A Review of Security Standards and Frameworks for IoT-Based Smart Environments
Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, howev...
Saved in:
Published in | IEEE access Vol. 9; pp. 121975 - 121995 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
IEEE
2021
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included 7 NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions. |
---|---|
AbstractList | Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included 7 NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions. Assessing the security of IoT-based smart environments such as smart homes and smart citiesis becoming fundamentally essential to implementing the correct control measures and effectively reducingsecurity threats and risks brought about by deploying IoT-based smart technologies. The problem, however,is in finding security standards and assessment frameworks that best meets the security requirements as wellas comprehensively assesses and exposes the security posture of IoT-based smart environments. To explorethis gap, this paper presents a review of existing security standards and assessment frameworks which alsoincludes several NIST special publications on security techniques highlighting their primary areas of focusto uncover those that can potentially address some of the security needs of IoT-based smart environments.Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventionalsecurity assessment frameworks which included 7 NIST special publications on security techniques werereviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process consideredboth published security standards and assessment frameworks as well as those under development. Thefindings show that most of the conventional security standards and assessment frameworks do not directlyaddress the security needs of IoT-based smart environments but have the potential to be adapted intoIoT-based smart environments. With this insight into the state-of-the-art research on security standards andassessment frameworks, this study helps advance the IoT field by opening new research directions as wellas opportunities for developing new security standards and assessment frameworks that will address futureIoT-based smart environments security concerns. This paper also discusses open problems and challengesrelated to IoT-based smart environments security issues. As a new contribution, a taxonomy of challengesfor IoT-based smart environment security concerns drawn from the extensive literature examined during thisstudy is proposed in this paper which also maps the identified challenges to potential proposed solutions. Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct control measures and effectively reducing security threats and risks brought about by deploying IoT-based smart technologies. The problem, however, is in finding security standards and assessment frameworks that best meets the security requirements as well as comprehensively assesses and exposes the security posture of IoT-based smart environments. To explore this gap, this paper presents a review of existing security standards and assessment frameworks which also includes several NIST special publications on security techniques highlighting their primary areas of focus to uncover those that can potentially address some of the security needs of IoT-based smart environments. Cumulatively a total of 80 ISO/IEC security standards, 32 ETSI standards and 37 different conventional security assessment frameworks which included seven NIST special