Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation

The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security i...

Full description

Bibliographic Details
Main Authors: Aarón Echeverría, Cristhian Cevallos, Ivan Ortiz-Garces, Roberto O. Andrade
Format: Article
Language:English
Published: MDPI AG 2021-04-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/11/7/3260
_version_ 1797538733671579648
author Aarón Echeverría
Cristhian Cevallos
Ivan Ortiz-Garces
Roberto O. Andrade
author_facet Aarón Echeverría
Cristhian Cevallos
Ivan Ortiz-Garces
Roberto O. Andrade
author_sort Aarón Echeverría
collection DOAJ
description The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution.
first_indexed 2024-03-10T12:35:37Z
format Article
id doaj.art-4953e933c8e44caaa111eb41012fcd1b
institution Directory Open Access Journal
issn 2076-3417
language English
last_indexed 2024-03-10T12:35:37Z
publishDate 2021-04-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj.art-4953e933c8e44caaa111eb41012fcd1b2023-11-21T14:18:13ZengMDPI AGApplied Sciences2076-34172021-04-01117326010.3390/app11073260Cybersecurity Model Based on Hardening for Secure Internet of Things ImplementationAarón Echeverría0Cristhian Cevallos1Ivan Ortiz-Garces2Roberto O. Andrade3Escuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorEscuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorEscuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorFacultad de Ingeniería en Sistemas, Escuela Politécnica Nacional, Quito 170525, EcuadorThe inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution.https://www.mdpi.com/2076-3417/11/7/3260Internet of Things (IoT)hardening processcybersecurity riskpenetration test
spellingShingle Aarón Echeverría
Cristhian Cevallos
Ivan Ortiz-Garces
Roberto O. Andrade
Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
Applied Sciences
Internet of Things (IoT)
hardening process
cybersecurity risk
penetration test
title Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
title_full Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
title_fullStr Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
title_full_unstemmed Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
title_short Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
title_sort cybersecurity model based on hardening for secure internet of things implementation
topic Internet of Things (IoT)
hardening process
cybersecurity risk
penetration test
url https://www.mdpi.com/2076-3417/11/7/3260
work_keys_str_mv AT aaronecheverria cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation
AT cristhiancevallos cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation
AT ivanortizgarces cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation
AT robertooandrade cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation