Abstract
This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
El origen e historia del Internet de las Cosas (IoT). http://www.bcendon.com/el-origen-del-iot/
Irshad M (2017) A systematic review of information security frameworks in the internet of things (IoT). In: Proceedings—18th IEEE international conference on high performance computing and communications, 14th IEEE international conference on smart city and 2nd IEEE international conference on data science and systems, HPCC/SmartCity/DSS 2016, pp 1270–1275
Vailshery L (2021) Número de dispositivos conectados en todo el mundo 2030—Statista, Jan 2021. https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/
Acharya V, Hegde VV (2020) Security frameworks for internet of things systems—A comprehensive survey. In: Proceedings of the 3rd international conference on smart systems and inventive technology, ICSSIT 2020, no. Icssit, pp 339–345
Brass LT, Carr M, Elsden M, Blackstock J (2018) Standardising a moving target: the development and evolution of IoT security standards. In: IET conference publications, vol 2018, no. CP740, pp 1–9
Arcos E (2016) Mirai e internet de las cosas responsables del ataque DDoS de octubre 21, Oct. https://hipertextual.com/2016/10/mirai-ddos-internet-cosas
Investigación sobre ciberseguridad de internet de las cosas (iot): una revisión de los temas de investigación actuals. IEEE Internet of Things J 6(2): 2103–2115 (2019)
E. U. A. for Cybersecurity (ENISA), Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (2017), November. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot
Khatoun R, Zeadally S (2017) Cybersecurity and privacy solutions in smart cities. IEEE Commun Mag 55(3):51–59
A survey on IoT architectures, protocols, security and smart city based applications. In: 8th International conference on computing, communications and networking technologies, ICCCNT 2017 (2017)
Introducción conclusiones hallazgos ciberseguridad en tiempos de pandemia preocupaciones incidentes controles. https://www.welivesecurity.com/wp-content/uploads/2021/06/ESET-security-report-LATAM2021.pdf
ESET: Threat Report Q2 2020. Comput Fraud Secur 2020(8):4 (2020)
Al-Boghdady KW, El-Ramly M (2021) The presence, trends, and causes of security vulnerabilities in operating systems of iot’s low-end devices. Sensors 21(7). https://www.mdpi.com/1424-8220/21/7/2329
Pacheco J, Tunc C, Hariri S (2019) Security framework for IoT cloud services. In: Proceedings of IEEE/ACS international conference on computer systems and applications, AICCSA, vol 2018-November, pp 1–6
Ichi.pro. Estándares y protocolos para soluciones de IoT. https://ichi.pro/es/estandares-y-protocolos-para-soluciones-de-iot-37517846919484
Coates M, Hero A, Nowak R, Yu B (2002) Internet tomography. IEEE Signal Process Mag. May, to be published
Huraj L, Šimon M, Horák T (2020) Resistance of iot sensors against DDoS attack in smart home environment. Sensors 20(18). https://www.mdpi.com/1424-8220/20/18/5298
Echeverría, Cevallos C, Ortiz-Garces I, Andrade RO (2021) Cybersecurity model based on hardening for secure internet of things implementation. Appl Sci 11(7). https://www.mdpi.com/2076-3417/11/7/3260
Peciña K, Estremera R, Bilbao A, Bilbao E (2011) Physical and logical security management organization model based on ISO 31000 and ISO 27001. In: 2011 Carnahan conference on security technology, pp 1–5
Núñez R (2018) Primera Norma internacional ISO para Internet de las Cosas IoT world online. https://www.iotworldonline.es/primera-norma-internacional-iso-para-internet-de-las-cosas
Cyber. En 303 645 - v2.1.0 - cyber; cyber security for consumer internet of things: baseline requirements (2020). https://www.etsi.org/deliver/etsien/303600303699/303645/0201.0030/en303645v020100v.pdf
Webb J, Hume D (2018) Campus IoT collaboration and governance using the nist cybersecurity framework. In: Living in the Internet of Things: cybersecurity of the IoT—2018, pp 1–7
Kearney P, Asal R (2019) ERAMIS: a reference architecture-based methodology for IoT systems. In: Proceedings—2019 IEEE world congress on services, Services 2019, vol 2642–939X, pp 366–367
Guzman, Bassem C (2021) Using the isvs - owasp isvs (pre-release 1.0rc). https://owasp-isvs.gitbook.io/owasp-isvs-pr/usingisvs
Iot SF (2020) IoT security compliance framework release 2.1. https://iotsecurityfoundation.org
Josyula SK, Gupta D (2017) A new security methodology for internet of things. In: 2017 international conference on computing, communication and automation (ICCCA), pp 613–618
Rahman FA, Daud M, Mohamad MZ (2016) Securing sensor to cloud ecosystem using internet of things (iot) security framework. In: Proceedings of the international conference on internet of things and cloud computing, ser. ICC ’16. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2896387.2906198
Matheu SN, Hernandez-Ramos JL, Skarmeta AF (2019) Toward a cybersecurity certification framework for the internet of things. IEEE Secur Privacy 17(3):66–76
Asllani AL, Lari N (2018) Strengthening information technology security through the failure modes and effects analysis approach. Int J Quality Innov 4(1):1–14
Ortiz Monet M (2019) Implementación y Evaluación de Plataformas en la Nube para Servicios de IoT. Oct 2019. https://riunet.upv.es/handle/10251/127825
Martinez Jacobso R (2017) Comparativa y estudio de plataformas IoT. https://upcommons.upc.edu/handle/2117/113622
Pires PF, Delicato FC, Batista T, Barros T, Cavalcante E, Resumo MP. Capítulo 3 Plataformas para a Internet das Coisas
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Moreta, N., Aragon, D., Oña, S., Jaramillo, A., Ibarra, J., Jahankhani, H. (2023). Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture. In: Jahankhani, H. (eds) Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-20160-8_2
Download citation
DOI: https://doi.org/10.1007/978-3-031-20160-8_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-20159-2
Online ISBN: 978-3-031-20160-8
eBook Packages: Computer ScienceComputer Science (R0)