A Review of Security Standards and Frameworks for IoT-Based Smart Environments

Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, howev...

Full description

Saved in:
Bibliographic Details
Published inIEEE access Vol. 9; pp. 121975 - 121995
Main Authors Karie, Nickson M., Sahri, Nor Masri, Yang, Wencheng, Valli, Craig, Kebande, Victor R.
Format Journal Article
LanguageEnglish
Published Piscataway IEEE 2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included 7 NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions.
AbstractList Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included 7 NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions.
Assessing the security of IoT-based smart environments such as smart homes and smart citiesis becoming fundamentally essential to implementing the correct control measures and effectively reducingsecurity threats and risks brought about by deploying IoT-based smart technologies. The problem, however,is in finding security standards and assessment frameworks that best meets the security requirements as wellas comprehensively assesses and exposes the security posture of IoT-based smart environments. To explorethis gap, this paper presents a review of existing security standards and assessment frameworks which alsoincludes several NIST special publications on security techniques highlighting their primary areas of focusto uncover those that can potentially address some of the security needs of IoT-based smart environments.Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventionalsecurity assessment frameworks which included 7 NIST special publications on security techniques werereviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process consideredboth published security standards and assessment frameworks as well as those under development. Thefindings show that most of the conventional security standards and assessment frameworks do not directlyaddress the security needs of IoT-based smart environments but have the potential to be adapted intoIoT-based smart environments. With this insight into the state-of-the-art research on security standards andassessment frameworks, this study helps advance the IoT field by opening new research directions as wellas opportunities for developing new security standards and assessment frameworks that will address futureIoT-based smart environments security concerns. This paper also discusses open problems and challengesrelated to IoT-based smart environments security issues. As a new contribution, a taxonomy of challengesfor IoT-based smart environment security concerns drawn from the extensive literature examined during thisstudy is proposed in this paper which also maps the identified challenges to potential proposed solutions.
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included seven NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions.
Author Sahri, Nor Masri
Valli, Craig
Yang, Wencheng
Kebande, Victor R.
Karie, Nickson M.
Author_xml – sequence: 1
  givenname: Nickson M.
  orcidid: 0000-0001-5173-9268
  surname: Karie
  fullname: Karie, Nickson M.
  email: n.karie@ecu.edu.au
  organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia
– sequence: 2
  givenname: Nor Masri
  surname: Sahri
  fullname: Sahri, Nor Masri
  organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia
– sequence: 3
  givenname: Wencheng
  orcidid: 0000-0001-7800-2215
  surname: Yang
  fullname: Yang, Wencheng
  organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia
– sequence: 4
  givenname: Craig
  surname: Valli
  fullname: Valli, Craig
  organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia
– sequence: 5
  givenname: Victor R.
  orcidid: 0000-0003-4071-4596
  surname: Kebande
  fullname: Kebande, Victor R.
  organization: Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden
BackLink https://urn.kb.se/resolve?urn=urn:nbn:se:bth-22139$$DView record from Swedish Publication Index
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86980$$DView record from Swedish Publication Index
BookMark eNqNkUtvEzEUhUeoSJTSX9CNJbYk-B17GUJaIlUgMYWt5Sc4JONgexr13-N2CgIWCG-udfWdo6N7nncnQxp8110gOEcIytfL1Wrd93MMMZqTthCCP-lOMeJyRhjhJ7_9n3XnpWxhe6Kt2OK0e78EH_1t9EeQAui9HXOsd6CvenA6uwLaBJdZ7_0x5W8FhJTBJt3M3ujiHej3OlewHm5jTsPeD7W86J4GvSv-_HGedZ8u1zerd7PrD1eb1fJ6ZjkSdWa8kXoRAqOIOySpdFgbCqWFxBPEtDOaOGyZN9A6riXCPFBHIDJsAZ1G5KzbTL4u6a065NiS3Kmko3pYpPxFtWjR7ryCjIYAvZXGWMqJ0wFSoY2BiFOBNG1eryavcvSH0fzh9jZ-Xj647eqoBJcC_h9u6leFMSKy4S8n_JDT99GXqrZpzEM7jsJsgRrEqGiUnCibUynZB2Vj1TWmoWYddwpBdd-1mrpW912rx66blvyl_Rnp36qLSRW9978UkmFBW-4fEkm3PQ
CODEN IAECCG
CitedBy_id crossref_primary_10_3390_s23125578
crossref_primary_10_1007_s43926_024_00076_3
crossref_primary_10_3390_app12189241
crossref_primary_10_3390_blockchains2020009
crossref_primary_10_1016_j_comcom_2022_07_007
crossref_primary_10_1109_ACCESS_2023_3268064
crossref_primary_10_3390_iot5030026
crossref_primary_10_1016_j_segan_2024_101555
crossref_primary_10_3390_s23187899
crossref_primary_10_1109_JFLEX_2023_3302827
crossref_primary_10_1155_2023_2524051
crossref_primary_10_3390_fi17010030
crossref_primary_10_1016_j_rineng_2024_103466
crossref_primary_10_3390_mca29040049
crossref_primary_10_1016_j_heliyon_2024_e24224
crossref_primary_10_1109_JIOT_2024_3372518
crossref_primary_10_3390_electronics14030608
crossref_primary_10_3390_sym16091121
crossref_primary_10_1016_j_iot_2023_100888
crossref_primary_10_1109_ACCESS_2022_3169137
crossref_primary_10_3390_info15040173
crossref_primary_10_3390_s22041384
crossref_primary_10_3390_technologies11010031
crossref_primary_10_1016_j_cose_2024_103964
crossref_primary_10_3390_ai5040143
crossref_primary_10_2139_ssrn_4818308
crossref_primary_10_3390_su142114645
crossref_primary_10_1109_ACCESS_2023_3313975
crossref_primary_10_3390_electronics11101568
crossref_primary_10_3390_e27030296
crossref_primary_10_4018_IJCAC_325624
crossref_primary_10_3390_electronics13091613
crossref_primary_10_1109_ACCESS_2023_3234632
crossref_primary_10_3390_s24092793
crossref_primary_10_1080_07366981_2023_2165293
crossref_primary_10_1007_s11036_023_02198_4
crossref_primary_10_32631_pb_2023_3_17
crossref_primary_10_3390_electronics11142181
crossref_primary_10_1007_s10462_024_10908_x
crossref_primary_10_1016_j_iot_2025_101529
crossref_primary_10_1109_ACCESS_2022_3204112
crossref_primary_10_1109_TCE_2024_3358177
crossref_primary_10_1016_j_future_2024_107519
crossref_primary_10_1109_ACCESS_2022_3225973
crossref_primary_10_2174_0122103279287156240218044819
crossref_primary_10_3390_fi16080273
crossref_primary_10_1049_qtc2_12105
crossref_primary_10_1109_ACCESS_2024_3464102
crossref_primary_10_3390_su151310471
crossref_primary_10_1145_3578363
crossref_primary_10_1016_j_iot_2024_101333
crossref_primary_10_1038_s44287_024_00017_w
crossref_primary_10_3390_s23198090
crossref_primary_10_1016_j_comnet_2024_110772
crossref_primary_10_1109_ACCESS_2023_3303205
Cites_doi 10.1108/S1548-6435(2005)0000002006
10.30958/ajl.3-3-2
10.1007/s11277-020-07446-4
10.1145/2398356.2398377
10.23919/IConAC.2017.8082057
10.1155/2018/1032761
10.1186/s13673-017-0087-4
10.1109/JIOT.2018.2801944
10.6028/NIST.SP.800-14
10.3390/app10124102
10.1109/CCST.2016.7815675
10.1109/ETSecIoT50046.2020.00009
10.3390/info7030044
10.1109/ICCES.2017.8275309
10.1007/978-981-13-8618-3_26
10.23919/MIPRO.2017.7973622
10.18517/ijaseit.8.1.2115
10.1109/EISIC.2016.044
10.1007/s42979-020-00201-3
10.6028/NIST.SP.800-53r1
10.1007/978-3-319-73676-1_11
10.1109/ICIRD.2018.8376320
10.1109/FiCloud.2016.57
10.1002/dac.4228
10.1109/ACCESS.2020.3017221
10.1088/1742-6596/1140/1/012006
10.1109/ICST46873.2019.9047745
10.1155/2018/3078272
10.6028/NIST.SP.800-12r1
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021
DBID 97E
ESBDL
RIA
RIE
AAYXX
CITATION
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTPV
AOWAS
D8T
DF3
ZZAVC
DOA
DOI 10.1109/ACCESS.2021.3109886
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE Xplore Open Access Journals
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Engineered Materials Abstracts
METADEX
Technology Research Database
Materials Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
SwePub
SwePub Articles
SWEPUB Freely available online
SWEPUB Blekinge Tekniska Högskola
SwePub Articles full text
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Materials Research Database
Engineered Materials Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
METADEX
Computer and Information Systems Abstracts Professional
DatabaseTitleList


Materials Research Database

Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISSN 2169-3536
EndPage 121995
ExternalDocumentID oai_doaj_org_article_054ff0ec9bbc463daf048abb016481a4
oai_DiVA_org_ltu_86980
oai_DiVA_org_bth_22139
10_1109_ACCESS_2021_3109886
9528421
Genre orig-research
GrantInformation_xml – fundername: Cyber Security Research Centre Ltd., funded through the Australian Government’s Cooperative Research Centres Programme
  funderid: 10.13039/100015539
GroupedDBID 0R~
4.4
5VS
6IK
97E
AAJGR
ABAZT
ABVLG
ACGFS
ADBBV
AGSQL
ALMA_UNASSIGNED_HOLDINGS
BCNDV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
ESBDL
GROUPED_DOAJ
IPLJI
JAVBF
KQ8
M43
M~E
O9-
OCL
OK1
RIA
RIE
RNS
AAYXX
CITATION
RIG
7SC
7SP
7SR
8BQ
8FD
JG9
JQ2
L7M
L~C
L~D
ADTPV
AOWAS
D8T
DF3
ZZAVC
ID FETCH-LOGICAL-c618t-beb9a7ff5416d1949d2ab409c03e315adba3d2c5eb0cd6a9126f4d301b570da13
IEDL.DBID RIE
ISSN 2169-3536
IngestDate Wed Aug 27 01:30:17 EDT 2025
Thu Aug 21 07:00:30 EDT 2025
Thu Aug 21 07:02:52 EDT 2025
Mon Jun 30 05:59:43 EDT 2025
Thu Apr 24 23:03:00 EDT 2025
Tue Jul 01 04:03:49 EDT 2025
Wed Aug 27 02:27:34 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Language English
License https://creativecommons.org/licenses/by/4.0/legalcode
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c618t-beb9a7ff5416d1949d2ab409c03e315adba3d2c5eb0cd6a9126f4d301b570da13
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0003-4071-4596
0000-0001-5173-9268
0000-0001-7800-2215
OpenAccessLink https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9528421
PQID 2571221548
PQPubID 4845423
PageCount 21
ParticipantIDs crossref_citationtrail_10_1109_ACCESS_2021_3109886
swepub_primary_oai_DiVA_org_ltu_86980
crossref_primary_10_1109_ACCESS_2021_3109886
ieee_primary_9528421
proquest_journals_2571221548
doaj_primary_oai_doaj_org_article_054ff0ec9bbc463daf048abb016481a4
swepub_primary_oai_DiVA_org_bth_22139
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210000
2021-00-00
20210101
2021
2021-01-01
PublicationDateYYYYMMDD 2021-01-01
PublicationDate_xml – year: 2021
  text: 20210000
PublicationDecade 2020
PublicationPlace Piscataway
PublicationPlace_xml – name: Piscataway
PublicationTitle IEEE access
PublicationTitleAbbrev Access
