Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture


Abstract:

This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.

Año de publicación:

2023

Keywords:

  • Hardening IoT Security
  • CYBERSECURITY
  • internet of things

Fuente:

scopusscopus

Tipo de documento:

Book Part

Estado:

Acceso restringido

Áreas de conocimiento:

  • Visualización de información
  • Ciencias de la computación

Áreas temáticas:

  • Programación informática, programas, datos, seguridad
  • Métodos informáticos especiales
  • Ciencias de la computación