Many companies are more and more interested in using IoT devices, either to optimize their processes or due to the lack of alternatives. The situation is similar to some years ago, when cameras were banned on company premises for security considerations, but all modern cell phones had cameras. Observations have shown, that the security properties of IoT devices with a similar functionality might differ significantly. This makes it challenging for a company to identify IoT devices that match its security policy. In order to make it possible for companies to assess the level of security of IoT devices before buying them, we introduce INFINITE, our 3-dimensional INternet oF thINgs maturITy modEl. INFINITE can be used at procurement-time, to find out to which degree an IoT device meets the requirements of the company’s security policy. This simplifies the procurement process, prevents the introduction of IoT devices that cannot be integrated into an enterprise-wide security strategy, and ultimately saves costs. To this end, INFINITE allows us to considers both the software and the hardware life cycle of an IoT device.:1. Introduction
2. Related Work
3. Defining INFINITE
4. Evaluation
5. Conclusion
Identifer | oai:union.ndltd.org:DRESDEN/oai:qucosa:de:qucosa:78215 |
Date | 25 February 2022 |
Creators | Haar, Christoph, Buchmann, Erik |
Publisher | Hochschule für Telekommunikation |
Source Sets | Hochschulschriftenserver (HSSS) der SLUB Dresden |
Language | English |
Detected Language | English |
Type | info:eu-repo/semantics/draft, doc-type:preprint, info:eu-repo/semantics/preprint, doc-type:Text |
Rights | info:eu-repo/semantics/openAccess |
Page generated in 0.0018 seconds