2020
DOI: 10.1109/access.2020.2965925
|View full text |Cite
|
Sign up to set email alerts
|

IoT-HarPSecA: A Framework and Roadmap for Secure Design and Development of Devices and Applications in the IoT Space

Abstract: The past couple of years have marked continued growth in the applications and services of the Internet of Things (IoT). This has attracted the attention of new operators as well as institutional, corporate, and private investors in every sector of the economy, and as a result, new businesses are springing up rapidly. These include many start-up companies that are producing various kinds of useful IoT devices and Smart Applications (smart apps). While this can be seen as a boost for innovation in the IoT, some … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0
5

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 39 publications
(20 citation statements)
references
References 81 publications
(108 reference statements)
0
15
0
5
Order By: Relevance
“…Confidencialidade (Agrawal et al, 2020;Ankele et al, 2019;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Kim et al, 2020;Lara et al, 2020;Liang et al, 2019;Luo et al, 2015;Murch et al, 2018;Ratasich et al, 2019;Samaila et al, 2020;Sun & Liu, 2012;Willing et al, 2020) Integridade (Agrawal et al, 2019;Ankele et al, 2019;Bolbot et al, 2020;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Kim et al, 2020;Lara et al, 2020;Liang et al, 2019;Luo et al, 2015;Mohamed et al, 2020;Moraitis et al, 2020;Ratasich et al, 2019;Sun & Liu, 2012;Willing et al, 2020) Disponibilidade (Agrawal et al, 2019(Agrawal et al, , 2020Al-Mhiqani et al, 2018;Bolbot et al, 2020;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Liang et al, 2019;Luo et al, 2015;Mohamed et al, 2020;Ratasich et al, 2019;Sun & Liu, 2012;Willing et al, 2020) Autenticação (Ankele et al, 2019;Bolbot et al, 2020;…”
Section: Segurança Computacionalunclassified
See 2 more Smart Citations
“…Confidencialidade (Agrawal et al, 2020;Ankele et al, 2019;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Kim et al, 2020;Lara et al, 2020;Liang et al, 2019;Luo et al, 2015;Murch et al, 2018;Ratasich et al, 2019;Samaila et al, 2020;Sun & Liu, 2012;Willing et al, 2020) Integridade (Agrawal et al, 2019;Ankele et al, 2019;Bolbot et al, 2020;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Kim et al, 2020;Lara et al, 2020;Liang et al, 2019;Luo et al, 2015;Mohamed et al, 2020;Moraitis et al, 2020;Ratasich et al, 2019;Sun & Liu, 2012;Willing et al, 2020) Disponibilidade (Agrawal et al, 2019(Agrawal et al, , 2020Al-Mhiqani et al, 2018;Bolbot et al, 2020;Butun et al, n.d., 2020;Dimitriadis et al, 2020;Liang et al, 2019;Luo et al, 2015;Mohamed et al, 2020;Ratasich et al, 2019;Sun & Liu, 2012;Willing et al, 2020) Autenticação (Ankele et al, 2019;Bolbot et al, 2020;…”
Section: Segurança Computacionalunclassified
“…Trabalhos relacionados Mourtzis et al, 2019;Murch et al, 2018;Ratasich et al, 2019;Russo et al, 2019;Samaila et al, 2020;Yan et al, 2020) Criptografia (Ankele et al, 2019;Lara et al, 2020;Samaila et al, 2020) Impacto nos ativos Criticidade (Anuar et al, 2013;Luo et al, 2015) Capacidade de manutenção (Agrawal et al, 2020;Ani et al, 2019;Anuar et al, 2013;Luo et al, 2015;Prislan et al, 2020;Sun & Liu, 2012) Capacidade de substituição (Ani et al, 2019;Anuar et al, 2013) Confiabilidade (Agrawal et al, 2020;Anuar et al, 2013;Luo et al, 2015) Dano colateral (Luo et al, 2015) Controle e remediação (Ani et al, 2019;Anuar et al, 2013;Luo et al, 2015;Prislan et al, 2020;Walker-Roberts et al, 2020) Probabilidade de ameaça e vulnerabilidade Severidade (Agrawal et al, 2020;Anuar et al, 2013;Mendonça Silva et al, 2016; A. K. Pandey & Alsolami, n.d.) Explorabilidade (Anuar et al, 2013;Luo et al, 2015;A. K. Pandey & Alsolami, n.d.; Sun & Liu, 2012) Sensibilidade (Anuar et al, 2013;Luo et al, 2015;Yan et al, 2020) Similaridade e distribuição de alvo (Agrawal et al, 2020;Anuar et al, 2013;…”
Section: Subcritériosunclassified
See 1 more Smart Citation
“…Since some monitoring scenarios may lack the basic networking infrastructure for continuous online transmission of the samples, either due to costs constraints or coverage holes, such multi-sensor units should operate for long periods of disconnection, demanding them to locally store samples for future transmissions. Therefore, for all aforementioned defined characteristics, there will be some basic functions that will be equivalent for different applications, which push us to the proposal and adoption of standard hardware frameworks [3] , [4] .…”
Section: Hardware In Contextmentioning
confidence: 99%
“…These IoT applications enable the technology, electronic equipments, phone like emebbed products, vehicles and other possible electronic devices to be monitored and controlled through the Internet based on actuators and sensor nodes that are wired or wirelessly connected [5]. Any person at any instant of time has the possibility of connecting with physical objects at distance locations or remote places through the path or the network [6]. IoT refers to the connectivity of the computers and different types of physical devices that need to cooperate with minimum degree of human interface in order to exchange data with the complementary devices connected on the Internet [7].…”
Section: Introductionmentioning
confidence: 99%