publications on security techniques were reviewed. To present an all-inclusive and up-to-date state-of-the-art research, the review process considered both published security standards and assessment frameworks as well as those under development. The findings show that most of the conventional security standards and assessment frameworks do not directly address the security needs of IoT-based smart environments but have the potential to be adapted into IoT-based smart environments. With this insight into the state-of-the-art research on security standards and assessment frameworks, this study helps advance the IoT field by opening new research directions as well as opportunities for developing new security standards and assessment frameworks that will address future IoT-based smart environments security concerns. This paper also discusses open problems and challenges related to IoT-based smart environments security issues. As a new contribution, a taxonomy of challenges for IoT-based smart environment security concerns drawn from the extensive literature examined during this study is proposed in this paper which also maps the identified challenges to potential proposed solutions. |
Author | Sahri, Nor Masri Valli, Craig Yang, Wencheng Kebande, Victor R. Karie, Nickson M. |
Author_xml | – sequence: 1 givenname: Nickson M. orcidid: 0000-0001-5173-9268 surname: Karie fullname: Karie, Nickson M. email: n.karie@ecu.edu.au organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia – sequence: 2 givenname: Nor Masri surname: Sahri fullname: Sahri, Nor Masri organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia – sequence: 3 givenname: Wencheng orcidid: 0000-0001-7800-2215 surname: Yang fullname: Yang, Wencheng organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia – sequence: 4 givenname: Craig surname: Valli fullname: Valli, Craig organization: Cyber Security Cooperative Research Centre Ltd., Joondalup, WA, Australia – sequence: 5 givenname: Victor R. orcidid: 0000-0003-4071-4596 surname: Kebande fullname: Kebande, Victor R. organization: Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, Luleå, Sweden |
BackLink | https://urn.kb.se/resolve?urn=urn:nbn:se:bth-22139$$DView record from Swedish Publication Index https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86980$$DView record from Swedish Publication Index |
BookMark | eNqNkUtvEzEUhUeoSJTSX9CNJbYk-B17GUJaIlUgMYWt5Sc4JONgexr13-N2CgIWCG-udfWdo6N7nncnQxp8110gOEcIytfL1Wrd93MMMZqTthCCP-lOMeJyRhjhJ7_9n3XnpWxhe6Kt2OK0e78EH_1t9EeQAui9HXOsd6CvenA6uwLaBJdZ7_0x5W8FhJTBJt3M3ujiHej3OlewHm5jTsPeD7W86J4GvSv-_HGedZ8u1zerd7PrD1eb1fJ6ZjkSdWa8kXoRAqOIOySpdFgbCqWFxBPEtDOaOGyZN9A6riXCPFBHIDJsAZ1G5KzbTL4u6a065NiS3Kmko3pYpPxFtWjR7ryCjIYAvZXGWMqJ0wFSoY2BiFOBNG1eryavcvSH0fzh9jZ-Xj647eqoBJcC_h9u6leFMSKy4S8n_JDT99GXqrZpzEM7jsJsgRrEqGiUnCibUynZB2Vj1TWmoWYddwpBdd-1mrpW912rx66blvyl_Rnp36qLSRW9978UkmFBW-4fEkm3PQ |
CODEN | IAECCG |
CitedBy_id | crossref_primary_10_3390_s23125578 crossref_primary_10_1007_s43926_024_00076_3 crossref_primary_10_3390_app12189241 crossref_primary_10_3390_blockchains2020009 crossref_primary_10_1016_j_comcom_2022_07_007 crossref_primary_10_1109_ACCESS_2023_3268064 crossref_primary_10_3390_iot5030026 crossref_primary_10_1016_j_segan_2024_101555 crossref_primary_10_3390_s23187899 crossref_primary_10_1109_JFLEX_2023_3302827 crossref_primary_10_1155_2023_2524051 crossref_primary_10_3390_fi17010030 crossref_primary_10_1016_j_rineng_2024_103466 crossref_primary_10_3390_mca29040049 crossref_primary_10_1016_j_heliyon_2024_e24224 crossref_primary_10_1109_JIOT_2024_3372518 crossref_primary_10_3390_electronics14030608 crossref_primary_10_3390_sym16091121 crossref_primary_10_1016_j_iot_2023_100888 crossref_primary_10_1109_ACCESS_2022_3169137 crossref_primary_10_3390_info15040173 crossref_primary_10_3390_s22041384 crossref_primary_10_3390_technologies11010031 crossref_primary_10_1016_j_cose_2024_103964 crossref_primary_10_3390_ai5040143 crossref_primary_10_2139_ssrn_4818308 crossref_primary_10_3390_su142114645 crossref_primary_10_1109_ACCESS_2023_3313975 crossref_primary_10_3390_electronics11101568 crossref_primary_10_3390_e27030296 crossref_primary_10_4018_IJCAC_325624 crossref_primary_10_3390_electronics13091613 crossref_primary_10_1109_ACCESS_2023_3234632 crossref_primary_10_3390_s24092793 crossref_primary_10_1080_07366981_2023_2165293 crossref_primary_10_1007_s11036_023_02198_4 crossref_primary_10_32631_pb_2023_3_17 crossref_primary_10_3390_electronics11142181 crossref_primary_10_1007_s10462_024_10908_x crossref_primary_10_1016_j_iot_2025_101529 crossref_primary_10_1109_ACCESS_2022_3204112 crossref_primary_10_1109_TCE_2024_3358177 crossref_primary_10_1016_j_future_2024_107519 crossref_primary_10_1109_ACCESS_2022_3225973 crossref_primary_10_2174_0122103279287156240218044819 crossref_primary_10_3390_fi16080273 crossref_primary_10_1049_qtc2_12105 crossref_primary_10_1109_ACCESS_2024_3464102 crossref_primary_10_3390_su151310471 crossref_primary_10_1145_3578363 crossref_primary_10_1016_j_iot_2024_101333 crossref_primary_10_1038_s44287_024_00017_w crossref_primary_10_3390_s23198090 crossref_primary_10_1016_j_comnet_2024_110772 crossref_primary_10_1109_ACCESS_2023_3303205 |
Cites_doi | 10.1108/S1548-6435(2005)0000002006 10.30958/ajl.3-3-2 10.1007/s11277-020-07446-4 10.1145/2398356.2398377 10.23919/IConAC.2017.8082057 10.1155/2018/1032761 10.1186/s13673-017-0087-4 10.1109/JIOT.2018.2801944 10.6028/NIST.SP.800-14 10.3390/app10124102 10.1109/CCST.2016.7815675 10.1109/ETSecIoT50046.2020.00009 10.3390/info7030044 10.1109/ICCES.2017.8275309 10.1007/978-981-13-8618-3_26 10.23919/MIPRO.2017.7973622 10.18517/ijaseit.8.1.2115 10.1109/EISIC.2016.044 10.1007/s42979-020-00201-3 10.6028/NIST.SP.800-53r1 10.1007/978-3-319-73676-1_11 10.1109/ICIRD.2018.8376320 10.1109/FiCloud.2016.57 10.1002/dac.4228 10.1109/ACCESS.2020.3017221 10.1088/1742-6596/1140/1/012006 10.1109/ICST46873.2019.9047745 10.1155/2018/3078272 10.6028/NIST.SP.800-12r1 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2021 |
DBID | 97E ESBDL RIA RIE AAYXX CITATION 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTPV AOWAS D8T DF3 ZZAVC DOA |
DOI | 10.1109/ACCESS.2021.3109886 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE Xplore Open Access Journals IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Engineered Materials Abstracts METADEX Technology Research Database Materials Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional SwePub SwePub Articles SWEPUB Freely available online SWEPUB Blekinge Tekniska Högskola SwePub Articles full text DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Materials Research Database Engineered Materials Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace METADEX Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Materials Research Database |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering Computer Science |
EISSN | 2169-3536 |
EndPage | 121995 |
ExternalDocumentID | oai_doaj_org_article_054ff0ec9bbc463daf048abb016481a4 oai_DiVA_org_ltu_86980 oai_DiVA_org_bth_22139 10_1109_ACCESS_2021_3109886 9528421 |