PublicationYear 2021
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
(ref76) 2021
(ref66) 2021
ref10
ref17
ref18
locke (ref43) 2011
(ref72) 2020
dawson (ref34) 2019
ross (ref42) 2018
(ref67) 2021
(ref47) 2021
(ref77) 2021
(ref82) 1996
ref46
ref45
(ref62) 2021
ref44
(ref59) 2021
(ref50) 2021
(ref70) 2021
(ref65) 2021
lee (ref22) 2018
(ref37) 2018
ref8
ref7
(ref57) 2018
(ref55) 1300
ref4
ref6
(ref56) 2021
ref5
razzaq (ref11) 2017; 8
(ref53) 2021
mutune (ref36) 2021
nagarkar (ref16) 2019; 14
(ref73) 2021
djemame (ref31) 2011
ref80
ref79
ref78
(ref58) 2021
(ref48) 2021
(ref71) 2021
(ref38) 2021
ref30
(ref68) 2021
ref33
ref32
kebande (ref9) 2020
ref2
ref1
(ref74) 2021
(ref64) 2021
lefkovitz (ref40) 2020
(ref54) 2020
chris (ref21) 2018
christopher (ref51) 2018
ref24
ref26
(ref52) 2021
gadiyar (ref14) 2018; 6
hall (ref19) 2020
ref25
ref20
(ref69) 2020
(ref35) 2014
wynn (ref60) 2014
cédric (ref3) 2015
ref28
(ref49) 2021
ref27
(ref75) 2021
ref29
alberts (ref61) 2018
(ref83) 2021
joey (ref81) 2016
blank (ref41) 2012
ross (ref39) 2020
(ref63) 2020
(ref23) 2020
References_xml – year: 2021
  ident: ref66
  publication-title: COBIT
– year: 2021
  ident: ref38
  publication-title: NIST Risk Management Framework-RMF
– ident: ref15
  doi: 10.1108/S1548-6435(2005)0000002006
– year: 2012
  ident: ref41
  publication-title: Guide for Conducting Risk Assessments
– year: 2020
  ident: ref40
  publication-title: NIST Privacy Framework An Overview
– volume: 14
  start-page: 1
  year: 2019
  ident: ref16
  article-title: Evaluating privacy and security threats in IoT-based smart home environment
  publication-title: Int J Appl Eng Res
– year: 2019
  ident: ref34
  publication-title: The Most Influential Security Frameworks of All Time
– ident: ref79
  doi: 10.30958/ajl.3-3-2
– ident: ref80
  doi: 10.1007/s11277-020-07446-4
– year: 2021
  ident: ref70
  publication-title: 10 Steps to Cyber Security
– ident: ref32
  doi: 10.1145/2398356.2398377
– ident: ref8
  doi: 10.23919/IConAC.2017.8082057
– year: 1300
  ident: ref55
– year: 2021
  ident: ref68
  publication-title: Committee of Spnsoring Organizations of the Treadway Commission
– year: 1996
  ident: ref82
  publication-title: Health Information Privacy
– year: 2020
  ident: ref63
  publication-title: IASME Consortium to Deliver IoT Certification Using Crossword Cybersecurity's Rizikon Assurance Platform
– ident: ref18
  doi: 10.1155/2018/1032761
– ident: ref33
  doi: 10.1186/s13673-017-0087-4
– year: 2021
  ident: ref65
  publication-title: CIS Controls
– year: 2018
  ident: ref21
  publication-title: Internet of Things Challenges in Storage and Data
– ident: ref25
  doi: 10.1109/JIOT.2018.2801944
– year: 2021
  ident: ref73
  publication-title: The Coding Rules to Deliver Resilient and Scalable Software
– ident: ref45
  doi: 10.6028/NIST.SP.800-14
– ident: ref10
  doi: 10.3390/app10124102
– ident: ref5
  doi: 10.1109/CCST.2016.7815675
– ident: ref2
  doi: 10.1109/ETSecIoT50046.2020.00009
– year: 2021
  ident: ref50
  publication-title: Cybersecurity Maturity Model Certification
– year: 2018
  ident: ref42
  publication-title: Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy
– ident: ref1
  doi: 10.3390/info7030044
– start-page: 304
  year: 2018
  ident: ref22
  article-title: Privacy mining from IoT-based smart homes
  publication-title: Proc Int Conf Broadband Wireless Comput Commun Appl (BWCCA)
– year: 2021
  ident: ref49
  publication-title: What is PCI Compliance?
