Security Model for IoT Applications - IoTSeMo

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The Internet of Things (IoT) is a technology that has become popular because of the ease of use, accessibility and services that can be offered to improve the quality of life of users. However, most of the manufacturers and IoT developers do not consider the risks inherent to this new technology due to, among other factors, their eagerness to market their products and/or applications and the lack of understandable ways to identify where and what protect in this wide environment to preserve data according to their sensitivity. Despite the above, IoT ecosystems are already being used in multiple contexts such as healthcare, automotive industries, home automation, among others, so it is necessary to have a structured methodology to develop secure IoT applications. Thus, a new IoT Security Model (IoTSeMo) is proposed to easily identify which security mechanisms should be implemented, according to the handling of the information.

Original languageEnglish
Title of host publicationContributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI - The C3AI 2024
EditorsNitin Naik, Paul Grace, Paul Jenkins, Shaligram Prajapat
PublisherSpringer Science and Business Media Deutschland GmbH
Pages209-220
Number of pages12
ISBN (Print)9783031744426
DOIs
StatePublished - 23 Dec 2024
EventInternational Conference on Computing, Communication, Cybersecurity and AI, C3AI 2024 - London, United Kingdom
Duration: 03 Jul 202404 Jul 2024

Publication series

NameLecture Notes in Networks and Systems
Volume884 LNNS
ISSN (Print)2367-3370
ISSN (Electronic)2367-3389

Conference

ConferenceInternational Conference on Computing, Communication, Cybersecurity and AI, C3AI 2024
Country/TerritoryUnited Kingdom
CityLondon
Period03/07/2404/07/24

Keywords

  • IoT model
  • IoT security
  • security methodology
  • security requirements

Fingerprint

Dive into the research topics of 'Security Model for IoT Applications - IoTSeMo'. Together they form a unique fingerprint.

Cite this