Genre | orig-research |
GrantInformation_xml | – fundername: Cyber Security Research Centre Ltd., funded through the Australian Government’s Cooperative Research Centres Programme funderid: 10.13039/100015539 |
GroupedDBID | 0R~ 4.4 5VS 6IK 97E AAJGR ABAZT ABVLG ACGFS ADBBV AGSQL ALMA_UNASSIGNED_HOLDINGS BCNDV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD ESBDL GROUPED_DOAJ IPLJI JAVBF KQ8 M43 M~E O9- OCL OK1 RIA RIE RNS AAYXX CITATION RIG 7SC 7SP 7SR 8BQ 8FD JG9 JQ2 L7M L~C L~D ADTPV AOWAS D8T DF3 ZZAVC |
ID | FETCH-LOGICAL-c618t-beb9a7ff5416d1949d2ab409c03e315adba3d2c5eb0cd6a9126f4d301b570da13 |
IEDL.DBID | RIE |
ISSN | 2169-3536 |
IngestDate | Wed Aug 27 01:30:17 EDT 2025 Thu Aug 21 07:00:30 EDT 2025 Thu Aug 21 07:02:52 EDT 2025 Mon Jun 30 05:59:43 EDT 2025 Thu Apr 24 23:03:00 EDT 2025 Tue Jul 01 04:03:49 EDT 2025 Wed Aug 27 02:27:34 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Language | English |
License | https://creativecommons.org/licenses/by/4.0/legalcode |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c618t-beb9a7ff5416d1949d2ab409c03e315adba3d2c5eb0cd6a9126f4d301b570da13 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0003-4071-4596 0000-0001-5173-9268 0000-0001-7800-2215 |
OpenAccessLink | https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/document/9528421 |
PQID | 2571221548 |
PQPubID | 4845423 |
PageCount | 21 |
ParticipantIDs | crossref_citationtrail_10_1109_ACCESS_2021_3109886 swepub_primary_oai_DiVA_org_ltu_86980 crossref_primary_10_1109_ACCESS_2021_3109886 ieee_primary_9528421 proquest_journals_2571221548 doaj_primary_oai_doaj_org_article_054ff0ec9bbc463daf048abb016481a4 swepub_primary_oai_DiVA_org_bth_22139 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210000 2021-00-00 20210101 2021 2021-01-01 |
PublicationDateYYYYMMDD | 2021-01-01 |
PublicationDate_xml | – year: 2021 text: 20210000 |
PublicationDecade | 2020 |
PublicationPlace | Piscataway |
PublicationPlace_xml | – name: Piscataway |
PublicationTitle | IEEE access |
PublicationTitleAbbrev | Access |
PublicationYear | 2021 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 (ref76) 2021 (ref66) 2021 ref10 ref17 ref18 locke (ref43) 2011 (ref72) 2020 dawson (ref34) 2019 ross (ref42) 2018 (ref67) 2021 (ref47) 2021 (ref77) 2021 (ref82) 1996 ref46 ref45 (ref62) 2021 ref44 (ref59) 2021 (ref50) 2021 (ref70) 2021 (ref65) 2021 lee (ref22) 2018 (ref37) 2018 ref8 ref7 (ref57) 2018 (ref55) 1300 ref4 ref6 (ref56) 2021 ref5 razzaq (ref11) 2017; 8 (ref53) 2021 mutune (ref36) 2021 nagarkar (ref16) 2019; 14 (ref73) 2021 djemame (ref31) 2011 ref80 ref79 ref78 (ref58) 2021 (ref48) 2021 (ref71) 2021 (ref38) 2021 ref30 (ref68) 2021 ref33 ref32 kebande (ref9) 2020 ref2 ref1 (ref74) 2021 (ref64) 2021 lefkovitz (ref40) 2020 (ref54) 2020 chris (ref21) 2018 christopher (ref51) 2018 ref24 ref26 (ref52) 2021 gadiyar (ref14) 2018; 6 hall (ref19) 2020 ref25 ref20 (ref69) 2020 (ref35) 2014 wynn (ref60) 2014 cédric (ref3) 2015 ref28 (ref49) 2021 ref27 (ref75) 2021 ref29 alberts (ref61) 2018 (ref83) 2021 joey (ref81) 2016 blank (ref41) 2012 ross (ref39) 2020 (ref63) 2020 (ref23) 2020 |
