Common Cybersecurity Requirements in IoT Standards, Best Practices, and Guidelines

被引:2
|
作者
Kaksonen, Rauli [1 ]
Halunen, Kimmo [1 ]
Roning, Juha [1 ]
机构
[1] Univ Oulu, Oulu, Finland
来源
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS, BIG DATA AND SECURITY (IOTBDS) | 2022年
基金
欧盟地平线“2020”;
关键词
Internet of Things; IoT; Cybersecurity; Security Requirements; Standards; Best Practices; Guidelines;
D O I
10.5220/0011041700003194
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The cybersecurity of the Internet of Things (IoT) is an increasing concern and product vendors are advised to follow security standards, best practices, and guidelines. From the many requirement sources, a vendor is likely to choose only a few. How does this selection impact the security requirements of an IoT product? To answer the question, we collect requirements from 16 sources and divide them into categories for comparison. Common categories are identified, with all sources covering Security design, Interface security, Authentication, Data protection, and System updates. The agreement on the high-level categories does not hold in the subcategories and the selection of the sources have a big impact to the requirement details. Consolidation of the IoT security requirements would be desirable and possible.
引用
收藏
页码:149 / 156
页数:8
相关论文
共 50 条
  • [1] A review of standards with cybersecurity requirements for smart grid
    Leszczyna, Rafal
    COMPUTERS & SECURITY, 2018, 77 : 262 - 276
  • [2] Privacy and Security Best Practices for IoT Solutions
    Anedda, Matteo
    Floris, Alessandro
    Girau, Roberto
    Fadda, Mauro
    Ruiu, Pietro
    Farina, Massimo
    Bonu, Alessandro
    Giusto, Daniele D.
    IEEE ACCESS, 2023, 11 : 129156 - 129172
  • [3] Cybersecurity best practices among Polish students
    Szumski, Oskar
    KNOWLEDGE-BASED AND INTELLIGENT INFORMATION & ENGINEERING SYSTEMS (KES-2018), 2018, 126 : 1271 - 1280
  • [4] Best Practices for Standards Communities
    Lane, Gerald T.
    COMPUTER, 2009, 42 (07) : 86 - 87
  • [5] Best Practices Would Make Things Better in the IoT
    Momenzadeh, Behnood
    Dougherty, Helen
    Remmel, Matthew
    Myers, Steven
    Camp, L. Jean
    IEEE SECURITY & PRIVACY, 2020, 18 (04) : 38 - 47
  • [6] Towards a Visual Grammar for IoT Systems Representation and their Cybersecurity Requirements
    Gomez-Cabrera, Alain
    Escamilla-Ambrosio, Ponciano J.
    Rodriguez-Mota, Abraham
    Happa, Jassim
    2020 IEEE COLOMBIAN CONFERENCE ON COMMUNICATIONS AND COMPUTING (COLCOM), 2020,
  • [7] Cybersecurity Best Practices for Creating Resilient Control Systems
    Smith, Jess
    Pereyda, Joshua
    Gammel, Dennis
    2016 RESILIENCE WEEK (RWS), 2016, : 62 - 66
  • [8] Cybersecurity in smart local energy systems: requirements, challenges, and standards
    Dong S.
    Cao J.
    Flynn D.
    Fan Z.
    Energy Informatics, 2022, 5 (01)
  • [9] Cybersecurity Management in the Light of ISO Standards Requirements
    Antczak, Joanna
    VISION 2025: EDUCATION EXCELLENCE AND MANAGEMENT OF INNOVATIONS THROUGH SUSTAINABLE ECONOMIC COMPETITIVE ADVANTAGE, 2019, : 12724 - 12737
  • [10] Best practice in forensic entomology - standards and guidelines
    Amendt, Jens
    Campobasso, Carlo P.
    Gaudry, Emmanuel
    Reiter, Christian
    LeBlanc, Helene N.
    Hall, Martin J. R.
    INTERNATIONAL JOURNAL OF LEGAL MEDICINE, 2007, 121 (02) : 90 - 104