system dynamics. Sharma et al. [16] proposed a set of dynamic security metrics to evaluate the effectiveness of the deployed MTD methods in software-defined network (SDN) environments. These metrics capture the dynamic changes in network and host state information such as IP addresses, ports, software stacks, vulnerabilities, or network topology that are introduced by the MTD’s shuffling and reconfiguration methods. Alavizadeh et al. [22] utilized system risk, attack cost, return on attack, and reliability metrics to assess the effectiveness of combined MTD techniques in cloud systems. Using security and economic metrics, they mainly focused on the specific context of cloud models for e-health applications. However, these metrics do not offer the ability to capture and measure the effectiveness of the MTDs in IoT networks.
State-of-the-art security metrics for assessing MTD methods mainly focus on measuring the static or dynamic aspects of network addresses, networks, or systems. Most of these metrics were developed for enterprise network settings, and are not suitable for IoT environments. In addition, there are no attack path-based TTC or security risk metrics for shuffling and diversity-based MTDs. Thus, this work proposes a suite of attack path-based time-to-compromise and security risk metrics for evaluating MTD methods in IoT networks.

3. System Model

This section presents the network, threat, and defense models considered in this work. In addition, it outlines the assumptions and scenarios about the considered IoT network system, including the devices, vulnerabilities, attacker capabilities, and deployed defense mechanisms.

3.1. Network Model

In this study, we consider a smart home IoT networked system similar to the one described in [3]. This IoT network system consists of various interconnected IoT devices with wireless communication protocols. Figure 1 shows the smart home IoT network setup scenario with smart TVs, smart door lock, smart security cameras, thermostats, meters, a smart plug, a smart phone, and appliances all communicating over wireless protocols such as WiFi, Bluetooth, or Zigbee. IoT devices are managed through a central hub or mobile app, allowing users to control and monitor them remotely. Each of these devices has one or more vulnerabilities. Table 1 shows example vulnerabilities of these devices along with their CVE ID, CVSS score, and description [37]. For example, the smart TV (e.g, LG WebOS Smart TV) and security camera (Wyze Cam) have high-severity vulnerabilities (CVSS 9.8) that allow for remote command execution and login bypass, respectively, potentially giving attackers full control of the devices. The smartphone is also affected by memory corruption, posing serious risks when connected to smart environments. The smart door lock has relatively less risk, as it has a low CVSS score. Additionally, the smart plug, smart meters, and thermostats suffer from incorrect signature verification, authentication bypass, and buffer overflow.

3.2. Threat Model

In this study, we model attackers based on their ability to scan and exploit vulnerabilities within a smart home IoT network. As shown in Figure 1, it is assumed that the attackers are external to the network and that they can attempt to identify and compromise vulnerable IoT devices through scanning and analysis. They can use common network scanning tools such as Nmap [38] or Nessus [39] to detect active hosts, open ports, and known vulnerabilities. We consider three levels of attackers based on their technical expertise and knowledge:
  • Beginner: These attackers use default scanning configurations and have limited knowledge of the target network. Their ability to interpret scan results is minimal, and they require significant effort to identify vulnerabilities and find usable exploits to attack the system.
  • Intermediate: These attackers have a moderate understanding of IoT network structures and known vulnerabilities. They can customize scan parameters to focus on specific devices or services, and are generally able to identify vulnerabilities; however, they may struggle to find or develop suitable exploits that effectively compromise the targets.
  • Expert: Expert attackers possess deep knowledge of IoT systems and employ stealthy or adaptive scanning techniques. They can efficiently discover vulnerabilities and are capable of locating or creating effective exploits, enabling them to compromise a wide range of heterogeneous devices with ease.

3.3. Defense Model

In this work, we use shuffling and/or diversity-based MTD methods to protect the smart home IoT network. These methods dynamically change key elements of the system such as the network address, operating system rotations, or application software at regular intervals [4]. This constant change makes it difficult for attackers to scan, identify, and exploit known vulnerabilities. For example, if a smart device’s operating system version is changed, the vulnerability targeted by the attacker may no longer exist. Similarly, changing the network layout or IP address can disrupt the attacker’s ability to track or reach the device. MTD network shuffling mechanisms dynamically reconfigure the network topology by disconnecting existing links and/or establishing new connections/links [40]. This dynamic disconnection and reconnection mechanism alters the network structure, which reduces an attacker’s ability to perform reconnaissance and launch targeted attacks. Figure 2 shows the network structure before and after the MTD shuffling operation. A brief description of time-based shuffling and diversity-based defense methods is provided below:
  • Shuffling-based MTDs: Shuffling methods periodically modify network attributes such as IP addresses, ports, or configurations in a fixed interval of time. These MTD methods hinder an attacker’s ability to maintain an accurate view of the system, invalidating reconnaissance efforts and narrowing the window for successful exploitation.
  • Diversity-based MTDs: Diversity-based MTD methods dynamically change device characteristics such as operating systems (OS rotation), firmware versions, or application configurations to ensure that the vulnerabilities of the IoT devices differ over time, thereby reducing the risk of uniform exploitation.

4. Proposed Approach

This section presents the proposed time-to-compromise and security risk metrics for evaluating the effectiveness of IoT-based MTD methods. IoT-based MTD mechanisms dynamically change the attack surface of the IoT network; in turn, these dynamic network changes affect the reachability and vulnerabilities of IoT devices. Attack graph-based security metrics describe attack paths using the attack graph [41], which helps in analyzing the level of security [42]. Attack paths are sequences of devices or vulnerabilities that an attacker can compromise to reach a target. We assume that the target IoT network system has been deployed with any time-based shuffling MTD mechanisms that continuously change the attack surface network, devices, or software properties by shuffling the IP address, route, cryptosystem, firmware, operating system, service, application software, or code partitioning. The shuffling event invalidates security-related information (e.g., vulnerabilities and exploits) of the target networked systems collected by the attacker and consequently reduces the visibility of the attack surface to the attacker.
Shuffling or diversity-based MTD mechanisms dynamically alter network configurations, topologies, and vulnerability information of both individual devices and the overall IoT network [4,17]. To effectively capture and model these temporal changes, we utilize the Temporal–Hierarchical Attack Representation Model (T-HARM), which is specifically designed to reflect the dynamic transformations introduced by MTD operations [43,44]. Figure 3 shows a two-layer hierarchical representation of an IoT network using the T-HARM. The reachability layer captures the evolving network topology and communication paths between nodes, while the vulnerability layer encodes node security information such as vulnerability of device operating systems, exploitability, and risk levels.

4.1. Time-to-Compromise Metrics

Time-to-compromise (TTC) security metrics estimate the mean time to compromise of a host in a network deploying an MTD mechanism. We devise security metrics for the MTD by modifying the existing models of Byres and Leversage [45] and McQueen et al. [46] for incorporating the MTD shuffling rate in their estimation. Our proposed metrics estimate the mean TTC for different skill levels of attackers and with different shuffling rates of the MTD mechanism while taking attack paths into account. Let A P t k be the set of all possible attack paths from an attacker to a target host or device h i . The time to compromise using an attack path a p j A P t k at time t k is defined as follows:
t t c ( a p j ) = i t t c ( h i ) , h i a p j ,
where t t c ( h i ) is a function that estimates the expected time to compromise of a host or device h i . Now, the mean time to compromise (MTTC) on all the attack paths is
M T T C t k = j = 1 | A P t k | t t c ( a p j ) | A P t k | , a p j A P t k .
Using Equation (1), the minimum and maximum times to compromise on the attack path at time point t k can be estimated as follows:
M i n T T C t k = min a p j A P t k t t c ( a p j ) ,
M a x T T C t k = max a p j A P t k t t c ( a p j ) .
Equations (3) and (4) can be used to find the minimum and maximum TTCs for a given MTD shuffling time window [ t 1 , t m ], as follows:
M i n T T C = k = 1 m M i n T T C t k m ,
M a x T T C = k = 1 m M a x T T C t k m .
The metrics presented in Equations (1)–(6) can be used to estimate the TTC of a target–host pair using attack paths. Attack paths are sequences of hosts/devices or vulnerabilities that an attacker can exploit and compromise to reach the target device or system. However, the TTC of a host t t c ( h i ) in Equation (1) is still unknown. To estimate it, we adapt a method Byres and Leversage [45] considering three different levels of attacker skill and knowledge about the target IoT network system with three attacking processes. Estimation of the TTC relies on the attacker’s skills and knowledge. Based on the different skill levels of an attacker, the attacking processes can be divided into the following three exclusive processes:
  • Attack Process 1: In this scenario, the attacker knows one or more vulnerabilities and exploits ( i.e., known vulnerabilities and known exploits). The attacker has all of the required knowledge to attack the system.
  • Attack Process 2: In this process, the attacker knows one or more vulnerabilities but does not have any exploits on hand ( i.e., known vulnerabilities and unknown exploits). Thus, the attacker has partial knowledge about the target IoT network system.
  • Attack Process 3: In this scenario, the attacker does not know any vulnerabilities or exploits (i.e., unknown vulnerabilities and unknown exploits). This means that the attacker does not possess any knowledge about the target system. Thus, the attacker must scan the network, find vulnerabilities, and build an exploit before launching an attack.
Some of the above attack processes are mutually exclusive. For instance, Attack Process 1 and Attack Process 2 are mutually exclusive processes, as are Attack Process 2 and Attack Process 3. Therefore, we can multiply the probabilities and expected time to compromise a host t t c ( h i ) as follows:
t t c ( h i ) = t 1 × p + t 2 × ( 1 p ) × ( 1 u ) + t 3 × u × ( 1 p )
where p and u are the probabilities of the attackers in Process 1 and Process 3, respectively, and t 1 , t 2 , and t 3 are the respective times required for completing the attack in each attack process. As MTD techniques change the attack surfaces, they can make vulnerabilities and other related information invisible to attackers. The visibility factor of a host h i can be related with the shuffling rate θ i as ( 1 θ i ) , where θ i = 1 T i for T i > 0 . We relate this visibility factor with the vulnerability information using different skill levels of the attacker to estimate the probabilities p and u. The computations of the probabilities p and u are as follows:
p = 1 e ( 1 θ i ) × v i × m i / K ,
u = ( 1 s ) ( 1 θ i ) × v i ,
where:
  • v i is the number of vulnerabilities that exist in a host h i or a component,
  • m i is the number of exploits readily available for the vulnerabilities of host h i ,
  • K is the number of total non-duplicate vulnerabilities in the vulnerability database,
  • θ i is the shuffling rate of the host h i with MTD interval time T i , θ i = 1 T i , T i > 0 ,
  • s is the attacker’s skill level, s [ 0 , 1 ] , e.g., s = 0.3 for beginner, s = 0.55 for intermediate, and s = 1.0 for expert.
We estimate the attack completion time of each attack process by adapting the estimation method and parameters used in the model from McQueen et al. [46]. Let t 1 , t 2 , and t 3 represent the amount of time for completing process 1, process 2, and process 3, respectively, provided as follows:
  • t 1 = 1 day,
  • t 2 = 5.8 days × E T , where
    E T = s × 1 + t r i e s = 2 v E + 1 t r i e s × j = 2 t r i e s v E j + 2 v i j + 1 ,
    t 3 = 30.42 × 1 s 0.5 + 5.8 days .
    where:
    • E T : Expected number of tries
    • v A : Number of vulnerabilities for which exploits are available or can be created by the attacker at their skill level
    • v E : Number of vulnerabilities for which no exploits are available at the attacker’s skill level
    • s: Attacker’s skill level.
Now, we can estimate the time-to-compromise of a given host or device using Equation (7), substituting p, u, t 1 , t 3 , and t 3 obtained from Equations (8), (9), and (10), respectively.

