A review of security frameworks for Internet of Things

Vishwesh Nagamalla, Aruna Varanasi
{"title":"A review of security frameworks for Internet of Things","authors":"Vishwesh Nagamalla, Aruna Varanasi","doi":"10.1109/ICICES.2017.8070757","DOIUrl":null,"url":null,"abstract":"By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

Abstract

By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).
物联网安全框架综述
据估计,到2020年,联网设备的数量将呈指数级增长,达到500亿台。物联网得到了广泛的关注,传感器、执行器的部署在全球范围内迅速增加。智能服务的兴起为高效生活提供了巨大的空间,但与此同时,安全和隐私问题也在增加。人们希望对物联网(IoT)内的信息安全治理框架进行科学审查。目的:本文的目的是评估与物联网(IoT)相关的信息安全管理框架的系统审查。它还将讨论物联网在不同垂直领域的模型和部署的完全不同的信息安全框架。这些框架根据框架的领域进行分类,任何计划开始滥用良好服务的企业的安全主管和高级管理人员必须概述有关其资产安全的透明治理策略,这种方法审查可以帮助他们为安全物联网部署的投资制定改进的决策。方法-已经建立了一套标准标准,以调查哪些安全框架是这些分类安全结构中最有效的工作,特别是对于物联网(IoT)。通过受害标准方法判断安全框架的首要步骤是识别资源,选择物联网的安全框架并根据CCS进行评估。第二步是开发一组安全目标(ST)。ST是用于分析目标(TOE)的一组标准。第三步是数据提取;第四步数据合成;最后一步是将研究写成报告。结论——在回顾了四种信息安全风险框架后,本研究提出了与物联网(IoT)信息安全风险治理相关的一些建议。已经决定转向智能设备的组织应该概述优势和风险,以及管理安全风险的准备过程。知识安全风险策略应符合组织的IT策略和标准,以保护知识安全的机密性、完整性和便捷性。该研究观察了管理安全风险所需的许多最重要的流程。此外,本文还关注了一些建议,这些建议将有助于企业在物联网(IoT)中采取与知识安全框架相关的措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信