References_xml | – year: 2021 ident: ref66 publication-title: COBIT – year: 2021 ident: ref38 publication-title: NIST Risk Management Framework-RMF – ident: ref15 doi: 10.1108/S1548-6435(2005)0000002006 – year: 2012 ident: ref41 publication-title: Guide for Conducting Risk Assessments – year: 2020 ident: ref40 publication-title: NIST Privacy Framework An Overview – volume: 14 start-page: 1 year: 2019 ident: ref16 article-title: Evaluating privacy and security threats in IoT-based smart home environment publication-title: Int J Appl Eng Res – year: 2019 ident: ref34 publication-title: The Most Influential Security Frameworks of All Time – ident: ref79 doi: 10.30958/ajl.3-3-2 – ident: ref80 doi: 10.1007/s11277-020-07446-4 – year: 2021 ident: ref70 publication-title: 10 Steps to Cyber Security – ident: ref32 doi: 10.1145/2398356.2398377 – ident: ref8 doi: 10.23919/IConAC.2017.8082057 – year: 1300 ident: ref55 – year: 2021 ident: ref68 publication-title: Committee of Spnsoring Organizations of the Treadway Commission – year: 1996 ident: ref82 publication-title: Health Information Privacy – year: 2020 ident: ref63 publication-title: IASME Consortium to Deliver IoT Certification Using Crossword Cybersecurity's Rizikon Assurance Platform – ident: ref18 doi: 10.1155/2018/1032761 – ident: ref33 doi: 10.1186/s13673-017-0087-4 – year: 2021 ident: ref65 publication-title: CIS Controls – year: 2018 ident: ref21 publication-title: Internet of Things Challenges in Storage and Data – ident: ref25 doi: 10.1109/JIOT.2018.2801944 – year: 2021 ident: ref73 publication-title: The Coding Rules to Deliver Resilient and Scalable Software – ident: ref45 doi: 10.6028/NIST.SP.800-14 – ident: ref10 doi: 10.3390/app10124102 – ident: ref5 doi: 10.1109/CCST.2016.7815675 – ident: ref2 doi: 10.1109/ETSecIoT50046.2020.00009 – year: 2021 ident: ref50 publication-title: Cybersecurity Maturity Model Certification – year: 2018 ident: ref42 publication-title: Risk Management Framework for Information Systems and Organizations A System Life Cycle Approach for Security and Privacy – ident: ref1 doi: 10.3390/info7030044 – start-page: 304 year: 2018 ident: ref22 article-title: Privacy mining from IoT-based smart homes publication-title: Proc Int Conf Broadband Wireless Comput Commun Appl (BWCCA) – year: 2021 ident: ref49 publication-title: What is PCI Compliance? – year: 2020 ident: ref72 publication-title: Privacy Act 2020-New Zealand Legislation – year: 2020 ident: ref69 publication-title: Essential eight maturity model – ident: ref78 doi: 10.1109/ICCES.2017.8275309 – ident: ref27 doi: 10.1007/978-981-13-8618-3_26 – year: 2018 ident: ref37 publication-title: Framework for Improving Critical Infrastructure Cybersecurity – year: 2021 ident: ref64 publication-title: HITRUST CSF-One Framework One Assessment Globally – ident: ref7 doi: 10.23919/MIPRO.2017.7973622 – year: 2021 ident: ref74 publication-title: Securing Cloud Services for the Federal Government – ident: ref4 doi: 10.18517/ijaseit.8.1.2115 – year: 2021 ident: ref71 publication-title: TC CYBER Roadmap – year: 2014 ident: ref60 publication-title: Threat assessment & remediation analysis (tara) – year: 2018 ident: ref57 publication-title: Security for Industrial Automation and Control Systems-Part 4-1 Secure Product Development Lifecycle Requirements – year: 2020 ident: ref23 publication-title: Privacy and the Internet of Things – year: 2021 ident: ref77 publication-title: ISO/IEC 27000 family of standards – ident: ref17 doi: 10.1109/EISIC.2016.044 – year: 2021 ident: ref76 publication-title: SCAP Standards – start-page: 119 year: 2011 ident: ref31 article-title: A risk assessment framework and software toolkit for cloud service ecosystems publication-title: Proc Int Conf Cloud Comput GRIDs Virtualization – volume: 8 start-page: 383 year: 2017 ident: ref11 article-title: Security issues in the Internet of Things (IoT): A comprehensive study publication-title: Int J Adv Comput Sci Appl – year: 2021 ident: ref53 publication-title: Cybersecurity Assessment Tools – year: 2021 ident: ref67 publication-title: Protective Security Requirements – ident: ref13 doi: 10.1007/s42979-020-00201-3 – ident: ref46 doi: 10.6028/NIST.SP.800-53r1 – year: 2021 ident: ref59 publication-title: SOC 2-SOC for Service Organizations Trust Services Criteria – ident: ref20 doi: 10.1007/978-3-319-73676-1_11 – ident: ref6 doi: 10.1109/ICIRD.2018.8376320 – year: 2021 ident: ref48 publication-title: Maintaining Payment Security – ident: ref12 doi: 10.1109/FiCloud.2016.57 – year: 2020 ident: ref39 publication-title: Security and privacy controls for information systems and organizations – year: 2021 ident: ref58 publication-title: What is GDPR the EU's new data protection law? – ident: ref29 doi: 10.1002/dac.4228 – year: 2021 ident: ref56 publication-title: CIP Standard – year: 2021 ident: ref75 publication-title: The Federal Information Security Modernization Act (FISMA) – year: 2014 ident: ref35 publication-title: Cybersecurity Framework – year: 2021 ident: ref52 publication-title: Cybersecurity capability maturity model (C2M2) program – year: 2016 ident: ref81 publication-title: Adaptive challenge and the leadership challenge – year: 2021 ident: ref83 publication-title: ETSI standard – ident: ref26 doi: 10.1109/ACCESS.2020.3017221 – year: 2020 ident: ref19 article-title: Smart homes: Security challenges and privacy concerns publication-title: arXiv 2010 15394 – year: 2015 ident: ref3 publication-title: Security and Resilience of Smart Home Environments Good Practices and Recommendations – year: 2011 ident: ref43 publication-title: Managing Information Security Risk-Organization Mission and Information System View – year: 2021 ident: ref36 publication-title: Top Cybersecurity Frameworks – ident: ref24 doi: 10.1088/1742-6596/1140/1/012006 – ident: ref28 doi: 10.1109/ICST46873.2019.9047745 – year: 2021 ident: ref62 publication-title: IASME Governance Audited – start-page: 1 year: 2020 ident: ref9 article-title: Internet of threats introspection in dynamic intelligent virtual sensing publication-title: Proc 1st Workshop Cyber-Phys Social Syst (CPSS) – year: 2018 ident: ref61 article-title: Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0 – year: 2020 ident: ref54 publication-title: The FFIEC Cybersecurity Assessment Tool A Framework for Measuring Cybersecurity Risk and Preparedness in the Financial Industry – ident: ref30 doi: 10.1155/2018/3078272 – year: 2021 ident: ref47 publication-title: Family Educational Rights and Privacy Act – year: 2018 ident: ref51 publication-title: The cybersecurity maturity model A means to measure and improve your cybersecurity program – ident: ref44 doi: 10.6028/NIST.SP.800-12r1 – volume: 6 start-page: 1 year: 2018 ident: ref14 article-title: Privacy and security issues in IoT based smart home applications publication-title: Int J Eng Res Technol |
SSID | ssj0000816957 |
Score | 2.5512795 |
Snippet | Assessing the security of IoT-based smart environments such as smart homes and smart cities is becoming fundamentally essential to implementing the correct... Assessing the security of IoT-based smart environments such as smart homes and smart citiesis becoming fundamentally essential to implementing the correct... |
SourceID | doaj swepub proquest crossref ieee |
SourceType | Open Website Open Access Repository Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 121975 |
SubjectTerms | Computer crime Computer Science Control Measures Datavetenskap Documents Information Systems Informationssystem Internet of Things IoT-based Smart Environments Privacy Risks Security Security Assessment Frameworks Security management Security Standards Smart buildings Smart cities State-of-the-art reviews Taxonomy Threats |
SummonAdditionalLinks | – databaseName: DOAJ Directory of Open Access Journals dbid: DOA link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxgQUBCBgjzARmicT3tMS6vC0KUt6mbZcSyQSoto-v85O26VLnRhShSdk_h89r072e8QelDg8oSKmE-FVhCgEAp3JokD7l0wzaCZ3SA7Tkez-G2ezBulvsyesJoeuFZcFyCF1gG0kLKI00gJDTYnpDTUUJQIywQKPq8RTNk1mJKUJZmjGSIB6-b9PvQIAsKQPBs2TGpOTzdckWXsdyVW9tFmk0HUep3hGTp1cBHn9W-eo6NyeYFOGiSCbTTOcZ3gxyuNJ64cHZ64FMEawxUPt1uw1hhAKn5dTf0euC-FJ1-gATxonHa7RLPhYNof-a5Kgl-khFa-LCUTmdYJQCtFWMxUKCREbUVg8puJUFJEKiySUgaFSgUjYapjBfNaJlmgBImuUGu5WpbXCAvAdkFBIlnGOo6KVAK80kpmLJMKxGMPhVuF8cJRiJtKFgtuQ4mA8VrL3GiZOy176GnX6Ltm0PhbvGdGYidq6K_tAzAK7oyCHzIKD7XNOO5ewhLwwiHxUGc7rtxN1TWHNYuEoYncPPRYj_Xex18-33P7cVl9cBCM2AG5RbXhNGU0uPmPrtyiY6OeOuvTQa3qZ1PeAQ6q5L01-V-NxAO1 priority: 102 providerName: Directory of Open Access Journals |
Title | A Review of Security Standards and Frameworks for IoT-Based Smart Environments |
URI | https://ieeexplore.ieee.org/document/9528421 https://www.proquest.com/docview/2571221548 https://urn.kb.se/resolve?urn=urn:nbn:se:bth-22139 https://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86980 https://doaj.org/article/054ff0ec9bbc463daf048abb016481a4 |
Volume | 9 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTxsxEB5RTnAoLVA1FJAP7Y0N6337GAIRrVQuAcTN8vihVqUJIptLf33HXmcVEKI9rbUa79qasedhzzcAnw2pPGVykTTKGXJQeEMtH8Qh9a6EE9QtXJC9qi5vim935d0GnPS5MNbacPnMDn0znOWbuV76UNmpKGkz9Vnjb8hx63K1-niKLyAhyjoCC_FUnI7GY5oDuYAZH3r8y8bnS68pn4DRH4uqPLUv1zFDg56Z7MD31Qi76yW_hssWh_rPM_DG_53CO3gbDU426iTkPWzY2S5sr8EQ7sHViHVHBGzu2DQWtGPTGGRYMHqyyeoS14KRmcu-zq-TM1KAhk1_k_Cxi7V8uX24mVxcjy-TWGch0RVv2gQtClU7V5JxZrgohMkUkt-nUx8hLZVBlZtMlxZTbSoleFa5wtDOgGWdGsXzD7A5m8_sR2CKrMNU8xxt4YpcV0gGmjNYixoNkRcDyFYMkDqCkPtaGPcyOCOpkB3XpOeajFwbwEnf6aHD4Hid_Mxztif1ANrhBTFCxvUoyVJ1LiVBRNRFlRvlaCtTiB5xrOGKBrrnmdd_JPJtAIcrOZFxsS8k7Xo8y7zvN4Avnew8-fn5z9tR-Dm2PyQR5uIfdPftUjaVaNKDl0fxCbb8hLtI0CFsto9Le0S2UYvHIaZwHJbGX-fEDXQ |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LbxMxEB5V5QAceBVEoIAPcOum6337mIZGKbS5JEW9WR4_BKIkVbO58OsZe51VihBwyiqa3bX1jT2P9XwD8N6QyVMmF0mjnKEAhTd05ZM4ZN6VcIJuCwdkZ9X0svh0VV7twVFfC2OtDYfP7NBfhm_5ZqU3PlV2LEraTH3V-D2y-yXvqrX6jIpvISHKOlIL8VQcj8ZjmgUFgRkfegbMxldM75ifwNIf26rc9TB3WUODpZk8hovtGLsDJt-HmxaH-udv9I3_O4kn8Ci6nGzU6chT2LPLZ_Bwh4jwAGYj1n0kYCvH5rGlHZvHNMOa0S-bbI9xrRk5uuxstUhOyAQaNv9B6sdOdyrmnsPl5HQxniax00KiK960CVoUqnauJPfMcFEIkymkyE-nPkdaKoMqN5kuLabaVErwrHKFob0Byzo1iucvYH-5WtqXwBT5h6nmOdrCFbmukKByBmtRoyHxYgDZFgCpIw2574ZxLUM4kgrZoSY9ajKiNoCj_qabjoXj7-InHtle1FNohz8ICBlXpCRf1bmUVBFRF1VulKPNTCF6zrGGKxrogQevf0jEbQCHWz2RcbmvJe17PMt89DeAD53u3Hn5x29fRuHl2H6VJJiLf8hdtxvZVKJJX_15FO_g_nRxcS7Pz2afX8MDP_kuL3QI--3txr4hT6nFt2GB_AK3Xg_I |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=A%C2%A0Review%C2%A0of%C2%A0Security%C2%A0Standards%C2%A0and%C2%A0Frameworks%C2%A0for%C2%A0IoT-Based%C2%A0Smart%C2%A0Environments&rft.jtitle=IEEE+access&rft.au=Nickson%2C+Karie+M.&rft.au=Sahri%2C+Nor+Masri&rft.au=Yang%2C+Wencheng&rft.au=Valli%2C+Craig&rft.date=2021&rft.issn=2169-3536&rft.eissn=2169-3536&rft.volume=9&rft.spage=121975&rft_id=info:doi/10.1109%2FACCESS.2021.3109886&rft.externalDocID=oai_DiVA_org_bth_22139 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2169-3536&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2169-3536&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2169-3536&client=summon |