A feature-based approach for guiding the selection of Internet of Things cybersecurity standards using text mining

被引:1
作者
van der Schaaf, Koen [1 ]
Tekinerdogan, Bedir [1 ]
Catal, Cagatay [2 ]
机构
[1] Wageningen Univ & Res, Informat Technol Grp, Wageningen, Netherlands
[2] Qatar Univ, Dept Comp Sci & Engn, Doha, Qatar
关键词
cybersecurity; feature model; Internet of Things; natural language processing; standards; text mining; SECURITY CHALLENGES; PRIVACY;
D O I
10.1002/cpe.6385
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Cybersecurity is critical in realizing Internet of Things (IoT) applications and many different standards have been introduced specifically for this purpose. However, selecting relevant standards is not trivial and requires a broad understanding of cybersecurity and knowledge about the available standards. In this study, we present a systematic approach that guides IoT system developers in selecting relevant cybersecurity standards for their IoT projects. The systematic approach has been developed in four stages. First, the common and variant features of IoT cybersecurity have been modeled using a feature model. Second, an up-to-date overview of the IoT cybersecurity standards landscape has been mapped by combining existing overviews. Third, a text mining algorithm has been implemented. Fourth, the systematic approach has been modeled using business process modeling notation. Our case study demonstrated that this approach is effective and efficient for guiding the selection of IoT cybersecurity standards.
引用
收藏
页数:17
相关论文
共 43 条
  • [11] Gliozzo A., 2005, P 9 C COMP NAT LANG, P56
  • [12] Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues
    Granjal, Jorge
    Monteiro, Edmundo
    Silva, Jorge Sa
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2015, 17 (03): : 1294 - 1312
  • [13] The Role of Text Pre-processing in Sentiment Analysis
    Haddi, Emma
    Liu, Xiaohui
    Shi, Yong
    [J]. FIRST INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND QUANTITATIVE MANAGEMENT, 2013, 17 : 26 - 32
  • [14] Security Challenges in the IP-based Internet of Things
    Heer, Tobias
    Garcia-Morchon, Oscar
    Hummen, Rene
    Keoh, Sye Loong
    Kumar, Sandeep S.
    Wehrle, Klaus
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2011, 61 (03) : 527 - 542
  • [15] Hogan M., 2015, Supplemental information for the report on strategic US government engagement in international standardization to achieve US objectives for cybersecurity
  • [16] Hogan M., 2018, Interagency report on status of international cybersecurity standardization for the Internet of Things (IoT) (No. NIST Internal or Interagency Report (NISTIR) 8200 (Draft))
  • [17] ITU-T, 2012, OV INT THINGS
  • [18] Security of the Internet of Things: perspectives and challenges
    Jing, Qi
    Vasilakos, Athanasios V.
    Wan, Jiafu
    Lu, Jingwei
    Qiu, Dechao
    [J]. WIRELESS NETWORKS, 2014, 20 (08) : 2481 - 2501
  • [19] Kang K.C., 1990, Software Engineering Inst, Tech. rep.
  • [20] How Good is 85%? A Survey Tool to Connect Classifier Evaluation to Acceptability of Accuracy
    Kay, Matthew
    Patel, Shwetak N.
    Kientz, Julie A.
    [J]. CHI 2015: PROCEEDINGS OF THE 33RD ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, 2015, : 347 - 356