4.2. Security Risks Metrics

The security risk (SR) is an important metric that is used to evaluate and assess security methods, including MTDs [17]. The quantitative security risk of an attack incident on IoT-based system host h i for an attack duration time t can be defined as follows:
S R ( h i ) = P r ( h i , t ) × C o A ( h i )
where P r ( h i , t ) is the probability of an attack happening on host h i for attack duration t and C o A ( h i ) is the loss or damage cost of the attack, typically measured in monetary value (e.g., USD). Here, the probability P r ( h i , t ) can be defined in terms of the expected time-to-compromise of a host T T C h i , obtained as follows:
P r ( h i , t ) = t T T C h i , t T T C h i
where T T C h i = t t c ( h i ) , which can be obtained using Equation (7).
The SR of a network (SRN) is the risk of compromising all hosts in the network with the MTD mechanism under test, and can be computed as
S R N = i = 1 n C o A ( h i ) × t T T C m t d t o t .
We propose a security risk reduction with MTD metric for measuring the effectiveness of deploying the MTD mechanism. The proposed metric estimates the security risk reduction provided by the MTD mechanism in terms of TTC based on the quantitative risk model. To measure it, we consider the system with and without the MTD mechanism. Using Equation (11), the security risk of the system with no MTD mechanism and with the mechanism can be respectively defined as follows:
S R n o m t d ( h i ) = P n o m t d ( h i , t ) × C o A ( h i )
S R m t d ( h i ) = P m t d ( h i , t ) × C o A ( h i )
where P n o m t d ( h i , t ) and P m t d ( h i , t ) are the respective probabilities of an attack occurring on a system of host h i for an attack duration time t without the mechanism and with it. In addition, the C o A ( h i ) value is the cost of the attack, which is the same in both systems. This metric evaluates the effectiveness of MTD method(s) deployed in an IoT network by comparing the defended network to a baseline model without any MTD methods. In addition, it is possible to consider attack paths and define path-based SR metrics. The SR reduction and path-based SR metrics are as follows:
  • Security Risk Reduction with MTD (SRRM): The SRRM of an attack on a system in host h i with the MTD security mechanism for an attack duration time t can be obtained by subtracting Equation (15) from Equation (14):
    S R R M ( h i ) = S R n o m t d ( h i ) S R m t d ( h i ) = ( 1 T T C n o m t d ( h i ) 1 T T C m t d ( h i ) ) × t × C o A ( h i ) .
    where t T T C n o m t d ( h i ) . Equation (7) can be used to compute T T C n o m t d ( h i ) and T T C m t d ( h i ) with θ i = 0.0 and 0.0 < θ i 1.0 , respectively.
  • Security Risk Reduction Percentage (SRRP): The SRRP can is expressed as a percentage, and can be obtained as follows:
    S R R P ( h i ) = S R R M ( h i ) S R n o m t d ( h i ) × 100 % = ( 1 T T C n o m t d ( h i ) T T C m t d ( h i ) ) × 100 % .
  • Security Risk Reduction Percentage of a Network (SRRPN): The SRRPN is the network’s risk reduction compromising all hosts in the network using the MTD, and can be obtained as follows:
    S R R N = ( 1 T T C n o m t d t o t T T C m t d t o t ) × 100 % .
  • Security Risk on Path (SRP): The SRP metric estimates the risk associated with a given attack path. It is the sum of the security risks of the hosts on a path a p j A P t k . The SRP of an attack path a p j A P t k for an attack duration time t starting at time t k is obtained as follows:
    S R P ( a p j ) = i P r ( h i , t ) × C o A ( h i ) , h i a p j = t × i ( 1 T T C h i × C o A ( h i ) ) , h i a p j
    where t T T C h i .
  • Security Risk on Paths of a Network (SRPN): The SRPN is the maximum security risk across all the attack paths, which can be obtained as follows:
    S R P N = max a p j A P t k S R P ( a p j ) .

