Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture

2Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.

Cite

CITATION STYLE

APA

Moreta, N., Aragon, D., Oña, S., Jaramillo, A., Ibarra, J., & Jahankhani, H. (2023). Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture. In Advanced Sciences and Technologies for Security Applications (pp. 9–29). Springer. https://doi.org/10.1007/978-3-031-20160-8_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free