Abstract
The goal of the article is to introduce the security risks connected with intelligent IoT networks and the recommendation of their elimination and the way to sustain them at an adequate level. Recommendations are related to general architecture of IoT for the risk management that presents one of many views for risk managements and their mitigation using standard and obligatory methods. These methods are practically tested within recommendations of general access for elimination of the cybernetic risks within IoT network solutions build on standard and generally accessible components.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andress, J.: The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Second edition. Boston: Elsevier/Syngress, Syngress is a imprint of Elsevier (2014). ISBN 9780128007440
Rjaibi, N., Rabai, L.B.A.: Developing a novel holistic taxonomy of security requirements. Procedia Comput. Sci. 62, 213–220 (2015). https://doi.org/10.1016/j.procs.2015.08.442. https://linkinghub.elsevier.com/retrieve/pii/S1877050915025776. Accessed 11 Feb 2019, ISSN 18770509
Li, S., Tryfonas, T., Li, H.: The Internet of Things: a security point of view. Internet Res. 26(2), 337–359 (2016)
Li, S., Xu, L.D., Romdhani, I.: Securing the Internet of Things. Syngress, Cambridge (2017). ISBN 9780128044582
Hanes, D., Salgueiro, G., Grossetete, P., Barton, R., Henry, J.: IoT Fundamentals: Networking Technologies, Protocols, and Use Cases for the Internet of Things. Cisco Press Fundamentals Series. Cisco Press, Indianapolis (2017). ISBN 9781587144561
Anton-Haro, C., Dohler, M.: Machine-to-machine (M2M) Communications: Architecture, Performance and Applications. Woodhead Publishing Limited, Cambridge (2015). Woodhead Publishing series in electronic and optical materials, no. 69. ISBN 9781782421023
Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29(7), 1645–1660 (2013). https://doi.org/10.1016/j.future.2013.01.010. Accessed 2019-02-09, ISSN 0167739X
Pisching, M.A., Junqueira, F., Santos Filho, D.J., Miyagi, P.E.: An architecture for organizing and locating services to the industry 4.0. In: 23rd ABCM International Congress of Mechanical Engineering Rio de Janeiro Dezembro, pp. 1–8 (2015)
Jing, Q., Vasilakos, A.V., Wan, J., et al.: Wireless Netw. 20, 2481 (2014). https://doi.org/10.1007/s11276-014-0761-7
Hosenkhan, R., Pattanayak, B.K.: A secured communication model for IoT. In: Satapathy, S.C., Bhateja, V., Somanah, R., Yang, X.-S., Senkerik, R. (eds.) Information Systems Design and Intelligent Applications. AISC, vol. 863, pp. 187–193. Springer, Singapore (2019). https://doi.org/10.1007/978-981-13-3338-5_18
Acknowledgment
This work and the contribution were supported by a Specific Research Project, Faculty of Informatics and Management, University of Hradec Kralove, Czech Republic. We would like to thank Mr. L. Mercl, a doctoral student, and Mr. J. Rydl, a graduate, of Faculty of management and informatics, University of Hradec Kralove, for the practical verification of the proposed solutions and close cooperation in the solution.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Horalek, J., Sobeslav, V. (2019). Cybersecurity Analysis of IoT Networks. In: Nguyen, N., Chbeir, R., Exposito, E., Aniorté, P., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2019. Lecture Notes in Computer Science(), vol 11684. Springer, Cham. https://doi.org/10.1007/978-3-030-28374-2_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-28374-2_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-28373-5
Online ISBN: 978-3-030-28374-2
eBook Packages: Computer ScienceComputer Science (R0)