IoT security training for system developers: Methodology and tools

被引:3
|
作者
Beuran, Razvan [1 ]
Wang, Jidong [1 ]
Zhao, Min [1 ]
Tan, Yasuo [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Nomi, Japan
关键词
Internet of Things (IoT); Security training; IoT simulation; Cooja network simulator; IoT testbeds; FIT IoT-LAB;
D O I
10.1016/j.iot.2023.100931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunities, as well as challenges, accompany the development of new technologies, and the Internet of Things (IoT) is no exception. While most companies tout the benefits of IoT, challenges are often overlooked. Thus, IoT devices come in a variety of shapes, from small sensors to home routers and factory equipment, each with specific characteristics. While many of us own IoT devices, some may not even recognize them as such, let alone be able to manage them. This lead to a series of significant security incidents, such as the much-publicized Mirai botnet distributed denial-of-service cyberattack. The solution is to develop safer and more secure IoT systems, and in this paper we discuss first the methodology needed to train the developers of such systems for this purpose. We then present two training platforms that we designed and implemented following this methodology: IoTrain-Sim, which is based on the Cooja network simulator, and IoTrain-Lab, which uses the FIT IoT-LAB testbed as infrastructure. The two platforms include training content in the form of tutorials and predefined scenarios, both for fundamental and security IoT training, that the trainees can follow to gain an in-depth understanding of IoT via hands-on practice. The evaluation we conducted from functionality, performance and user perspectives demonstrates that our systems have several advantages compared to other approaches in terms of learner support, availability, extensibility, flexibility and scalability.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] Estimability Tools for Package Developers
    Lenth, Russell V.
    R JOURNAL, 2015, 7 (01): : 195 - 199
  • [22] IoT Security Hardware Framework for Remote Maintenance of Legacy Machine Tools
    Tedeschi, Stefano
    Mehnen, Jorn
    Roy, Rajkumar
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, DATA AND CLOUD COMPUTING (ICC 2017), 2017,
  • [23] Extending MUD Profiles Through an Automated IoT Security Testing Methodology
    Nieves Matheu, Sara
    Luis Hernandez-Ramos, Jose
    Perez, Salvador
    Skarmeta, Antonio F.
    IEEE ACCESS, 2019, 7 : 149444 - 149463
  • [24] DIVISION AMONG THE RANKS - THE SOCIAL IMPLICATIONS OF CASE TOOLS FOR SYSTEM DEVELOPERS
    ORLIKOWSKI, WJ
    PROCEEDINGS OF THE TENTH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS, 1989, : 199 - 210
  • [25] A Capability for Autonomous IoT System Security: Pushing IoT Assurance to the Edge
    Chavis, Jeffrey S.
    Buczak, Anna
    Kunz, Aaron
    Rubin, Aviel
    Watkins, Lanier
    2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2020), 2020, : 256 - 261
  • [26] Code Reviewing as Methodology for Online Security Studies with Developers - A Case Study with Freelancers on Password Storage
    Danilova, Anastasia
    Naiakshina, Alena
    Rasgauski, Anna
    Smith, Matthew
    PROCEEDINGS OF THE SEVENTEENTH SYMPOSIUM ON USABLE PRIVACY AND SECURITY (SOUPS 2021), 2021, : 397 - 416
  • [27] IoT Lysimeter System with Enhanced Data Security
    Oliveira, Geraldo
    Almeida, Carlos
    Santos, Joao Miguel
    Martins, Joao C.
    Caeiro, Jose Jasnau
    CONTROLO 2022, 2022, 930 : 119 - 129
  • [28] Embedded IOT System: Software and Security Attacks
    Sabir, Muhammad Ayub
    Malik, Muhammad Sheraz Arshad
    Ashraf, Fatima
    Rasheed, Rubab
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (08): : 70 - 73
  • [29] Application of IOT Technologies in Campus Security System
    Wang Xiuping
    COMPUTATIONAL MATERIALS SCIENCE, PTS 1-3, 2011, 268-270 : 1884 - 1887
  • [30] IOT Based energy Efficient Security System
    Saba, Amreen
    Nagarathna
    PROCEEDINGS OF THE 2017 3RD INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2017, : 132 - 136