{"title":"物联网安全框架综述","authors":"Vishwesh Nagamalla, Aruna Varanasi","doi":"10.1109/ICICES.2017.8070757","DOIUrl":null,"url":null,"abstract":"By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).","PeriodicalId":134931,"journal":{"name":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"A review of security frameworks for Internet of Things\",\"authors\":\"Vishwesh Nagamalla, Aruna Varanasi\",\"doi\":\"10.1109/ICICES.2017.8070757\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).\",\"PeriodicalId\":134931,\"journal\":{\"name\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"volume\":\"8 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Information Communication and Embedded Systems (ICICES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICES.2017.8070757\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Information Communication and Embedded Systems (ICICES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICES.2017.8070757","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A review of security frameworks for Internet of Things
By 2020, it's estimated that the amount of connected devices is predicted to grow exponentially to fifty billion. internet of things has gained intensive attention, the deployment of sensors, actuators are increasing at a speedy pace round the world. there's tremendous scope for a lot of efficient living through a rise of smart services, however this coincides with a rise in security and privacy issues. there's a desire to perform a scientific review of information security governance frameworks within the internet of things (IoT) Objective: The aim of this paper to evaluate systematic review of information security management frameworks that are related to the internet of things (IoT). it'll additionally discuss totally different information security frameworks that IoT models and deployments across different verticals. These frameworks are classified in line with the realm of the framework, the security executives and senior management of any enterprise that plans to start out mistreatment good services must outline a transparent governance strategy regarding the safety of their assets, this method review can facilitate them to create an improved decision for their investment for secure IoT deployments. Method — a set of standard criteria has been established to investigate which security framework are the most effective work among these classified security structures in notably for net of Things (IoT). the primary step to judge security framework by victimisation commonplace criteria methodology is to identify resources, the safety framework for IoT is chosen to be assessed in line with CCS. The second step is to develop a group of Security Targets (ST). The ST is that the set of criteria to use for the target of analysis (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion — after reviewing four information security risk frameworks, this study makes some suggestions associated with information security risk governance in internet of Things (IoT). The organizations that have determined to maneuver to smart devices ought to outline the advantages and risks and preparation processes to manage security risk. the knowledge security risk policies ought to befits an organization's IT policies and standards to guard the confidentiality, integrity and handiness of knowledge security. The study observes a number of the most processes that are required to manage security risks. Moreover, the paper additionally drew attention on some suggestions which will assist corporations that square measure related to the knowledge security framework in internet of things (IoT).