A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining

被引:1
作者
van der Schaaf, Koen [1 ]
Tekinerdogan, Bedir [1 ]
Catal, Cagatay [2 ]
机构
[1] Wageningen Univ & Res, Informat Technol Grp, Wageningen, Netherlands
[2] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
cybersecurity; feature model; Internet of Things; natural language processing; standards; text mining; SECURITY CHALLENGES; PRIVACY;
D O I
10.1002/cpe.6385
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.
引用
收藏
页数:17
相关论文
共 43 条
  • [1] SoK: Security Evaluation of Home-Based IoT Deployments
    Alrawi, Omar
    Lever, Chaz
    Antonakakis, Manos
    Monrose, Fabian
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 1362 - 1380
  • [2] [Anonymous], 2014, IEEE T IND INFORM, DOI DOI 10.1109/TII.2014.2300753
  • [3] Internet of Things: Applications and Challenges in Technology and Standardization
    Bandyopadhyay, Debasis
    Sen, Jaydip
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 58 (01) : 49 - 69
  • [4] Technology Standards and Standard Setting Organizations: Introduction to the Searle Center Database
    Baron, Justus
    Spulber, Daniel F.
    [J]. JOURNAL OF ECONOMICS & MANAGEMENT STRATEGY, 2018, 27 (03) : 462 - 503
  • [5] Botnets and Internet of Things Security
    Bertino, Elisa
    Islam, Nayeem
    [J]. COMPUTER, 2017, 50 (02) : 76 - 79
  • [6] Brass I., 2018, LIVING INTERNET THIN, P24, DOI DOI 10.1049/CP.2018.0024
  • [7] Computest Research:, 1000 HOUS OFF VULN H
  • [8] ETSI, 2016, 103375 TR ETSI
  • [9] Farooq M.U., 2015, International journal of computer applications, V111, P1, DOI [10.5120/19547-1280, DOI 10.5120/19547-1280]
  • [10] Evaluating Critical Security Issues of the IoT World: Present and Future Challenges
    Frustaci, Mario
    Pace, Pasquale
    Aloi, Gianluca
    Fortino, Giancarlo
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2483 - 2495