Malmö University Publications
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
IoTSM: An End-to-end Security Model for IoT Ecosystems
Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).ORCID iD: 0000-0003-0546-072X
Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).
Malmö University, Internet of Things and People (IOTAP). Malmö University, Faculty of Technology and Society (TS), Department of Computer Science and Media Technology (DVMT).ORCID iD: 0000-0002-8512-2976
Department of Security & Enterprise, Sony Mobile Communications, Lund, Sweden.
2019 (English)In: 2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops), IEEE, 2019Conference paper, Published paper (Refereed)
Abstract [en]

The Internet of Things (IoT) market is growing rapidly, allowing continuous evolution of new technologies. Alongside this development, most IoT devices are easy to compromise, as security is often not a prioritized characteristic. This paper proposes a novel IoT Security Model (IoTSM) that can be used by organizations to formulate and implement a strategy for developing end-to-end IoT security. IoTSM is grounded by the Software Assurance Maturity Model (SAMM) framework, however it expands it with new security practices and empirical data gathered from IoT practitioners. Moreover, we generalize the model into a conceptual framework. This approach allows the formal analysis for security in general and evaluates an organization’s security practices. Overall, our proposed approach can help researchers, practitioners, and IoT organizations, to discourse about IoT security from an end-to-end perspective.

Place, publisher, year, edition, pages
IEEE, 2019.
Series
International Conference on Pervasive Computing and Communications, ISSN 2474-249X, E-ISSN 2474-2503
Keywords [en]
IoT, end-to-end security, security model, secure development
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:mau:diva-16813DOI: 10.1109/PERCOMW.2019.8730672ISI: 000476951900049Scopus ID: 2-s2.0-85067936836Local ID: 28794ISBN: 978-1-5386-9151-9 (electronic)OAI: oai:DiVA.org:mau-16813DiVA, id: diva2:1420327
Conference
2019 IEEE International Conference on Pervasive Computing and Communications Workshops (PerLS 2019 - Third International Workshop on Pervasive Smart Living Spaces), Kyoto, Japan (March 11–15, 2019)
Available from: 2020-03-30 Created: 2020-03-30 Last updated: 2024-02-05Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopusConference homepage

Authority records

Bugeja, JosephVogel, BahtijarJacobsson, Andreas

Search in DiVA

By author/editor
Bugeja, JosephVogel, BahtijarJacobsson, Andreas
By organisation
Internet of Things and People (IOTAP)Department of Computer Science and Media Technology (DVMT)
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 100 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf