Skip to main content

Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture

  • Conference paper
  • First Online:

Abstract

This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   179.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. El origen e historia del Internet de las Cosas (IoT). http://www.bcendon.com/el-origen-del-iot/

  2. Irshad M (2017) A systematic review of information security frameworks in the internet of things (IoT). In: Proceedings—18th IEEE international conference on high performance computing and communications, 14th IEEE international conference on smart city and 2nd IEEE international conference on data science and systems, HPCC/SmartCity/DSS 2016, pp 1270–1275

    Google Scholar 

  3. Vailshery L (2021) Número de dispositivos conectados en todo el mundo 2030—Statista, Jan 2021. https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/

  4. Acharya V, Hegde VV (2020) Security frameworks for internet of things systems—A comprehensive survey. In: Proceedings of the 3rd international conference on smart systems and inventive technology, ICSSIT 2020, no. Icssit, pp 339–345

    Google Scholar 

  5. Brass LT, Carr M, Elsden M, Blackstock J (2018) Standardising a moving target: the development and evolution of IoT security standards. In: IET conference publications, vol 2018, no. CP740, pp 1–9

    Google Scholar 

  6. Arcos E (2016) Mirai e internet de las cosas responsables del ataque DDoS de octubre 21, Oct. https://hipertextual.com/2016/10/mirai-ddos-internet-cosas

  7. Investigación sobre ciberseguridad de internet de las cosas (iot): una revisión de los temas de investigación actuals. IEEE Internet of Things J 6(2): 2103–2115 (2019)

    Google Scholar 

  8. E. U. A. for Cybersecurity (ENISA), Baseline Security Recommendations for IoT in the context of Critical Information Infrastructures (2017), November. https://www.enisa.europa.eu/publications/baseline-security-recommendations-for-iot

  9. Khatoun R, Zeadally S (2017) Cybersecurity and privacy solutions in smart cities. IEEE Commun Mag 55(3):51–59

    Article  Google Scholar 

  10. A survey on IoT architectures, protocols, security and smart city based applications. In: 8th International conference on computing, communications and networking technologies, ICCCNT 2017 (2017)

    Google Scholar 

  11. Introducción conclusiones hallazgos ciberseguridad en tiempos de pandemia preocupaciones incidentes controles. https://www.welivesecurity.com/wp-content/uploads/2021/06/ESET-security-report-LATAM2021.pdf

  12. ESET: Threat Report Q2 2020. Comput Fraud Secur 2020(8):4 (2020)

    Google Scholar 

  13. Al-Boghdady KW, El-Ramly M (2021) The presence, trends, and causes of security vulnerabilities in operating systems of iot’s low-end devices. Sensors 21(7). https://www.mdpi.com/1424-8220/21/7/2329

  14. Pacheco J, Tunc C, Hariri S (2019) Security framework for IoT cloud services. In: Proceedings of IEEE/ACS international conference on computer systems and applications, AICCSA, vol 2018-November, pp 1–6

    Google Scholar 

  15. Ichi.pro. Estándares y protocolos para soluciones de IoT. https://ichi.pro/es/estandares-y-protocolos-para-soluciones-de-iot-37517846919484

  16. Coates M, Hero A, Nowak R, Yu B (2002) Internet tomography. IEEE Signal Process Mag. May, to be published

    Google Scholar 

  17. Huraj L, Šimon M, Horák T (2020) Resistance of iot sensors against DDoS attack in smart home environment. Sensors 20(18). https://www.mdpi.com/1424-8220/20/18/5298

  18. Echeverría, Cevallos C, Ortiz-Garces I, Andrade RO (2021) Cybersecurity model based on hardening for secure internet of things implementation. Appl Sci 11(7). https://www.mdpi.com/2076-3417/11/7/3260

  19. Peciña K, Estremera R, Bilbao A, Bilbao E (2011) Physical and logical security management organization model based on ISO 31000 and ISO 27001. In: 2011 Carnahan conference on security technology, pp 1–5

    Google Scholar 

  20. Núñez R (2018) Primera Norma internacional ISO para Internet de las Cosas IoT world online. https://www.iotworldonline.es/primera-norma-internacional-iso-para-internet-de-las-cosas

  21. Cyber. En 303 645 - v2.1.0 - cyber; cyber security for consumer internet of things: baseline requirements (2020). https://www.etsi.org/deliver/etsien/303600303699/303645/0201.0030/en303645v020100v.pdf

  22. Webb J, Hume D (2018) Campus IoT collaboration and governance using the nist cybersecurity framework. In: Living in the Internet of Things: cybersecurity of the IoT—2018, pp 1–7

    Google Scholar 

  23. Kearney P, Asal R (2019) ERAMIS: a reference architecture-based methodology for IoT systems. In: Proceedings—2019 IEEE world congress on services, Services 2019, vol 2642–939X, pp 366–367

    Google Scholar 

  24. Guzman, Bassem C (2021) Using the isvs - owasp isvs (pre-release 1.0rc). https://owasp-isvs.gitbook.io/owasp-isvs-pr/usingisvs

  25. Iot SF (2020) IoT security compliance framework release 2.1. https://iotsecurityfoundation.org

  26. Josyula SK, Gupta D (2017) A new security methodology for internet of things. In: 2017 international conference on computing, communication and automation (ICCCA), pp 613–618

    Google Scholar 

  27. Rahman FA, Daud M, Mohamad MZ (2016) Securing sensor to cloud ecosystem using internet of things (iot) security framework. In: Proceedings of the international conference on internet of things and cloud computing, ser. ICC ’16. Association for Computing Machinery, New York, NY, USA. https://doi.org/10.1145/2896387.2906198

  28. Matheu SN, Hernandez-Ramos JL, Skarmeta AF (2019) Toward a cybersecurity certification framework for the internet of things. IEEE Secur Privacy 17(3):66–76

    Article  Google Scholar 

  29. Asllani AL, Lari N (2018) Strengthening information technology security through the failure modes and effects analysis approach. Int J Quality Innov 4(1):1–14

    Google Scholar 

  30. Ortiz Monet M (2019) Implementación y Evaluación de Plataformas en la Nube para Servicios de IoT. Oct 2019. https://riunet.upv.es/handle/10251/127825

  31. Martinez Jacobso R (2017) Comparativa y estudio de plataformas IoT. https://upcommons.upc.edu/handle/2117/113622

  32. Pires PF, Delicato FC, Batista T, Barros T, Cavalcante E, Resumo MP. Capítulo 3 Plataformas para a Internet das Coisas

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hamid Jahankhani .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Moreta, N., Aragon, D., Oña, S., Jaramillo, A., Ibarra, J., Jahankhani, H. (2023). Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture. In: Jahankhani, H. (eds) Cybersecurity in the Age of Smart Societies. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-031-20160-8_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20160-8_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20159-2

  • Online ISBN: 978-3-031-20160-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics