IoT security training for system developers: Methodology and tools

被引:3
|
作者
Beuran, Razvan [1 ]
Wang, Jidong [1 ]
Zhao, Min [1 ]
Tan, Yasuo [1 ]
机构
[1] Japan Adv Inst Sci & Technol, Nomi, Japan
关键词
Internet of Things (IoT); Security training; IoT simulation; Cooja network simulator; IoT testbeds; FIT IoT-LAB;
D O I
10.1016/j.iot.2023.100931
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunities, as well as challenges, accompany the development of new technologies, and the Internet of Things (IoT) is no exception. While most companies tout the benefits of IoT, challenges are often overlooked. Thus, IoT devices come in a variety of shapes, from small sensors to home routers and factory equipment, each with specific characteristics. While many of us own IoT devices, some may not even recognize them as such, let alone be able to manage them. This lead to a series of significant security incidents, such as the much-publicized Mirai botnet distributed denial-of-service cyberattack. The solution is to develop safer and more secure IoT systems, and in this paper we discuss first the methodology needed to train the developers of such systems for this purpose. We then present two training platforms that we designed and implemented following this methodology: IoTrain-Sim, which is based on the Cooja network simulator, and IoTrain-Lab, which uses the FIT IoT-LAB testbed as infrastructure. The two platforms include training content in the form of tutorials and predefined scenarios, both for fundamental and security IoT training, that the trainees can follow to gain an in-depth understanding of IoT via hands-on practice. The evaluation we conducted from functionality, performance and user perspectives demonstrates that our systems have several advantages compared to other approaches in terms of learner support, availability, extensibility, flexibility and scalability.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] IoT Application Development: Home Security System
    Anvekar, Raj G.
    Banakar, Rajeshwari M.
    2017 IEEE TECHNOLOGICAL INNOVATIONS IN ICT FOR AGRICULTURE AND RURAL DEVELOPMENT (TIAR), 2017, : 68 - 72
  • [32] Border Security and Surveillance System Using IoT
    Boukhalfa, Siham
    Amine, Abdelmalek
    Hamou, Reda Mohamed
    INTERNATIONAL JOURNAL OF INFORMATION RETRIEVAL RESEARCH, 2022, 12 (01)
  • [33] Home automation and security system using IoT
    Veeranjaneyulu N.
    Srivalli G.
    Bodapati J.D.
    Revue d'Intelligence Artificielle, 2019, 33 (01) : 21 - 24
  • [34] IoT Security Framework for Smart Water System
    Pacheco, Jesus
    Ibarra, Daniela
    Vijay, Ashamsa
    Hariri, Salim
    2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 1285 - 1292
  • [35] IOT Enabled Security System for Android users
    Roy, Sulochana
    2018 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN ELECTRICAL, ELECTRONICS & COMMUNICATION ENGINEERING (ICRIEECE 2018), 2018, : 2312 - 2317
  • [36] IoT-Based Women Security System
    Kannan, Megalingam Rajesh
    Jyothsna, K.
    Aparna, T. S.
    Anjali, T.
    Meera, M.
    Amrutha, S. D.
    INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES, ICICCT 2019, 2020, 89 : 1369 - 1378
  • [37] IoT based Smart Security and Surveillance System
    Lulla, Gurusha
    Kumar, Abhinav
    Pole, Govind
    Deshmukh, Gopal
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 385 - 390
  • [38] IoT Based Smart Security System:IBSSS
    Goel, Vaibhav
    Chauhan, Vivek
    Jha, Ravi Chandra
    Pandey, Shivang
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 303 - 306
  • [39] Development of IoT Security Exercise Contents for Cyber Security Exercise System
    Shin, Sanggyu
    Seto, Yoichi
    2020 13TH INTERNATIONAL CONFERENCE ON HUMAN SYSTEM INTERACTION (HSI), 2020, : 281 - 286
  • [40] Knowledge discovery for training intelligent agents: Methodology, tools and applications
    Mitkas, P
    AUTONOMOUS INTELLIGENT SYSTEMS: AGENTS AND DATA MINING, PROCEEDINGS, 2005, 3505 : 2 - 18