A Systematic Review of Information Security Frameworks in the Internet of Things

被引:21
作者
Irshad, Mohammad [1 ]
机构
[1] Singtel Cyber Secur Inst, Syst Secur, Singapore, Singapore
来源
PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS) | 2016年
关键词
Information Security; Internet of Things; Systematic Review; Risk Management Framework; IoT Architecture;
D O I
10.1109/HPCC-SmartCity-DSS.2016.51
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. Internet of things has gained extensive attention, the deployment of sensors, actuators are increasing at a rapid pace around the world. There is tremendous scope for more streamlined living through an increase of smart services, but this coincides with an increase in security and privacy concerns. There is a need to perform a systematic review of Information security governance frameworks in the Internet of things (IoT). Objective - The aim of this paper to evaluate systematic review of information security management frameworks which are related to the Internet of things (IoT). It will also discuss different information security frameworks that cover IoT models and deployments across different verticals. These frameworks are classified according to the area of the framework, the security executives and senior management of any enterprise that plans to start using smart services needs to define a clear governance strategy concerning the security of their assets, this system review will help them to make a better decision for their investment for secure IoT deployments. Method - A set of standard criteria has been established to analyze which security framework will be the best fit among these classified security structures in particularly for Internet of Things (IoT). The first step to evaluate security framework by using standard criteria methodology is to identify resources, the security framework for IoT is selected to be assessed according to CCS. The second step is to develop a set of Security Targets (ST). The ST is the set of criteria to apply for the target of evaluation (TOE). The third step is data extraction; fourth step data synthesis; and final step is to write-up study as a report. Conclusion - After reviewing four information security risk frameworks, this study makes some suggestions related to information security risk governance in Internet of Things (IoT). The organizations that have decided to move to smart devices have to define the benefits and risks and deployment processes to manage security risk. The information security risk policies should comply with an organization's IT policies and standards to protect the confidentiality, integrity and availability of information security. The study observes some of the main processes that are needed to manage security risks. Moreover, the paper also drew attention on some suggestions that may assist companies which are associated with the information security framework in Internet of things (IoT).
引用
收藏
页码:1270 / 1275
页数:6
相关论文
共 22 条
  • [1] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [2] Bogdan Maarten, 18 ANN C ACSAC102
  • [3] Internet of Things (IoT): A vision, architectural elements, and future directions
    Gubbi, Jayavardhana
    Buyya, Rajkumar
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (07): : 1645 - 1660
  • [4] An Information Framework for Creating a Smart City Through Internet of Things
    Jin, Jiong
    Gubbi, Jayavardhana
    Marusic, Slaven
    Palaniswami, Marimuthu
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (02): : 112 - 121
  • [5] Johnson P., WHAT ARE POLICIES ST
  • [6] RFID security and privacy: A research survey
    Juels, A
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 381 - 394
  • [7] Kitchenham Barbara, TRSE0401 KEEL U
  • [8] Physical access control for captured RFID data
    Kriplean, Travis
    Welbourne, Evan
    Khoussainova, Nodira
    Rastogi, Vibhor
    Balazinska, Magdalena
    Borriello, Gaetano
    Kohno, Tadaayoshi
    Suciu, Dan
    [J]. IEEE PERVASIVE COMPUTING, 2007, 6 (04) : 48 - 55
  • [9] Ma M., 2013, IEEE INT C IEEE CYB
  • [10] The Cluster Between Internet of Things and Social Networks: Review and Research Challenges
    Ortiz, Antonio M.
    Hussein, Dina
    Park, Soochang
    Han, Son N.
    Crespi, Noel
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (03): : 206 - 215