Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms

Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ dev...

Full description

Autores:
Daniel Díaz López
Blanco Uribe, María
Santiago Cely, Claudia
Tarquino Murgueitio, Daniel
Garcia Garcia, Edwin
Nespoli, Pantaleone
Gómez Mármol, Félix
Tipo de recurso:
Article of investigation
Fecha de publicación:
2018
Institución:
Escuela Colombiana de Ingeniería Julio Garavito
Repositorio:
Repositorio Institucional ECI
Idioma:
eng
OAI Identifier:
oai:repositorio.escuelaing.edu.co:001/1466
Acceso en línea:
https://repositorio.escuelaing.edu.co/handle/001/1466
https://doi.org/10.3390/sym10120669
Palabra clave:
Internet de las cosas
Seguridad informática
Ciberseguridad
Internet of Things
IoT platforms
Information security
IoT security
Rights
openAccess
License
https://creativecommons.org/licenses/by/4.0/
id ESCUELAIG2_345cb6246ba77937ee35a5de1cff7c50
oai_identifier_str oai:repositorio.escuelaing.edu.co:001/1466
network_acronym_str ESCUELAIG2
network_name_str Repositorio Institucional ECI
repository_id_str
dc.title.spa.fl_str_mv Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
title Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
spellingShingle Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
Internet de las cosas
Seguridad informática
Ciberseguridad
Internet of Things
IoT platforms
Information security
IoT security
title_short Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
title_full Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
title_fullStr Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
title_full_unstemmed Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
title_sort Developing Secure IoT Services: A Security-Oriented Review of IoT Platforms
dc.creator.fl_str_mv Daniel Díaz López
Blanco Uribe, María
Santiago Cely, Claudia
Tarquino Murgueitio, Daniel
Garcia Garcia, Edwin
Nespoli, Pantaleone
Gómez Mármol, Félix
dc.contributor.author.none.fl_str_mv Daniel Díaz López
Blanco Uribe, María
Santiago Cely, Claudia
Tarquino Murgueitio, Daniel
Garcia Garcia, Edwin
Nespoli, Pantaleone
Gómez Mármol, Félix
dc.contributor.researchgroup.spa.fl_str_mv CTG-Informática
dc.subject.armarc.spa.fl_str_mv Internet de las cosas
Seguridad informática
Ciberseguridad
topic Internet de las cosas
Seguridad informática
Ciberseguridad
Internet of Things
IoT platforms
Information security
IoT security
dc.subject.proposal.eng.fl_str_mv Internet of Things
IoT platforms
Information security
IoT security
description Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.
publishDate 2018
dc.date.issued.none.fl_str_mv 2018
dc.date.accessioned.none.fl_str_mv 2021-05-21T20:47:51Z
2021-10-01T17:22:49Z
dc.date.available.none.fl_str_mv 2021-05-21
2021-10-01T17:22:49Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coarversion.fl_str_mv http://purl.org/coar/version/c_970fb48d4fbd8a85
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/publishedVersion
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
format http://purl.org/coar/resource_type/c_2df8fbb1
status_str publishedVersion
dc.identifier.issn.none.fl_str_mv 2073-8994
dc.identifier.uri.none.fl_str_mv https://repositorio.escuelaing.edu.co/handle/001/1466
dc.identifier.doi.none.fl_str_mv doi.org/10.3390/sym10120669
dc.identifier.url.none.fl_str_mv https://doi.org/10.3390/sym10120669
identifier_str_mv 2073-8994
doi.org/10.3390/sym10120669
url https://repositorio.escuelaing.edu.co/handle/001/1466
https://doi.org/10.3390/sym10120669
dc.language.iso.spa.fl_str_mv eng
language eng
dc.relation.citationedition.spa.fl_str_mv Volume 10, Número 12, Noviembre 2018
dc.relation.citationendpage.spa.fl_str_mv 34
dc.relation.citationissue.spa.fl_str_mv 12
dc.relation.citationstartpage.spa.fl_str_mv 1
dc.relation.citationvolume.spa.fl_str_mv 10
dc.relation.indexed.spa.fl_str_mv N/A
dc.relation.ispartofjournal.spa.fl_str_mv Symmetry
dc.relation.references.spa.fl_str_mv Gartner. Gartner’s 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage; Gartner: Stamford, CT, USA, 2016
Li, S.; Da Xu, L.; Zhao, S. The Internet of Things: A Survey; Springer: New York, NY, USA, 2015; pp. 243–259.
Yelamarthi, K.; Aman, M.S.; Abdelgawad, A. An application-driven modular IoT architecture. Wirel. Commun. Mob. Comput. 2017, 2017, 1350929. [CrossRef] [PubMed]
Gomes, B.; Muniz, L.; da Silva e Silva, F.J.; Ríos, L.E.T.; Endler, M. A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living. In Proceedings of the 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakech, Morocco, 2–4 June 2015; pp. 1–8.
Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [CrossRef]
Połap, D.; K ˛esik, K.; Ksi ˛azek, K.; Wo´zniak, M. Obstacle Detection as a Safety Alert in Augmented Reality ˙ Models by the Use of Deep Learning Techniques. Sensors 2017, 17, 2803. [CrossRef] [PubMed]
Wo´zniak, M.; Połap, D. Object detection and recognition via clustered features. Neurocomputing 2018, 320, 76–84. [CrossRef]
Zarpelo, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A Survey of Intrusion Detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [CrossRef]
Abdelgawad, A.; Yelamarthi, K. Internet of things (IoT) platform for structure health monitoring. Wirel. Commun. Mob. Comput. 2017, 2017, 6560797. [CrossRef]
Połap, D.; Winnicka, A.; Serwata, K.; K ˛esik, K.; Wo´zniak, M. An Intelligent System for Monitoring Skin Diseases. Sensors 2018, 18, 2552. [CrossRef] [PubMed]
Charmonman, S.; Mongkhonvanit, P. Special consideration for Big Data in IoE or Internet of Everything. In Proceedings of the 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015), Bangkok, Thailand, 18–20 November 2015; pp. 147–150.
Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [CrossRef]
Ju, J.; Kim, M.S.; Ahn, J.H. Prototyping Business Models for IoT Service. Procedia Comput. Sci. 2016, 91, 882–890. [CrossRef]
Gupta, H.; Vahid Dastjerdi, A.; Ghosh, S.K.; Buyya, R. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw. Pract. Exp. 2017, 47, 1275–1296. [CrossRef]
Sarkar, S.; Chatterjee, S.; Misra, S. Assessment of the Suitability of Fog Computing in the Context of Internet of Things. IEEE Trans. Cloud Comput. 2018, 6, 46–59. [CrossRef]
Nespoli, P.; Papamartzivanos, D.; Gómez Mármol, F.; Kambourakis, G. Optimal Countermeasures Selection against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks. IEEE Commun. Surv. Tutor. 2018, 20, 1361–1396. [CrossRef]
Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]
Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [CrossRef]
Perera, C.; Liu, C.H.; Jayawardena, S. The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey. IEEE Trans. Emerg. Top. Comput. 2015, 3, 585–598. [CrossRef]
Ganguly, P. Selecting the right IoT cloud platform. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 316–320.
Guth, J.; Breitenbücher, U.; Falkenthal, M.; Leymann, F.; Reinfurt, L. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT), Paris, France, 23–25 November 2016; pp. 1–6.
Derhamy, H.; Eliasson, J.; Delsing, J.; Priller, P. A survey of commercial frameworks for the Internet of Things. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–8.
Yaqoob, I.; Ahmed, E.; ur Rehman, M.H.; Ahmed, A.I.A.; Al-garadi, M.A.; Imran, M.; Guizani, M. The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Netw. 2017, 129, 444–458. [CrossRef]
Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [CrossRef]
Díaz López, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Morón Castro, S.; Nespoli, P.; Gómez Mármol, F. Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [CrossRef]
Beltran, V.; Skarmeta, A.; Ruiz, P. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT. Wirel. Commun. Mob. Comput. 2017, 2017, 3859836. [CrossRef]
Ferrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Netw. 2017, 2017, 6562953. [CrossRef]
Nespoli, P.; Zago, M.; Huertas Celdrán, A.; Gil Pérez, M.; Gómez Mármol, F.; García Clemente, F.J. A Dynamic Continuous Authentication Framework in IoT-Enabled Environments. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October 2018
Boneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); LNCS: Berlin, Germany, 2011; Volume 6597, pp. 253–273.
Saxena, N.; Choi, B.J.; Lu, R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016, 11, 907–921. [CrossRef]
Goldstein, J.; Pagan, F.; Short, J. Systems and Methods for Providing Dynamic Network Authorization Authentication and Accounting. Patent EP20000973771, 20 October 2000.
Sforzin, A.; Gómez Mármol, F.; Conti, M.; Bohli, J.M. RPiDS: Raspberry Pi IDS—A Fruitful Intrusion Detection System for IoT. In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), Toulouse, France, 18–21 July 2016; pp. 440–448.
Useche Peláez, D.; Díaz López, D.; Nespoli, P.; Gómez Mármol, F. TRIS: A Three-Rings IoT Sentinel to protect against cyber-threats. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October 2018.
Hunke, N.; Rüßmann, M.; Schmieg, F.; Bhatia, A.; Kalra, N. Winning in IoT: It’s All about the Business Processes. Available online: https://www.bcg.com/en-co/publications/2017/hardware-software-energyenvironment-winning-in-iot-all-about-winning-processes.aspx (accessed on 25 October 2018).
Lucero, S. IoT Platforms: Enabling the Internet of Things; IHS Technology: Phoenix, AZ, USA, 2016.
Wootton, C. Samsung ARTIK Reference: The Definitive Developers Guide; Apress: New York, NY, USA, 2016; p. 409
Wootton, C. Beginning Samsung ARTIK—A Guide to Developers; Apress: New York, NY, USA, 2016; p. 396.
