Test-based risk assessment and security certification proposal for the Internet of Things

被引:0
|
作者
Matheu Garcia, Sara N. [1 ]
Hernandez-Ramos, Jose L. [1 ]
Skarmeta, Antonio E. [1 ,2 ]
机构
[1] Univ Murcia, Fac Comp Sci, Dept Informat & Commun Engn, Murcia, Spain
[2] Odin Solut SL, Murcia, Spain
基金
欧盟地平线“2020”;
关键词
Security Certification; Security Risk Assessment; CWSS; Common Criteria; IoT; Security Testing;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This work provides a design of a certification methodology for IoT, paying attention to the test-based risk assessment phase to empower testers with the ability to assess security solutions for large-scale IoT deployments. The resulting approach is an instantiation of the Risk-based Security Assessment presented by ETSI based on the ISO 31000, and it is built on top of different technologies and approaches for security testing and risk assessment adapted to the IoT landscape. The proposed methodology is intended to be used for the different experiments that are proposed in the scope of the ARMOUR project for assessing the fulfilment of several security aspects. It is expected to be used as a baseline to build a new security certification and labelling approach for IoT devices.
引用
收藏
页码:641 / 646
页数:6
相关论文
共 50 条
  • [31] Encryption and Hash based Security in Internet of Things
    Sundaram, B. Vinayaga
    Ramnath, M.
    Prasanth, M.
    Sundaram, Varsha J.
    [J]. 2015 3RD INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING, COMMUNICATION AND NETWORKING (ICSCN), 2015,
  • [32] A PROPOSAL FOR ADVANCED SECURITY SYSTEM BASED ON EMPIRICAL TECHNOLOGIES: CLOUD COMPUTING, MACHINE LEARNING AND THE INTERNET OF THINGS
    Singh, Arun Pratap
    Jayant, Khel Prakash
    Bansal, Nidhi
    Singh, Pratik
    Awasthi, Amit
    [J]. ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2020, 20 (01): : 175 - 190
  • [33] A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication
    Saqib, Manasha
    Moon, Ayaz Hassan
    [J]. COMPUTERS & SECURITY, 2023, 125
  • [34] Comprehensive Assessment of Security Attack Detection Algorithms in Internet of Things
    Karande, Jalindar B.
    Joshi, Sarang A.
    [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
  • [35] Distributed network security framework of energy internet based on internet of things
    Zhang, Jie
    [J]. SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS, 2021, 44
  • [36] Privacy Information Security Classification for Internet of Things Based on Internet Data
    Lu, Xiaofeng
    Qu, Zhaowei
    Li, Qi
    Hui, Pan
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2015,
  • [37] Cyber security framework for Internet of Things-based Energy Internet
    Sani, Abubakar Sadiq
    Yuan, Dong
    Jin, Jiong
    Gao, Longxiang
    Yu, Shui
    Dong, Zhao Yang
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 93 : 849 - 859
  • [38] Security algorithm of Internet of Things based on ZigBee protocol
    Wang, Yongkang
    Chen, Chunxia
    Jiang, Qijie
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (Suppl 6): : 14759 - 14766
  • [39] Security of internet of things based on cryptographic algorithms: a survey
    Mousavi, Seyyed Keyvan
    Ghaffari, Ali
    Besharat, Sina
    Afshari, Hamed
    [J]. WIRELESS NETWORKS, 2021, 27 (02) : 1515 - 1555
  • [40] A Model-based Security Toolkit for the Internet of Things
    Neisse, Ricardo
    Fovino, Igor Nai
    Baldini, Gianmarco
    Stavroulaki, Vera
    Vlacheas, Panagiotis
    Giaffreda, Raffaele
    [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES), 2015, : 78 - 87