This research presents the collection of data from different cybersecurity methodologies used for securing IoT environments, of which a few were chosen for the validation of parameters. The methodology known as ENISA was used to filter, select and adjust to the needs of the architecture carried out in this project and was compared with the Hardening methodology. To review and validate the parameters of each one, a test bed environment was designed with several sensors and integrated systems (NodeMCU ESP8266 and Raspberry Pi). In addition, tests were carried out in three different scenarios and the validation of its security has been done using the Kali Linux distribution with tools like Nmap, Hydra, Wireshark, etc. The results were presented at the end in comparative tables attached to this document, which enabled the research to validate which methodology provides better resilience along with its applications to other architectures depending on the needs of the users.
CITATION STYLE
Moreta, N., Aragon, D., Oña, S., Jaramillo, A., Ibarra, J., & Jahankhani, H. (2023). Comparison of Cybersecurity Methodologies for the Implementing of a Secure IoT Architecture. In Advanced Sciences and Technologies for Security Applications (pp. 9–29). Springer. https://doi.org/10.1007/978-3-031-20160-8_2
Mendeley helps you to discover research relevant for your work.