– year: 2020
  ident: ref72
  publication-title: Privacy Act 2020-New Zealand Legislation
– year: 2020
  ident: ref69
  publication-title: Essential eight maturity model
– ident: ref78
  doi: 10.1109/ICCES.2017.8275309
– ident: ref27
  doi: 10.1007/978-981-13-8618-3_26
– year: 2018
  ident: ref37
  publication-title: Framework for Improving Critical Infrastructure Cybersecurity
– year: 2021
  ident: ref64
  publication-title: HITRUST CSF-One Framework One Assessment Globally
– ident: ref7
  doi: 10.23919/MIPRO.2017.7973622
– year: 2021
  ident: ref74
  publication-title: Securing Cloud Services for the Federal Government
– ident: ref4
  doi: 10.18517/ijaseit.8.1.2115
– year: 2021
  ident: ref71
  publication-title: TC CYBER Roadmap
– year: 2014
  ident: ref60
  publication-title: Threat assessment & remediation analysis (tara)
– year: 2018
  ident: ref57
  publication-title: Security for Industrial Automation and Control Systems-Part 4-1 Secure Product Development Lifecycle Requirements
– year: 2020
  ident: ref23
  publication-title: Privacy and the Internet of Things
– year: 2021
  ident: ref77
  publication-title: ISO/IEC 27000 family of standards
– ident: ref17
  doi: 10.1109/EISIC.2016.044
– year: 2021
  ident: ref76
  publication-title: SCAP Standards
– start-page: 119
  year: 2011
  ident: ref31
  article-title: A risk assessment framework and software toolkit for cloud service ecosystems
  publication-title: Proc Int Conf Cloud Comput GRIDs Virtualization
– volume: 8
  start-page: 383
  year: 2017
  ident: ref11
  article-title: Security issues in the Internet of Things (IoT): A comprehensive study
  publication-title: Int J Adv Comput Sci Appl
– year: 2021
  ident: ref53
  publication-title: Cybersecurity Assessment Tools
– year: 2021
  ident: ref67
  publication-title: Protective Security Requirements
– ident: ref13
  doi: 10.1007/s42979-020-00201-3
– ident: ref46
  doi: 10.6028/NIST.SP.800-53r1
– year: 2021
  ident: ref59
  publication-title: SOC 2-SOC for Service Organizations Trust Services Criteria
– ident: ref20
  doi: 10.1007/978-3-319-73676-1_11
– ident: ref6
  doi: 10.1109/ICIRD.2018.8376320
– year: 2021
  ident: ref48
  publication-title: Maintaining Payment Security
– ident: ref12
  doi: 10.1109/FiCloud.2016.57
– year: 2020
  ident: ref39
  publication-title: Security and privacy controls for information systems and organizations
– year: 2021
  ident: ref58
  publication-title: What is GDPR the EU's new data protection law?