5. Numerical Computation and Analysis

This section presents numerical computations of the proposed metrics to demonstrate their computation in evaluating the effectiveness of MTD techniques. To illustrate the computation of the proposed metrics, we consider an example IoT network comprising six IoT devices h 0 , h 1 , , h 5 , where h 0 is an entry point and h 5 is a target device. Figure 4a,b presents the reachability network graphs of the example IoT network before and after the MTD shuffling operating. In the figure, each node denotes an IoT device and its edge represents the time-to-compromise from the preceding device to that device. The time to compromise a device depends on its vulnerabilities, the attacker’s skill level, and how frequently shuffling is performed by the deployed MTD techniques. Similarly, Figure 5 shows two adjacency matrices of corresponding reachability graphs before shuffling (at time t) and after shuffling (at time t + T ), where T is the MTD shuffling interval time. The metrics are computed using these matrices with TTC values from the initial host to the target host without the MTD mechanism and with it. We assume that the attack time duration t is one day and that MTD shuffling follows some constant rate, i.e, θ i > 0.0 . In addition, we consider some given values for the cost of attack, e.g., CoA of host h 1 = $3000.00. Table 2 presents the summary of the computed metrics for each host from the entry point host h 0 .
Computation of the path-based metrics is as follows:
t t c ( a p 1 ) = t t c ( A h 0 h 1 h 3 h 5 ) = 6 + 3 + 2 = 11 days t t c ( a p 2 ) = t t c ( A h 0 h 2 h 4 h 5 ) = 4 + 5 + 2 = 11 days t t c ( a p 3 ) = t t c ( A h 0 h 1 h 4 h 5 ) = 6 + 2 + 2 = 10 days t t c ( a p 4 ) = t t c ( A h 0 h 2 h 3 h 5 ) = 4 + 1 + 2 = 7 days .
The time-to-compromise (TTC) of target host h 5 using the path a p 4 : A h 0 h 2 h 3 h 5 is 7 days. This path yields the minimum TTC among all possible attack paths to h 5 . The total time to compromise all the IoT devices/hosts in a network is the sum of the TTCs using the minimum TTC value. The total times to compromise all the IoT devices of the network without the MTD method and with it are 15 days and 19 days, respectively. Similarly, the security risk reduction percentage for compromising all the hosts in the network using the MTD can be obtained as shown below.
S R R N = ( 1 T T C n o m t d t o t T T C m t d t o t ) × 100 % = ( 1 15 19 ) × 100 % = 21.05 %
In this example, the deployed networking shuffling MTD method reduces the overall security risk of compromising all the IoT devices/hosts in the network by 21.05%.

6. Experimental Results and Analysis

This section presents the network setting and scenario description, simulation experiment setup, and analysis of the results for the evaluation of MTD methods. The proposed metrics are used to evaluate the effectiveness of deploying MTD methods and analyze results by varying the number of vulnerabilities, shuffling rates, and attacker skill levels.

6.1. Network Setting and Scenario Description

Simulation experiments were conducted considering the scenarios and settings discussed in the system model (Section 3). Figure 6 shows a network graph of the IoT network considered for the simulation experiments. The network consists of six different IoT devices interconnected through a gateway/router ( h 0 ) along with an attacker externally connected to this router. The router is assumed to run the OpenWRT operating system, and represents entry point to the network. The smartphone ( h 2 ) and smart camera ( h 1 ) are directly connected to the router, and operate on Android and embedded Linux, respectively. The target device in this setup is the smart door lock ( h 5 ), which runs on FreeRTOS and is accessible via two intermediate devices: the smart TV ( h 4 ) and smart speaker ( h 3 ). The smart TV uses WebOS, while the smart speaker is based on Google Cast OS. Initially, the network topology permits four distinct paths to reach the target device.
In this setting, the IoT network system (smart home system) is protected by one or more shuffling- and/or diversity-based MTD mechanism(s), which dynamically reconfigure or shuffle configurations of each host or device h i , such as the IP address, operating system/application software, or network topology using a specific shuffling rate θ i . Our simulation experiments used real-world data from a public vulnerability database [47], considering 122,774 unique vulnerabilities and 4,333 known exploits [37]. Attackers were assumed to be external to the network and to attack the network using their skills along with any available tools and techniques, as discussed in Section 3.2. The effectiveness of deploying different MTD methods was evaluated while varying key parameters such as the distribution of vulnerabilities, MTD shuffling rate, and attacker skill levels.

