TY - GEN
T1 - Security Model for IoT Applications - IoTSeMo
AU - Páez-Méndez, Rafael V.
AU - García, Edgar E.Ruiz
AU - Forné, Jordi
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - The Internet of Things (IoT) is a technology that has become popular because of the ease of use, accessibility and services that can be offered to improve the quality of life of users. However, most of the manufacturers and IoT developers do not consider the risks inherent to this new technology due to, among other factors, their eagerness to market their products and/or applications and the lack of understandable ways to identify where and what protect in this wide environment to preserve data according to their sensitivity. Despite the above, IoT ecosystems are already being used in multiple contexts such as healthcare, automotive industries, home automation, among others, so it is necessary to have a structured methodology to develop secure IoT applications. Thus, a new IoT Security Model (IoTSeMo) is proposed to easily identify which security mechanisms should be implemented, according to the handling of the information.
AB - The Internet of Things (IoT) is a technology that has become popular because of the ease of use, accessibility and services that can be offered to improve the quality of life of users. However, most of the manufacturers and IoT developers do not consider the risks inherent to this new technology due to, among other factors, their eagerness to market their products and/or applications and the lack of understandable ways to identify where and what protect in this wide environment to preserve data according to their sensitivity. Despite the above, IoT ecosystems are already being used in multiple contexts such as healthcare, automotive industries, home automation, among others, so it is necessary to have a structured methodology to develop secure IoT applications. Thus, a new IoT Security Model (IoTSeMo) is proposed to easily identify which security mechanisms should be implemented, according to the handling of the information.
KW - IoT model
KW - IoT security
KW - security methodology
KW - security requirements
UR - http://www.scopus.com/inward/record.url?scp=85214231703&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-74443-3_12
DO - 10.1007/978-3-031-74443-3_12
M3 - Conference contribution
AN - SCOPUS:85214231703
SN - 9783031744426
T3 - Lecture Notes in Networks and Systems
SP - 209
EP - 220
BT - Contributions Presented at The International Conference on Computing, Communication, Cybersecurity and AI - The C3AI 2024
A2 - Naik, Nitin
A2 - Grace, Paul
A2 - Jenkins, Paul
A2 - Prajapat, Shaligram
PB - Springer Science and Business Media Deutschland GmbH
T2 - International Conference on Computing, Communication, Cybersecurity and AI, C3AI 2024
Y2 - 3 July 2024 through 4 July 2024
ER -