– ident: ref29
  doi: 10.1002/dac.4228
– year: 2021
  ident: ref56
  publication-title: CIP Standard
– year: 2021
  ident: ref75
  publication-title: The Federal Information Security Modernization Act (FISMA)
– year: 2014
  ident: ref35
  publication-title: Cybersecurity Framework
– year: 2021
  ident: ref52
  publication-title: Cybersecurity capability maturity model (C2M2) program
– year: 2016
  ident: ref81
  publication-title: Adaptive challenge and the leadership challenge
– year: 2021
  ident: ref83
  publication-title: ETSI standard
– ident: ref26
  doi: 10.1109/ACCESS.2020.3017221
– year: 2020
  ident: ref19
  article-title: Smart homes: Security challenges and privacy concerns
  publication-title: arXiv 2010 15394
– year: 2015
  ident: ref3
  publication-title: Security and Resilience of Smart Home Environments Good Practices and Recommendations
– year: 2011
  ident: ref43
  publication-title: Managing Information Security Risk-Organization Mission and Information System View
– year: 2021
  ident: ref36
  publication-title: Top Cybersecurity Frameworks
– ident: ref24
  doi: 10.1088/1742-6596/1140/1/012006
– ident: ref28
  doi: 10.1109/ICST46873.2019.9047745
– year: 2021
  ident: ref62
  publication-title: IASME Governance Audited
– start-page: 1
  year: 2020
  ident: ref9
  article-title: Internet of threats introspection in dynamic intelligent virtual sensing
  publication-title: Proc 1st Workshop Cyber-Phys Social Syst (CPSS)
– year: 2018
  ident: ref61
  article-title: Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0
– year: 2020
  ident: ref54
  publication-title: The FFIEC Cybersecurity Assessment Tool A Framework for Measuring Cybersecurity Risk and Preparedness in the Financial Industry
– ident: ref30
  doi: 10.1155/2018/3078272
– year: 2021
  ident: ref47
  publication-title: Family Educational Rights and Privacy Act
– year: 2018
  ident: ref51
  publication-title: The cybersecurity maturity model A means to measure and improve your cybersecurity program
– ident: ref44
  doi: 10.6028/NIST.SP.800-12r1
– volume: 6
  start-page: 1
  year: 2018
  ident: ref14
  article-title: Privacy and security issues in IoT based smart home applications
  publication-title: Int J Eng Res Technol
SSID ssj0000816957
Score 2.5512795
Snippet Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct...
Assessing the security of IoT-based smart environments such as smart homes and smart citiesis becoming fundamentally essential to implementing the correct...
SourceID doaj
swepub
proquest
crossref
ieee
SourceType Open Website
Open Access Repository
Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 121975
SubjectTerms Computer crime
Computer Science
Control Measures
Datavetenskap
Documents
Information Systems
Informationssystem
Internet of Things
IoT-based Smart Environments
Privacy
Risks
Security
Security Assessment Frameworks
Security management
Security Standards
Smart buildings
Smart cities
State-of-the-art reviews
Taxonomy
Threats
SummonAdditionalLinks – databaseName: DOAJ Directory of Open Access Journals
  dbid: DOA