6.2. Results and Analysis

Evaluating MTD methods by varying vulnerabilities: Figure 7 presents the performance evaluation of the MTD mechanism(s) in terms of time-to-compromise (TTC) under varying vulnerability distributions and with different shuffling rates for different attacker skill levels. The results indicate that the TTC increases as the number of vulnerabilities in the network increases irrespective of the attacker’s skill level. This is because a higher number of vulnerabilities introduces more uncertainty for the attackers. Furthermore, the shuffling rate has a significant impact on the effectiveness of the MTD strategy. Our simulations explored shuffling intervals of 2, 5, 7, and 15 days. The results indicate that more frequent shuffling (i.e., every two days) significantly increases the TTC compared to less frequent shuffling (e.g., every fifteen days). In particular, shuffling intervals of 15 days or less consistently improve the IoT system’s resilience, making it harder and more time-consuming for attackers to successfully compromise the network. These findings suggest that frequent reconfiguration through MTDs is critical to enhancing security posture, especially in IoT environments with a high number of vulnerabilities or that face skilled adversaries.
Evaluating MTD methods with different shuffling rates: Figure 8 shows a performance comparison of MTD mechanisms using the time-to-compromise (TTC) metric across varying attacker skill levels and shuffling rates. These results demonstrate that the TTC increases with higher shuffling frequencies, indicating the high impact of the reconfiguration rate. In addition, the results show that attacker skill level plays a critical role. Low-skill (beginner) attackers experience a substantial increase in TTC even with only moderate shuffling, while highly skilled attackers are only significantly affected when the shuffling rate is very high. This indicates that defending against advanced adversaries requires frequent shuffling in order to effectively delay or prevent successful compromise.
Evaluating MTD methods with different attacker skills levels: Figure 9 presents a comparative analysis of MTD performance with time-to-compromise (TTC) metrics for different attacker skill levels. The results show a clear distinction in TTC values based on attacker expertise. Specifically, beginner-level attackers require approximately 8 to 158 days to successfully compromise a device/host, while intermediate attackers take between 30 to 62 days. In contrast, expert attackers exhibit significantly shorter TTC values ranging from approximately 15 to 30 days. These findings highlight that attacker proficiency substantially influences the effectiveness of the MTD mechanism.
Evaluating MTD methods with SRRP metric: Figure 10 evaluates the effectiveness of the deployed MTD mechanisms using the SRRP metric when varying the shuffling rate and with different attacker skill levels. The results indicate a consistent decline in MTD effectiveness as the shuffling interval increases. Specifically, daily shuffling yields the highest performance, reducing security risk by approximately 90% for all attacker skill levels. However, this effectiveness drops significantly to approximately 25–35% when the shuffling interval increases from one day to two days. This sharp decline highlights the sensitivity of MTD performance to shuffling frequency, emphasizing the necessity of frequent shuffling or reconfiguration to protect IoT environments from attackers.

7. Conclusions

This work has proposed a set of metrics for measuring the effectiveness of shuffling- or diversity-based MTD methods that shuffle device configurations, protocols, links, topology, operating systems, or application software in IoT networks. The proposed metrics estimate mean time-to-compromise and security risk scores for smart devices in IoT network systems, considering both the attacker’s skill level and available attack paths. Attack path-based metrics capture the dynamic change of an IoT network’s vulnerabilities with and without MTD methods. Our simulation results show that the effectiveness of MTD techniques depends significantly on the frequency of shuffling and the attacker’s skill level.
In future work, we plan to (1) develop context-aware metrics that incorporate contextual information such as device mobility, usage pattern, etc., in order to provide more adaptive and dynamic assessment of MTD methods; (2) design metrics that evaluate the energy consumption, computation overhead, and communication cost introduced by deploying MTD methods; and (3) investigate how machine learning models can be utilized to analyze system behavior and evolving pattern by using historical attack data in real-time settings.

Funding

This research received no external funding.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [Google Scholar] [CrossRef]
  2. Roman, R.; Zhou, J.; Lopez, J. On the features and challenges of security and privacy in distributed Internet-of-Things. Comput. Netw. 2013, 57, 2266–2279. [Google Scholar] [CrossRef]
  3. Ge, M.; Hong, J.B.; Guttmann, W.; Kim, D.S. A Framework for Automating Security Analysis of the Internet of Things. J. Netw. Comput. Appl. 2017, 83, 12–27. [Google Scholar] [CrossRef]
  4. Cho, J.H.; Sharma, D.P.; Alavizadeh, H.; Yoon, S.; Ben-Asher, N.; Moore, T.J.; Kim, D.S.; Lim, H.; Nelson, F.F. Toward Proactive, Adaptive Defense: A Survey on Moving Target Defense. IEEE Commun. Surv. Tutor. 2020, 22, 709–745. [Google Scholar] [CrossRef]
  5. Jajodia, S.; Ghosh, A.K.; Swarup, V.; Wang, C.; Wang, X.S. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, 1st ed.; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  6. Navas, R.E.; Cuppens, F.; Boulahia Cuppens, N.; Toutain, L.; Papadopoulos, G.Z. MTD, Where Art Thou? A Systematic Review of Moving Target Defense Techniques for IoT. IEEE Internet Things J. 2021, 8, 7818–7832. [Google Scholar] [CrossRef]
  7. Jafarian, J.H.; Al-Shaer, E.; Duan, Q. Openflow random host mutation: Transparent moving target defense using software defined networking. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, New York, NY, USA, 13 August 2012; pp. 127–132. [Google Scholar]
  8. Sharma, D.P.; Kim, D.S.; Yoon, S.; Lim, H.; Cho, J.; Moore, T.J. FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks. In Proceedings of the IEEE TrustCom, New York, NY, USA, 1–3 August 2018; pp. 579–587. [Google Scholar]
  9. Al-Shaer, E.; Duan, Q.; Jafarian, J.H. Random host mutation for moving target defense. In Proceedings of the International Conference on Security and Privacy in Communication Systems; Springer: Berlin/Heidelberg, Germany, 2012; pp. 310–327. [Google Scholar]
  10. Sherburne, M.; Marchany, R.; Tront, J. Implementing Moving Target IPv6 Defense to Secure 6LoWPAN in the Internet of Things and Smart Grid. In Proceedings of the the 9th Annual Cyber and Information Security Research Conference (CISR), New York, NY, USA, 8–10 April 2014; pp. 37–40. [Google Scholar]
  11. Thompson, M.; Evans, N.; Kisekka, V. Multiple OS rotational environment an implemented moving target defense. In Proceedings of the 2014 7th International Symposium on Resilient Control Systems (ISRCS), Denver, CO, USA, 19–21 August 2014; pp. 1–6. [Google Scholar]
  12. Zeitz, K.; Cantrell, M.; Marchany, R.; Tront, J. Designing a Micro-moving Target IPv6 Defense for the Internet of Things. In Proceedings of the Proceedings of IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation (IoTDI), Pittsburgh, PA, USA, 18–21 April 2017; pp. 179–184.
  13. Casola, V.; Benedictis, A.D.; Albanese, M. A moving target defense approach for protecting resource-constrained distributed devices. In Proceedings of the Proceedings of the IEEE 14th International Conference on Information Reuse Integration (IRI), San Francisco, CA, USA, 14–16 August 2013; pp. 22–29.
  14. Mahmood, K.; Shila, D.M. Moving target defense for Internet-of-Things using context aware code partitioning and code diversification. In Proceedings of the IEEE 3rd World Forum on Internet of Things (WF-IoT), Reston, VA, USA, 12–14 December 2016; pp. 329–330. [Google Scholar]
  15. Ge, M.; Cho, J.H.; Kim, D.; Dixit, G.; Chen, I.R. Proactive defense for internet-of-things: Moving target defense with cyberdeception. Acm Trans. Internet Technol. (Toit) 2021, 22, 1–31. [Google Scholar] [CrossRef]
  16. Sharma, D.P.; Enoch, S.Y.; Cho, J.H.; Moore, T.J.; Nelson, F.F.; Lim, H.; Kim, D.S. Dynamic Security Metrics for Software-Defined Network-based Moving Target Defense. J. Netw. Comput. Appl. 2020, 170, 102805. [Google Scholar] [CrossRef]
  17. Hong, J.B.; Kim, D.S. Assessing the effectiveness of moving target defenses using security models. IEEE Trans. Dependable Secur. Comput. 2016, 13, 163–177. [Google Scholar] [CrossRef]
  18. Zaffarano, K.; Taylor, J.; Hamilton, S. A Quantitative Framework for Moving Target Defense Effectiveness Evaluation. In Proceedings of the Second ACM Workshop on Moving Target Defense, New York, NY, USA, 12 October 2015; MTD ’15. pp. 3–10. [Google Scholar]
  19. Zhuang, R.; DeLoach, S.A.; Ou, X. A model for analyzing the effect of moving target defenses on enterprise networks. In Proceedings of the 9th Annual Cyber and Information Security Research Conference, Oak Ridge, TN, USA, 8–10 April 2014; pp. 73–76. [Google Scholar]
  20. Xiong, X.L.; Yang, L.; Zhao, G.S. Effectiveness evaluation model of moving target defense based on system attack surface. IEEE Access 2019, 7, 9998–10014. [Google Scholar] [CrossRef]
  21. Connell, W.; Menascé, D.A.; Albanese, M. Performance modeling of moving target defenses. In Proceedings of the 2017 Workshop on Moving Target Defense, Dallas, TX, USA, 30 October–3 November 2017; pp. 53–63. [Google Scholar]
  22. Alavizadeh, H.; Aref, S.; Kim, D.S.; Jang-Jaccard, J. Evaluating the security and economic effects of moving target defense techniques on the cloud. IEEE Trans. Emerg. Top. Comput. 2022, 10, 1772–1788. [Google Scholar] [CrossRef]
  23. HaddadPajouh, H.; Dehghantanha, A.; Parizi, R.M.; Aledhari, M.; Karimipour, H. A survey on internet of things security: Requirements, challenges, and solutions. Internet Things 2021, 14, 100129. [Google Scholar] [CrossRef]
  24. Mishra, N.; Pandya, S. Internet of things applications, security challenges, attacks, intrusion detection, and future visions: A systematic review. IEEE Access 2021, 9, 59353–59377. [Google Scholar] [CrossRef]
  25. Li, J.; Wu, S.; Zhou, H.; Luo, X.; Wang, T.; Liu, Y.; Ma, X. Packet-level open-world app fingerprinting on wireless traffic. In Proceedings of the 2022 Network and Distributed System Security Symposium (NDSS’22), San Diego, CA, USA, 24–28 April 2022. [Google Scholar]
  26. Li, J.; Zhou, H.; Wu, S.; Luo, X.; Wang, T.; Zhan, X.; Ma, X. FOAP: Fine-Grained Open-World android app fingerprinting. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1579–1596. [Google Scholar]
  27. Ni, T.; Lan, G.; Wang, J.; Zhao, Q.; Xu, W. Eavesdropping mobile app activity via Radio-Frequency energy harvesting. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 23), Anaheim, CA, USA, 9–11 August 2023; pp. 3511–3528. [Google Scholar]
  28. Sun, Z.; Ni, T.; Yang, H.; Liu, K.; Zhang, Y.; Gu, T.; Xu, W. FLoRa: Energy-efficient, reliable, and beamforming-assisted over-the-air firmware update in LoRa networks. In Proceedings of the Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, San Antonio, TX, USA, 9–12 May 2023; pp. 14–26. [Google Scholar]
  29. Sun, Z.; Ni, T.; Yang, H.; Liu, K.; Zhang, Y.; Gu, T.; Xu, W. Flora+: Energy-efficient, reliable, beamforming-assisted, and secure over-the-air firmware update in lora networks. ACM Trans. Sens. Netw. 2024, 20, 1–28. [Google Scholar] [CrossRef]
  30. Picek, S.; Hemberg, E.; O’Reilly, U.M. If you can’t measure it, you can’t improve it: Moving target defense metrics. In Proceedings of the 2017 Workshop on Moving Target Defense, Dallas, TX USA, 30 October 2017; pp. 115–118. [Google Scholar]
  31. Osei, A.B.; Yeginati, S.R.; Al Mtawa, Y.; Halabi, T. Optimized Moving Target Defense Against DDoS Attacks in IoT Networks: When to Adapt? In Proceedings of the GLOBECOM 2022—2022 IEEE Global Communications Conference, Rio de Janeiro, Brazil, 4–8 December 2022; pp. 2782–2787. [Google Scholar] [CrossRef]
  32. Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S. Analysis of network address shuffling as a moving target defense. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 701–706. [Google Scholar]
  33. Hong, J.B.; Enoch, S.Y.; Kim, D.S.; Nhlabatsi, A.; Fetais, N.; Khan, K.M. Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 2018, 79, 33–52. [Google Scholar] [CrossRef]
  34. Zhuang, R.; DeLoach, S.A.; Ou, X. Towards a Theory of Moving Target Defense. In Proceedings of the First ACM Workshop on Moving Target Defense, Scottsdale, AR, USA, 7 November 2014; pp. 31–40. [Google Scholar]
  35. Ma, D.; Wang, L.; Lei, C.; Xu, Z.; Zhang, H.; Li, M. POSTER: Quantitative Security Assessment Method Based on Entropy for Moving Target Defense. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, New York, NY, USA, 2–6 April 2017; pp. 920–922. [Google Scholar]
  36. Steinberger, J.; Kuhnert, B.; Dietz, C.; Ball, L.; Sperotto, A.; Baier, H.; Pras, A.; Dreo, G. DDoS Defense using MTD and SDN. In Proceedings of the IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, 23–27 April 2018; pp. 1–9. [Google Scholar]
  37. CVE. CVEdetails. Available online: https://www.cvedetails.com/ (accessed on 1 March 2025).
  38. Lyon, G.F. Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning; Insecure: Los Angeles, CA, USA, 2009. [Google Scholar]
  39. Nessus. Nessus Professional. 2018. Available online: https://www.tenable.com/products/nessus/nessus-professional (accessed on 20 December 2024).
  40. Hong, J.B.; Yoon, S.; Lim, H.; Kim, D.S. Optimal network reconfiguration for software defined networks using shuffle-based online MTD. In Proceedings of the 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS), Hong Kong, China, 26–29 September 2017; pp. 234–243. [Google Scholar]
  41. Sheyner, O.; Haines, J.; Jha, S.; Lippmann, R.; Wing, J.M. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 12–15 May 2002; pp. 273–284. [Google Scholar]
  42. Idika, N.; Bhargava, B. Extending Attack Graph-Based Security Metrics and Aggregating Their Application. IEEE Trans. Dependable Secur. Comput. 2012, 9, 75–85. [Google Scholar] [CrossRef]
  43. Yusuf, S.E.; Ge, M.; Hong, J.B.; Kim, H.K.; Kim, P.; Kim, D.S. Security Modelling and Analysis of Dynamic Enterprise Networks. In Proceedings of the 2016 IEEE International Conference on Computer and Information Technology (CIT), Nadi, Fiji, 8–10 December 2016; pp. 249–256. [Google Scholar] [CrossRef]
  44. Hong, J.; Kim, D.S. Harms: Hierarchical attack representation models for network security analysis. In Proceedings of the 10th Australian Information Security Management Conference, Novotel Langley Hotel, Perth, Australia, 3–5 December 2012. [Google Scholar]
  45. Byres, E.; Leversage, D. Estimating a System’s Mean Time-to-Compromise. IEEE Secur. Priv. 2008, 6, 52–60. [Google Scholar]
  46. McQueen, M.A.; Boyer, W.F.; Flynn, M.A.; Beitel, G.A. Time-to-Compromise Model for Cyber Risk Reduction Estimation. In Proceedings of the Quality of Protection; Gollmann, D., Massacci, F., Yautsiukhin, A., Eds.; Springer: Boston, MA, USA, 2006; pp. 49–64. [Google Scholar]
