Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation
The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security i...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-04-01
|
Series: | Applied Sciences |
Subjects: | |
Online Access: | https://www.mdpi.com/2076-3417/11/7/3260 |
_version_ | 1797538733671579648 |
---|---|
author | Aarón Echeverría Cristhian Cevallos Ivan Ortiz-Garces Roberto O. Andrade |
author_facet | Aarón Echeverría Cristhian Cevallos Ivan Ortiz-Garces Roberto O. Andrade |
author_sort | Aarón Echeverría |
collection | DOAJ |
description | The inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution. |
first_indexed | 2024-03-10T12:35:37Z |
format | Article |
id | doaj.art-4953e933c8e44caaa111eb41012fcd1b |
institution | Directory Open Access Journal |
issn | 2076-3417 |
language | English |
last_indexed | 2024-03-10T12:35:37Z |
publishDate | 2021-04-01 |
publisher | MDPI AG |
record_format | Article |
series | Applied Sciences |
spelling | doaj.art-4953e933c8e44caaa111eb41012fcd1b2023-11-21T14:18:13ZengMDPI AGApplied Sciences2076-34172021-04-01117326010.3390/app11073260Cybersecurity Model Based on Hardening for Secure Internet of Things ImplementationAarón Echeverría0Cristhian Cevallos1Ivan Ortiz-Garces2Roberto O. Andrade3Escuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorEscuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorEscuela de Ingeniería en Tecnologías de la Información, FICA, Universidad de Las Américas, Quito 170125, EcuadorFacultad de Ingeniería en Sistemas, Escuela Politécnica Nacional, Quito 170525, EcuadorThe inclusion of Internet of Things (IoT) for building smart cities, smart health, smart grids, and other smart concepts has driven data-driven decision making by managers and automation in each domain. However, the hyper-connectivity generated by IoT networks coupled with limited default security in IoT devices increases security risks that can jeopardize the operations of cities, hospitals, and organizations. Strengthening the security aspects of IoT devices prior to their use in different systems can contribute to minimize the attack surface. This study aimed to model a sequence of seven steps to minimize the attack surface by executing hardening processes. Conducted a systematic literature review using Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) techniques. In this way, we were able to define a proposed methodology to evaluate the security level of an IoT solution by means of a checklist that considers the security aspects in the three layers of the IoT architecture. A risk matrix adapted to IoT is established to evaluate the attack surface. Finally, a process of hardening and vulnerability analysis is proposed to reduce the attack surface and improve the security level of the IoT solution.https://www.mdpi.com/2076-3417/11/7/3260Internet of Things (IoT)hardening processcybersecurity riskpenetration test |
spellingShingle | Aarón Echeverría Cristhian Cevallos Ivan Ortiz-Garces Roberto O. Andrade Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation Applied Sciences Internet of Things (IoT) hardening process cybersecurity risk penetration test |
title | Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation |
title_full | Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation |
title_fullStr | Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation |
title_full_unstemmed | Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation |
title_short | Cybersecurity Model Based on Hardening for Secure Internet of Things Implementation |
title_sort | cybersecurity model based on hardening for secure internet of things implementation |
topic | Internet of Things (IoT) hardening process cybersecurity risk penetration test |
url | https://www.mdpi.com/2076-3417/11/7/3260 |
work_keys_str_mv | AT aaronecheverria cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation AT cristhiancevallos cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation AT ivanortizgarces cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation AT robertooandrade cybersecuritymodelbasedonhardeningforsecureinternetofthingsimplementation |