Kurniawan, A. Learning AWS IoT: Effectively Manage Connected Devices on the AWS Cloud Using Services Such as AWS Greengrass, AWS Button, Predictive Analytics and Machine Learning; Packt Publishing Ltd.: Birmingham, UK, 2018; p. 278
Tarneberb, W.; Chandrasekaran, V.; Humpherey, M. Experiences Creating a Framework for Smart Traffic Control using AWS IoT. In Proceedings of the 2016 ACM 9th International Conference on Utility and Cloud Computing, Shanghai, China, 6–9 December 2016; pp. 63–69.
Azraq, A.; Chughtai, S.; Mashhour, A.; V Nguyen, D.; Dos Santos, R.M. Enhancing the IBM Power Systems Platform with IBM Watson Services; IBM Redbooks: New York, NY, USA, 2018; p. 218.
Ravulavaru, A. Enterprise Internet of Things Handbook: Build End-to-End IoT Solutions Using Popular IoT Platforms; Packt Publishing: Birmingham, UK, 2018.
PratimRay, P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2016, 1, 35–46.
Vossen, G.; Schonthaler, F.; Dillon, S. The Web at Graduation and Beyond: Business Impacts and Developments; Springer: New York, NY, USA, 2016
EVRYTHNG IoT Smart Products Platform. Available online: https://evrythng.com/ (accessed on 12 July 2018).
Guinard, D.; Trifa, V. Building the Web of Things; Manning Publications Co.: Greenwich, CT, USA, 2016.
Dweet—Data Sharing for IoT. Available online: https://dweet.io/ (accessed on 12 September 2018).
Freeboard—Dashboards for the Internet of Things. Available online: https://freeboard.io/ (accessed on 1 September 2018)
Blackstock, M.; Lea, R. Toward a Distributed Data Flow Platform for the Web of Things (Distributed Node-RED). In Proceedings of the 5th International Workshop on Web of Things (WoT ’14), Cambridge, MA, USA, 8 October 2014; pp. 34–39
Yasumoto, K.; Yamaguchi, H.; Shigeno, H. Survey of Real-Time Processing Technologies of IoT Data Streems. J. Inf. Process. 2016, 24, 195–202.
Kamal, R. Internet of Thinks: Architecture and Design Principles; McGraw Hill Education: New York, NY, USA, 2017.
Kocovic, P.; Behringer, R.; Ramachandran, M.; Mihajlovic, R. Emerging Trends and Applications of the Internet of Things; IGI Global: Hershey, PA, USA, 2017.
Minerauda, J.; Mazhelisb, O.; Suc, X.; Tarkomaa, S. A gap analysis of Internet-of-Things platforms. Comput. Commun. 2016, 89–90, 5–16. [CrossRef]
Mavromoustakis, C.X.; Mastorakis, G.; Dobre, C. Advances in Mobile Cloud Computing and Big Data in the 5G Era; Springer: New York, NY, USA, 2016.
Martino, B.D.; Li, K.C.; Yang, L.T.; Esposito, A. Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives; Springer: New York, NY, USA, 2017
Geng, H. Internet of Things and Data Analytics Handbook; John Wiley & Sons: New York, NY, USA, 2017
Spitzer, C.; Ferrell, U.; Ferrell, T. Digital Avionics Handbook, 3rd ed.; CRC Press: Boca Raton, FL, USA, 2017.
Soro, A.; Ambe, A.H.; Brereton, M. Minding the Gap: Reconciling Human and Technical Perspectives on the IoT for Healthy Ageing. Wirel. Commun. Mob. Comput. 2017, 2017, 7439361. [CrossRef]
Cao, T.D.; Hoang, H.H.; Huynh, H.X.; Nguyen, B.M.; Pham, T.V.; Tran-Minh, Q.; Tran, V.T.; Truong, H.L. Iot services for solving critical problems in vietnam: A research landscape and directions. IEEE Internet Comput. 2016, 20, 76–81. [CrossRef]
Thacker, S.; Pant, R.; Hall, J.W. System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures. Reliab. Eng. Syst. Saf. 2017, 167, 30–41. [CrossRef]
dc.rights.coar.fl_str_mv http://purl.org/coar/access_right/c_abf2
dc.rights.uri.spa.fl_str_mv https://creativecommons.org/licenses/by/4.0/
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.creativecommons.spa.fl_str_mv Atribución 4.0 Internacional (CC BY 4.0)
rights_invalid_str_mv https://creativecommons.org/licenses/by/4.0/
Atribución 4.0 Internacional (CC BY 4.0)
http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
dc.format.extent.spa.fl_str_mv 34 páginas
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.place.spa.fl_str_mv Suiza
dc.source.spa.fl_str_mv https://www.mdpi.com/2073-8994/10/12/669
institution Escuela Colombiana de Ingeniería Julio Garavito
bitstream.url.fl_str_mv https://repositorio.escuelaing.edu.co/bitstream/001/1466/1/license.txt
https://repositorio.escuelaing.edu.co/bitstream/001/1466/2/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf
https://repositorio.escuelaing.edu.co/bitstream/001/1466/3/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf.txt
https://repositorio.escuelaing.edu.co/bitstream/001/1466/4/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf.jpg
bitstream.checksum.fl_str_mv 5a7ca94c2e5326ee169f979d71d0f06e
67545c6e6c2a53442d42be029928fade
6d865603a397f0b64958320213463716
b247436aa5adb67661713db0eac09486
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio Escuela Colombiana de Ingeniería Julio Garavito
repository.mail.fl_str_mv repositorio.eci@escuelaing.edu.co
_version_ 1814355614970675200
spelling Daniel Díaz López9303e2d12adf755fd3107a762b8e0c2f600Blanco Uribe, Maríacca9a88e357cca40939126b944683a23600Santiago Cely, Claudia1ae439eff3acd0e1bbd78d0e7e49030d600Tarquino Murgueitio, Daniel9eb32cced860c4968881cec268abb82f600Garcia Garcia, Edwin4bc47a9786b92386283ad653b3dd4ebf600Nespoli, Pantaleoneca87776112d767308172d768ee634197600Gómez Mármol, Félix05bc37949b22ff833576da93b8602af2600CTG-Informática2021-05-21T20:47:51Z2021-10-01T17:22:49Z2021-05-212021-10-01T17:22:49Z20182073-8994https://repositorio.escuelaing.edu.co/handle/001/1466doi.org/10.3390/sym10120669https://doi.org/10.3390/sym10120669Undoubtedly, the adoption of the Internet of Things (IoT) paradigm has impacted on our every-day life, surrounding us with smart objects. Thus, the potentialities of this new market attracted the industry, so that many enterprises developed their own IoT platforms aiming at helping IoT services’ developers. In the multitude of possible platforms, selecting the most suitable to implement a specific service is not straightforward, especially from a security perspective. This paper analyzes some of the most prominent proposals in the IoT platforms market-place, performing an in-depth security comparison using five common criteria. These criteria are detailed in sub-criteria, so that they can be used as a baseline for the development of a secure IoT service. Leveraging the knowledge gathered from our in-depth study, both researchers and developers may select the IoT platform which best fits their needs. Additionally, an IoT service for monitoring commercial flights is implemented in two previously analyzed IoT platforms, giving an adequate detail level to represent a solid guideline for future IoT developers.Sin lugar a dudas, la adopción del paradigma de Internet de las cosas (IoT) ha impactado en nuestra la vida cotidiana, rodeándonos de objetos inteligentes. Así, las potencialidades de este nuevo mercado atrajeron la industria, por lo que muchas empresas desarrollaron sus propias plataformas de IoT con el objetivo de ayudar a IoT desarrolladores de servicios. En la multitud de plataformas posibles, seleccionar la más adecuada para implementar un servicio específico no es sencillo, especialmente desde una perspectiva de seguridad. Este artículo analiza algunas de las propuestas más destacadas en el mercado de plataformas de IoT, realizando un análisis en profundidad comparación de seguridad utilizando cinco criterios comunes. Estos criterios se detallan en subcriterios, de modo que se pueden utilizar como base para el desarrollo de un servicio de IoT seguro. Aprovechando el conocimiento recopilados de nuestro estudio en profundidad, tanto los investigadores como los desarrolladores pueden seleccionar la plataforma de IoT que se adapta mejor a sus necesidades. Adicionalmente, se implementa un servicio de IoT para monitorear vuelos comerciales en dos plataformas de IoT previamente analizadas, dando un nivel de detalle adecuado para representar una pauta sólida para futuros desarrolladores de IoT.Received: 11 October 2018; Accepted: 30 October 2018; Published: 27 November 2018Faculty of Computer Science, Colombian School of Engineering Julio Garavito, Bogotá, 111166, Colombia; maria.blanco@mail.escuelaing.edu.co (M.B.U.); claudia.santiago@escuelaing.edu.co (C.S.C.); daniel.tarquino@mail.escuelaing.edu.co (D.T.M.); edwin.garcia-ga@mail.escuelaing.edu.co (E.G.G.) Faculty of Computer Science, University of Murcia, 30100 Murcia, Spain; pantaleone.nespoli@um.es (P.N.); felixgm@um.es (F.G.M.) * Correspondence: daniel.diaz@escuelaing.edu.co; Tel.: +571-6683600-26234 páginasapplication/pdfengThis article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).https://creativecommons.org/licenses/by/4.0/info:eu-repo/semantics/openAccessAtribución 4.0 Internacional (CC BY 4.0)http://purl.org/coar/access_right/c_abf2https://www.mdpi.com/2073-8994/10/12/669Developing Secure IoT Services: A Security-Oriented Review of IoT PlatformsArtículo de revistainfo:eu-repo/semantics/publishedVersionhttp://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARThttp://purl.org/coar/version/c_970fb48d4fbd8a85SuizaVolume 10, Número 12, Noviembre 20183412110N/ASymmetryGartner. Gartner’s 2016 Hype Cycle for Emerging Technologies Identifies Three Key Trends That Organizations Must Track to Gain Competitive Advantage; Gartner: Stamford, CT, USA, 2016Li, S.; Da Xu, L.; Zhao, S. The Internet of Things: A Survey; Springer: New York, NY, USA, 2015; pp. 243–259.Yelamarthi, K.; Aman, M.S.; Abdelgawad, A. An application-driven modular IoT architecture. Wirel. Commun. Mob. Comput. 2017, 2017, 1350929. [CrossRef] [PubMed]Gomes, B.; Muniz, L.; da Silva e Silva, F.J.; Ríos, L.E.T.; Endler, M. A comprehensive cloud-based IoT software infrastructure for Ambient Assisted Living. In Proceedings of the 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakech, Morocco, 2–4 June 2015; pp. 1–8.Yaqoob, I.; Ahmed, E.; Hashem, I.A.T.; Ahmed, A.I.A.; Gani, A.; Imran, M.; Guizani, M. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges. IEEE Wirel. Commun. 2017, 24, 10–16. [CrossRef]Połap, D.; K ˛esik, K.; Ksi ˛azek, K.; Wo´zniak, M. Obstacle Detection as a Safety Alert in Augmented Reality ˙ Models by the Use of Deep Learning Techniques. Sensors 2017, 17, 2803. [CrossRef] [PubMed]Wo´zniak, M.; Połap, D. Object detection and recognition via clustered features. Neurocomputing 2018, 320, 76–84. [CrossRef]Zarpelo, B.B.; Miani, R.S.; Kawakani, C.T.; de Alvarenga, S.C. A Survey of Intrusion Detection in Internet of Things. J. Netw. Comput. Appl. 2017, 84, 25–37. [CrossRef]Abdelgawad, A.; Yelamarthi, K. Internet of things (IoT) platform for structure health monitoring. Wirel. Commun. Mob. Comput. 2017, 2017, 6560797. [CrossRef]Połap, D.; Winnicka, A.; Serwata, K.; K ˛esik, K.; Wo´zniak, M. An Intelligent System for Monitoring Skin Diseases. Sensors 2018, 18, 2552. [CrossRef] [PubMed]Charmonman, S.; Mongkhonvanit, P. Special consideration for Big Data in IoE or Internet of Everything. In Proceedings of the 2015 13th International Conference on ICT and Knowledge Engineering (ICT Knowledge Engineering 2015), Bangkok, Thailand, 18–20 November 2015; pp. 147–150.Wollschlaeger, M.; Sauter, T.; Jasperneite, J. The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0. IEEE Ind. Electron. Mag. 2017, 11, 17–27. [CrossRef]Ju, J.; Kim, M.S.; Ahn, J.H. Prototyping Business Models for IoT Service. Procedia Comput. Sci. 2016, 91, 882–890. [CrossRef]Gupta, H.; Vahid Dastjerdi, A.; Ghosh, S.K.; Buyya, R. iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments. Softw. Pract. Exp. 2017, 47, 1275–1296. [CrossRef]Sarkar, S.; Chatterjee, S.; Misra, S. Assessment of the Suitability of Fog Computing in the Context of Internet of Things. IEEE Trans. Cloud Comput. 2018, 6, 46–59. [CrossRef]Nespoli, P.; Papamartzivanos, D.; Gómez Mármol, F.; Kambourakis, G. Optimal Countermeasures Selection against Cyber Attacks: A Comprehensive Survey on Reaction Frameworks. IEEE Commun. Surv. Tutor. 2018, 20, 1361–1396. [CrossRef]Al-Fuqaha, A.; Guizani, M.; Mohammadi, M.; Aledhari, M.; Ayyash, M. Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications. IEEE Commun. Surv. Tutor. 2015, 17, 2347–2376. [CrossRef]Xu, L.D.; He, W.; Li, S. Internet of Things in Industries: A Survey. IEEE Trans. Ind. Inform. 2014, 10, 2233–2243. [CrossRef]Perera, C.; Liu, C.H.; Jayawardena, S. The Emerging Internet of Things Marketplace From an Industrial Perspective: A Survey. IEEE Trans. Emerg. Top. Comput. 2015, 3, 585–598. [CrossRef]Ganguly, P. Selecting the right IoT cloud platform. In Proceedings of the 2016 International Conference on Internet of Things and Applications (IOTA), Pune, India, 22–24 January 2016; pp. 316–320.Guth, J.; Breitenbücher, U.; Falkenthal, M.; Leymann, F.; Reinfurt, L. Comparison of IoT platform architectures: A field study based on a reference architecture. In Proceedings of the 2016 Cloudification of the Internet of Things (CIoT), Paris, France, 23–25 November 2016; pp. 1–6.Derhamy, H.; Eliasson, J.; Delsing, J.; Priller, P. A survey of commercial frameworks for the Internet of Things. In Proceedings of the 2015 IEEE 20th Conference on Emerging Technologies Factory Automation (ETFA), Luxembourg, 8–11 September 2015; pp. 1–8.Yaqoob, I.; Ahmed, E.; ur Rehman, M.H.; Ahmed, A.I.A.; Al-garadi, M.A.; Imran, M.; Guizani, M. The rise of ransomware and emerging security challenges in the Internet of Things. Comput. Netw. 2017, 129, 444–458. [CrossRef]Ammar, M.; Russello, G.; Crispo, B. Internet of Things: A survey on the security of IoT frameworks. J. Inf. Secur. Appl. 2018, 38, 8–27. [CrossRef]Díaz López, D.; Blanco Uribe, M.; Santiago Cely, C.; Vega Torres, A.; Moreno Guataquira, N.; Morón Castro, S.; Nespoli, P.; Gómez Mármol, F. Shielding IoT against cyber-attacks: An event-based approach using SIEM. Wirel. Commun. Mob. Comput. 2018, 2018, 3029638. [CrossRef]Beltran, V.; Skarmeta, A.; Ruiz, P. An ARM-Compliant Architecture for User Privacy in Smart Cities: SMARTIE—Quality by Design in the IoT. Wirel. Commun. Mob. Comput. 2017, 2017, 3859836. [CrossRef]Ferrag, M.A.; Maglaras, L.A.; Janicke, H.; Jiang, J.; Shu, L. Authentication Protocols for Internet of Things: A Comprehensive Survey. Secur. Commun. Netw. 2017, 2017, 6562953. [CrossRef]Nespoli, P.; Zago, M.; Huertas Celdrán, A.; Gil Pérez, M.; Gómez Mármol, F.; García Clemente, F.J. A Dynamic Continuous Authentication Framework in IoT-Enabled Environments. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October 2018Boneh, D.; Sahai, A.; Waters, B. Functional encryption: Definitions and challenges. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); LNCS: Berlin, Germany, 2011; Volume 6597, pp. 253–273.Saxena, N.; Choi, B.J.; Lu, R. Authentication and Authorization Scheme for Various User Roles and Devices in Smart Grid. IEEE Trans. Inf. Forensics Secur. 2016, 11, 907–921. [CrossRef]Goldstein, J.; Pagan, F.; Short, J. Systems and Methods for Providing Dynamic Network Authorization Authentication and Accounting. Patent EP20000973771, 20 October 2000.Sforzin, A.; Gómez Mármol, F.; Conti, M.; Bohli, J.M. RPiDS: Raspberry Pi IDS—A Fruitful Intrusion Detection System for IoT. In Proceedings of the 13th IEEE International Conference on Advanced and Trusted Computing (ATC 2016), Toulouse, France, 18–21 July 2016; pp. 440–448.Useche Peláez, D.; Díaz López, D.; Nespoli, P.; Gómez Mármol, F. TRIS: A Three-Rings IoT Sentinel to protect against cyber-threats. In Proceedings of the Fifth International Conference on Internet of Things: Systems, Management and Security (IoTSMS 2018), Valencia, Spain, 15–18 October 2018.Hunke, N.; Rüßmann, M.; Schmieg, F.; Bhatia, A.; Kalra, N. Winning in IoT: It’s All about the Business Processes. Available online: https://www.bcg.com/en-co/publications/2017/hardware-software-energyenvironment-winning-in-iot-all-about-winning-processes.aspx (accessed on 25 October 2018).Lucero, S. IoT Platforms: Enabling the Internet of Things; IHS Technology: Phoenix, AZ, USA, 2016.Wootton, C. Samsung ARTIK Reference: The Definitive Developers Guide; Apress: New York, NY, USA, 2016; p. 409Wootton, C. Beginning Samsung ARTIK—A Guide to Developers; Apress: New York, NY, USA, 2016; p. 396.Kurniawan, A. Learning AWS IoT: Effectively Manage Connected Devices on the AWS Cloud Using Services Such as AWS Greengrass, AWS Button, Predictive Analytics and Machine Learning; Packt Publishing Ltd.: Birmingham, UK, 2018; p. 278Tarneberb, W.; Chandrasekaran, V.; Humpherey, M. Experiences Creating a Framework for Smart Traffic Control using AWS IoT. In Proceedings of the 2016 ACM 9th International Conference on Utility and Cloud Computing, Shanghai, China, 6–9 December 2016; pp. 63–69.Azraq, A.; Chughtai, S.; Mashhour, A.; V Nguyen, D.; Dos Santos, R.M. Enhancing the IBM Power Systems Platform with IBM Watson Services; IBM Redbooks: New York, NY, USA, 2018; p. 218.Ravulavaru, A. Enterprise Internet of Things Handbook: Build End-to-End IoT Solutions Using Popular IoT Platforms; Packt Publishing: Birmingham, UK, 2018.PratimRay, P. A survey of IoT cloud platforms. Future Comput. Inform. J. 2016, 1, 35–46.Vossen, G.; Schonthaler, F.; Dillon, S. The Web at Graduation and Beyond: Business Impacts and Developments; Springer: New York, NY, USA, 2016EVRYTHNG IoT Smart Products Platform. Available online: https://evrythng.com/ (accessed on 12 July 2018).Guinard, D.; Trifa, V. Building the Web of Things; Manning Publications Co.: Greenwich, CT, USA, 2016.Dweet—Data Sharing for IoT. Available online: https://dweet.io/ (accessed on 12 September 2018).Freeboard—Dashboards for the Internet of Things. Available online: https://freeboard.io/ (accessed on 1 September 2018)Blackstock, M.; Lea, R. Toward a Distributed Data Flow Platform for the Web of Things (Distributed Node-RED). In Proceedings of the 5th International Workshop on Web of Things (WoT ’14), Cambridge, MA, USA, 8 October 2014; pp. 34–39Yasumoto, K.; Yamaguchi, H.; Shigeno, H. Survey of Real-Time Processing Technologies of IoT Data Streems. J. Inf. Process. 2016, 24, 195–202.Kamal, R. Internet of Thinks: Architecture and Design Principles; McGraw Hill Education: New York, NY, USA, 2017.Kocovic, P.; Behringer, R.; Ramachandran, M.; Mihajlovic, R. Emerging Trends and Applications of the Internet of Things; IGI Global: Hershey, PA, USA, 2017.Minerauda, J.; Mazhelisb, O.; Suc, X.; Tarkomaa, S. A gap analysis of Internet-of-Things platforms. Comput. Commun. 2016, 89–90, 5–16. [CrossRef]Mavromoustakis, C.X.; Mastorakis, G.; Dobre, C. Advances in Mobile Cloud Computing and Big Data in the 5G Era; Springer: New York, NY, USA, 2016.Martino, B.D.; Li, K.C.; Yang, L.T.; Esposito, A. Internet of Everything: Algorithms, Methodologies, Technologies and Perspectives; Springer: New York, NY, USA, 2017Geng, H. Internet of Things and Data Analytics Handbook; John Wiley & Sons: New York, NY, USA, 2017Spitzer, C.; Ferrell, U.; Ferrell, T. Digital Avionics Handbook, 3rd ed.; CRC Press: Boca Raton, FL, USA, 2017.Soro, A.; Ambe, A.H.; Brereton, M. Minding the Gap: Reconciling Human and Technical Perspectives on the IoT for Healthy Ageing. Wirel. Commun. Mob. Comput. 2017, 2017, 7439361. [CrossRef]Cao, T.D.; Hoang, H.H.; Huynh, H.X.; Nguyen, B.M.; Pham, T.V.; Tran-Minh, Q.; Tran, V.T.; Truong, H.L. Iot services for solving critical problems in vietnam: A research landscape and directions. IEEE Internet Comput. 2016, 20, 76–81. [CrossRef]Thacker, S.; Pant, R.; Hall, J.W. System-of-systems formulation and disruption analysis for multi-scale critical national infrastructures. Reliab. Eng. Syst. Saf. 2017, 167, 30–41. [CrossRef]Internet de las cosasSeguridad informáticaCiberseguridadInternet of ThingsIoT platformsInformation securityIoT securityLICENSElicense.txttext/plain1881https://repositorio.escuelaing.edu.co/bitstream/001/1466/1/license.txt5a7ca94c2e5326ee169f979d71d0f06eMD51open accessORIGINALDeveloping Secure IoT Services_ A Security-Oriented Review of IoT Platforms.pdfapplication/pdf863440https://repositorio.escuelaing.edu.co/bitstream/001/1466/2/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf67545c6e6c2a53442d42be029928fadeMD52metadata only accessTEXTDeveloping Secure IoT Services_ A Security-Oriented Review of IoT Platforms.pdf.txtDeveloping Secure IoT Services_ A Security-Oriented Review of IoT Platforms.pdf.txtExtracted texttext/plain111575https://repositorio.escuelaing.edu.co/bitstream/001/1466/3/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf.txt6d865603a397f0b64958320213463716MD53open accessTHUMBNAILDeveloping Secure IoT Services_ A Security-Oriented Review of IoT Platforms.pdf.jpgDeveloping Secure IoT Services_ A Security-Oriented Review of IoT Platforms.pdf.jpgGenerated Thumbnailimage/jpeg14635https://repositorio.escuelaing.edu.co/bitstream/001/1466/4/Developing%20Secure%20IoT%20Services_%20A%20Security-Oriented%20Review%20of%20IoT%20Platforms.pdf.jpgb247436aa5adb67661713db0eac09486MD54open access001/1466oai:repositorio.escuelaing.edu.co:001/14662022-08-08 17:40:33.21metadata only accessRepositorio Escuela Colombiana de Ingeniería Julio Garavitorepositorio.eci@escuelaing.edu.coU0kgVVNURUQgSEFDRSBQQVJURSBERUwgR1JVUE8gREUgUEFSRVMgRVZBTFVBRE9SRVMgREUgTEEgQ09MRUNDScOTTiAiUEVFUiBSRVZJRVciLCBPTUlUQSBFU1RBIExJQ0VOQ0lBLgoKQXV0b3Jpem8gYSBsYSBFc2N1ZWxhIENvbG9tYmlhbmEgZGUgSW5nZW5pZXLDrWEgSnVsaW8gR2FyYXZpdG8gcGFyYSBwdWJsaWNhciBlbCB0cmFiYWpvIGRlIGdyYWRvLCBhcnTDrWN1bG8sIHZpZGVvLCAKY29uZmVyZW5jaWEsIGxpYnJvLCBpbWFnZW4sIGZvdG9ncmFmw61hLCBhdWRpbywgcHJlc2VudGFjacOzbiB1IG90cm8gKGVuICAgIGFkZWxhbnRlIGRvY3VtZW50bykgcXVlIGVuIGxhIGZlY2hhIAplbnRyZWdvIGVuIGZvcm1hdG8gZGlnaXRhbCwgeSBsZSBwZXJtaXRvIGRlIGZvcm1hIGluZGVmaW5pZGEgcXVlIGxvIHB1YmxpcXVlIGVuIGVsIHJlcG9zaXRvcmlvIGluc3RpdHVjaW9uYWwsIAplbiBsb3MgdMOpcm1pbm9zIGVzdGFibGVjaWRvcyBlbiBsYSBMZXkgMjMgZGUgMTk4MiwgbGEgTGV5IDQ0IGRlIDE5OTMsIHkgZGVtw6FzIGxleWVzIHkganVyaXNwcnVkZW5jaWEgdmlnZW50ZQphbCByZXNwZWN0bywgcGFyYSBmaW5lcyBlZHVjYXRpdm9zIHkgbm8gbHVjcmF0aXZvcy4gRXN0YSBhdXRvcml6YWNpw7NuIGVzIHbDoWxpZGEgcGFyYSBsYXMgZmFjdWx0YWRlcyB5IGRlcmVjaG9zIGRlIAp1c28gc29icmUgbGEgb2JyYSBlbiBmb3JtYXRvIGRpZ2l0YWwsIGVsZWN0csOzbmljbywgdmlydHVhbDsgeSBwYXJhIHVzb3MgZW4gcmVkZXMsIGludGVybmV0LCBleHRyYW5ldCwgeSBjdWFscXVpZXIgCmZvcm1hdG8gbyBtZWRpbyBjb25vY2lkbyBvIHBvciBjb25vY2VyLgpFbiBtaSBjYWxpZGFkIGRlIGF1dG9yLCBleHByZXNvIHF1ZSBlbCBkb2N1bWVudG8gb2JqZXRvIGRlIGxhIHByZXNlbnRlIGF1dG9yaXphY2nDs24gZXMgb3JpZ2luYWwgeSBsbyBlbGFib3LDqSBzaW4gCnF1ZWJyYW50YXIgbmkgc3VwbGFudGFyIGxvcyBkZXJlY2hvcyBkZSBhdXRvciBkZSB0ZXJjZXJvcy4gUG9yIGxvIHRhbnRvLCBlcyBkZSBtaSBleGNsdXNpdmEgYXV0b3LDrWEgeSwgZW4gY29uc2VjdWVuY2lhLCAKdGVuZ28gbGEgdGl0dWxhcmlkYWQgc29icmUgw6lsLiBFbiBjYXNvIGRlIHF1ZWphIG8gYWNjacOzbiBwb3IgcGFydGUgZGUgdW4gdGVyY2VybyByZWZlcmVudGUgYSBsb3MgZGVyZWNob3MgZGUgYXV0b3Igc29icmUgCmVsIGRvY3VtZW50byBlbiBjdWVzdGnDs24sIGFzdW1pcsOpIGxhIHJlc3BvbnNhYmlsaWRhZCB0b3RhbCB5IHNhbGRyw6kgZW4gZGVmZW5zYSBkZSBsb3MgZGVyZWNob3MgYXF1w60gYXV0b3JpemFkb3MuIEVzdG8gCnNpZ25pZmljYSBxdWUsIHBhcmEgdG9kb3MgbG9zIGVmZWN0b3MsIGxhIEVzY3VlbGEgYWN0w7phIGNvbW8gdW4gdGVyY2VybyBkZSBidWVuYSBmZS4KVG9kYSBwZXJzb25hIHF1ZSBjb25zdWx0ZSBlbCBSZXBvc2l0b3JpbyBJbnN0aXR1Y2lvbmFsIGRlIGxhIEVzY3VlbGEsIGVsIENhdMOhbG9nbyBlbiBsw61uZWEgdSBvdHJvIG1lZGlvIGVsZWN0csOzbmljbywgCnBvZHLDoSBjb3BpYXIgYXBhcnRlcyBkZWwgdGV4dG8sIGNvbiBlbCBjb21wcm9taXNvIGRlIGNpdGFyIHNpZW1wcmUgbGEgZnVlbnRlLCBsYSBjdWFsIGluY2x1eWUgZWwgdMOtdHVsbyBkZWwgdHJhYmFqbyB5IGVsIAphdXRvci5Fc3RhIGF1dG9yaXphY2nDs24gbm8gaW1wbGljYSByZW51bmNpYSBhIGxhIGZhY3VsdGFkIHF1ZSB0ZW5nbyBkZSBwdWJsaWNhciB0b3RhbCBvIHBhcmNpYWxtZW50ZSBsYSBvYnJhIGVuIG90cm9zIAptZWRpb3MuRXN0YSBhdXRvcml6YWNpw7NuIGVzdMOhIHJlc3BhbGRhZGEgcG9yIGxhcyBmaXJtYXMgZGVsIChsb3MpIGF1dG9yKGVzKSBkZWwgZG9jdW1lbnRvLiAKU8OtIGF1dG9yaXpvIChhbWJvcykK