  47. NIST-NVD. National Vulnerability Database (NVD). 2025. Available online: https://nvd.nist.gov/ (accessed on 1 March 2025).
Figure 1. IoT network and attack scenario for a smart home.
Figure 1. IoT network and attack scenario for a smart home.
Electronics 14 02205 g001
Figure 2. Network reachability graphs before and after shuffling.
Figure 2. Network reachability graphs before and after shuffling.
Electronics 14 02205 g002
Figure 3. Two-layer hierarchical representation of the IoT network’s reachability and vulnerability information.
Figure 3. Two-layer hierarchical representation of the IoT network’s reachability and vulnerability information.
Electronics 14 02205 g003
Figure 4. Network reachability graphs showing the IoT topology (a) before and (b) after applying MTD-based shuffling.
Figure 4. Network reachability graphs showing the IoT topology (a) before and (b) after applying MTD-based shuffling.
Electronics 14 02205 g004
Figure 5. Matrices representing reachability graphs before and after shuffling at time t and time t + T , where T is the MTD shuffling interval time.
Figure 5. Matrices representing reachability graphs before and after shuffling at time t and time t + T , where T is the MTD shuffling interval time.
Electronics 14 02205 g005
Figure 6. Smart home IoT network model for simulation experiments.
Figure 6. Smart home IoT network model for simulation experiments.
Electronics 14 02205 g006
Figure 7. Performance evaluation of the MTD method using time-to-compromise with different shuffling rates varying the distribution of vulnerabilities for three different attacker skill levels: (a) beginner, (b) intermediate, and (c) expert. No shuffling ( θ = 0 ) represents a baseline IoT network with no defense mechanism.
Figure 7. Performance evaluation of the MTD method using time-to-compromise with different shuffling rates varying the distribution of vulnerabilities for three different attacker skill levels: (a) beginner, (b) intermediate, and (c) expert. No shuffling ( θ = 0 ) represents a baseline IoT network with no defense mechanism.
Electronics 14 02205 g007
Figure 8. Performance comparison of MTD mechanisms using different time-to-compromise metrics with different attacker skill levels and varying shuffling rate: (a) minimum time-to-compromise (MinTTC), (b) mean time-to-compromise (MTTC), and (c) maximum time-to-compromise (MaxTTC).
Figure 8. Performance comparison of MTD mechanisms using different time-to-compromise metrics with different attacker skill levels and varying shuffling rate: (a) minimum time-to-compromise (MinTTC), (b) mean time-to-compromise (MTTC), and (c) maximum time-to-compromise (MaxTTC).
Electronics 14 02205 g008
Figure 9. Comparison of time-to-compromise metrics (MinTTC, MTTC, and MaxTTC) for different attacker skill levels.
Figure 9. Comparison of time-to-compromise metrics (MinTTC, MTTC, and MaxTTC) for different attacker skill levels.
Electronics 14 02205 g009
Figure 10. Evaluation of effectiveness of MTD methods using the security risk reduction percentage (SRRP) metric with different shuffling rates and different attacker skill levels.
Figure 10. Evaluation of effectiveness of MTD methods using the security risk reduction percentage (SRRP) metric with different shuffling rates and different attacker skill levels.
Electronics 14 02205 g010
Table 1. Vulnerabilities of IoT devices with CVE IDs, and CVSS score, and description.
Table 1. Vulnerabilities of IoT devices with CVE IDs, and CVSS score, and description.
Device TypeBrand/ModelCVE IDCVSS ScoreDescription
Smart TVLG WebOSCVE-2023-63179.8Remote command execution
Smart door lockSuleve 5-in-1 Smart Door Lock v1.0CVE-2023-398432.4Missing encryption
Smart speakerSonos Era 100CVE-2024-52698.8Use-after-free remote code execution
SmartphoneAndroid DevicesCVE-2023-400888.8Memory corruption
Security CameraWyze CamCVE-2019-95649.8Bypass login and control the devices
Smart MeterSiemens 7KT PAC1200CVE-2017-99448.8Authentication bypass
Smart ThermostatEcobee3 liteCVE-2021-279548.5Buffer-overflow
Smart PlugWSP080 v1.2 liteCVE-2023-337686.5Incorrect signature verification
Table 2. Computed metric values.
Table 2. Computed metric values.
IoT Devices CoA TTC no mtd TTC mtd SR no mtd SR mtd SRRP
h 0 (start)------
h 1 $3000.006 days6 days500.00500.000.00%
h 2 $3000.004 days4 days750.00750.000.00%
h 3 $2000.005 days13 days400.00153.8461.00%
h 4 $2000.008 days8 days250.00250.000.00%
h 5 $5000.007 days10 days714.28500.0030.00%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Sharma, D.P. Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks. Electronics 2025, 14, 2205. https://doi.org/10.3390/electronics14112205

AMA Style

Sharma DP. Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks. Electronics. 2025; 14(11):2205. https://doi.org/10.3390/electronics14112205

Chicago/Turabian Style

Sharma, Dilli Prasad. 2025. "Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks" Electronics 14, no. 11: 2205. https://doi.org/10.3390/electronics14112205

APA Style

Sharma, D. P. (2025). Evaluating Moving Target Defense Methods Using Time to Compromise and Security Risk Metrics in IoT Networks. Electronics, 14(11), 2205. https://doi.org/10.3390/electronics14112205

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop