The Best Software Security Practices for Internet of Things


Abstract views: 98 / PDF downloads: 80

Authors

  • Maha Al Wahaibi Sultan Qaboos University
  • Zuhoor Al Khanjari Sultan Qaboos University

DOI:

https://doi.org/10.59287/ijanser.249

Keywords:

Internet of Things (IoT), Software Security, Security Model, Best Practices

Abstract

The Internet of Things (IoT) is one of the most modern technologies of the twenty-first century. Technology for the Internet of Things has been rapidly developed and applied, allowing for a wide range of technological advancements in various sectors of life [1]. This paper intends to explore different software security frameworks that offer recommendations for securing software, such as the IoT Security Maturity Model (SMM) and the Software Assurance Maturity Model (SAMM), Based on these frameworks, the study will identify the most effective practices for securing IoT software. Ultimately, this paper aims to provide valuable insights for software developers, security professionals, and organizations that seek to secure their IoT software and devices.

Downloads

Download data is not yet available.

Author Biographies

Maha Al Wahaibi, Sultan Qaboos University

Computer Science Department, Muscat, Saltant of Oman

Zuhoor Al Khanjari, Sultan Qaboos University

Computer Science Department, Muscat, Saltant of Oman

References

Aakanksha Tewari, B.B. Gupta. (2021). Security, privacy and trust of different layers in Internet-of-Things. Future Generation Computer Systems, 909-920.

Alliance. (2016). Future-proofing the Connected World: 13 Steps to Developing Secure IoT Products.

Arbia Riahi Sfar,Enrico Natalizio,Yacine Challal,Zied Chtourou. (2018). A roadmap for security challenges in the Internet of Things. Digital Communications and Networks, 118-137.

C. Sandescu et al. (2018). Why IoT security is failing. The Need of a Test Driven Security Approach. IEEE, 1-6.

D. Miorandi, S. Sicari, F. De Pellegrini, I. Chlamtac. (2012). Internet of things : Vision, applications and research challenges. Ad Hoc Networks, 1497–1516.

Daniele Miorandia,Sabrina Sicarib Francesco,De PellegriniaImrich Chlamtac. (2012). Internet of things: Vision, applications and research challenges. Ad Hoc Networks, 1497-1516.

Gary McGraw, Ph.D., Sammy Migues, and Jacob West. (2018). Building Security In Maturity Model.

ISO/IEC 27001. (2013). International Organization for Standardization and the International Electrotechnical Commission.

J. Viega and G. McGraw. (2002). Building Secure Software: How to Avoid Security Problems the Right Way. Addison-Wesley.

M. Farooq, M. Waseem, A. Khairi, S. Mazhar. (2015). A critical analysis on the security concerns of internet of things (IoT). Int. J. Comput. Appl., 1-15.

Mark Mbock Ogonji a, George Okeyo, Joseph Muliaro Wafula. (2020). A survey on privacy and security of Internet of Things. Computer Science Review, 1-19.

McGraw, G. (2006). Software Security: Building Security In. Addison-Wesley.

Michael Howard and Steve Lipner. (2006). Microsoft Security Development Lifecycle. United States of America: Microsoft Press.

OWASP. (2006 ). lightweight application security process.

Sandro Nizetic a, Petar Solic, Diego Lopez-de-Ipina Gonzalez-de-Artaza, Luigi Patrono. (2020). Internet of Things (IoT): Opportunities, issues and challenges towards. Journal of Cleaner Production, 1-32.

Sandy Carielli, Matt Eble, Frederick Hirsch, Ekaterina, Rudina, and Ron Zahavi. (2020). IoT Security Maturity Model (SMM). An Industrial Internet Consortium.

Society, I. C. (2019). IEEE Standard for an Architectural Framework for the Internet of Things . IEEE.

Z. Ling et al. (n.d.). IoT Security: An End-to-End View and Case Study.

Chandra, p. (2018). Software Assurance Maturity Model. OWASP

J. R. C. Nurse, S. Creese, and D. De Roure. (2017). Security Risk Assessment in Internet of Things Systems. IEEE, 20-26.

Downloads

Published

2023-03-16

How to Cite

Al Wahaibi, M., & Al Khanjari, Z. (2023). The Best Software Security Practices for Internet of Things. International Journal of Advanced Natural Sciences and Engineering Researches, 7(2), 16–19. https://doi.org/10.59287/ijanser.249

Conference Proceedings Volume

Section

Articles