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxgQUBCBgjzARmicT3tMS6vC0KUt6mbZcSyQSoto-v85O26VLnRhShSdk_h89r072e8QelDg8oSKmE-FVhCgEAp3JokD7l0wzaCZ3SA7Tkez-G2ezBulvsyesJoeuFZcFyCF1gG0kLKI00gJDTYnpDTUUJQIywQKPq8RTNk1mJKUJZmjGSIB6-b9PvQIAsKQPBs2TGpOTzdckWXsdyVW9tFmk0HUep3hGTp1cBHn9W-eo6NyeYFOGiSCbTTOcZ3gxyuNJ64cHZ64FMEawxUPt1uw1hhAKn5dTf0euC-FJ1-gATxonHa7RLPhYNof-a5Kgl-khFa-LCUTmdYJQCtFWMxUKCREbUVg8puJUFJEKiySUgaFSgUjYapjBfNaJlmgBImuUGu5WpbXCAvAdkFBIlnGOo6KVAK80kpmLJMKxGMPhVuF8cJRiJtKFgtuQ4mA8VrL3GiZOy176GnX6Ltm0PhbvGdGYidq6K_tAzAK7oyCHzIKD7XNOO5ewhLwwiHxUGc7rtxN1TWHNYuEoYncPPRYj_Xex18-33P7cVl9cBCM2AG5RbXhNGU0uPmPrtyiY6OeOuvTQa3qZ1PeAQ6q5L01-V-NxAO1
  priority: 102
  providerName: Directory of Open Access Journals
Title A Review of Security Standards and Frameworks for IoT-Based Smart Environments
URI https://ieeexplore.ieee.org/document/9528421
https://www.proquest.com/docview/2571221548
https://urn.kb.se/resolve?urn=urn:nbn:se:bth-22139
https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86980
https://doaj.org/article/054ff0ec9bbc463daf048abb016481a4
Volume 9
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB5RTnAoLVA1FJAP7Y0N6337GAIRrVQuAcTN8vihVqUJIptLf33HXmcVEKI9rbUa79qasedhzzcAnw2pPGVykTTKGXJQeEMtH8Qh9a6EE9QtXJC9qi5vim935d0GnPS5MNbacPnMDn0znOWbuV76UNmpKGkz9Vnjb8hx63K1-niKLyAhyjoCC_FUnI7GY5oDuYAZH3r8y8bnS68pn4DRH4uqPLUv1zFDg56Z7MD31Qi76yW_hssWh_rPM_DG_53CO3gbDU426iTkPWzY2S5sr8EQ7sHViHVHBGzu2DQWtGPTGGRYMHqyyeoS14KRmcu-zq-TM1KAhk1_k_Cxi7V8uX24mVxcjy-TWGch0RVv2gQtClU7V5JxZrgohMkUkt-nUx8hLZVBlZtMlxZTbSoleFa5wtDOgGWdGsXzD7A5m8_sR2CKrMNU8xxt4YpcV0gGmjNYixoNkRcDyFYMkDqCkPtaGPcyOCOpkB3XpOeajFwbwEnf6aHD4Hid_Mxztif1ANrhBTFCxvUoyVJ1LiVBRNRFlRvlaCtTiB5xrOGKBrrnmdd_JPJtAIcrOZFxsS8k7Xo8y7zvN4Avnew8-fn5z9tR-Dm2PyQR5uIfdPftUjaVaNKDl0fxCbb8hLtI0CFsto9Le0S2UYvHIaZwHJbGX-fEDXQ
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB5V5QAceBVEoIAPcOum6337mIZGKbS5JEW9WR4_BKIkVbO58OsZe51VihBwyiqa3bX1jT2P9XwD8N6QyVMmF0mjnKEAhTd05ZM4ZN6VcIJuCwdkZ9X0svh0VV7twVFfC2OtDYfP7NBfhm_5ZqU3PlV2LEraTH3V-D2y-yXvqrX6jIpvISHKOlIL8VQcj8ZjmgUFgRkfegbMxldM75ifwNIf26rc9TB3WUODpZk8hovtGLsDJt-HmxaH-udv9I3_O4kn8Ci6nGzU6chT2LPLZ_Bwh4jwAGYj1n0kYCvH5rGlHZvHNMOa0S-bbI9xrRk5uuxstUhOyAQaNv9B6sdOdyrmnsPl5HQxniax00KiK960CVoUqnauJPfMcFEIkymkyE-nPkdaKoMqN5kuLabaVErwrHKFob0Byzo1iucvYH-5WtqXwBT5h6nmOdrCFbmukKByBmtRoyHxYgDZFgCpIw2574ZxLUM4kgrZoSY9ajKiNoCj_qabjoXj7-InHtle1FNohz8ICBlXpCRf1bmUVBFRF1VulKPNTCF6zrGGKxrogQevf0jEbQCHWz2RcbmvJe17PMt89DeAD53u3Hn5x29fRuHl2H6VJJiLf8hdtxvZVKJJX_15FO_g_nRxcS7Pz2afX8MDP_kuL3QI--3txr4hT6nFt2GB_AK3Xg_I
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A%C2%A0Review%C2%A0of%C2%A0Security%C2%A0Standards%C2%A0and%C2%A0Frameworks%C2%A0for%C2%A0IoT-Based%C2%A0Smart%C2%A0Environments&rft.jtitle=IEEE+access&rft.au=Nickson%2C+Karie+M.&rft.au=Sahri%2C+Nor+Masri&rft.au=Yang%2C+Wencheng&rft.au=Valli%2C+Craig&rft.date=2021&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=9&rft.spage=121975&rft_id=info:doi/10.1109%2FACCESS.2021.3109886&rft.externalDocID=oai_DiVA_org_bth_22139
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon